Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. Course Outline Information Security Threats and Vulnerabilities Information Security Attacks Network Security Fundamentals Identification, Authentication, and Authorization Network Security Controls: Administrative Controls Network Security Controls: Physical Controls Network Security Controls: Technical Controls Network Security Assessment Techniques and Tools Application Security Virtualization and Cloud Computing Wireless Network Security Mobile Device Security Internet of Things (IoT) and Operational Technology (OT) Security Cryptography Data Security Network Troubleshooting Network Traffic Monitoring Network Log Monitoring and Analysis Incident Response Computer Forensics Business Continuity and Disaster Recovery Risk Management
Duration 4 Days 24 CPD hours This course is intended for The course content is aimed at operators of devices running the Junos OS in a NOC environment. These operators include network engineers, administrators, support personnel, and reseller support personnel. Overview After successfully completing this course, you should be able to: Reduce the time it takes to identify and isolate the root cause of an issue impacting your network. Gain familiarity with Junos products as they pertain to troubleshooting. Become familiar with online resources valuable to Junos troubleshooting. Gain familiarity with Junos tools used in troubleshooting. Identify and isolate hardware issues. Troubleshoot problems with the control plane. Troubleshoot problems with interfaces and other data plane components. Describe the staging and acceptance methodology. Troubleshoot routing protocols. Describe how to monitor your network with SNMP, RMON, Junos Traffic Vision (formerly known as JFlow), and port mirroring. Become familiar with JTAC procedures. This instructor-led four-day course is designed to provide introductory troubleshooting skills for engineers in a network operations center (NOC) environment. Chapter 1: Course Introduction Course Introduction Chapter 2: Troubleshooting as a Process Before You Begin The Troubleshooting Process Challenging Network Issues The Troubleshooting Process Lab Chapter 3: Junos Product Families The Junos OS Control Plane and Data Plane Field-Replaceable Units Junos Product Families Lab: Identifying Hardware Components Chapter 4: Troubleshooting Toolkit Troubleshooting Tools Best Practices Lab: Using Monitoring Tools and Establishing a Baseline Chapter 5: Hardware and Environmental Conditions Hardware Troubleshooting Overview Memory and Storage Boot Monitoring Hardware-Related System Logs Chassis and Environmental Monitoring Lab: Monitoring Hardware and Environmental Conditions Chapter 6: Control Plane Control Plane Review System and User Processes Monitoring Routing Tables and Protocols Monitoring Bridging Monitoring the Address Resolution Protocol Lab: Control Plane Monitoring and Troubleshooting Chapter 7: Control Plane Protection Protection Overview DDOS Protection Loopback Filter Lab: Control Plane Monitoring and Troubleshooting Chapter 8: Data Plane ? Interfaces Interface Properties General Interface Troubleshooting Ethernet Interface Troubleshooting Lab: Monitoring and Troubleshooting Ethernet Interfaces Chapter 9: Data Plane ? Other Components Definition of a Data Plane Problem Data Plane Components Data Plane Forwarding Load-Balancing Behavior Firewall Filters and Policers Data Plane Troubleshooting Case Study Lab: Isolate and Troubleshoot PFE Issues Chapter 10: Staging and Acceptance Testing Initial Inspection and Power-on General System Checks Interface Testing Chapter 11: Troubleshooting Routing Protocols Troubleshooting OSPF Troubleshooting BGP Troubleshooting Routing Loops and Route Oscillation Lab: Troubleshooting Routing Protocols Chapter 12: High Availability High Availability Overview Graceful Routing Engine Switchover Graceful Restart Nonstop Active Routing and Bridging Unified In-Service Software Upgrade Chapter 13: Network Monitoring SNMP RMON Telemetry Flow Monitoring Lab: Monitoring the Network Chapter 14: vMX Troubleshooting vMX Overview Troubleshooting Lab: Monitoring vMX Chapter 15: JTAC Procedures Opening a Support Case Customer Support Tools The Content of a PR Transferring Files to JTAC Chapter 16: Automated Support and Prevention Overview Service Now Service Insight Lab: Automated Support and Prevention Additional course details: Nexus Humans JTNOC - Junos Troubleshooting in the NOC training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JTNOC - Junos Troubleshooting in the NOC course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is designed for security administrators and Check Point resellers who need to manage and monitor issues that may occur within their Security Management environment. Overview Understand