Duration 3 Days 18 CPD hours This course is intended for Security Engineers Network Engineers Overview Upon completion of this course, students will be able to: Deploy gateways using the Gaia web interface Configure a Security Policy Learn about managing and monitoring a secure network Upgrade and configure a Security Gateway to implement a virtual private network for both internal and external, remote users The growing frequency and sophistication of security threats makes protecting your organization more difficult every year. Check Point?s integrated products provide end-to-end security from the enterprise to the cloud to your mobile worker?s personal devices. They prevent and mitigate cyberattacks and limit the data theft that often results from these threats. Introduction to Check Point TechnologyDeployment PlatformsIntroduction to the Security PolicyMonitoring Traffic & ConnectionsNetwork Address TranslationUsing SmartUpdateUser Management & AuthenticationIdentity AwarenessIntroduction to Check Point VPNsSmartLog
Duration 3 Days 18 CPD hours This course is intended for This course is designed for the following roles: Network engineers Network security engineers Network architects Sales/presales engineers Overview After completing the course, you should be able to: Describe Cisco SD-WAN security functions and deployment options Understand how to deploy on-premises threat prevention Describe content filtering options Implement secure Direct Internet Access (DIA) Explain and implement service chaining Explore Secure Access Service Edge (SASE) and identify use cases Describe Umbrella Secure Internet Gateway (SIG) and deployment options Implement Cisco Umbrella SIG and DNS policies Explore and implement Cloud Access Security Broker (CASB) and identify use cases (including Microsoft 365) Discover how to use Cisco ThousandEyes to monitor cloud services Configure Cisco ThousandEyes to monitor Microsoft 365 applications Examine how to protect and optimize access to the software as a service (SaaS) application with Cisco SD-WAN Cloud OnRamp Discover and deploy Cloud OnRamp for multi-cloud, including interconnect and collocation use cases Examine Cisco SD-WAN monitoring capabilities and features with vManage and vAnalytics. The Implementing Cisco SD-WAN Security and Cloud Solutions (SDWSCS) v1.1 course is an advanced training course focused on Cisco SD-WAN security and cloud services. Through a series of labs and lectures you will learn about on-box security services, including application aware enterprise firewall, intrusion prevention, URL filtering, malware protection, and TLS or SSL decryption. You will also learn about cloud integration with multiple cloud services providers and multiple use-cases. Additionally, the lab will allow you to configure and deploy local security services and cloud security services with the Cisco Umbrella Secure Internet Gateway (SIG), as well as integrate the Cisco SD-WAN fabric with a cloud service provider using the Cisco vManage automated workflows. Course Outline Introducing Cisco SD-WAN Security Deploying On-Premises Threat Prevention Examining Content Filtering Exploring Cisco SD-WAN Dedicated Security Options Examining Cisco SASE Exploring Cisco Umbrella SIG Securing Cloud Applications with Cisco Umbrella SIG Exploring Cisco SD-Wan ThousandEyes Optimizing SaaS Applications Connecting Cisco SD-WAN to Public Cloud Examining Cloud Interconnect Solutions Exploring Cisco Cloud OnRamp for Colocation Monitoring Cisco SD-WAN Cloud and Security Solutions
Duration 5 Days 30 CPD hours This course is intended for This course provides an immersive learning experience for business and technical professionals who need a thorough understanding of the CMMC program. It does this by taking the point of view of a CMMC Certified Professional. Students might consider taking this course to learn more about the overall CMMC program, how DoD contractors are assessed, and how to help their organizations prepare for a CMMC Assessment. Overview In this course, you will learn about the CMMC Model, framework, context, and application within the DoD, as well as the expectations and requirements imposed upon organizations that do business with the DoD. You will: Identify the threats to the Defense Supply Chain and the established regulations and standards for managing the risk. Identify the sensitive information that needs to be protected within the Defense Supply Chain and how to manage it. Describe how the CMMC Model ensures compliance with federal acquisitions regulations. Identify responsibilities of the Certified CMMC Professional, including appropriate ethical behavior. Establish the Certification and Assessment scope boundaries for evaluating the systems that protect regulated