Duration 5 Days 30 CPD hours This course is intended for Network security engineers Network security architects ISE administrators Senior Security Operations Center (SOC) personnel responsible for Incidence Response Cisco integrators and partners Overview After taking this course, you should be able to: Describe the Cisco Identity Services Engine (ISE) Explain Cisco ISE deployment Describe Cisco ISE policy enforcement components Describe Cisco ISE policy configuration Troubleshoot Cisco ISE policy and third-party Network Access Device (NAD) support Configure guest access Configure hotspots and guest portals Describe the Cisco ISE profiler services Describe profiling best practices and reporting Configure a Cisco ISE BYOD solution Configure endpoint compliance Configure client posture services Configure Cisco ISE device administration Describe Cisco ISE TrustSec configurations The Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco© Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) exam, which leads to CCNP© Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. This course also earns you 40 Continuing Education (CE) credits toward recertification Course Outline Introducing Cisco ISE Architecture Introducing Cisco ISE Deployment Introducing Cisco ISE Policy Enforcement Components Introducing Cisco ISE Policy Configuration Troubleshooting Cisco ISE Policy and Third-Party NAD Support Introducing Web Authentication and Guest Services Configuring Hotspots and Guest Portals Introducing the Cisco ISE Profiler Introducing Profiling Best Practices and Reporting Configuring Cisco ISE BYOD Introducing Cisco ISE Endpoint Compliance Services Configuring Client Posture Services and Compliance Working With Network Access Devices Exploring Cisco TrustSec Additional course details: Nexus Humans Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 0.5 Days 3 CPD hours This course is intended for This course is designed for the non-technical end user of computers, mobile devices, networks, and the Internet, to enable you to use technology more securely to minimize digital risks. This course is also designed for you to prepare for the Certified CyberSAFE credential. You can obtain your Certified CyberSAFE certificate by completing the Certified CyberSAFE credential process on the CHOICE platform following the course presentation. Overview In this course, you will identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect yourself from those risks. You will: Identify the need for security Secure devices like desktops, laptops, smartphones, and more Use the Internet securely Regardless of your computer experience, this class will help you become more aware of technology ðrelated risks and what you can do to protect yourself and your organization from them. This course will help you to: ? Understand security compliance needs and requirements ? Recognize and avoid phishing and other social engineering ? Recognize and avoid viruses, ransomware, and other malware ? Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud. In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely. Course includes access to the CyberSAFE assessment. Upon successful completion of the assessment, learners will receive the CyberSAFE credential and digital badge. Identifying the Need for Security Identify Security Compliance Requirements Recognize Social Engineering and Avoid Phishing and other Attacks Securing Devices Maintain Physical Security of Devices Use Passwords for Security Protect Your Data Identify and Mitigate Viruses, Ransomware, and other Malware Use Wireless Devices Securely Using the Internet Securely Browse the Web Safely Use Email Securely Use Social Networking Securely Use Cloud Services Securely Additional course details: Nexus Humans CertNexus CyberSAFE Extended Edition 2019 (CBS-310) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus CyberSAFE Extended Edition 2019 (CBS-310) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants who are charged with the configuration and day-to-day management of Symantec Endpoint Protection in a variety of network environments. Overview By the completion of this course, you will be able to: Manage Virus and Spyware Protection policies. Manage SONAR scans. Manage Firewall and Intrusion Prevention policies. Manage Application and Device Control policies. Manage System Lockdown. Manage Host Integrity. Manage Virtualized clients. This course is designed for the network, IT security, and systems administration professional tasked with implementing and monitoring virus and spyware protection, zero-day protection, and network threat protection solutions. Introduction Course overview The classroom lab environment Introducing Antivirus, Insight, and SONAR Virus and spyware protection needs and solutions Reputation and Insight Administrator-defined scans Auto-Protect Download Insight SONAR Included Virus and Spyware Protection policies Managing Virus and Spyware Protection Policies for Windows Configuring administrator-defined scans Configuring protection technology settings and scans Configuring e-mail scans Configuring advanced options Managing scanned clients Managing Virus and Spyware Protection Policies for Mac and Linux Configuring