• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

6477 Awareness courses in Cardiff delivered Online

Adverse Childhood Experiences

By Compete High

Overview With the ever-increasing demand for Adverse Childhood Experiences in personal & professional settings, this online training aims at educating, nurturing, and upskilling individuals to stay ahead of the curve - whatever their level of expertise in Adverse Childhood Experiences may be. Learning about Adverse Childhood Experiences or keeping up to date on it can be confusing at times, and maybe even daunting! But that's not the case with this course from Compete High. We understand the different requirements coming with a wide variety of demographics looking to get skilled in Adverse Childhood Experiences. That's why we've developed this online training in a way that caters to learners with different goals in mind. The course materials are prepared with consultation from the experts of this field and all the information on Adverse Childhood Experiences is kept up to date on a regular basis so that learners don't get left behind on the current trends/updates. The self-paced online learning methodology by compete high in this Adverse Childhood Experiences course helps you learn whenever or however you wish, keeping in mind the busy schedule or possible inconveniences that come with physical classes. The easy-to-grasp, bite-sized lessons are proven to be most effective in memorising and learning the lessons by heart. On top of that, you have the opportunity to receive a certificate after successfully completing the course! Instead of searching for hours, enrol right away on this Adverse Childhood Experiences course from Compete High and accelerate your career in the right path with expert-outlined lessons and a guarantee of success in the long run. Who is this course for? While we refrain from discouraging anyone wanting to do this Adverse Childhood Experiences course or impose any sort of restrictions on doing this online training, people meeting any of the following criteria will benefit the most from it: Anyone looking for the basics of Adverse Childhood Experiences, Jobseekers in the relevant domains, Anyone with a ground knowledge/intermediate expertise in Adverse Childhood Experiences, Anyone looking for a certificate of completion on doing an online training on this topic, Students of Adverse Childhood Experiences, or anyone with an academic knowledge gap to bridge, Anyone with a general interest/curiosity Career Path This Adverse Childhood Experiences course smoothens the way up your career ladder with all the relevant information, skills, and online certificate of achievements. After successfully completing the course, you can expect to move one significant step closer to achieving your professional goals - whether it's securing that job you desire, getting the promotion you deserve, or setting up that business of your dreams.   Course Curriculum Module 1 Introduction to ACEs Introduction to ACEs 00:00 Module 2 Understanding Types of ACEs and Their Prevalence Understanding Types of ACEs and Their Prevalence 00:00 Module 3 Neurobiological Impact of ACEs on Brain Development Neurobiological Impact of ACEs on Brain Development 00:00 Module 4 Recognizing Signs and Symptoms of ACEs Recognizing Signs and Symptoms of ACEs 00:00 Module 5 Effective Communication and Trauma-Informed Interventions Effective Communication and Trauma-Informed Interventions 00:00 Module 6 Collaboration, Community Engagement, and Advocacy Collaboration, Community Engagement, and Advocacy 00:00 Module 7 Synthesis and Action Planning Synthesis and Action Planning 00:00 Module 8 Evaluation and Continuous Improvement Evaluation and Continuous Improvement 00:00