information. Prepare the OSC for an Assessment by evaluating readiness. Use the CMMC Assessment Guides to determine and assess the Evidence for practices. Implement and evaluate practices required to meet CMMC Level 1. Identify the practices required to meet CMMC Level 2. Work through the CMMC Assessment process. The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices, as well as their integration of corresponding policies and plans into their overall business operations. Once rule-making has concluded and CMMC 2.0 has been implemented, all organizations providing products or services to the United States Department of Defense (DoD) must comply with the requirements of their applicable CMMC Level. This course provides a complete review of the key elements of this important program. Lesson 1: Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses against Threats Lesson 2: Handling Sensitive Information Topic A: Identify Sensitive Information Topic B: Manage the Sensitive Information Lesson 3: Ensuring Compliance through CMMC Topic A: Describe the CMMC Model Architecture Topic B: Define the CMMC Program and Its Ecosystem Topic C: Define Self-Assessments Lesson 4: Performing CCP Responsibilities Topic A: Identify Responsibilities of the CCP Topic B: Demonstrate Appropriate Ethics and Behavior Lesson 5: Scoping Certification and Assessment Boundaries Topic A: Use the CMMC Assessment Scope Documentation Topic B: Get Oriented to the OSC Environment Topic C: Determine How Sensitive Information Moves Topic D: Identify Systems in Scope Topic E: Limit Scope Lesson 6: Preparing the OSC Topic A: Foster a Mature Cybersecurity Culture Topic B: Evaluate Readiness Lesson 7: Determining and Assessing Evidence Topic A: Determine Evidence Topic B: Assess the Practices Using the CMMC Assessment Guides Lesson 8: Implementing and Evaluating Level 1 Topic A: Identify CMMC Level 1 Domains and Practices Topic B: Perform a CMMC Level 1 Gap Analysis Topic C: Assess CMMC Level 1 Practices Lesson 9: Identifying Level 2 Practices Topic A: Identify CMMC Level 2 Practices Lesson 10: Working through an Assessment Topic A: Identify Assessment Roles and Responsibilities Topic B: Plan and Prepare the Assessment Topic C: Conduct the Assessment Topic D: Report the Assessment Results Topic E: Conduct the CMMC POA&M Close-Out Assessment
Duration 3 Days 18 CPD hours This course is intended for This course is designed for the following roles: Network engineers Network security engineers Network architects Sales/presales engineers Overview After taking this course, you should be able to: Describe Cisco SD-WAN security functions and deployment options Understand how to deploy on-premises threat prevention Describe content filtering options Implement secure Direct Internet Access (DIA) Explain and implement service chaining Explore Secure Access Service Edge (SASE) and identify use cases Describe Cisco Umbrella Secure Internet Gateway (SIG) and deployment options Implement Cisco Umbrella SIG and Domain Name System (DNS) policies Explore and implement Cloud Access Security Broker (CASB) and identify use cases (including Microsoft 365) Describe how to use Cisco ThousandEyes to monitor cloud services Configure Cisco ThousandEyes to monitor Microsoft 365 applications Examine how to protect and optimize access to the Software as a Service (SaaS) application with Cisco SD-WAN Cloud OnRamp Describe and deploy Cloud OnRamp for multi-cloud, including interconnect and colocation use cases Examine Cisco SD-WAN monitoring capabilities and features with vManage and vAnalytics The Implementing Cisco SD-WAN Security and Cloud Solutions (SDWSCS) v1.0 course is an advanced training course focused on Cisco SD-WAN security and cloud services. Through a series of labs and lectures you will learn about on-box security services, including application-aware enterprise firewall, intrusion prevention, URL filtering, malware protection, and Transport Layer Security (TLS) or Secure Socket Layer (SSL) decryption. You will also learn about cloud integration with multiple cloud service providers across multiple use cases. Additionally, the course labs will allow you to configure and deploy local security services and cloud security services with the Cisco Umbrella Secure Internet Gateway (SIG), as well as integrate the Cisco SD-WAN fabric with a cloud service provider using the Cisco vManage automated workflows. The course lab environment is built using Cisco Catalyst 8000v IOS XE routers and Cisco SD-WAN 20.7 code, and it includes the integration of Cisco FirePOWER Threat Defense for network security and Cisco ThousandEyes for network monitoring. The course will allow you to earn 24 Continuing Education (CE) credits toward recertification. Course Outline Introducing