Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Threat Intelligence Analyst students will be able to proactively collect threat data and implement strategies to limit exposure to those threats. Additionally, they will be prepared to take the C)TIA exam Everywhere you turn today, you hear about the need for threat intelligence analysis! However, in some cases, it is just a buzzword, while in other cases, threat intelligence is being touted as the remedy toward advanced persistent threats. The real question is, how do we leverage threat intelligence to reduce network vulnerabilities without wasting time and money? The answer is simple, Mile2?s Certified Threat Intelligence Analyst course. Mile2?s CTIA course will help security professionals learn how to make good use of the many sources of threat intelligence. It will aid an individual to understand what threat sources are helpful, which specific threats are targeted and which ones may need minor adjustments to monitor within your organization. Mile2?s CTIA course focuses heavily on hands-on labs, concentrating on discerning and interpreting threats and responding to them.ÿ The CTIA course focuses overall on current significant threats, threat actors, and identification procedures so that cyber-security professionals can implement the best policies and procures for their organizational security posture. Once complete, the student will be competent toward improving a company?s existing security infrastructure. Policies and methodologies learned in the CTIA will allow the student to use threat intelligence concepts to decrease overall company risk. Course Outline Threat Intelligence Basics Cyber Threats Threat Actors Case Studies Threat Identification Proactive Approach
Duration 2 Days 12 CPD hours This course is intended for Implementation Consultants Key Technical Business Users involved in a GRC 12.0 project IT Governance Experts Consultants for SAP Security and GRC IT Auditors Business Project Team Leaders Overview This course will prepare you to: Introduce SAP Governance, Risk, and Compliance (GRC) 12.0 Identify key governance, risk, and compliance processes supported in the SAP GRC 12.0 solution Describe key features and business benefits of the integrated solution Identify applications that integrate with the SAP GRC 12.0 solution Describe the purpose and location of key user interface components Discuss harmonized navigation and how authorizations affect what users see Describe how common functions and relative master data are shared across the SAP GRC solutions Describe the IMG organization for GRC 12.0 Describe a general implementation process and key steps This course provides foundation knowledge for SAP Governance, Risk and Compliance (GRC) 12.0. By gaining familiarity with this solution?s harmonized navigation, common functions, shared master data, and the harmonized reporting framework, you will be better able to get the most value out of using the integrated applications in SAP GRC. Introduction to SAP Governance, Risk, and compliance (GRC) 12.0 Solution Introduction Solution Overview ? Enterprise Risk and Compliance Solution Overview ? Access Governance Solution Overview ? International Trade Management Solution Overview ? Cybersecurity Information Architecture, Security, and Authorizations Understanding the SAP Fiori Concept and Architecture Security and Authorizations The SAP GRC 12.0 User Interface Work Centers SAP Fiori Common Functions and Data User Interface Configuration Framework Shared Master Data Implementation and Configuration Streamlined Configuration Reporting Harmonized Reporting Framework SAP HANA Integration
Duration 3 Days 18 CPD hours This course is intended for Built for experienced IT Professionals who want to be familiar with Citrix ADC. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC. Overview Understand the functionality and capabilities of the Citrix ADC Complete the initial setup and configuration of the Citrix ADC appliance Understand Citrix ADC Load Balancing and High Availability configuration options and management Employ recommended tools and techniques to troubleshoot common ADC network and connectivity issues Learn the skills required to implement Citrix ADC Essential components includingsecure Load Balancing, High Availability, and Citrix ADC Management. At the endof the course, students will be able to configure their Citrix ADC environments toaddress traffic delivery and management requirements including Load Balancing,Availability, and ADC Operation Management. Getting Started Introduction to Citrix ADC Feature and Platform Overview Deployment Options Architectural Overview Setup and Management Basic Networking Networking Topology Citrix ADC Components Routing Access Control Lists ADC Platforms Citrix ADC MPX Citrix ADC VPX Citrix ADC CPX Citrix ADC SDX Citrix ADC BLX High Availability Citrix ADC High Availability High Availability Configuration Managing High Availability In Service Software Upgrade Troubleshooting High Availability Load balancing Load Balancing Overview Load Balancing Methods and Monitors Load Balancing Traffic Types Load Balancing Protection Priority Load Balancing Load Balancing Troubleshooting SSL Offloading SSL Overview SSL Configuration SSL Offload Troubleshooting SSL Offload SSL Vulnerabilities and Protections Security Authentication, Authorization, and Auditing Configuring External Authentication Admin Partitions Security Citrix ADC Logging Monitoring with SNMP Reporting and Diagnostics AppFlow Functions Citrix Application Delivery Management Troubleshooting