Adverse Childhood Experiences
Delivered Online On Demand8 hours
£4.99

Mental Health & Care Law Diploma

By Compete High

🌟 Unlock a Career in Mental Health Advocacy with the Mental Health & Care Law Diploma! 🧠️   Are you passionate about making a difference in the lives of individuals facing mental health challenges? Gain comprehensive insights into the legal landscape surrounding mental health with our cutting-edge course - the 'Mental Health & Care Law Diploma.' This meticulously designed program covers essential modules to empower you with the knowledge and skills needed to navigate the complex intersection of mental health and the law. 📘 Module 1: Introduction to Mental Health Law   Dive into the foundations of mental health law, understanding its evolution, key principles, and the critical role it plays in safeguarding the rights of individuals. Lay the groundwork for a comprehensive understanding of mental health legislation. 📚 Module 2: Mental Health and the Law   Explore the intricate relationship between mental health and legal frameworks. Delve into landmark cases, current statutes, and the legal precedents that shape mental health policies. Develop a nuanced perspective on the legal challenges faced by individuals dealing with mental health issues. ️ Module 3: Legal and Ethical Issues in Mental Health Treatment   Navigate the ethical complexities involved in mental health treatment. Understand the legal obligations of mental health professionals, confidentiality concerns, and the delicate balance between patient autonomy and public safety. Equip yourself with the tools to address ethical dilemmas in real-world scenarios. 🏥 Module 4: The Mental Health Care System   Get an in-depth understanding of the mental health care system, examining its structure, challenges, and opportunities. Explore the integration of legal frameworks within mental health institutions and how they impact the delivery of care. Gain insights into policy implications and potential areas for reform. 🌐 Module 5: Rights of Mental Health Patients   Empower yourself with a comprehensive knowledge of the rights of mental health patients. From informed consent to advocacy, explore the legal safeguards in place to protect the dignity and autonomy of individuals receiving mental health treatment. Learn how to champion the rights of vulnerable populations within the legal framework. 🎓 Why Choose Our Diploma Program? Expert-Led Curriculum: Learn from industry experts and legal professionals at the forefront of mental health advocacy. Practical Insights: Gain real-world insights through case studies, simulations, and practical applications of mental health law. Flexible Learning: Access course materials at your own pace, enabling you to balance your studies with other commitments. Networking Opportunities: Connect with a community of like-minded individuals and professionals dedicated to mental health advocacy.   Embark on a transformative journey towards becoming a knowledgeable and compassionate advocate for mental health rights. Enroll in the 'Mental Health & Care Law Diploma' today and make a meaningful impact in the lives of those who need it the most. Course Curriculum Module 1_ Introduction to Mental Health Law Introduction to Mental Health Law 00:00 Module 2_ Mental Health and the Law Mental Health and the Law 00:00 Module 3_ Legal and Ethical Issues in Mental Health Treatment Legal and Ethical Issues in Mental Health Treatment 00:00 Module 4_ The Mental Health Care System The Mental Health Care System 00:00 Module 5_ Rights of Mental Health Patients Rights of Mental Health Patients 00:00

Mental Health & Care Law Diploma
Delivered Online On Demand5 hours
£4.99

COSHH Training

By Compete High

Product Overview: COSHH Training Course   Course Title: COSHH Training - Control of Substances Hazardous to Health   Introduction: The COSHH Training course is designed to provide comprehensive knowledge and understanding of the Control of Substances Hazardous to Health (COSHH) regulations. These regulations are vital for ensuring the safety and well-being of employees who work with or around hazardous substances. This course equips participants with the necessary skills to identify, assess, and control risks associated with hazardous substances in the workplace.   Modules Overview: Module 1: Introduction to COSHH In this module, participants will gain a foundational understanding of the COSHH regulations, including its scope and legal requirements. Key topics covered include the definition of hazardous substances, responsibilities of employers and employees, and the importance of COSHH assessments. Module 2: Risk Assessment Module 2 focuses on the process of risk assessment in the context of COSHH. Participants will learn how to identify hazards, assess risks, and prioritize control measures. Practical techniques for conducting COSHH risk assessments will be discussed, along with the documentation and review processes involved. Module 3: Control Measures This module delves into the various control measures that can be implemented to minimize or eliminate exposure to hazardous substances. Participants will learn about engineering controls, administrative controls, and personal protective equipment (PPE). Case studies and real-world examples will be used to illustrate effective control measures in different workplace scenarios. Module 4: Emergency Procedures Module 4 covers the importance of emergency preparedness and response in dealing with incidents involving hazardous substances. Participants will learn how to recognize potential emergencies, evacuate safely, and implement emergency procedures. Training on the use of emergency equipment and communication protocols will also be provided. Module 5: Health Effects of Hazardous Substances The final module explores the health effects associated with exposure to hazardous substances. Participants will gain an understanding of the short-term and long-term health risks posed by different types of hazardous substances. Common symptoms of exposure and the importance of early detection and treatment will be discussed. Key Features: Interactive and engaging multimedia content. Practical exercises and case studies for hands-on learning. Quizzes and assessments to reinforce learning objectives. Expert instructors with extensive experience in occupational health and safety. Accessible anytime, anywhere via an online learning platform. Who Should Attend: The COSHH Training course is suitable for employees who work with or around hazardous substances, including but not limited to: Laboratory technicians Manufacturing workers Construction workers Healthcare professionals Facilities managers Health and safety officers Conclusion: With its comprehensive coverage of COSHH regulations and practical guidance on risk assessment, control measures, emergency procedures, and health effects, the COSHH Training course equips participants with the knowledge and skills needed to ensure a safe and healthy work environment in compliance with regulatory requirements. Course Curriculum Module 1_ Introduction to COSHH. Introduction to COSHH. 00:00 Module 2_ Risk Assessment. Risk Assessment. 00:00 Module 3_ Control Measures. Control Measures. 00:00 Module 4_ Emergency Procedures. Emergency Procedures. 00:00 Module 5_ Health Effects of Hazardous Substances. Health Effects of Hazardous Substances. 00:00

COSHH Training
Delivered Online On Demand5 hours
£4.99

Embody, Find your Centre : Get Ready to Dance!