Cisco SD-WAN Security Deploying On-Premises Threat Prevention Examining Content Filtering Exploring Cisco SD-WAN Dedicated Security Options Examining Cisco SASE Exploring Cisco Umbrella SIG Securing Cloud Applications with Cisco Umbrella SIG Exploring Cisco SD-Wan ThousandEyes Optimizing SaaS Applications Connecting Cisco SD-WAN to Public Cloud Examining Cloud Interconnect Solutions Exploring Cisco Cloud OnRamp for Colocation Monitoring Cisco SD-WAN Cloud and Security Solutions Additional course details: Nexus Humans Cisco SD-WAN Security and Cloud Onboarding v1.0 (SDWSCS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco SD-WAN Security and Cloud Onboarding v1.0 (SDWSCS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Account manager Deployment engineer Deployment project manager Sales engineer Overview After taking this course, you should be able to: Describe CCE flows and processes required to support and troubleshoot the PCCE deployment Introduce the many diagnostic tools available to the engineer responsible for troubleshooting a PCCE environment Apply troubleshooting tools and techniques to address issues with CCE Certificates, Cisco Finesse, and PCCE Deployment The Troubleshooting Cisco Contact Center Enterprise (CCET) v1.0 course is focused on Day 2 support of a Packaged Contact Center Enterprise (PCCE) deployment by Tier 3 support personnel. Cisco© PCCE provides an enterprise-class contact center in a prepackaged deployment model that offers simplified deployment, operation, and maintenance. You will learn to identify the processes and tools used to diagnose common deployment issues so that support personnel can select optimal methods to resolve those issues CCE Flows and Process Review Troubleshooting and Support Methodology PCCE Component Review PCCE Call Flow Review CCE Diagnostic Tools Diagnostic Framework Suite Run Analysis Manager Run Unified System Command-Line Interface (CLI) Troubleshooting CCE Troubleshoot Certificates Troubleshoot Cisco Finesse Troubleshoot a PCCE Deployment Additional course details: Nexus Humans Cisco Troubleshooting Cisco Contact Center Enterprise v1.0 (CCET) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Troubleshooting Cisco Contact Center Enterprise v1.0 (CCET) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4.375 Days 26.25 CPD hours This course is intended for This course provides a jump start on learning material that relates to the CMMC program, and to the planned Certified Professional (CP) certification in particular. It discusses the CMMC program, the current CMMC Model, and other CMMC materials as they exist today. The course may be of interest to individuals who wish to pursue the CMMC-CP certification when it is released. It may also be useful to stakeholders in organizations who will be involved in CMMC assessments, and who wish to gain a general understanding of the program and its requirements for their business planning purposes Overview In this course, you will examine the current CMMC model (Version 1.02), framework, context, and application within the DoD, as well as the expectations and requirements that will be imposed upon organizations that do business with the DoD. It will also help you to identify threats to cybersecurity and privacy within an IoT ecosystem and implement appropriate countermeasures. You will gain the skills to: · Identify risks within the defense supply chain and the established standards for managing them. · Describe how the CMMC model ensures compliance with federal acquisition regulations. · Identify responsibilities of the CMMC Certified Professional, including appropriate ethics and behavior. · Identify regulated information and establish the Certification and Assessment scope boundaries for evaluating the systems that protect that regulated information. · Evaluate OSC readiness and determine the objective evidence you intend to present to the assessor. · Use the NIST 800-171A and CMMC Assessment Guide to assess objective evidence for processes and practices. · Implement and evaluate practices required to meet CMMC maturity level 1. · Implement and evaluate processes and practices required to meet CMMC maturity level 2. · Implement and evaluate processes and practices required to meet CMMC maturity level 3. · Identify processes and practices required to meet CMMC maturity levels 4 and 5. · Work through the logistics of a CMMC assessment, including planning for and conducting the assessment, as well as any follow-up processes, such as remediation and adjudication. The Cybersecurity Maturity Model Certification (CMMC), managed by the CMMC Accreditation Body (CMMC-AB), is a program through which an organization's cybersecurity program is measured by their initial and ongoing compliance with applicable cybersecurity practices as well as their integration of corresponding policies and plans into their overall business operations. By Fiscal Year 2026, all organizations providing products or services to the United States Department of Defense (DoD) must obtain at least a Maturity Level 1 certification under this program. Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses Against Threats Ensuring Compliance through CMMC Topic A: Identify Limitations of Self-Certification Topic B: Identify Benefits of CMMC Topic C: Describe the CMMC Model Architecture Performing the General Responsibilities of a CMMC CP Topic A: Identify Responsibilities of the CMMC CP Topic B: Demonstrate Appropriate Ethics and Behavior Identifying and Scoping Regulated Information Topic A: Identify Regulated Information Topic B: Establish the Certification and Assessment Scope Boundaries Initiating the Assessment Process Topic A: Evaluate Readiness Topic B: Determine Objective Evidence Assessing Objective Evidence Topic A: Assess the Practices Using the CMMC Assessment Guides Topic B: Assess the Processes Using the CMMC Assessment Guide Level 3 Implementing and Evaluating CMMC Level 1 TTopic A: Maturity Level 1 Domains and Practices Topic B: Determine Scope Boundaries at Maturity Level 1 Topic C: Perform a Maturity Level 1 Gap Analysis Topic D: Perform a Maturity Level 1 Evidence Validation Implementing and Evaluating CMMC Levels 2 and 3 Topic A: Process Maturity Requirements for CMMC Levels 2 and 3 Topic B: Maturity Level 2 Practices Topic C: Maturity Level 3 Practices Identifying CMMC Levels 4 and 5 Topic A: Maturity Level 4 Processes and Practices Topic B: Maturity Level 5 Processes and Practices Working Through a CMMC Assessment Topic A: Define the Assessment Logistics Topic B: Resolve Assessment Related Issues Appendix A: Additional Documentation the CP Should Study
Duration 3 Days 18 CPD hours This course is intended for Security Engineers Network Engineers Overview Upon completion of this course, students will be able to: Deploy gateways using the Gaia web interface Configure a Security Policy Learn about managing and monitoring a secure network Upgrade and configure a Security Gateway to implement a virtual private network for both internal and external, remote users The growing frequency and sophistication of security threats makes protecting your organization more difficult every year. Check Point?s integrated products provide end-to-end security from the enterprise to the cloud to your mobile worker?s personal devices. They prevent and mitigate cyberattacks and limit the data theft that often results from these threats. Introduction to Check Point TechnologyDeployment PlatformsIntroduction to the Security PolicyMonitoring Traffic & ConnectionsNetwork Address TranslationUsing SmartUpdateUser Management & AuthenticationIdentity AwarenessIntroduction to Check Point VPNsSmartLog
Duration 1 Days 6 CPD hours This course is intended for Account and project managers Business liaisons Deployment engineers Managers overseeing CCE deployments Technical sales Overview After taking this course, you should be able to: Provide a high-level overview of the Cisco Contact Center portfolio List the key components within the Packaged Contact Center Enterprise (PCCE) architecture and their functions Describe how calls flow through PCCE using appropriate terms and naming conventions Introduce the tools used in the configuration, scripting, reporting and support of a PCCE deployment Identify advanced features available within the PCCE solution The Reporting Cisco Contact Center Enterprise (CCER) v1.0 course provides an architectural overview of the Contact Center Enterprise (CCE) Solution components and deployment models. You will learn the end-to-end reporting solutions of CCE designed to assist customers and partners in the task of creating reports and managing disparate data sources. Introduction to CCE Cisco Contact Center Basics Cisco Contact Center Fundamentals Functionality of PCCE Components Public Switched Telephone Network (PSTN) and Voice Gateways Cisco Unified Border Element (CUBE) Terms and Naming Conventions Used in CCE CCE Access Environment CCE Routing Configuration Access Tools Available in CCE Single Pane of Glass (SPOG) Cisco Intelligent Contact Management (ICM) Configuration Manager Discovering CCE Features Beyond Default Agent Management Agent Efficiency
