• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4053 BA courses in Cardiff delivered Live Online

TS619G IBM Spectrum Protect version 8.1.12 Implementation and Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Implementers and administrators who are new to IBM Spectrum Protect data management. Overview Describe the purpose of IBM Spectrum Protect Install and configure the IBM Spectrum Protect components Use the administrative and client interfaces Discuss storage methodology options and create storage pool Customize data movement and retention policies to meet business requirements Configure the IBM Spectrum Protect database and storage pools for protection Optimize client configuration Perform backup, restore, archive and retrieve operations Organize daily tasks required to protect the IBM Spectrum Protect environment Automate and monitor client and administrative tasks and events IBM Spectrum Protect 8.1.12 is a data backup and recovery solution designed to help you manage your data retention, reduce the cost of storage, and provide appropriate recovery point objectives to meet any service level agreement. IBM Spectrum Protect offers improved efficiency and flexibility using object-based data management and policy driven retention.This five-day course will focus on implementation and basic administration of an IBM Spectrum Protect environment. The hands-on lab exercises are performed on a Windows 2016 environment. The course materials include examples of AIX and Linux commands, when different from Windows. Unit 1 Concepts and components Unit 2 Installation and configuration Unit 3 Interfaces and monitoring Unit 4 Storage pools and devices Unit 5 Policy management, data movement, and expiration Unit 6 Server database and storage pool management Unit 7 Client configuration and management Unit 8 Client data protection Unit 9 Daily operations and maintenance Unit 10 Schedules and reports Additional course details: Nexus Humans TS619G IBM Spectrum Protect version 8.1.12 Implementation and Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TS619G IBM Spectrum Protect version 8.1.12 Implementation and Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

TS619G IBM Spectrum Protect version 8.1.12 Implementation and Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Linux Professional Institute Certification (LPIC-1) 102

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Linux Professional Institute Certification (LPIC-1) 102 training is suitable for individuals with roles of: System administrator Network administrator Technician DevOps Overview Upon successful completion of this course, students will be able to: customize shell environments to meet users' needs customize existing scripts or write simple new Bash scripts install and configure X11 add, remove, suspend and change user accounts use cron and systemd timers to run jobs at regular intervals and to use at to run jobs at a specific time localize a system in a different language than English properly maintain the system time and synchronize the clock via NTP manage print queues and user print jobs using CUPS and the LPD compatibility interface manage the persistent network configuration of a Linux host configure DNS on a client host review system configuration to ensure host security in accordance with local security policies know how to set up a basic level of host security use public key techniques to secure data and communication. This course prepares students to take the 102 exam of the LPI level 1 certification. Shells and Shell Scripting Customize and use the shell environment Customize or write simple scripts User Interfaces and Desktops Install and configure X11 Graphical Desktops Accessibility Administrative Tasks Manage user and group accounts and related system files Automate system administration tasks by scheduling jobs Localisation and internationalisation Essential System Services Maintain system time System logging Mail Transfer Agent (MTA) basics Manage printers and printing Networking Fundamentals Fundamentals of internet protocols Persistent network configuration Basic network troubleshooting Configure client side DNS Security Perform security administration tasks Setup host security Securing data with encryption Additional course details: Nexus Humans Linux Professional Institute Certification (LPIC-1) 102 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Linux Professional Institute Certification (LPIC-1) 102 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Linux Professional Institute Certification (LPIC-1) 102
Delivered OnlineFlexible Dates
Price on Enquiry

AN12 IBM Power Systems for AIX II - AIX Implementation and Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This is an intermediate course for anyone with system administrative duties implementing and managing an AIX operating system in a multiuser POWER (System p) partitioned environment. Overview Install and the AIX operating system, filesets, and RedHat Package Manager (RPM) packages Perform system startup and shutdown Discuss and use system management tools such as System Management Interface Tool (SMIT) and IBM systems director console for AIX Manage physical and logical devices Discuss the purpose of the logical volume manager Perform logical volume, paging space and file system management Create and manage user administration Manage AIX user security including enhanced RBAC and implement customized access of file and directories Perform and restore system backups Utilize administrative subsystems, including cron to schedule system tasks Configure TCP/IP networking Define and run basic Workload Partitions (WPAR) Learn to install, customize, and administer the AIX operating system in a POWER (System p) partitioned environment. This course is based on AIX 7.1 running on a Power7 system managed by HMC version 7. Day 1 Introduction to IBM POWER systems, AIX and system administration AIX system management tools System startup and shutdown AIX installation Day 2 AIX software installation and maintenance System configuration and devices System storage overview Working with the Logical Volume Manager Day 3 File systems administration Paging space Backup and restore Day 4 Security and user administration: Part 1 Security and user administration: Part 2 Scheduling and time TCP/IP networking Day 5 TCP/IP networking (continued) Introduction to workload partitions Additional course details: Nexus Humans AN12 IBM Power Systems for AIX II - AIX Implementation and Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AN12 IBM Power Systems for AIX II - AIX Implementation and Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AN12 IBM Power Systems for AIX II - AIX Implementation and Administration
Delivered OnlineFlexible Dates
Price on Enquiry

