• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

7219 CLO courses delivered Online

PMI Agile Certified Practitioner (PMI-ACP) Exam Preparation

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for project leaders, scrum masters, coaches, product owners, and team members who intend on taking the PMI-ACP© exam. This course provides participants with a foundation of the PMI-ACP© exam. Participants will be introduced to PMI Agile concepts and practices with banks of sample questions. PMI-ACP© Exam Preperation PMI-ACP© Exam Particulars Overview PMI-ACP© Exam Particulars PMI-ACP© Candidate Requirements PMI-ACP© Candidate Fees PMI-ACP© Exam Application Process Core Agile Concepts Core Agile Concepts Overview Traditional Project Management Methodologies Drawbacks of Waterfall Methodologies Agile Approach Empirical Process Control Agile and Traditional Project Management Choice of Methodologies/Frameworks The Agile Manifesto The Agile Manifesto Overview Manifesto Contributors Manifesto Values Manifesto Principles Common Agile Methodology Elements Common Agile Methodology Elements Overview Project (Product; Release) Initiation Agile Planning Iteration Planning and Executing Project Initiation Project Initiation Overview Determine Project Justifications and Metrics Provide Value-Driven Delivery Write Project Vision Statement Create Project Charter Identify Stakeholders and Leader/Coach Form Project Team Agile Teams and Team Space Agile Teams and Team Space Overview Scrum Master/Coach Product Owner/Customer Team Members/Developers (XP) Trackers and Testers Other Roles Team Space Physical Space Recommendations Agile Planning Agile Planning Overview Develop Epics and Stories Create Stories Non-Customer Facing Stories Personas and Extreme Personas Story Maps Estimating Stories Prioritizing Stories Create Product Backlog Create Product Roadmap Conduct Release Planning Create Parking Lot Iterations/Sprints Iterations/Sprints Overview Velocity Determination Iteration Planning Meeting Iteration Planning Guidelines Development Testing Daily Standup Meetings Progress Tracking Velocity Tracking Interpersonal Aspects of Agile Interpersonal Aspects of Agile Overview Methodologies and Uncertainty Coach/Scrum Master Team Motivation Soft Skills Emotional Intelligence Collaboration Negotiations Active listening Conflict Resolution Speed Leas? Model of Group Conflict Conducting Retrospectives Mindsets of Agile Coaches Leadership Stages Key Coaching Responsibilities Agile Methodologies Agile Methodologies Overview XP and Scrum Terms XP Terms and Concepts XP Primary Practices XP Corollary Practices Scrum Lean Software Development Seven Principles of Lean Seven Types of Muda Responsibilities Core Beliefs of Lean-Agile Software Development Other Principles of Lean-Agile Software Development Value Stream Mapping Lean-Agile Software Development Portfolio Management Additional course details: Nexus Humans PMI Agile Certified Practitioner (PMI-ACP) Exam Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PMI Agile Certified Practitioner (PMI-ACP) Exam Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

PMI Agile Certified Practitioner (PMI-ACP) Exam Preparation
Delivered OnlineFlexible Dates
Price on Enquiry

