• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

522 Certified in Cybersecurity (CC) courses delivered Online

VMware Spring Security

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Application developers who want to increase their understanding of Spring Security with hands-on experience and build secure Spring and Spring Boot applications. Overview By the end of the course, you should be able to meet the following objectives: Use Spring Security in Spring and Spring Boot applications Configure the Spring Security filter chain Protect HTTP endpoints with expression-based access control and the AuthorizationManager API Protect method execution Use different authentication mechanisms Handle passwords in an efficient way Integrate Spring Security with Junit 5 and MockMVC to test HTTP and method security Protect against common vulnerabilities and threats Understand what OAuth2 is Use and configure the Spring Authorization Server Implement a resource server and client This 2-day course offers hands-on experience with the major features of Spring Security, which includes configuration, authentication, authorization, password handling, testing, protecting against security threats, and the OAuth2 support to secure applications. On completion, participants will have a foundation for securing enterprise and microservices applications. Security Introduction Need for security Basic security concepts Common security vulnerabilities Spring Security Basics Introduction to Spring Security High-level architecture Overview of SecurityContext Spring Security with Spring Boot Customizing Authentication Building blocks for authentication Authentication mechanisms based on user name and password Other authentication mechanisms Authentication events Securing Web Applications Configuring authorization Using AccessDecisionsManager for authorization Using AuthorizationManager for authorization Bypassing security Method Security Method security architecture Declarative method security with annotations Security Testing Spring Security Testing Support Security mock annotations and meta-annotations Using MockMvc to test security Handling Passwords Password hashing Upgrading passwords (Optional) Protecting Against Common Vulnerabilities Hardening web applications with security headers Preventing cross-site request forgery Encrypting data in transit OAuth5 and OIDC Concepts Need for OAuth Overview of OAuth5 and OIDC OAuth5 grant types Types of tokens Spring Security OAuth5 support and OAuth5 login Spring Authorization Server Introduction to Authorization Server Spring Authorization Server endpoints Spring Authorization Server configuration Protecting and accessing resources with OAuth5 Resource server Using JWT tokens Using opaque tokens Configuring an OAuth5 client Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Spring Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Spring Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Spring Security
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black Cloud: Plan and Deploy

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for System administrators and consultants, application owners, and system architects Overview By the end of the course, you should be able to meet the following objectives: Describe VMware Carbon Black Cloud platform Describe data flows on VMware Carbon Black Cloud Create and edit a custom role in VMware Carbon Black Cloud Recognize the impact of a user role on a console user Describe the VMware Carbon Black Cloud sensor resource usage Explain sensor usage in VMware Carbon Black Cloud Identify configuration settings for endpoints in sensor policy settings Determine requirements for initial deployment of sensors Recognize the differences between attended and unattended sensor installation methods Identify the correct deployment strategy for a given scenario Recognize the deployment process for VMware Carbon Black Cloud Workload™ Identify eligible workloads in a VMware vSphere environment Describe VMware Carbon Black Cloud sensor deployment Manage VMware vSphere workloads Identify sensor status in RepCLI This two-day hands-on training course provides you with the knowledge, skills, and tools to achieve competency in planning and deploying VMware Carbon Black Cloud in your environment. This course explains the VMware Carbon Black Cloud components, managing users and roles in VMware Carbon Black Cloud, configuring policies to support sensor deployment and management, and presents methods for deploying sensors across endpoints and workloads. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Carbon Black Cloud Describe the VMware Carbon Black Cloud platform Describe VMware Carbon Black Cloud operating systems requirements Identify interesting files according to VMware Carbon Black Cloud Identify events collected Describe data flows Managing VMware Carbon Black Cloud Roles and Users Describe the use of roles in VMware Carbon Black Cloud Describe RBAC capabilities Create and edit a custom role Manage new console users Recognize the impact of a user role on a console user Describe authentication mechanisms VMware Carbon Black Cloud Sensors Describe the VMware Carbon Black Cloud sensor resource usage List the supported operating systems for VMware Carbon Black Cloud sensors Explain sensor usage in VMware Carbon Black Cloud Preparing for Deployment Identify configuration settings for endpoints in sensor policy settings Organize sensors using sensor groups to assign the desired policy based on specific criteria Compare VDI sensor settings as compared to traditional endpoint sensor settings Determine requirements for the initial deployment of sensors Evaluate the policy impact on sensors Identify best practices for deploying sensors Installing Sensors Describe how to send an installation request Recognize the features and limitations of an installation code and company code Recognize the process for successfully completing an attended installation Recognize the differences between attended and unattended sensor installation methods Identify the correct deployment strategy for a given scenario Generate logs with unattended installations Generate sensor logs Check network connectivity for sensor installation Deploying Workloads Recognize the deployment process for VMware Carbon Black Cloud Workload Identify eligible workloads in a vSphere environment Recognize how to enable the VMware Carbon Black Cloud sensor on a VM workload Managing Sensors Describe VMware Carbon Black Cloud sensor deployment Explain the differences in sensor status Describe sensor update capabilities Explain sensor actions Manage vSphere workloads Post-deployment Validation Describe the process of a sensor background scan Recognize a properly registered sensor installation Identify sensor status in RepCLI Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud: Plan and Deploy training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud: Plan and Deploy course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black Cloud: Plan and Deploy
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black EDR Advanced Analyst