how to use Check Point resources for support. Understand how to perform packet captures using tcmdump and FW Monitor command tools. Understand the basic process of kernel debugging, and how debug commands are structured. Recognize how to use various Linux commands for troubleshooting system issues. Recognize communication issues that may occur between SmartConsole and the SMS and how to resolve them. Understand how to troubleshoot SmartConsole login and authentication issues. Understand how to prevent and resolve licensing and contract issues. Understand how to troubleshoot issues that may occur during policy installation. Understand communication issues that may occur when collecting logs and how to resolve them. Recall various tools to use when analyzing issues with logs. Understand how to restore interrupted communications during heavy logging. Understand how NAT works and how to troubleshoot issues. Understand Client Side and Server Side NAT. Understand how the Access Control Policy functions and how the access control applications work together. Understand how to troubleshoot issues that may occur with Application Control and URL Filtering. Understand how the HTTPS Inspection process works and how to resolve issues that may occur during the process. Understand how to troubleshoot Content Awareness issues. Recognize how to troubleshoot VPN-related issues. Understand how to monitor cluster status and work with critical devices. Recognize how to troubleshoot State Synchronization. Understand how to troubleshoot communication issues between Identity Sources and Security Gateways. Understand how to troubleshoot and debug issues with internal Identity Awareness processes. The goal of this course is to provide an understanding of the concepts and skills necessary to troubleshoot issues which may occur when managing the Check Point Security Management architecture and Security Gateways. Course Outline An Introduction to Troubleshooting SmartConsole and Policy Management Troubleshooting Monitoring Logging Activity Troubleshooting Issues with NAT Understanding the Unified Access Control Policy Basic VPN Troubleshooting Monitoring ClusterXL Connections Understanding Identity Awareness Additional course details: Nexus Humans CCTA Check Point Troubleshooting Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCTA Check Point Troubleshooting Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Security Engineers Network Engineers Overview Upon completion of this course, students will be able to: Deploy gateways using the Gaia web interface Configure a Security Policy Learn about managing and monitoring a secure network Upgrade and configure a Security Gateway to implement a virtual private network for both internal and external, remote users The growing frequency and sophistication of security threats makes protecting your organization more difficult every year. Check Point?s integrated products provide end-to-end security from the enterprise to the cloud to your mobile worker?s personal devices. They prevent and mitigate cyberattacks and limit the data theft that often results from these threats. Introduction to Check Point TechnologyDeployment PlatformsIntroduction to the Security PolicyMonitoring Traffic & ConnectionsNetwork Address TranslationUsing SmartUpdateUser Management & AuthenticationIdentity AwarenessIntroduction to Check Point VPNsSmartLog
Duration 5 Days 30 CPD hours This course is intended for This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician. This course is also designed for students who are seeking the CompTIA A+ certification. Overview Install and configure mobile devices Compare and contrast networking hardware Configure internet connections and wireless networking Troubleshoot hardware and networks Install motherboards, RAM, storage devices, CPUs and add-on cards Deploy and configure connected devices Summarize cloud-computing concepts and virtualization CompTIA A+ certified professionals are proven problem solvers. They support today's core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today's digital world. It is the only industry-recognized credential with performance-based items to prove pros can think on their feet to perform critical IT support tasks in the moment. It is trusted by employers around the world to identify the go-to person in end-point management and technical support roles. CompTIA A+ is regularly re-invented by IT experts to ensure that it validates core skills and abilities demanded in the workplace. Prerequisites While there are no prerequisites for this course, please ensure you have the right level of experience to be successful in this training. Lesson 1: Installing Motherboards and Connectors Topic 1A: Explain Cable Types and Connectors Topic 1B: Install and Configure Motherboards Topic 