Managing Campus Networks with Aruba AirWave, Rev. 19.21

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Ideal candidates are Network Administrators who monitor and troubleshoot wireless networks, and Network and System Administrators responsible for installing and configuring network monitoring systems. Overview This hands-on course prepares you with the knowledge and experience required to install and use the AirWave Wireless Management Suite: AirWave Management Platform (AMP), RAPIDS, Visual RF, network health diagnostics, client troubleshooting, alerts and reporting.  In this course, you learn about AirWave?s capabilities in troubleshooting network health and client status via the various stages of association and authentication, as well as redundancy and master consoles for large networks. Introduction to AWMS Airwave Platform. Features and Benefits of AMP RAPIDS and Visual RF. Airwave products. Basic operations using AWMS Installing AWMS Installing AMP. Hardware requirements. Cent OS and AWMS software. Basic configuration steps. Upgrade AWMS software. Licensing AWMS. AWMS documentation Adding Device to AWMS Folders and Groups. Adding devices general process. Manually adding devices. Device discovery and managing device discovery. Moving a device to a folder. Troubleshooting IAP Organizaion and Groups Overview of IAP.Airwave integration. Golden configuration. IAP Organization options. IAP Whitelist Using Visual RF and Visual RF Plan Navigation. Setup. Heat-maps and location information. Import floorplan graphics. Plan deployments. Provision APs. Manage Visual RF performance Network Health Diagnostics page indicators. Network performance tabs. Source of issues. Network issues Troubleshooting Clients and Wireless Networks Searching for users and Diagnostics tab. Client issues. Network issues. AP issues. Switch/Controller issues. General Issues Rogue Detection and Using RAPIDS Why use RAPIDS. Threat Detection Methods. Rules. Classifications. IDS Events Report. New Rogue Devices Report. Visualization. PCI Compliance.WMS Offload Managing Administrative Access, Alerts, Triggers and Reporting Configure role-based administrative use access to the AMP system. Triggers. Alerts. Define and generate reports Scalability and Redundancy VM Redundancy. Failover for Redundancy. Master Console for large deployments. Multiple AMP Server deployments. Large Deployment example System Administration AMP Maintenance. Device Maintenance Wired Device Management Monitoring wired devices in AWMS. Wired device port and interface information. Wired device bandwith statistics and counters. Managing and configuring wired devices via AWMS templates AirWave Aruba Groups How AWMS configures devices. Using groups to control policies. Creating and controlling groups. Basic Group Design.Configuration Audits IAP Template Configuration Fetching a Template. Template Variables. Templates Configuration IAP GUI Configuration Golden configuration. GUI mode. GUI configuration Additional course details: Nexus Humans Managing Campus Networks with Aruba AirWave, Rev. 19.21 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing Campus Networks with Aruba AirWave, Rev. 19.21 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Managing Campus Networks with Aruba AirWave, Rev. 19.21
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft PowerPoint for Office 365 (Desktop or Online) - Part 1 ( v1.1)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for students who wish to gain a foundational understanding of PowerPoint that is necessary to create and develop engaging multimedia presentations. Overview In this course, you will create and deliver an engaging PowerPoint presentation. You will: Identify the basic features and functions of PowerPoint. Develop a PowerPoint presentation. Perform text formatting. Add and arrange graphical elements. Modify graphical elements. Prepare to deliver your presentation. How do you grab and maintain an audience's focus when you're asked to present important information? By being clear, organized, and engaging. And, that is exactly what Microsoft© PowerPoint© can help you do.Today's audiences are tech savvy, accustomed to high-impact multimedia content, and stretched for time. By learning how to use the vast array of features and functionality contained within PowerPoint, you will gain the ability to organize your content, enhance it with high-impact visuals, and deliver it with a punch. In this course, you will use PowerPoint to begin creating engaging, dynamic multimedia presentations.Note: Most Office users perform the majority of their daily tasks using the desktop version of the Office software, so that is the focus of this training. The course material will also enable you to access and effectively utilize many web-based resources provided with your Microsoft 365 subscription. This includes brief coverage of key skills for using PowerPoint for the Web and OneDrive. Helpful notes throughout the material alert you to cases where the online version of the application may function differently from the primary, desktop version.This course may be a useful component in your preparation for the Microsoft PowerPoint (Microsoft 365 Apps and Office 2019): Exam MO-300 certification exam. Lesson 1: Getting Started with PowerPoint Topic A: Navigate the PowerPoint Environment Topic B: View and Navigate a Presentation Topic C: Create and Save a Basic Presentation Topic D: Navigate in PowerPoint for the Web Topic E: Use PowerPoint Help Lesson 2: Developing a PowerPoint Presentation Topic A: Create Presentations Topic B: Edit Text Topic C: Work with Slides Topic D: Design a Presentation Lesson 3: Formatting Text Topic A: Format Characters Topic B: Format Paragraphs Lesson 4: Adding and Arranging Graphical Elements Topic A: Insert Images Topic B: Insert Shapes Topic C: Create SmartArt Topic D: Insert Stock Media, Icons, and 3D Models Topic E: Size, Group, and Arrange Objects Lesson 5: Modifying Graphical Elements Topic A: Format Images Topic B: Format Shapes Topic C: Customize SmartArt Topic D: Format Icons Topic E: Format 3D Models Topic F: Animate Objects Lesson 6: Preparing to Deliver Your Presentation Topic A: Review Your Presentation Topic B: Apply Transitions Topic C: Print or Export a Presentation Topic D: Deliver Your Presentation Additional course details: Nexus Humans Microsoft PowerPoint for Office 365 (Desktop or Online) - Part 1 ( v1.1) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft PowerPoint for Office 365 (Desktop or Online) - Part 1 ( v1.1) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Microsoft PowerPoint for Office 365 (Desktop or Online) - Part 1 ( v1.1)
Delivered OnlineFlexible Dates
Price on Enquiry