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Security operations personnel, including analysts and incident responders Overview By the end of the course, you should be able to meet the following objectives: Utilize Carbon Black EDR throughout an incident Implement a baseline configuration for Carbon Black EDR Determine if an alert is a true or false positive Fully scope out an attack from moment of compromise Describe Carbon Black EDR capabilities available to respond to an incident Create addition detection controls to increase security This course teaches you how to use the VMware Carbon Black© EDR? product during incident response. Using the SANS PICERL framework, you will configure the server and perform an investigation on a possible incident. This course provides guidance on using Carbon Black EDR capabilities throughout an incident with an in-depth, hands-on, scenariobased lab. Course Introduction Introductions and course logistics Course objectives VMware Carbon Black EDR & Incident Response Framework identification and process Preparation Implement the Carbon Black EDR instance according to organizational requirements Identification Use initial detection mechanisms Process alerts Proactive threat hunting Incident determination Containment Incident scoping Artifact collection Investigation Eradication Hash banning Removing artifacts Continuous monitoring Recovery Rebuilding endpoints Getting to a more secure state Lessons Learned Tuning Carbon Black EDR Incident close out

VMware Carbon Black EDR Advanced Analyst
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black Cloud Audit and Remediation

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of VMware Carbon Black Cloud Audit and Remediation Identify the architecture and data flows for Carbon Black Cloud Audit and Remediation communication Describe the use case and functionality of recommended queries Achieve a basic knowledge of SQL Describe the elements of a SQL query Evaluate the filtering options for queries Perform basic SQL queries on endpoints Describe the different response capabilities available from VMware Carbon Black Cloud This course teaches you how to use the VMware Carbon Black© Cloud Audit and Remediation? product to build queries for IT hygiene, incident response, and vulnerability assessment to support your organization?s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Data Flows and Communication Hardware and software requirements Architecture Data flows Query Basics Osquery Available tables Query scope Running versus scheduling Recommended Queries Use cases Inspecting the SQL query SQL Basics Components Tables Select statements Where clause Creating basic queries Filtering Results Where clause Exporting and filtering Basic SQL Queries Query creation Running queries Viewing results Advanced Search Capabilities Advanced SQL options Threat hunting Response Capabilities Using live response Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud Audit and Remediation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud Audit and Remediation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black Cloud Audit and Remediation
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black Cloud Endpoint Standard

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of VMware Carbon Black Cloud Endpoint Standard Identify the architecture and data flows for Carbon Black Cloud Endpoint Standard communication Perform searches across endpoint data to discover suspicious behavior Manage the Carbon Black Cloud Endpoint Standard rules based on organizational requirements Configure rules to address common threats Evaluate the impact of rules on endpoints Process and respond to alerts Describe the different response capabilities available from VMware Carbon Black CloudTM This course teaches you how to use the VMware Carbon Black Cloud Endpoint? Standard product and leverage the capabilities to configure and maintain the system according to your organization?s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Data Flows and Communication Hardware and software requirements Architecture Data flows Searching Data Creating searches Analyzing events Search operators Advanced queries Policy Components Rules Local scanner Sensor capabilities Prevention Capabilities Using Rules Rule types Rule creation Reputation priority Configuring rules Evaluating rule impact Processing Alerts Alert triage Alert actions Response Capabilities Using quarantine Using live response Hash banning

VMware Carbon Black Cloud Endpoint Standard
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black EDR Advanced Administrator

