Duration 5 Days 30 CPD hours This course is intended for Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff Overview The Palo Alto Networks Firewall 10.2 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo Alto Networks next-generation firewalls Configure and manage Security and NAT policies to enable approved traffic to and from zones Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs Monitor network traffic using the interactive web interface and firewall reports Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud. Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud.
Duration 4 Days 24 CPD hours This course is intended for This course is intended for: Network administrators Network engineers with little or no programming or Python experience Network managers Systems engineers Overview After taking this course, you should be able to: Create a Python script Describe data types commonly used in Python coding Describe Python strings and their use cases Describe Python loops, conditionals, operators, and their purposes and use cases Describe Python classes, methods, functions, namespaces, and scopes Describe the options for Python data manipulation and storage Describe Python modules and packages, their uses, and their benefits Explain how to manipulate user input in Python Describe error and exception management in Python Describe Python code debugging methods The Programming for Network Engineers (PRNE) v2.0 course is designed to equip you with fundamental skills in Python programming. Through a combination of lectures and lab experience in simulated network environments, you will learn to use Python basics to create useful and practical scripts with Netmiko to retrieve data and configure network devices. Upon completion of this course, you should have a basic understanding of Python, including the knowledge to create, apply, and troubleshoot simple network automation scripts. Course Outline Introducing Programmability and Python for Network Engineers Scripting with Python Examining Python Data Types Manipulating Strings Describing Conditionals, Loops, and Operators Exploring Classes, Methods, Functions, Namespaces, and Scopes Exploring Data Storage Options Exploring Python Modules and Packages Gathering and Validating User Input Analyzing Exceptions and Error Management Examining Debugging Methods Course Summary
Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT professionals who will be responsible for the support of guests and other virtual machines running in the z/VM environment. It assumes that these persons will have little or no experience in the z/VM environment. Additionally anyone responsible for installing, customizing, and maintaining Linux on System z. Overview Describe the process of running guests under z/VM Define virtual machines to z/VM and reload the directory Customize the CP component of the z/VM system Customize the TCP/IP files on z/VM Apply service to the z/VM system Install SUSE Linux on System z Install additional packages Describe zLinux system management process Describe zLinux backup and recovery procedures Manage and update zLinux network connectivity issues Implement the z/VM Performance Toolkit Prerequisite to z/VM and Linux Connectivity and Management (ZV100) Prerequisite to z/VM RACF and DirMaint Implementation (ZV200) Introduces system programmers to the tasks required to support a z/VM operating system; providing an overview of the processes required to install z/VM & perform the required tailoring steps to support guest operating system virtual machines & CMS users. z/VM and zLinux overview . Installation . Directory . CP system configuration . z/VM networking . VMSES/E . Installing SUSE Linux on System z . Installing additional packages . Network connectivity . System management . Backup and recovery . z/VM Performance Toolkit configuration .
Duration 5 Days 30 CPD hours About Oracle Database Oracle Database Architecture Database Instance and Storage Starting and stopping Oracle Database Connecting with Oracle Database: Oracle Net Services User and Access Management Authentication Authorisation Auditing Backup & Recovery Data Pump Cold/Hot Backup Flashback RMAN Database Performance and Tuning Transaction Management and Undo Execution Plans and Indexes Enterprise Manager Diagnostics & Tuning Packs Other performance and tuning methods Optional: Introduction to High Availability Automatic Storage Management (ASM) Real Application Clusters (RAC) Data Guard and Active Data Guard Additional course details: Nexus Humans Oracle DBA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle DBA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Network Video Operator and Administrator Voice / UC / Collaboration / Communications Engineer Collaboration Tools Engineer Collaboration Sales / Systems Engineer Overview Upon completing this course, the learner will be able to meet these overall objectives: Install, configure, maintain, and troubleshoot Cisco visual collaboration solutions. This course assists the student in preparing for the Cisco TelePresence Video Specialist