CV041 IBM z/OS and DB2 Basics for DB2 for z/OS DBA Beginners

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This beginning DB2 basic course is for z/OS database administrators who need to acquire the basic skills required to administer a DB2 database in a z/OS environment. Overview Describe several services provided in a z/OS environmentExplain workloads in the batch environmentExplain workloads in the online environmentDescribe job roles in a z/OS environmentLog On to TSO/ENavigate TSO/E and ISPFUse TSO commandsSetup and utilize JCL (Job Control Language)Utilize SDSFDescribe the different types of data sets in a z/OS environmentAllocate data sets and list data set information and contentCreate and modify data set contentGive an overview of the DB2 9 environmentDescribe and utilize DB2 ObjectsDescribe and utilize several DB2 UtilitiesDescribe the DB2I (DB2 Interactive Facility) environmentUse SPUFI (SQL Processing Using File Input) to compose and execute SQLSetup and execute DB2 CommandsUnderstand DB2 LoggingDescribe DB2 program preparation processUnderstand DB2 startup and shutdownUnderstand and utilize DB2 recovery strategies This course is intended for students looking to develop fundamental skills or recognition through lectures and hands-on exercises of TSO/E and ISPF, data sets, DB2 objects, Structured Query Language, DB2 commands, JCL and SDSF. Day 1 Welcome Unit 1: Introduction Unit 2: TSO/E and ISPF Exercise 1: TSO and ISPF Exercise 1 Review Unit 3: Data Sets (Data Sets and Sequential Data Sets) Exercise 2: Sequential Data Sets Exercise 2 Review Day 2 Unit 3: Data Sets (Partitioned Data Sets) Exercise 3: Partitioned Data Sets Exercise 3 Review Unit 3: Data Sets (VSAM Data Sets) Exercise 4: VSAM Data Sets Exercise 4 Review Unit 4: JCL and SDSF Exercise 5: JCL and SDSF Exercise 5 Review Day 3 Unit 5: DB2 Relational Database Concepts Unit 6: Structured Query Language (SQL) and SPUFI Exercise 6: SQL and SPUFI Exercise 6 Review Unit 7: DB2 Objects (Databases and Table Spaces) Exercise 7: Databases and Table Spaces Exercise 7 Review Unit 7: DB2 Objects (Tables, Indexes, and Views) Exercise 8: Tables, Indexes, and Views Exercise 8 Review Day 4 Unit 7: DB2 Objects (Qualified Names, Implicit Object Creation, and SQL Statements) Exercise 9: Qualified Names, Implicit Object Creation, and SQL Statements Exercise 9 Review Unit 8: The DB2 System Exercise 10: The DB2 System Exercise 10 Review Unit 9: DB2 Commands and Program Preparation Exercise 11: DB2 Commands Exercise 11 Review Day 5 Unit 10: DB2 Utilities Exercise 12: DB2 Utilities Exercise 12 Review Unit 11: DB2 Shutdown, Startup, and Recovery Exercise 13: DB2 Recovery Exercise 13 Review Unit 12: Course Summary Additional course details: Nexus Humans CV041 IBM z/OS and DB2 Basics for DB2 for z/OS DBA Beginners training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CV041 IBM z/OS and DB2 Basics for DB2 for z/OS DBA Beginners course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CV041 IBM z/OS and DB2 Basics for DB2 for z/OS DBA Beginners
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat Application Development I: Programming in Java EE with exam (AD184)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for Java developers who want to learn more about the specifications that comprise the world of Java Enterprise Edition (Java EE). Overview As a result of attending this course, you should be able to describe most of the specifications in Java EE 7 and create a component with each specification. You will be able to convert a Java SE program into a multi-tiered Java EE application. You should be able to demonstrate these skills: Describe the architecture of multi-tiered Java EE applications. Package Java EE applications and deploy to Red Hat JBoss Enterprise Application Platform with various tools. Create an Enterprise Java Bean instance. Manage the persistence of data using Java Persistence API. Create a web service using JAX-RS. Properly apply context scopes to beans and inject resources into Java Beans. Store and retrieve messages using the Java Messaging Service. Secure a Java EE application. Red Hat Application Development I: Programming in Java EE with exam (AD184) exposes experienced Java Standard Edition (Java SE) developers to the world of Java Enterprise Edition (Java EE). This course is based on Red Hat© Enterprise Application Platform 7.0. This course is a combination of Red Hat Application Development I: Programming in Java EE (AD183) and Red Hat Certified Enterprise Application Developer Exam (EX183). In this course, you will learn about the various specifications that make up Java EE. Through hands-on labs, you will transform a simple Java SE command line application into a multi-tiered enterprise application using various Java EE specifications, including Enterprise Java Beans, Java Persistence API, Java Messaging Service, JAX-RS for REST services, Contexts and Dependency Injection (CDI), and JAAS for securing the application. Transition to multi-tiered applications Describe Java EE features and distinguish between Java EE and Java SE applications. Package and deploying applications to an application server