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of the Carbon Black EDR server Identify the architecture and data flows for Carbon Black EDR communication Identify the architecture for a cluster configuration and Carbon Black EDR cluster communication Describe the Carbon Black EDR server data types and data locations Use the API to interact with the Carbon Black EDR server without using the UI Create custom threat feeds for use in the Carbon Black EDR server Perform the integration with a syslog server Use different server-side scripts for troubleshooting Troubleshoot sensor-side configurations and communication This course teaches you how to use the advanced features of the VMware Carbon Black© EDR? product. This usage includes gaining access to the Linux server for management and troubleshooting in addition to configuring integrations and using the API. This course provides an in-depth, technical understanding of the Carbon Black EDR product through comprehensive coursework and hands-on scenario-based labs. This class focuses exclusively on advanced technical topics related to the technical back-end configuration and maintenance Course Introduction Introductions and course logistics Course objectives Architecture Data flows and channels Sizing considerations Communication channels and ports Server Datastores SOLR database Storage configurations and data aging Partition states Postgres Modulestore EDR API CBAPI overview Viewing API calls in the browser Utilizing the API to access data Threat Intelligence Feeds Feed structure Report indicator types Custom threat feed creation and addition Syslog Integration SIEM support Configuration Troubleshooting Server-side scripts Server logs Sensor operations Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black EDR Advanced Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black EDR Advanced Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black EDR Advanced Administrator
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network security engineers Network security architects ISE administrators Senior Security Operations Center (SOC) personnel responsible for Incidence Response Cisco integrators and partners Overview After taking this course, you should be able to: Describe the Cisco Identity Services Engine (ISE) Explain Cisco ISE deployment Describe Cisco ISE policy enforcement components Describe Cisco ISE policy configuration Troubleshoot Cisco ISE policy and third-party Network Access Device (NAD) support Configure guest access Configure hotspots and guest portals Describe the Cisco ISE profiler services Describe profiling best practices and reporting Configure a Cisco ISE BYOD solution Configure endpoint compliance Configure client posture services Configure Cisco ISE device administration Describe Cisco ISE TrustSec configurations The Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco© Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) exam, which leads to CCNP© Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. This course also earns you 40 Continuing Education (CE) credits toward recertification Course Outline Introducing Cisco ISE Architecture Introducing Cisco ISE Deployment Introducing Cisco ISE Policy Enforcement Components Introducing Cisco ISE Policy Configuration Troubleshooting Cisco ISE Policy and Third-Party NAD Support Introducing Web Authentication and Guest Services Configuring Hotspots and Guest Portals Introducing the Cisco ISE Profiler Introducing Profiling Best Practices and Reporting Configuring Cisco ISE BYOD Introducing Cisco ISE Endpoint Compliance Services Configuring Client Posture Services and Compliance Working With Network Access Devices Exploring Cisco TrustSec Additional course details: Nexus Humans Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE)
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Cryptocurrency

5.0(10)

By Apex Learning

Overview This comprehensive course on Introduction to Cryptocurrency will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Introduction to Cryptocurrency comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enroll in this course today to fast-track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Introduction to Cryptocurrency. It is available to all students, of all academic backgrounds. Requirements Our Introduction to Cryptocurrency is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 10 sections • 10 lectures • 06:15:00 total length •The Fundamentals of Cryptocurrencies: 00:30:00 •The Blockchain: 00:35:00 •Types of Cryptocurrencies: 00:45:00 •NFTs: 00:50:00 •Cryptocurrency Wallets: 00:40:00 •Cryptocurrency Security: 00:20:00 •Decentralized Finance: 00:30:00 •Investing in Cryptos: 01:00:00 •Opportunities and Future of Cryptocurrencies: 00:35:00 •Cryptocurrency Laws in the UK: 00:30:00