Virus and Spyware settings for Mac Configuring Virus and Spyware settings for Linux Configuring advanced options Managing Exception Policies Exceptions and exclusions Configuring the Exceptions policy Introducing Network Threat Protection The OSI model and network threats Network threat tools and attack methods Attack and mitigation Managing Firewall Policies Firewall policy overview Defining rule components Modifying firewall rules Configuring built-in rules Configuring protection and stealth settings Configuring Windows integration settings Managing Intrusion Prevention Policies Configuring network and browser intrusion prevention Managing custom signatures Compliance Management Application and Device Control System Lockdown Host Integrity Virtualization Introducing virtualization features Virtual image exception Network and vShield Shared Insight Cache Virtual client tagging Offline image scanner Windows Azure support Additional course details: Nexus Humans Symantec Endpoint Protection 12.X - Manage And Administer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Endpoint Protection 12.X - Manage And Administer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer Overview Cisco Meeting Server Overview Cisco Meeting Server Deployment Cisco Meeting Server User Licensing Cisco Meeting Server Configuration Cisco Meeting Server Configuration with Cisco Unified Communication Manager (CUCM) Cisco Meeting Server Integration VCS/Expressway Cisco Meeting Server Integration with TMS Cisco Meeting Server Configuration with Lync/Skype for Business Cisco Meeting Server Recording and Streaming Cisco Meeting Manager (CMM) Deployment Cisco Meeting Server WebRTC using Expressway Proxy Cisco Meeting Server Customization Cisco Meeting Server Troubleshooting In this course, students will install and configure a Cisco Meeting Server version 2.x. Students will configure a multimode CMS Cluster and implement all the different components of a clustered solution. Student will also integrate CMS with Unified Communications Manager and VCS/Expressway. Students will also integrate Recording and Skype/Lync. Students will use the TMS and new Cisco Meeting Manager Schedule and monitor CMS. Cisco Meeting Server Overview What is Cisco Meeting Server Cisco Meeting Server Benefits Cisco Meeting Server vs Telepresence Server vs MCU Cisco Meeting Server Functions? Cisco Meeting Server Components Cisco Meeting Server Call Bridge Cisco Meeting Server Web Bridge Cisco Meeting Server Turn Server Cisco Meeting Server XMPP Server Cisco Meeting Server Database Cisco Meeting Server Scalability On-premises and Cloud Conferencing API Integration Cisco Meeting Server Deployment MMP CLI Cisco Meeting Server Prerequisites Cisco Meeting Server 2000 Deployments Installing the server Configuring the Fabric Interconnect modules Configuring the Cisco Meeting Server 2000 through the MMP Checking the installed software Configuring the Web Admin Interface Applying a License File Cisco Meeting Server 1000/VM Deployments Installing CMM via VMware Configuring VMware Network Management Configuring the VMware Instance using vSphere client Retrieving and activating VMware Licenses Accessing the Cisco Meeting Server 1000 Console Installing CMM via Hyper-V Single combined server deployment Single Split Server Deployment Deploying a Core Server Deploying an Edge Server Certificate Guidelines for Single Split Server Deployment Scalable and Resilient Server Deployments Cisco Meeting Server User Licensing Obtaining and Entering a License File Cisco Meeting Server Licenses Cisco User Licenses Personal Multiparty Plus Licensing Shared Multiparty Plus Licensing Cisco Meeting Server Capacity Units XMPP Licensing for Cisco Meeting Apps Cisco Meeting Server Capacity Units Cisco Meeting Server Configuration Transferring the License File to the Cisco Meeting Sever Creating a Cisco Meeting Server Administrator Account Setting up the Network Interface for IPv4 Adding additional Network Interfaces Configuring the Web Admin Interface Creating the certificate for the Web Admin Interface Configuring the Web Admin Interface for HTTS Access Configuring the Web Bridge Configuring the TURN server Configuring the Databases Deploying Web Bridges Deploying multiple Web Bridges Setting up the Web Bridges? certificates Setting up the Web Bridges via the API Web Bridge call flow Cisco Meeting App and WebRTC Client Enabling HTTP redirect and the Web Bridge Deploying the TURN Servers Dial plan configuration ? Overview Dial plan rules for incoming calls and outbound calls Outbound Dial Plan Rules Inbound Dial Plan Rules Forwarding Dial Plan Rules Dial plan configuration?SIP endpoints Cisco Meeting Server (CMS) Configuration with Cisco Unified Communication Manager (CUCM) CUCM and CMS Integration Setting up Escalated ad hoc calls Configuring the Meeting Server Setup Incoming Dial Plan Setup Administrator Account with API Permission Adding the Cisco Meeting Server as a Conference Bridge Creating a Media Resource Group Creating a Media Resource List Adding the Media Resource Group to a Device Pool or Device Setting up Scheduled and Rendezvous Calls Configure Outbound Dial Plan Dial Plan Configuring Cisco Unified Communications Server Configure