Describe the architecture of a Java EE application server, package an application, and deploy the application to an EAP server. Create Enterprise Java Beans Develop Enterprise Java Beans, including message-driven beans. Manage persistence Create persistence entities with validations. Manage entity relationships Define and manage JPA entity relationships. Create REST services Create REST APIs using the JAX-RS specification. Implement Contexts and Dependency Injection Describe typical use cases for using CDI and successfully implement it in an application. Create messaging applications with JMS Create messaging clients that send and receive messages using the JMS API. Secure Java EE applications Use JAAS to secure a Java EE application. Comprehensive review of Red Hat JBoss Development I: Java EE Demonstrate proficiency of the knowledge and skills obtained during the course. Additional course details: Nexus Humans Red Hat Application Development I: Programming in Java EE with exam (AD184) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Application Development I: Programming in Java EE with exam (AD184) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat Application Development I: Programming in Java EE with exam (AD184)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Developing Applications Using Cisco Core Platforms and APIs v1.0 (DEVCOR)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for To fully benefit from this course, you should have three to five years of experience designing and implementing applications that are built on top of Cisco platforms. This course is appropriate for: Network engineers expanding their skill-base to include software and automation Developers expanding expertise in automation and DevOps Solution architects moving to the Cisco ecosystem Infrastructure developers designing hardened production environments The job roles best suited to the material in this course are: Senior network automation engineer Senior software developer Senior system integration programmer Additional job roles that could find this course useful are: Senior infrastructure architect Senior network designer Senior test development engineer Students preparing for Cisco Certified DevNet Professional and Cisco Certified DevNet Specialist - Core certification will also find this material useful. Overview After taking this course, you should be able to: Describe the architectural traits and patterns that improve application maintainability Describe the architectural traits and patterns that improve application serviceability Identify steps to design and build a ChatOps application Implement robust Representational State Transfer (REST) API integrations with network error handling, pagination, and error flow control Describe the necessary steps for securing user and system data in applications Describe the necessary steps for securing applications Identify common tasks in automated application release process Describe best practices for application deployment Describe methodologies for designing distributed systems Describe the concepts of infrastructure configuration management and device automation Utilize Yet Another Next Generation (YANG) data models to describe network configurations and telemetry Compare various relational and nonrelational database types and how to select the appropriate type based on requirements In this course, you will learn how to implement network applications using Cisco© platforms as a base, from initial software design to diverse system integration, as well as testing and deployment automation. The course gives you hands-on experience solving real world problems using Cisco Application Programming Interfaces (APIs) and modern development tools. This course helps you prepare for Cisco DevNet Professional certification and for professional-level network automation engineer roles. COURSE OUTLINE DESIGNING FOR MAINTAINABILITY (SELF-STUDY) DESIGNING FOR SERVICEABILITY (SELF-STUDY) IMPLEMENTING CHATOPS APPLICATION DESCRIBING ADVANCED REST API INTEGRATION SECURING APPLICATION DATA (SELF-STUDY) SECURING WEB AND MOBILE APPLICATIONS (SELF-STUDY) AUTOMATING APPLICATION-RELEASE DEPLOYING APPLICATIONS UNDERSTANDING DISTRIBUTED SYSTEMS ORCHESTRATING NETWORK AND INFRASTRUCTURE MODELING DATA WITH YANG USING RELATIONAL AND NON-RELATIONAL DATABASES (SELF-STUDY) PLEASE NOTE:This class includes lecture sections and self-study sections. In instructor-led classes, lectures are delivered in real-time, either in person or via video conferencing. In e-learning courses, the lectures are on recorded videos. In both versions, you will need to review self-study sections on your own before taking the certification exam. Additional course details: Nexus Humans Cisco Developing Applications Using Cisco Core Platforms and APIs v1.0 (DEVCOR) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Developing Applications Using Cisco Core Platforms and APIs v1.0 (DEVCOR) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Developing Applications Using Cisco Core Platforms and APIs v1.0 (DEVCOR)
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Endpoint Protection 14.X - Configure And Protect