Duration 2 Days 12 CPD hours This course is intended for DevOps Engineers Software Developers Telecommunications Professionals Architects Quality Assurance & Site Reliability Professionals Overview Automate basic freestyle projects Jenkins Pipelines and Groovy Programming Software lifecycle management with Jenkins Popular plugins Scaling options Integrating Jenkins with Git and GitHub (as well as other Software Control Management platforms) Triggering Jenkins with Webhooks Deploying into Docker and Kubernetes CI / CD with Jenkins This course covers the fundamentals necessary to deploy and utilize the Jenkins automation server. Jenkins enables users to immediately begin automating both their individual and collaborative workflows. Jenkins is a proven solution for a wide variety of tasks ranging from the helpful automation of scripts (such as Python and Ansible) to creating complex pipelines that govern the technical parts of not only Continuous Integration, but Continuous Delivery (CI/CD) as well. Jenkins is free, open source, and easily controlled with a simple web- based UI- it can be expanded by third party plugins and is deployable on nearly any on-site (Linux, Windows and Mac) or cloud platform. Overview of Jenkins Overview of Continuous Integration and Continuous Deployment (CI/CD) Understanding Git and GitHub Git Branching Methods for Installing Jenkins Jenkins Dashboard Jenkins Jobs Getting Started with Freestyle Jobs Triggering builds HTTP Web Hooks Augmenting Jenkins with Plugins Overview of Docker and Dockerfile for Building and Launching Images Pipeline Jobs for Continuous Integration and Continuous Deployment Pipeline Build Stage Pipeline Testing Stage Post Build actions SMTP and Other Notifications Programming Pipelines with Groovy More Groovy Programming Essentials Extracting Jenkins Data Analytics to Support Project Management Troubleshooting Failures Auditing stdout and stderr with Jenkins Jenkins REST API Controlling Jenkins API with Python Jenkins Security Scaling Jenkins Jenkins CLI Building a Kubernetes Cluster and Deploying Jenkins How to start successfully using Jenkins to automate aspects of your job the moment this course ends.
Duration 5 Days 30 CPD hours This course is intended for Test Programme Managers, Test Managers, and anyone else wishing to take the ISTQB© Certified Tester Advanced Level Test Manager examination. Overview Whilst this course is focused on the syllabus, giving participants the maximum chance of passing the examination, it also contains many real world practical examples. On completion of this course, attendees will have an advanced understanding of test design techniques and will be fully prepared to take the ISTQB© Certified Tester Advanced Level Test Manager examination. ISTQB© is the standard for international qualifications in software testing at an advanced level. The course thoroughly prepares attendees for the ISTQB© Certified Tester Advanced Level Test Manager examination. Testing Process The fundamental test process Test levels and test types Test planning, monitoring and control Test analysis Test design Test implementation Test execution Evaluating exit criteria and reporting Test closure activities Test Management Test management in context Risk-based testing and other approaches for test prioritization and effort allocation Test documentation and other work products Project risk management Other test work products Test estimation Defining and using test metrics Business value of testing Distributed, outsourced, and insourced testing Managing the application of industry standards Reviews Management reviews and audits Managing reviews Metrics for reviews Managing formal reviews Defect Management The defect lifecycle and the software development lifecycle Cross-functional defect management Defect report information Assessing process capability with defect report information Improving the Testing Process Introduction Test improvement process Improving the testing process Improving the testing process with TMMI Improving the testing process with TPI Next Improving the testing process with CTP Improving the testing process with STEP Test Tools and Automation Tool selection Return on investment (ROI) Selection process Tool lifecycle Tool metrics People Skills ? Team Composition Individual skills Test team dynamics Fitting testing within an organization Motivation Communication
Duration 1 Days 6 CPD hours This course is intended for This basic course is designed for system administrators, system architects, application developers, quality assurance specialists, and technical sales and marketing professionals. Overview After completing this course, you should be able to: Summarize current business drivers and the need for flexibility Describe enterprise messaging and the capabilities it must provide Identify the main ways that IBM© MQ can impact application design Describe the basic components of IBM© MQ Differentiate between point-to-point and IBM© MQ cluster connectivity Summarize queue manager and queue manager components administrative tasks Contrast the architectural role of IBM© MQ clusters and multiple instance queue managers Describe the security provisions of IBM© MQ and IBM© MQ Advanced Message Security Describe how IBM© MQ is used as part of the communications infrastructure to: Connect application environments, such as the World Wide Web, enterprise transaction systems, and database systems Manage the distribution of publisher information to appropriate subscribers Provide file transfer management with IBM© MQ Managed File Transfer Serve as a JMS provider Interface with WebSphere Application Server Store in-flight messages for IBM© Integration Bus Interact with z/OS applications Facilitate connectivity to mobile environments with IBM© MQ Telemetry Describe the options for deployment to the Cloud In this course, you learn about IBM© MQ V9 basic components and the path that messages follow when they are exchanged between applications. You also learn how IBM© MQ administrative responsibilities can include the management of topic-based publish/subscribe messaging, managed file transfer, and deployments to the cloud. Topics include an overview of the support that IBM© MQ provides for security, publish/subscribe, high availability, administration, logging, auditing, managed file transfer, MQTT, and cloud options. Course introductionIBM© MQ overviewIBM© MQ basicsMessaging styles, topologies, and architecture overviewSystem administration overviewSecurity overviewIntroduction to IBM© MQ Managed File TransferIntroduction to IBM© MQ Telemetry and IBM© MessageSightIntroduction to the IBM© MQ ApplianceExpanding the scope of IBM© MQCourse summary