Route Groups Configure Route Lists Configure Route Pattern Support for Active Control Participant List Indicators Selecting Layout Limitations Overview of ActiveControl and the iX protocol CUCM 8.x and earlier Third-party networks VCS-centric deployments Load Balancing Calls Configuring Call Bridges for Load Balancing Incoming Calls Creating Call Bridge Groups Enabling Load Balancing Fine Tuning Load Balancing Enable Load Balancing of Outbound SIP Calls Setup Outbound Dial Plan Rule for Load Balancing SIP Calls Supply the Call Bridge Group or Specific Call Bridge to Use for Outbound SIP Calls Cisco Meeting Server Integration VCS/Expressway Gateway Configuration Call Testing Inbound call from an endpoint registered to a VCS/Expressway Outbound call to an endpoint registered to a VCS/Expressway Calling non Cisco Meeting App users from H.323 endpoint Troubleshooting Cisco Meeting Server Integration with TMS TMS Integration Cisco Meeting Server Configuration with Lync/Skype for Business Configuring Cisco Meeting Server with SKYPE Dial plan configuration ? integrating Lync/Skype for Business Lync clients dialing into a call on clustered Meeting Servers Integrating SIP endpoints and Lync clients Adding calls between Lync clients and SIP video endpoints Lync Front End server configuration VCS configuration Meeting Server configuration Integrating Cisco Meeting App with SIP and Lync clients Integrating Lync using Lync Edge service Controlling the bandwidth for sharing content on Microsoft Lync and Skype for Business calls Direct Lync federation Calling into scheduled Lync meetings directly and via IVR Office 365 Dual Homed Experience with OBTP Scheduling Cisco Meeting Server Recording and Streaming Recording Meetings Recorder licensing Recording with Vbrick Prerequisites for the Meeting Server Configuring the Meeting Server to work with Vbrick Steps to configuring the Streamer Deploying streaming Streamer licensing Recording meetings Cisco Meeting Manager (CMM) Deployment Deploy Cisco Meeting Manager Cisco Meeting Manager Meetings Navigation List Meetings Edit Meetings Layout Recording Streaming Participants Find meetings Find participants Change layout for all participants in a meeting Start and stop recording Start and stop streaming Add participants Change layout for an individual participant Turn audio or video on or off View participant details Call statistics Cisco Meeting Server WebRTC using Expressway Proxy Configure Cisco Meeting Server for WebRTC Proxy Configure Cisco Expressway C Configure Turn on Cisco Expressway E Cisco Meeting Server Customization WebRTC App Customization Call Customization IVR Message Customization SIP/LYNC Call Message Customization Invitation Customization Cisco Meeting Server Troubleshooting Troubleshooting Cisco Meeting Server Connectivity Troubleshooting Web Bridge connectivity Troubleshooting Call Server issues Troubleshooting Conferencing issues
Duration 1 Days 6 CPD hours This course is intended for This course is designed primarily for IT leaders and company executives who are responsible for complying with incident response legislation. This course focuses on the knowledge, resources, and skills necessary to comply with incident response, and incident handling process requirements. Overview In this course, you will understand, assess and respond to security threats and operate a system and network security analysis platform. You will: Explain the importance of best practices in preparation for incident response Given a scenario, execute incident response process Explain general mitigation methods and devices Assess and comply with current incident response requirements. This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT?s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirements regarding incident response, and for executing standardized responses to such incidents. The course introduces procedures and resources to comply with legislative requirements regarding incident response. This course is designed to assist students in preparing for the CertNexus Incident Responder Credential (CIR-110). What you learn and practice in this course can be a significant part of your preparation. Assessment of Information Security Risks The Importance of Risk Management Integrating Documentation into Risk Management Response to Cybersecurity Incidents Deployment of Incident Handling and Response Architecture Containment and Mitigation of Incidents Preparation for Forensic Investigation as a CSIRT Investigating Cybersecurity Incidents Use a Forensic Investigation Plan Securely Collect and Analyze Electronic Evidence Follow Up on the Results of an Investigation Complying with Legislation Examples of Legislation (if this is covered in above topics, no need to include here) GDPR, HIPPA, Elections Case study: Incident Response and GDPR (Using GDPR legislation, create a response that is compliant with it ? this could be discussion-based activity as well.) State Legislation Resources and Example Search terms to find state legislation Using NYS as example use the NYS Privacy Response act or other legislation to create a similar case study as previous. Provide answers on when to use federal versus state and do you have to follow both?