ES10 IBM Fundamental System Skills in z/OS

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This basic course is for IT personnel with a theoretical background of z/OS. Overview Review the main concepts of z/OS Log on to TSO and start ISPF/PDF Navigate through ISPF/PDF dialogs and use the basic ISPF/PDF functions and the ISPF Editor Use ISPF/PDF to allocate data sets and edit data sets (including hierarchical file system (HFS) files) via the ISPF Editor primary and line commands Use ISPF to create and manipulate (copy, rename, delete, list, sort and merge) data sets Identify security considerations for Multiple Virtual Storage (MVS) data sets and HFS files Describe and use TSO/E commands Perform simple modifications to existing ISPF/PDF panels Invoke a REXX exec and TSO CLIST Tailor existing JCL and submit batch jobs Review job status and job output using SDSF Invoke UNIX processes Manipulate HFS directories and file systems using the UNIX System Services ISHELL This course is designed to teach students the fundamental practical skills to navigate and work in a z/OS environment. This includes the use of ISPF/PDF dialogs, TSO/E commands, JCL, UNIX System Services shell, and BookManager. Review of the z/Architecture and z/OS An Introduction to ISPF, ISPF/PDF, and RACF System familiarization Working with ISPF/PDF (Part 1 & 2) Allocate new data sets ISPF editor primary commands ISPF editor line command Copy/move/rename/delete data sets and members Data set lists Working with TSO/E Using TSO/E commands Working with JCL Submit a job JCL exercises Working with UNIX System Services Procedures ISHELL and hierarchical file system Additional course details: Nexus Humans ES10 IBM Fundamental System Skills in z/OS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ES10 IBM Fundamental System Skills in z/OS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ES10 IBM Fundamental System Skills in z/OS
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle Solaris 11 System Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The course provides an intensive hands-on experience for key system administration tasks with the goal of making the system administrator job-ready. Overview Administer the Oracle Solaris 11 Host on an Existing Network Administer Oracle Solaris Zones Control Access to Systems and Files Install Oracle Solaris 11 Operating System Administer User Accounts Administer System Processes and Schedule System Tasks Manage Data by Using ZFS Manage Boot and Shutdown of a System Administer Services by Using SMF Administer Software Packages by Using IPS and Manage Boot Environments Describe the use of IPS in packaging the Oracle Solaris OS Manage boot environments Updating the OS by using IPS The Oracle Solaris 11 System Administration training covers the full range of introductory system administration tasks on Oracle Solaris 11.3 OS. The topics covered range from installing the operating system on a single system, to monitoring and basic troubleshooting. The Oracle Solaris 11 System Administration course is designed to provide new system administrators, as well as enterprise system administrators who are new to the Oracle Solaris 11 Operating System, with the skills they need to perform their job tasks successfully and efficiently. Installing Oracle Solaris 11 Operating System Introduction to Oracle Solaris 11 OS Planning for Oracle Solaris 11 OS installation Installing Oracle Solaris 11 OS by Using the Live Media Installer Installing Oracle Solaris 11 OS Using the Text Installer Verifying the OS Installation Managing Boot and Shutdown of Systems Analyze the boot design and boot process Boot a SPARC-based system Boot an x86-based system Shut down a system Administering Services by Using SMF Describing SMF and its components Administering SMF Services Administering Software Packages by Using IPS and Managing Boot Environments Describing IPS, its components, and interfaces Configuring an IPS Client to Access the Local IPS Repository Managing Package Publishers Managing Software Packages Managing Signed Packages and Package Properties Describe the use of IPS in packaging the Oracle Solaris OS Manage boot environments Updating the OS by using IPS Managing Data by Using ZFS Introducing ZFS Administering ZFS Storage Pools Administering ZFS File Systems Administering ZFS Properties Administering ZFS Snapshots and Clones Administering the Network Reviewing Networking Fundamentals Administering Datalink Configuration Administering a Network Interface Administering Profile-Based Network Configuration Configuring a Virtual Network Verifying the Network Operations Managing Resources on the Virtual Network Administering Oracle Solaris Zones Introducing Oracle Solaris Zones Configuring an Oracle Solaris Zone Determining an Oracle Solaris Zone Configuration Controlling Access to Systems and Files Controlling Access to Systems Controlling Access to Files Securing Access to Remote Host Administering User Accounts Getting Started with the User Administration Setting Up User Accounts Maintaining User Accounts Configuring User Disk Quotas Managing System Processes and System Tasks Managing System Processes Scheduling System Administration Tasks