Duration 1 Days 6 CPD hours This course is intended for This course benefits cloud consumers and administrators of public cloud, private cloud, and hybrid cloud infrastructures: Security architects Cloud architects Network engineers and administrators System engineers and adminstrators Cloud security consumers Cloud application administrators IT managers Line of business managers Cisco integrators and partners Overview After taking this course, you should be able to: Describe public, private, and hybrid cloud models, concepts, and design Explain the concepts and components for securing cloud environments Describe Cisco security offerings for Amazon Web Services (AWS) Define methods to secure SaaS application usage The Introducing Cisco Cloud Consumer Security (SECICC) v1.0 course gives you a technical overview of basic concepts and components of the cloud, and the Cisco© solutions used to provide comprehensive security of your cloud-based environment. In this primarily lecture-based course, you?ll learn the basics from a cloud consumer perspective including securing cloud and Software as a Service (SaaS) application environments. This introductory course provides insights on using Cisco Stealthwatch? Cloud, Cisco CloudLock, Cisco Umbrella? and more to protect the user when using cloud-based applications. Introducing the Cloud Describe the Evolution of Cloud Computing Explain Cloud Service Models Explore Cloud Deployment Models Introducing Securing the Cloud Describe the Cisco Threat-Centric Approach to Network Security Describe Cloud Physical Environment Security Describe Cloud Network Infrastructure Security Explain Application Security Explore Cloud Management and API Security Describe Cisco Cloud-Based Security Solutions Describe Network Functions Virtualization (NFV), Virtual Network Function (VNF), and Secure Agile Exchange (SAE) Describe Cisco CloudCenter for MultiCloud Management Describe Cisco Stealthwatch Describing Cloud Security Solutions Using AWS Identify AWS Security Offerings Identify Cisco Security Solutions in AWS Introducing Security in an SaaS Environment Describe SaaS Applications Describe SaaS Security Challenges Explain Cloud Access Security Broker Describe Cisco CloudLock Describe OAuth and OAuth Attacks Describe Cisco Advanced Malware Protection for Endpoints Describe Cisco Cloud Email Security Describe Cisco Umbrella Lab outline Explore Cisco Stealthwatch Cloud Explore Stealthwatch Cloud Alerts Settings, Watchlists, and Sensors Explore Cisco Security Solutions in AWS Marketplace Explore the Cisco CloudLock Dashboard and User Security Explore Cisco CloudLock Application and Data Security Explore Cisco Advanced Malware Protection (AMP) Endpoints Explore the Cisco Umbrella Roaming Client Additional course details: Nexus Humans Cisco Introducing Cisco Cloud Consumer Security v1.0 (SECICC) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Introducing Cisco Cloud Consumer Security v1.0 (SECICC) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Cisco Unified Communications system channel partners and resellers System engineers Customers deploying and maintaining Cisco Unified Contact Center Express products. Overview Upon completing this course, the learner will be able to meet these overall objectives: Provide a comprehensive overview of the Cisco Unified Contact Center Express product suite. This overview will cover descriptions of the product, compatibility, and hardware and software options, architecture, and sizing and ordering tools. Provide a complete description of the Cisco Unified CCX installation process, the configuration required with an overview of most common configuration web pages, and describe the call flow processes needed to establish a call on Cisco Unified CCX. Describe the Cisco Unified CCX script editor, how it is installed and how to implement common IVR scripting techniques. Provide a comprehensive view of Cisco Unified CCX ACD operations to include basic contact center build-up, scripting, agent and supervisor desktop configurations, advanced scripting topics, and reporting. Describe how to install, configure and use features found in Cisco Unified CCX Premium such as, Remote Monitoring, Outbound Dialer, Agent Email, Agent Web Chat, and Automatic Speech Recognition (ASR) and Text-to-Speech (TTS). Understand how to maintain and monitor a Cisco Unified CCX system This course, Deploying Cisco© Unified Contact Center Express (UCCXD) v6.0, provides the student with hands-on experience and knowledge of tasks typically performed during contact center deployment. Cisco Unified CCX Product Overview Cisco Unified CCX Product Packages Cisco Unified CCX Architecture Designing Cisco Unified CCX Cisco Unified CCX Installation and Configuration Installing Cisco Unified CCX Managing Cisco Unified CCX Configuring Basic Properties of Cisco Unified CCX Cisco Unified CCX Scripting Understanding Script Editor Basics Creating a Basic IVR Script Prompting and Collecting Information Accessing an External Database Making Decisions Confirming Caller Input Cisco Unified CCX ACD Operations Implementing Cisco Unified CCX