Certification. Upon completing this course, the learner will be able to meet these overall objectives Module 1: Advanced Cisco Expressway Features Introducing Cisco video network solutions Exploring Cisco Expressway basic setup Explaining regular expressions in a Cisco Expressway environment Deploying components of Cisco Expressway Security Exploring the fundamentals of subzonesÿ Administering call control Implementing subzone bandwidth management Implementing zones Exploring clustering Applying troubleshooting Module 2: Advanced Cisco Meeting Server Features Introducing the Cisco meeting server Exploring API configuration Exploring resilient and scalable deployments Additional features Module 3: Cisco Collaboration Meeting Room Solutions with Cisco TelePresence Server Introducing Collaboration Meeting Room cloud, premises, and hybrid products Deploying the TelePresence Server and TelePresence conductor Applying troubleshooting to Cisco CMR Premises Solutions Module 4: Cisco TelePresence Management Suite (TMS) Solution Explaining Cisco TMS Installation Describing TMS operation Explaining TMS conference scheduling and management Configuring permissions Applying troubleshooting Module 5: Cisco Cloud Solutions - WebEx and Spark Introducing WebEx and Spark cloud solutions Exploring Spark administration configuration Deploying Spark hybrid services Exploring Spark APIs and BOTs configuration Module 6: Cisco TelePresence Content Server (Optional Module) Examining Cisco TCS operation and configuration
Duration 1 Days 6 CPD hours We?ve all met that dynamic, charismatic person that just has a way with others, and has a way of being remembered. This workshop will help participants work towards being that unforgettable person by providing communication skills, negotiation techniques, tips on making an impact, and advice on networking and starting conversations. 1 - Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives 2 - Verbal Communication Skills Listening and Hearing: They Aren?t the Same Thing Asking Questions Communicating with Power 3 - Non-Verbal Communication Skills Body Language The Signals You Send to Others It?s Not What You Say, It?s How You Say It 4 - Making Small Talk and Moving Beyond The Four Levels of Conversation 5 - Moving the Conversation Along Asking for Examples Using Repetition Using Summary Questions Asking for Clarity and Completeness 6 - Remembering Names Creating a Powerful Introduction Using Mnemonics Uh-Oh?I?ve Forgotten Your Name 7 - Influencing Skills Seeing the Other Side Building a Bridge Giving In Without Giving Up 8 - Bringing People to Your Side A Dash of Emotion Plenty of Facts Bringing It All Together 9 - Sharing Your Opinion Using I-Messages Disagreeing Constructively Building Consensus 10 - Negotiation Basics Preparation Opening Bargaining Closing 11 - Making An Impact Creating a Powerful First Impression Assessing a Situation Being Zealous without Being Offensive 12 - Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations
Duration 0.5 Days 3 CPD hours This course is intended for This course is primarily designed for business leaders, consultants, product and project managers, and other decision-makers who are interested in growing the business by leveraging the power of AI. Other individuals who wish to explore basic AI concepts are also candidates for this course. This course is also designed to assist students in preparing for the CertNexus AIBIZ⢠(Exam AIZ-210) credential. Overview In this course, you will identify ways in which AI can bring significant value to the business. You will: Describe AI fundamentals. Identify the functions of AI in business. Implement business requirements for AI. Artificial intelligence (AI) is not just another technology or process for the business to consider?it is a truly disruptive force, one that delivers an entirely new level of results across business sectors. Even organizations that resist adopting AI will feel its impact. If the organization wants to thrive and survive in this transforming business landscape, it will need to harness the power of AI. This course is designed to help business professionals conquer and move beyond the basics of AI to apply AI concepts for the benefit of the business. It will give you the essential knowledge of AI you'll need to steer the business forward. Lesson 1: AI Fundamentals Topic A: A Brief History of AI Topic B: AI Concepts Lesson 2: Functions of AI in Business Topic A: Improve User Experiences Topic B: Segment Audiences Topic C: Secure Assets Topic D: Optimize Processes Lesson 3: Implementing Business Requirements for AI Topic A: Identify Design Requirements Topic B: Identify Data Requirements Topic C: Identify Risks in Implementing AI Topic D: Develop an AI Strategy