Duration 5 Days 30 CPD hours This course is intended for Pen Testers Ethical Hackers Network Auditors Cybersecurity Professionals Vulnerability Assessors Cybersecurity Managers IS Managers Overview A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system. You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system. Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants. In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system.ÿ You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system.ÿ ÿ Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants.ÿ In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. Course Outline Business & Technical Logistics of Pen Testing Information Gathering Reconnaissance ? Passive (External Only) Detecting Live Systems ? Reconnaissance (Active) Banner Grabbing and Enumeration Automated Vulnerability Assessment Hacking Operating Systems Advanced Assessment and Exploitation Techniques Evasion Techniques Hacking with PowerShell Networks and Sniffing Accessing and Hacking Web Techniques Mobile and IoT Hacking Report Writing Basics
Duration 5 Days 30 CPD hours This course is intended for Coders Web Application Engineers IS Managers Application Engineers Developers Programmers Overview Upon completion, Certified Secure Web Application Engineer students will be able to establish industry acceptable auditing standards with current best practices and policies. Students will also be prepared to competently take the CSWAE exam. Secure Web Application Engineers work to design information systems that are secure on the web. Organizations and governments fall victim to internet-based attacks every day. In many cases, web attacks could be thwarted but hackers, organized criminal gangs, and foreign agents are able to exploit weaknesses in web applications. The Secure Web programmer knows how to identify, mitigate and defend against all attacks through designing and building systems that are resistant to failure. With this course you will learn how to develop web applications that aren?t subject to common vulnerabilities, and how to test and validate that their applications are secure, reliable and resistant to attack. Course Outline Web Application Security OWASP Top 10 Threat Modeling & Risk Management Application Mapping Authentication and Authorization Attacks Session Management Attacks Application Logic Attacks Data Validation AJAX Attacks Code Review And Security Testing Web Application Penetration Testing Secure SDLC Cryptography Additional course details: Nexus Humans Certified Secure Web Application Engineer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Secure Web Application Engineer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course are Application Consultants, Developers, Developer Consultants, and Technology Consultants. Overview Define Data ServicesDefine Source and Target ConnectionsTrace, Validate, and Debug Data Services JobsUse Data Services TransformsImplement Change Data Capture in Data Services In this course, students will learn how to define data services, source, and target connections, as well as use data services transforms and implement change in data capture within data services. Data Services Defining Data Services Source and Target Metadata Defining Datastores in Data Services Defining a Data Services Flat File Format Batch Job Creation Creating Batch Jobs Batch Job Troubleshooting Writing Comments with Descriptions and Annotations Validating and Tracing Jobs Debugging Data Flows Auditing Data Flows Functions, Scripts, and Variables Using Built-In Functions Using Variables, Parameters, and Scripts Platform Transforms Using Platform Transforms Using the Map Operation Transform Using the Validation Transform Using the Merge Transform Using the Case Transform Using the SQL Transform Error Handling Setting Up Error Handling Changes in Data Capturing Changes in Data Using Source-Based Change Data Capture (CDC) Using Target-Based Change Data Capture (CDC) Data Services (Integrator) Platform Transforms Using Data Services (Integrator) Platform Transforms Using the Pivot Transform Using the Data Transfer Transform Additional course details: Nexus Humans DS10 SAP Data Services - Platform and Transforms training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DS10 SAP Data Services - Platform and Transforms course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. Fundamentals of information privacy Reviewing the modern history of privacy Foundational privacy concepts Data protection roles and fair information practices Exploring the impacts of privacy and data protection regulations on information management Privacy in the IT environment Compliance requirements IT risks Stakeholder privacy expectations Differentiating between privacy and security Core privacy concepts Foundational elements for embedding privacy in IT Common privacy principles Data protection by design and default Privacy considerations in the information life cycle Privacy considerations throughout the stages of the information life cycle Privacy in systems and applications Examining the risks inherent in the IT environment and options for addressing them Identity and access management Credit card information and processing Remote access BYOD and telecommuting Data encryption Additional privacy-enhancing technologies in the enterprise environment Privacy techniques Strengths and weaknesses of authentication techniques Using identifiers Privacy by design Online privacy issues Unique challenges that come from online privacy issues Laws and regulations Online threats Social media E-commerce Tracking technologies Web security protocols Technologies with privacy considerations Privacy considerations associated with a variety of technologies Cloud computing Wireless IDs Location-based services ?Smart? technologies Video/data/audio surveillance Biometric recognition