Oracle Solaris 11 System Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Cisco Networks with Open Source Snort v2.1 (SSFSNORT)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for technical professionals who need to know how to deploy open source intrusion detection systems (IDS) and intrusion prevention systems (IPS), and how to write Snort rules. Security administrators Security consultants Network administrators System engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe Snort technology and identify resources available for maintaining a Snort deployment Install Snort on a Linux-based operating system Describe the Snort operation modes and their command-line options Describe the Snort intrusion detection output options Download and deploy a new rule set to Snort Describe and configure the snort.conf file Configure Snort for inline operation and configure the inline-only features Describe the Snort basic rule syntax and usage Describe how traffic is processed by the Snort engine Describe several advanced rule options used by Snort Describe OpenAppID features and functionality Describe how to monitor Snort performance and how to tune rules The Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1 course shows you how to deploy a network intrusion detection system based on Snort. You?ll learn how to install, configure, operate, and manage a Snort system, rules writing with an overview of basic options, advanced rules writing, how to configure Pulled Pork, and how to use OpenAppID to provide protection of your network from malware. You will learn techniques of tuning and performance monitoring, traffic flow through Snort rules, and more Course outline Introduction to Snort Technology Snort Installation Snort Operation Snort Intrusion Detection Output Rule Management Snort Configuration Inline Operation and Configuration Snort Rule Syntax and Usage Traffic Flow Through Snort Rules Advanced Rule Options OpenAppID Detection Tuning Snort Additional course details: Nexus Humans Cisco Securing Cisco Networks with Open Source Snort v2.1 (SSFSNORT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Securing Cisco Networks with Open Source Snort v2.1 (SSFSNORT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Securing Cisco Networks with Open Source Snort v2.1 (SSFSNORT)
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat Cloud-native Microservices Development with Quarkus (DO378)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for application developers. Overview Deploy microservice applications on Red Hat© OpenShift Container Platform. Build a microservice application with Quarkus. Implement unit and integration tests for microservices. Use the config specification to inject data into a microservice. Secure a microservice using OAuth. Build and deploy native Quarkus applications. Develop microservice-based applications with Quarkus and OpenShift. Many enterprises are looking for a way to take advantage of cloud-native architectures, but many do not know the best approach. Quarkus is an exciting new technology that brings the reliability, familiarity, and maturity of Java Enterprise with a container-ready lightning fast deployment time. Red Hat Cloud-native Microservices Development with Quarkus (DO378) emphasizes learning architectural principles and implementing microservices based on Quarkus and OpenShift. You will build on application development fundamentals and focus on how to develop, monitor, test, and deploy modern microservices applications.. This course is based on OpenShift 4.5 and Quarkus 1.7L 1 - Describe microservice architectures Describe components and patterns of microservice-based application architectures. 2 - Implement a microservice with Quarkus Describe the specifications in Quarkus, implement a microservice with some of the specifications, and deploy it to an OpenShift cluster. 3 - Build microservice applications with Quarkus Build a persistent and configurable distributed quarkus microservices application. 4 - Implement fault tolerance Implement fault tolerance in a microservice architecture. 5 - Build and deploy native Quarkus applications Describe Quarkus in native mode and describe its deployment on OpenShift Container Platform. 6 - Test microservices Implement unit and integration tests for microservices. 7 - Create application health checks Create a health check for a microservice. 8 - Secure microservices Secure microservice endpoints and communication. 9 - Monitor microservices Monitor the operation of a microservice using metrics and distributed tracing. Additional course details: Nexus Humans Red Hat Cloud-native Microservices Development with Quarkus (DO378) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Cloud-native Microservices Development with Quarkus (DO378) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat Cloud-native Microservices Development with Quarkus (DO378)
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Configuring BIG-IP LTM: Local Traffic Manager