1C: Explain Legacy Cable Types Lesson 2: Installing System Devices Topic 2A: Install and Configure Power Supplies and Cooling Topic 2B: Select and Install Storage Devices Topic 2C: Install and Configure System Memory Topic 2D: Install and Configure CPUs Lesson 3: Troubleshooting PC Hardware Topic 3A: Apply Troubleshooting Methodology Topic 3B: Configure BIOS/UEFI Topic 3C: Troubleshoot Power and Disk Issues Topic 3D: Troubleshoot System and Display Issues Lesson 4: Comparing Local Networking Hardware Topic 4A: Compare Network Types Topic 4B: Compare Networking Hardware Topic 4C: Explain Network Cable Types Topic 4D: Compare Wireless Networking Types Lesson 5: Configuring Network Addressing and Internet Connections Topic 5A: Compare Internet Connection Types Topic 5B: Use Basic TCP/IP Concepts Topic 5C: Compare Protocols and Ports Topic 5D: Compare Network Configuration Concepts Lesson 6: Supporting Network Services Topic 6A: Summarize Services Provided by Networked Hosts Topic 6B: Compare Internet and Embedded Appliances Topic 6C: Troubleshoot Networks Lesson 7: Summarizing Virtualization and Cloud Concepts Topic 7A: Summarize Client-Side Virtualization Topic 7B: Summarize Cloud Concepts Lesson 8: Supporting Mobile Devices Topic 8A: Set Up Mobile Devices and Peripherals Topic 8B: Configure Mobile Device Apps Topic 8C: Install and Configure Laptop Hardware Topic 8D: Troubleshoot Mobile Device Issues Lesson 9: Supporting Print Devices Topic 9A: Deploy Printer and Multifunction Devices Topic 9B: Replace Print Device Consumables Topic 9C: Troubleshoot Print Device Issues
Duration 5 Days 30 CPD hours This course is intended for This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician. This course is also designed for students who are seeking the CompTIA A+ certification and who want to prepare for the CompTIA A+ Core 2 220-1102 Certification Exam. Overview Identify, install and configure Windows Operating System features Perform OS installations and upgrades Identify features and tools of macOS Identify features and tools of Linux OS Summarize security measures and protocols Configure SOHO network security Manage security settings Troubleshoot Windows OS problems Explain change-management best practices Implement workstation backup and recover methods Identify the basics of scripting CompTIA A+ certified professionals are proven problem solvers. They support today?s core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today?s digital world. It is the only industry recognized credential with performance-based items to prove pros can think on their feet to perform critical IT support tasks in the moment. It is trusted by employers around the world to identify the go-to person in end point management and technical support roles. CompTIA A+ is regularly re-invented by IT experts to ensure that it validates core skills and abilities demanded in the workplace. This course follows after the A+ Part 1 course and prepares you for the A+ Core 2 exam 220-1101. Prerequisites While there are no prerequisites for this course, please ensure you have the right level of experience to be successful in this training. Lesson 1: Configuring Windows Topic 1A: Configure Windows User Settings Topic 1B: Configure Windows System Settings Lesson 2: Managing Windows Topic 2A: Use Management Consoles Topic 2B: Use Performance and Troubleshooting Tools Topic 2C: Use Command-line Tools Lesson 3: Identifying OS Types and Features Topic 3A: Explain OS Types Topic 3B: Compare Windows Editions Lesson 4: Supporting Windows Topic 4A: Perform OS Installations and Upgrades Topic 4B: Install and Configure Application Topic 4C: Troubleshoot Windows OS Problems Lesson 5: Managing Windows Networking Topic 5A: Manage Windows Networking Topic 5B: Troubleshoot Windows Networking Topic 5C: Configure Windows Security Settings Topic 5D: Manage Windows Shares Lesson 6: Managing Linux and macOS Topic 6A: Identify Features of Linux Topic 6B: Identify Features of macOS Lesson 7: Configuring SOHO Network Security Topic 7A: Explain Attacks, Threats, and Vulnerabilities Topic 7B: Compare Wireless Security Protocols Topic 7C: Configure SOHO Router Security Topic 7D: Summarize Security Measures Lesson 8: Managing Security Settings Topic 8A: Configure Workstation Security Topic 8B: Configure Browser Security Topic 8C: Troubleshoot Workstation Security Issues Lesson 9: Supporting Mobile Software Topic 9A: Configure Mobile OS Security Topic 9B: Troubleshoot Mobile OS and App Software Topic 9C: Troubleshoot Mobile OS and App Security Lesson 10: Using Support and Scripting Tools Topic 10A: Use Remote Access Technologies Topic 10B: Implement Backup and Recovery Topic 10C: Explain Data Handling Best Practices Topic 10D: Identify Basics of Scripting Lesson 11: Implementing Operational Procedures Topic 11A: Implement Best Practice Documentation Topic 11B: Use Proper Communication Techniques Topic 11C: Use Common Safety and Environmental Procedures