By Niio Dance

embodiment course, somatic movement training, somatic awareness, free mini course to get embodied, find your centre, get grounded, embodiment training, somatic dance course, life coach with somatic intelligence, transformational dance, conscious dance, journey to freedom, mind body soul connection, mind body spirit, dance movement therapy, movementcoach, personaldevelopmentjourney, movementmeditation

Embody, Find your Centre : Get Ready to Dance!
Delivered Online On Demand
FREE

Understanding the LGBTQ+ Community

By traumatraining.uk

Throughout this course, we explore key topics including the historical context of LGBTQ+ rights, the impact of societal attitudes on mental health, and the importance of affirming practices in therapy. You will also learn about the intersectionality of LGBTQ+ identities with other aspects of diversity, such as race, ethnicity, and socioeconomic status, providing a holistic view of your clients’ experiences. Our goal is to create a deeper understanding and awareness of the LGBTQ+ community, empowering you to build meaningful, respectful relationships with clients and colleagues from all backgrounds. By the end of this course, you will be better equipped to challenge biases, advocate for inclusivity, and support the mental health needs of LGBTQ+ individuals.

Understanding the LGBTQ+ Community
Delivered Online On Demand15 months
FREE

Accessible Documents

By Nexus Human

Duration 0.75 Days 4.5 CPD hours This course is intended for Making Microsoft Word documents accessible. Overview Please refer to Overview. During this course students will interact with a variety of Word documents and review components that would render the document inaccessible. Students will enable the Accessibility Checker and the Speak feature and progress through the processes and procedures to meet the AODA mandate. Students will ultimately create an accessible set of styles and use those styles within the document. Adding the Accessibility Checker and the Speak feature Discussions will follow as to the limitations of the checker When the checker won?t run Document Metadata Students will review where and why to add metadata to a Word Document Setting the application language and setting the document language Setting the document title Adding the Author and subject metadata fields Creating Accessible Paragraphs and Columns Students will see the perils of incorrect use of hard returns and text boxes within a document Exercises will have students work with paragraph formatting and column formatting for accessibility Creating Accessible Tables Students will interact with tables that are poorly designed and restricted them to still maintain content but that are now accessible Discussions will surround, changes to how tables are handled when sending to PDF Accessible Imagery Students will discuss the need to images with a document The Alternate text feature will be used and the rationale for adding specific types of descriptions Students will see and understand the rationale for ?in-line- imagery Styles for Navigation Students will use and modify the built-in styles feature of Microsoft Word and create a table of contents Students will see with the use of the navigation pane, how styles impact accessibility Students will also understand the importance of proper styles nesting Headers, Footers and Footnotes Students will discuss and then implement accessible headers and footers Students will discuss footnotes and alternative methods to provide footnotes Verifying Reading Order Students will ?listen? to their documents using the Speak feature Students will enable the selection pane as an accessibility tools and discuss its limitations Creating an Accessible Style Template Students will create several accessible styles including headings and paragraphs Students will save the style within a template Additional course details: Nexus Humans Accessible Documents training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Accessible Documents course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Accessible Documents
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing the Web with Cisco Web Security Applicance v3.0 (SWSA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting This course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA). Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface

Cisco Securing the Web with Cisco Web Security Applicance v3.0 (SWSA)
Delivered OnlineFlexible Dates
Price on Enquiry

SWSA v3.0-Securing the Web with Cisco Web Security Appliance

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SWSA v3.0-Securing the Web with Cisco Web Security Appliance
Delivered OnlineFlexible Dates
Price on Enquiry

Cybersecurity Fundamentals for the Business or End User

By Nexus Human

Duration 0.5 Days 3 CPD hours Overview By the end of the course, delegates will know: The difference between cybersecurity and physical security Identify what information is sought after How to protect valuable data and accounts How to detect a data breach How to respond to an incident How to recover from a data breach A security checklist Why You Should Care What are cybersecurity threats How to improve cybersecurity Account access best practices How to protect cloud-based information How to prevent phishing Detecting a data breach Responding to a data breach Protection against scams

Cybersecurity Fundamentals for the Business or End User
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)
Delivered OnlineFlexible Dates
Price on Enquiry