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP LTM system. This course gives network professionals a functional understanding of BIG-IP Local Traffic Manager, introducing students to both commonly used and advanced BIG-IP LTM features and functionality. Incorporating lecture, extensive hands-on labs, and classroom discussion, the course helps students build the well-rounded skill set needed to manage BIG-IP LTM systems as part of a flexible and high performance application delivery network. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Module 2: Reviewing Local Traffic Configuration Reviewing Nodes, Pools, and Virtual Servers Reviewing Address Translation Reviewing Routing Assumptions Reviewing Application Health Monitoring Reviewing Traffic Behavior Modification with Profiles Reviewing the TMOS Shell (TMSH) Reviewing Managing BIG-IP Configuration Data Module 3: Load Balancing Traffic with LTM Exploring Load Balancing Options Using Priority Group Activation and Fallback Host Comparing Member and Node Load Balancing Module 4: Modifying Traffic Behavior with Persistence Reviewing Persistence Introducing SSL Persistence Introducing SIP Persistence Introducing Universal Persistence Introducing Destination Address Affinity Persistence Using Match Across Options for Persistence Module 5: Monitoring Application Health Differentiating Monitor Types Customizing the HTTP Monitor Monitoring an Alias Address and Port Monitoring a Path vs. Monitoring a Device Managing Multiple Monitors Using Application Check Monitors Using Manual Resume and Advanced Monitor Timer Settings Module 6: Processing Traffic with Virtual Servers Understanding the Need for Other Virtual Server Types Forwarding Traffic with a Virtual Server Understanding Virtual Server Order of Precedence Path Load Balancing Module 7: Processing Traffic with SNATs Overview of SNATs Using SNAT Pools SNATs as Listeners SNAT Specificity VIP Bounceback Additional SNAT Options Network Packet Processing Module 8: Modifying Traffic Behavior with Profiles Profiles Overview TCP Express Optimization TCP Profiles Overview HTTP Profile Options OneConnect Offloading HTTP Compression to BIG-IP HTTP Caching Stream Profiles F5 Acceleration Technologies Module 9: Selected Topics VLAN, VLAN Tagging, and Trunking Restricting Network Access SNMP Features Segmenting Network Traffic with Route Domains Module 10: Deploying Application Services with iApps Simplifying Application Deployment with iApps Using iApps Templates Deploying an Application Service Leveraging the iApps Ecosystem on DevCentral Module 11: Customizing Application Delivery with iRules and Local Traffic Policies Getting Started with iRules Configuring and Managing Policy Rules Module 12: Securing Application Delivery with LTM Understanding Today?s Threat Landscape Integrating LTM Into Your Security Strategy Defending Your Environment Against SYN Flood Attacks Defending Your Environment Against Other Volumetric Attacks Addressing Application Vulnerabilities with iRules and Local Traffic Policies Detecting and Mitigating Other Common HTTP Threats Module 13: Final Lab Project About the Final Lab Project

F5 Networks Configuring BIG-IP LTM: Local Traffic Manager
Delivered OnlineFlexible Dates
Price on Enquiry

GRC330 SAP Process Control 10.1 - Implementation and Configuration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Implmentation Consultants, Business Users, IT Governance Experts, Compliance Managers Overview Discuss the purpose and business use of Process ControlDescribe key features and related harmonization topicsDescribe risk-based internal controlsConfigure Process Control customizing settings and those shared across GRCCreate and manage master dataDiscuss security and authorization requirementsImplement the Process Control solutionUse risk-managed financial compliance practicesPlan and process surveys and testsSet up and maintain Continuous MonitoringIntegrate and use Process Control with Policy ManagementDiscuss operational complianceAggregate deficienciesUse the harmonized reporting frameworkDescribe the use of custom-defined fields and document search This course offers hands-on configuration and implementation of SAP Process Control 10.1, as well as important concepts you will need to know in order to prepare for implementation and ongoing prevention of process risk. Enterprise Goverance, Riskl, and Compliance (eGRC) Risk-Based Approach to Managing Compliance Initiatives Integrated GRC Approach Governance Governance Overview Governance Using Process Control 10.1 Daily Business Use Harmonization Overview Harmonization Concepts Work Centers Setting Up an Entry Page Technical Landscape Configuration Requirements Customizing Central Tasks Shared Master Data and Reports Workflow Authorization Updates Process Control-Specific Customizing Create & Manage Master Data Master Data Overview Setting Up an Organization Hierarchy Setting Up the Account Group Hierarchy Setting Up the Central Process Hierarchy Setting Up the Indirect Entity-Level Control Hierarchy Harmonized Risk Model Uploading Master Data with MDUG Content Lifecycle Management Master Data Change Request Workflow Surveys and Manual Tests Survey and Test Overview Planner Overview Assessment Survey Manual Test Manual Test ? Offline Forms and Data Sheets Disclosure Survey Issue Remediation Risk-Managed Financial Compliance Risk-Based Financial Compliance Materiality Analysis Risk Assessment Control Risk Rating Test Strategy Risk Coverage Analysis Integration with SAP Audit Management Ad Hoc Issues Ad Hoc Issues Integration with SAP Fraud Management Policy Management Policy Management ? Overview Configuring Policy Management Policy Lifecycle Management Continuous Monitoring Continuous Monitoring ? Overview Continuous Monitoring ? Preconfiguration Creating a Data Source Creating a Business Rule Assigning Business Rules to a Control Scheduling a Continuous Monitoring Job Monitoring a Continuous Monitoring Job SAP Queries SAP BW Query Setting Up a Configurable Rule Subscenario Create a Programmed Rule ABAP Reports Process Integration Subscenario SoD Integration Web Service for Continuous Monitoring Event-Based Monitoring SAP HANA Views New CCM Content Upload Capabilities Operational Compliance Overview Operational Compliance Overview and Key Trends CAPA Operational Compliance-Specific Focus in CCM Closing Activies in an ICS Management Cycle Sign-Off Aggregation of Deficiencies Reporting Reports Overview Report Framework Harmonization Dashboard Overview Security & Authorization Security and Authorization ? Overview Authorization Configuration and Setup Implementation Scope and Approach Implementation Scope and Approach Establishing a Compliance Framework Configuring a Multi-Compliance Framework (MCF) Other Process Control Features Custom-Defined Fields Document Search