Introduction to Cryptocurrency
Delivered Online On Demand6 hours 15 minutes
£12

Confidentiality in the Workplace

By Online Training Academy

Embark on a transformational journey towards personal and professional growth with our "Confidentiality in the Workplace" course. Crafted by experts, this curriculum delves deep into the essential skills necessary to uphold confidentiality in any workplace setting. By enrolling, you gain access to a wealth of knowledge that not only enhances your understanding of confidentiality protocols but also equips you with practical tools to navigate sensitive information with finesse and integrity. Whether you're a seasoned professional or just starting your career, this course promises to propel your trajectory to new heights by instilling confidence in your ability to maintain confidentiality effectively. Don't miss out on this opportunity to invest in yourself and seize the chance to unlock boundless opportunities for advancement. Join us on this journey and watch as your career reaches unprecedented heights. Key Features: CPD Certified Confidentiality in the Workplace Course Free Certificate from Reed CIQ Approved Confidentiality in the Workplace Course Developed by Specialist Lifetime Access Course Curriculum Module 01: Introduction to Workplace Confidentiality Module 02: Business Etiquette and Types of Confidentiality Module 03: The Importance of Confidentiality Module 04: Maintaining Confidentiality with Co-workers Module 05: Preventing Confidentiality Breach Module 06: How Employees Can Protect Confidential Information Learning Outcomes: Identify various types of workplace confidentiality and their significance. Demonstrate business etiquette in handling confidential information with professionalism. Understand the importance of confidentiality in maintaining a trustworthy work environment. Apply strategies to maintain confidentiality while collaborating with co-workers. Implement measures to prevent breaches and protect sensitive information effectively. Equip employees with practical knowledge on safeguarding confidential data in the workplace. CPD 10 CPD hours / points Accredited by CPD Quality Standards Confidentiality in the Workplace 38:08 1: Module 01: Introduction to Workplace Confidentiality Preview 03:18 2: Module 02: Business Etiquette and Types of Confidentiality 08:01 3: Module 03: The Importance of Confidentiality 03:46 4: Module 04: Maintaining Confidentiality with Co-workers 05:45 5: Module 05: Preventing Confidentiality Breach 06:08 6: Module 06: How Employees Can Protect Confidential Information 10:10 7: CPD Certificate - Free 01:00 Who is this course for? This Confidentiality in the Workplace course is accessible to anyone eager to learn more about this topic. Through this course, you'll gain a solid understanding of Confidentiality in the Workplace. Moreover, this course is ideal for: Employees across industries seeking a comprehensive understanding of workplace confidentiality. Managers and team leaders responsible for fostering a confidential work environment. HR professionals aiming to enhance confidentiality practices within their organizations. New hires looking to integrate seamlessly into workplace confidentiality protocols. Business owners committed to instilling a culture of trust and discretion. Requirements There are no requirements needed to enrol into this Confidentiality in the Workplace course. We welcome individuals from all backgrounds and levels of experience to enrol into this Confidentiality in the Workplace course. Career path After finishing this Confidentiality in the Workplace course you will have multiple job opportunities waiting for you. Some of the following Job sectors of Confidentiality in the Workplace are: Data Protection Officer - £35K to 60K/year Compliance Officer - £30K to 50K/year Legal Secretary - £20K to 35K/year Human Resources Officer - £25K to 45K/year Administrative Assistant - £18K to 30K/year Certificates Digital certificate Digital certificate - Included Reed Courses Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.

Confidentiality in the Workplace
Delivered Online On Demand36 minutes
£12

Cisco Securing Networks with Cisco Firepower Next-Generation IPS v4.0 (SSFIPS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy and manage a Cisco Firepower NGIPS in their network environment. Security administrators Security consultants Network administrators System engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe the components of Cisco Firepower Threat Defense and the managed device registration process Detail Next-Generation Firewalls (NGFW) traffic control and configure the Cisco Firepower system for network discovery Implement access control policies and describe access control policy advanced features Configure security intelligences features and the Advanced Malware Protection (AMP) for Networks implementation procedure for file control and advanced malware protection Implement and manage intrusion and network analysis policies for NGIPS inspection Describe and demonstrate the detailed analysis techniques and reporting features provided by the Cisco Firepower Management Center Integrate the Cisco Firepower Management Center with an external logging destination Describe and demonstrate the external alerting options available to Cisco Firepower Management Center and configure a correlation policy Describe key Cisco Firepower Management Center software update and user account management features Identify commonly misconfigured settings within the Cisco Firepower Management Center and use basic commands to troubleshoot a Cisco Firepower Threat Defense device This course shows you how to deploy and use Cisco Firepower© Next-Generation Intrusion Prevention System (NGIPS). This hands-on course gives you the knowledge and skills to use the platform features and includes firewall security concepts, platform architecture and key features; in-depth event analysis including detection of network-based malware and file type, NGIPS tuning and configuration including application control, security intelligence, firewall, and network-based malware and file controls; Snort© rules language; file and malware inspection, security intelligence, and network analysis policy configuration designed to detect traffic patterns; configuration and deployment of correlation policies to take action based on events detected; troubleshooting; system and user administration tasks, and more. This course helps you prepare to take the exam, Securing Networks with Cisco Firepower (300-710 SNCF), which leads to CCNP Security and Cisco Certified Specialist ? Network Security Firepower certifications. The 300-710 SNCF exam has a second preparation course as well, Cisco© Securing Networks with Cisco© Firepower Next Generation Firewall (SSNGFW). You can take these courses in any order. Course Outline Cisco Firepower Threat Defense Overview Cisco Firepower NGFW Device Configuration Cisco Firepower NGFW Traffic Control Cisco Firepower Discovery Implementing Access Control Policies Security Intelligence File Control and Advanced Malware Protection Next-Generation Intrusion Prevention Systems Network Analysis Policies Detailed Analysis Techniques Cisco Firepower Platform Integration Alerting and Correlation Policies Performing System Administration Troubleshooting Cisco Firepower

Cisco Securing Networks with Cisco Firepower Next-Generation IPS v4.0 (SSFIPS)
Delivered OnlineFlexible Dates
Price on Enquiry