Coming soon! The Certificate in Orthodontic Nursing is a qualification suitable for dental nurses who assist in orthodontic procedures. The course details areas of knowledge and understanding which a dental nurse assisting in orthodontic procedures needs to develop in order to practise competently. It requires students to maintain a work-based record of competence, integral to their learning journey, as well as complete an exam at the end of the 6 month course.
Coming soon! An oral health educator has an important and valuable role within a dental practice to promote good oral health care and work with patients to help prevent oral disease. The Certificate in Oral Health Education is specifically designed to equip a Dental Nurse wishing to develop professionally to become an oral health educator, with the knowledge and skills required to be able to effectively deliver oral health care messages, educate various patient groups and have the ability to adapt information and communication to the specific needs of the patient.
The CIEH Introductory Certificate in Occupational Health and Safety provides an awareness of key health and safety issues, and the part that staff should play in keeping themselves and others free from harm at work. This course will give you a basic background in, and understanding of, general health and safety practices and the control measures required to reduce risks in the workplace.
The CIEH Foundation Certificate in Occupational Health and Safety supports businesses in their legal obligations to ensure employees are protected from harm. This course is ideal for those who want to develop their knowledge of health and safety issues in the workplace and of the regulations for maintaining a healthy and safe working environment. This course will focus on common hazards and how to control them. It will help you work more safely and be more aware of how your own actions can affect the health and safety of others.
Duration 2 Days 12 CPD hours This course is intended for This course is for IT network or security professionals who have practical experience with the ProxySG in the field and wish to master the advanced network security of the ProxySG. Overview Solve common authentication and SSL issuesUnderstand the underlying architecture of SGOSMonitor and analyze ProxySG performanceUse policy tracing as a troubleshooting tool The ProxySG 6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of the ProxySG. Using Authentication Realms Describe the benefits of enabling authentication on the ProxySG Describe, at a high level, the ProxySG authentication architecture Understand the use of IWA realms, with both IWA Direct and IWA BCAAA connection methods Understanding Authentication Credentials Describe how NTLM and Kerberos authentication work in both IWA direct and IWA BCAAA deployments Configure the ProxySG to use Kerberos authentication Understanding Authentication Modes Describe authentication surrogates and authentication modes Describe ProxySG authentication in both explicit and transparent deployment mode Understanding HTTPS Describe key components of SSL encryption Describe how the SSL handshake works Describe some of the legal and security considerations related to use of the SSL proxy Managing SSL Traffic on the ProxySG Describe how the SSL proxy service handles SSL traffic Describe the standard keyrings that are installed by default on the ProxySG Identify the types of security certificates that the ProxySG uses Optimizing SSL Interception Performance Configure the ProxySG to process SSL traffic according to best practices for performance SGOS Architecture Identify key components of SGOS Explain the interaction among client workers and software workers in processing client requests Explain the significance of policy checkpoints Describe key characteristics of the SGOS storage subsystem Explain the caching behavior of the ProxySG Caching Architecture Describe the benefits of object caching on the ProxySG Explain the caching-related steps in a ProxySG transaction Identify and describe the HTTP request and response headers related to caching Describe, in general terms, how the ProxySG validates cached objects to ensure freshness Explain how the ProxySG uses cost-based deletion, popularity contests, and pipelining to improve object caching System Diagnostics Describe the use of the health monitor and health checks Explain the use of the event and access logs Describe the information available in advanced URLs and sysinfo files Describe the function of policy tracing and packet captures Introduction to Content Policy Language (CPL) Describe the fundamental concepts and purposes of ProxySG policy transactions Understand the relationship of layers, rules, conditions, properties, and triggers Describe the two types of actions in CPL Describe how to write, edit, and upload CPL code Using Policy Tracing for Troubleshooting Identify the two main types of ProxySG policy traces Describe the various sections of a policy trace result Configure a global and policy-driven trace Access and interpret policy trace results ProxySG Integration Identify other Symantec products that can be used as part of a complete security solution