Duration 5 Days 30 CPD hours This course is intended for Network Administrators Network security Administrators Network Security Engineer Network Defense Technicians CND Analyst Security Analyst Security Operator Anyone who involves in network operations Overview A dedicated focus on IoT security Network virtualization practices for the remote workforce Enhanced Cloud Security & IoT and Operational Technology (OT) Modules Introduction to threat intelligence In-depth Attack Surface Analysis Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF) as well as a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators. The program prepares network administrators how to identify what parts of an organization need to be reviewed and tested for security vulnerabilities and how to reduce, prevent, and mitigate risks in the network. CND covers the protect, detect, respond and predict approach to network security. Course Outline Network Attacks and Defense Strategies Administrative Network Security Technical Network Security Network Perimeter Security Endpoint Security-Windows Systems Endpoint Security-Linux Systems Endpoint Security- Mobile Devices Endpoint Security-IoT Devices Administrative Application Security Data Security Enterprise Virtual Network Security Enterprise Cloud Network Security Enterprise Wireless Network Security Network Traffic Monitoring and Analysis Network Logs Monitoring and Analysis Incident Response and Forensic Investigation Business Continuity and Disaster Recovery Risk Anticipation with Risk Management Threat Assessment with Attack Surface Analysis Threat Prediction with Cyber Threat Intelligence
Duration 2 Days 12 CPD hours This course is intended for AT&T Custom Course - 5G Essentials - WiFi Ran Overview AT&T Custom Course - 5G Essentials - WiFi Ran AT&T Custom Course - 5G Essentials - WiFi Ran AT&T Custom Course - 5G Essentials - WiFi Ran
Duration 5 Days 30 CPD hours This course is intended for This course benefits individuals responsible for implementing, monitoring, and troubleshooting Layer 3 components of a service provider's network. Overview Describe the various OSPF link-state advertisement (LSA) types. Explain the flooding of LSAs in an OSPF network. Describe the shortest-path-first (SPF) algorithm. List key differences between OSPFv2 and OSPFv3. Describe OSPF area types and operations. Configure various OSPF area types. Summarize and restrict routes. Identify some scenarios in a service provider network that can be solved using routing policy or specific configuration options. Use routing policy and specific configuration options to implement solutions for various scenarios. Describe how to troubleshoot OSPF. Explain the concepts and operation of IS-IS. Describe various IS-IS link-state protocol data unit (LSP) types. List IS-IS adjacency rules and troubleshoot common adjacency issues. Configure and monitor IS-IS. Display and interpret the link-state database (LSDB). Perform advanced IS-IS configuration options. Implement IS-IS routing policy. Explain the default operation in multiarea IS-IS. Describe IS-IS address summarization methods. Configure and monitor a multiarea IS-IS network. Describe how to troubleshoot IS-IS. Describe basic BGP operation. List common BGP attributes. Explain the route selection process for BGP. Describe how to alter the route selection process. Configure some advanced options for BGP peers. Describe various BGP attributes in detail and explain the operation of those attributes. Manipulate BGP attributes using routing policy. Explain the causes for route instability. Describe the effect of damping on BGP routing. Explain the default behavior of damping on links. Control damping using routing policy. View damped routes using command-line interface (CLI) commands. Describe the operation of BGP route reflection. Configure a route reflector. Describe the operation of a BGP confederation. Configure confederations. Describe peering relationships in a confederation. Describe how to troubleshoot BGP. Describe how to troubleshoot routing policy. This five-day course is designed to provide students with detailed coverage of OSPF, IS-IS, BGP, and routing policy. Course Outline Course Introduction OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication OSPF Areas Review of OSPF Areas Stub Area Operation Stub Area Configuration NSSA Operation NSSA Configuration Route Summarization OSPF Case Studies and Solutions Virtual Links OSPF Multiarea Adjacencies External Reachability Troubleshooting OSPF Troubleshooting OSPF IS-IS Overview of IS-IS IS-IS PDUs Neighbors and Adjacencies Configuring and Monitoring IS-IS Advanced IS-IS Operations and Configuration