Duration 2 Days 12 CPD hours This course is intended for Network analysts Network investigators Cisco integrators and partners Overview After taking this course, you should be able to: Describe the stages of the network attack lifecycle and identify ITD solution platform placement based on a given stage Detail how to locate and mitigate email malware attacks Describe email phishing attacks and the steps taken to locate and mitigate them on the network Identify and mitigate data exfiltration threats on the network Identify malware threats on the network and mitigate those threats after investigation The Cisco Integrated Threat Defense Investigation and Mitigation (SECUR202) v1.0 course shows you how to identify, isolate, and mitigate network threats using the Cisco© Integrated Threat Defense solution platform. Through expert instruction and lab-based scenarios, you will be introduced to network threat investigation, and learn how to identify relationships between Cisco products and the stages of the attack lifecycle. This course is the second in a pair of courses (SECUR201) covering the Cisco Integrated Threat Defense (ITD) solution. Network Threat Investigation Introduction Network Attack Introduction Hunting Network Threats in the Enterprise Investigation and Mitigation of Email Malware Threats Examining Email Malware Threats Investigating and Verifying Email Malware Threat Mitigation Investigation and Mitigation of Email Phishing Threats Examining Email Phishing Attacks Configuring Cisco Email Security Appliance (ESA) for URL and Content Filtering Investigating and Verifying Email Phishing Threat Mitigation Investigation and Mitigation of Data Exfiltration Threats Exploiting Vulnerable Network Servers Investigating Data Exfiltration Threats Mitigating and Verifying Data Exfiltration Threats nvestigation and Mitigation of Malware Threats Examining Endpoint Malware Protection Investigating and Mitigating Endpoint Malware Threats
Duration 1 Days 6 CPD hours This course is intended for This course is intended for an individual who has experience developing and deploying basic business logic and user interfaces using the programmatic capabilities of the Force.com platform, including practical application of the skills and concepts noted in the exam objectives below. Overview When you complete this course, you will be able to:Describe the structure of the exam and the exam?s objectives.List the most heavily weighted exam objectives.Describe key features of the Force.com programming languages, including: Apex, SOQL, SOSL, and Visualforce.Explain important Force.com concepts, such as the testing framework, governor limits, and the save order of execution.Explain the ALM of a Salesforce development project. By covering the details around the exam objectives, this course will help hone your problem-solving skills and reinforce your knowledge of key topics. A mock exam at the end of the course will help you assess your readiness. Introduction to the Course and the Exam Introduction to AW computing Introduction to the Platform Developer I certification Salesforce FundamentalsLogic & Process Automation (Part 1) Working with Formulas and Rollup Summary Fields Working with Basic Constructs in Apex Working with SOQL Working with SOSL Working with DML Working with Exceptions and Governor Limits Logic & Process Automation (Part 2) Working with Apex classes Working with Apex triggers Describe the save order of execution User Interface Working with Visualforce Pages Working with Visualforce Controllers Working with the Lightning Component Framework Testing Describing the Testing Framework and Requirements Creating Test Data and Tests Executing a Test Testing Considerations Debug & Deployment Tools Debugging Deploying Certification Preparation Resources
Duration 5 Days 30 CPD hours This course is intended for Network Administrators Network security Administrators Network Security Engineer Network Defense Technicians CND Analyst Security Analyst Security Operator Anyone who involves in network operations Overview A dedicated focus on IoT security Network virtualization practices for the remote workforce Enhanced Cloud Security & IoT and Operational Technology (OT) Modules Introduction to threat intelligence In-depth Attack Surface Analysis Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF) as well as a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators. The program prepares network administrators how to identify what parts of an organization need to be reviewed and tested for security vulnerabilities and how to reduce, prevent, and mitigate risks in the network. CND covers the protect, detect, respond and predict approach to network security. Course Outline Network Attacks and Defense Strategies Administrative Network Security Technical Network Security Network Perimeter Security Endpoint Security-Windows Systems Endpoint Security-Linux Systems Endpoint Security- Mobile Devices Endpoint Security-IoT Devices Administrative Application Security Data Security Enterprise Virtual Network Security Enterprise Cloud Network Security Enterprise Wireless Network Security Network Traffic Monitoring and Analysis Network Logs Monitoring and Analysis Incident Response and Forensic Investigation Business Continuity and Disaster Recovery Risk Anticipation with Risk Management Threat Assessment with Attack Surface Analysis Threat Prediction with Cyber Threat Intelligence