GRC330 SAP Process Control 10.1 - Implementation and Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Data Center Security - Server Advanced 6.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for information technology professionals, security professionals, network, system managers and administrators tasked with installing, configuring and maintaining Symantec Data Center Security: Server Advanced. Overview At the completion of the course, you will be able to: Describe the major components of Symantec Data Center Security: Server Advanced and how they communicate. Install the management server, console and agent. Define, manage and create assets, policies, events and configurations. Understand policy creation and editing in depth. course is an introduction to implementing and managing a Symantec Data Center Security: Server Advanced 6.0 deployment. Introduction Course Overview The Classroom Lab Environment Introduction to Security Risks and Risk Security Risks Security Risk Management Managing and Protecting Systems Corporate Security Policies and Security Assessments Host-Based Computer Security Issues SDCS:Server Advanced Overview SDCS: Server Advanced Component Overview Policy Types and Platforms Management Console Overview Agent User Interface Overview DEMO of Management Console Installation and Deployment Planning the Installation Deploying SDCS:SA for High Availability Scalability Installing the Management Server Installing the Management Console Installing a Windows Agent Installing a UNIX Agent LAB: Install Manager and Agents Configuring Assets Asset and Agent Overview Viewing Agents and Assets Managing Agents Managing Agents on Assets LAB: Create Asset Groups LAB: Examine Agent Interface Policy Overview Policies Defined Prevention Policy Overview Process Sets Resource Access Policy Options Detection Policy Overview IDS Capabilities Rules Collectors Policy Management Workspace User Interface on Agent Example Use Cases LAB: Paper Based Scenarios LAB: What type of security strategy should be used? Detailed Prevention Policies Policy Editor Policy Structure Global Policy Options Service Options Program Options Policy Processing Order Network Rules File Rules Registry Rules Process Sets Predefined Policies LAB: Deploy Strict policy LAB: Examine Functionality Advanced Prevention Profiling Applications Customizing Predefined Policies LAB: Modify Policy Previously Deployed LAB: Re-examine Functionality LAB: Preparing for Policy deployment LAB: Best Practice - Covering Basics LAB: Further Enhance Strict Policy LAB: Create Custom Process Set LAB :Secure an FTP Server LAB: Troubleshoot Policy/pset Assignment Using CLI Detection Policies Detection Policies Structure Collectors Rules Predefined Detection Policies Creating a Detection Policy Using the Template Policy LAB: Deploy Baseline Policy LAB: Create Custom Policy Event Management Events Defined Viewing Events Reports and Queries Overview Creating Queries and Reports Creating Alerts LAB: View Monitor Types and Search Events LAB: Create Real Time Monitor Agent Management and Troubleshooting Configurations Defined Creating and Editing Configurations Common Parameters Prevention Settings Detection Settings Analyzing Agent Log Files Diagnostic Policies Local Agent Tool ? sisipsconfig LAB: Create Custom Configurations LAB: Implement Bulk Logging LAB: Disable Prevention on Agent Using CLI LAB: Use Diagnostic Policy to Gather Logs LAB: Troubleshoot a Policy System Management Managing Users and Roles Server Security Viewing and Managing Server Settings Viewing and Managing Database Settings Viewing and Managing Tomcat Settings LAB: Create a New User LAB: View System Settings

Symantec Data Center Security - Server Advanced 6.0
Delivered OnlineFlexible Dates
Price on Enquiry