Options IS-IS Operations IS-IS Configuration Options IS-IS Routing Policy Multilevel IS-IS Networks Level 1 and Level 2 Operations Multilevel Configuration Troubleshooting IS-IS Troubleshooting IS-IS BGP Review of BGP BGP Operations BGP Path Selection Options Configuration Options BGP Attributes and Policy?Part 1 BGP Policy Next Hop Origin and MED AS Path BGP Attributes and Policy?Part 2 Local Preference Communities Route Reflection and Confederations Route Reflection Operation Configuration and Routing Knowledge BGP Confederations BGP Route Damping Route Flap and Damping Overview Route Damping Parameters Configuring and Monitoring Route Damping Troubleshooting BGP Troubleshooting BGP Troubleshooting Policy Troubleshooting Policy
Duration 3 Days 18 CPD hours This course is intended for This course is targeted for Juniper Networks system engineers, partner sales engineers (including Champions), and services partners who are interested in learning network design introductory concepts. However, the course is also applicable to a general audience of Juniper customers with a desire to learn more about network design. Overview Provide an overview of network design needs and common business requirements.Describe key product groups related to campus, WAN, data center, and security architectures.Analyze and interpret common RFP requirements.Scope a network design by gathering data and working with key stakeholders.Describe ways of processing customer data and design requests.Identify boundaries and scope for the design proposal.List some considerations when creating a design proposal.Provide an overview of network security design principles and common vulnerabilities.List high-level design considerations and best practices for securing the network.List the components of the campus network design.Describe best practices and design considerations for the campus.Describe architectural design options for the campus.List the components of the WAN.Describe best practices and design considerations for the WAN.Describe design options for the WAN.List the components of the data center design.Describe best practices and design considerations for the data center.Describe architectural design options for the data center.Define business continuity and its importance in a network design.Describe high availability design considerations and best practices.Provide an overview of high availability offerings and solutions.Describe Class of Service design considerations.Provide an overview of environmental considerations in network design.List design considerations and best practices for managing the network.Provide an overview of Juniper Networks and third party options for network management.List design considerations and best practices for network automation.Provide an overview of automation tools.Explain the foundational topics that have been taught throughout the course.Create a network design proposal that satisfies customer requirements and business needs.Provide an overview of the steps involved in migrating a network.Describe best practices used in network migration.List the various campus network topographies.Describe sample design options for the campus. This three-day course is designed to cover best practices, theory, and design principles for overall network design and will serve as the prerequisite course for other design subject areas Æ?? data center, security, and WAN. Course IntroductionNetwork Design Fundamentals A Need for Design Knowledge is King A Proposed Design Methodology A Reference Network Understanding Customer Requirements RFP Requirements Scoping the Design Project Analyzing the Data Lab: Understanding Customer Requirements Organizing the Data Processing the Data and Requests Understanding Boundaries and Scope Design Proposal Considerations Securing the Network Why Secure the Network? Security Design Considerations Creating the Design Campus The Campus Network: An Overview Best Practices and Considerations Architectural Design Options Lab: Creating the Design Campus Creating the Design Wide Area Network The WAN: An Overview Best Practices and Considerations WAN Design Examples Lab: Creating the Design WAN Creating the Design Data Center The Data Center: An Overview Best Practices and Considerations Data Center Design Examples Lab: Creating the Design Data Center Business Continuity & Network Enhancements Business Continuity Planning High Availability Design Considerations and Best Practices Offerings and Solutions CoS and Traffic Engineering Considerations Environmental Design Network Management Designing for Network Management Automation Designing for Network Automation Lab: Enhancing the Design Putting Network Design Into Practice Network Design Recap Responding to the RFP Final Lab Introduction Lab: Putting Network Design into Practice