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions

Symantec Endpoint Protection 14.X - Configure And Protect
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.1

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for those who regularly deploy or manage Meraki networks and want to deepen their technical expertise and understanding of the full Meraki product suite and features. This may include professionals with job titles or in roles such as: Consulting Systems Engineer Deployment Engineer Network Administrator Network Manager Network Engineer Site Reliability Engineer Systems Engineer Technical Solutions Architect Wireless Design Engineer Wireless Engineer Overview After completing the course, you should be able to: Plan new Cisco Meraki architectures and expand existing deployments Design the network for scalable management and high availability Describe how to automate and scale Meraki deployments with dashboard tools Use dynamic routing protocols to expand networks and improve WAN performance Describe proper QoS, policy and performance-based routing configurations across a Cisco Meraki network and WAN optimization through traffic shaping Describe Virtual Private Network (VPN) and Wide Area Network (WAN) topologies and how to integrate them Secure, expand, and shape the network Implement switched network concepts and practices, and configure guests networks Implement wireless configurations concepts and practices Describe endpoint management concepts and practices using Cisco Meraki Systems Manager Describe physical security concepts and practices Gain network insight by monitoring applications Describe how to prepare monitoring, logging, and alerting services Set up reporting and auditing capabilities in the Cisco Meraki dashboard Monitor and troubleshoot issues using Cisco Meraki tools The course, Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.1 elevates your knowledge of Cisco© Meraki? technology suite. In this advanced technical training course, you?ll learn how to plan for network deployments and integrations using the Cisco Meraki platform. Through practical hands-on instruction and experiences, you will learn how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives. This course is the second of two courses that prepares you for Cisco Meraki certification. Course Outline Planning new Cisco Meraki architectures and expanding existing deployments Designing for scalable management and high availability Automating and scaling Meraki deployments Designing routing and practices on the Meraki platform Describing Quality of Service (QoS) and traffic shaping design Building VPN and WAN topologies Securing, expanding, and shaping the network Describing network concepts and practices Implementing wireless configuration practices and concepts Describing Endpoint management concepts and practices Describing physical security concepts and practices Gaining network insight through monitoring applications Preparing monitoring, logging, and alerting services Setting up reporting and auditing capabilities in the Cisco Meraki Dashboard Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools Additional course details: Nexus Humans Cisco Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.1 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.1 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.1
Delivered OnlineFlexible Dates
Price on Enquiry

CCAS Check Point Certified Automation Specialist

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who automate, orchestrate, and troubleshoot Check Point secured environments. Overview Explain how automation and orchestration work together Understand the key drivers for incorporating automation and orchestration into security management Execute a shell script that demonstrates how to build a comprehensive Security Policy. Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions Demonstrate how to define new objects and modify existing ones by using the Check Point API The goal of this course is to provide an understanding of the advanced concepts and skills necessary to automate and orchestrate tasks relating to managing Check Point Security Policies Course Ouline Explain how automation and orchestration work together Understand the key drivers for incorporating automation and orchestration into security management Execute a shell script that demonstrates how to build a comprehensive Security Policy. Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions Demonstrate how to define new objects and modify existing ones by using the Check Point API Demonstrate how to create API commands to efficiently maintain the Check Point Security Management Server database Demonstrate how to use different methods to update the database with API commands Become familiar with client-side and server-side scripting and scripting languages Understand how to use the Bash shell to develop APIs Recognize and describe many of the open source tools that are available to assist with API development Demonstrate how to use a custom REST application to update the database of a Security Management Server Demonstrate how to use Postman to manage the Security Policy database through the Check Point API Understand what steps to take to troubleshoot and debug API scripts Demonstrate basic troubleshooting techniques by reviewing debugging messages in various forms Understand how to use self-service portal capabilities to provide general IT services Recognize how automation tools work with Check Point APIs to automate security management tasks and orchestrate workflow behind service portals Demonstrate common tasks that are automated in a Web portal to manage the Security Policy LAB Exercises Demonstrate Check Point automation and orchestration Manage objects using the Check Point API Create a management API shell script Use a variety of methods to execute API commands Use a custom REST tool for API calls Use Postman for API calls Debug the Check Point management API Automate tasks using a Check Point API enabled Web portal Additional course details: Nexus Humans CCAS Check Point Certified Automation Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCAS Check Point Certified Automation Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCAS Check Point Certified Automation Specialist
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Collaboration Applications v1.0 (CLICA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for professionals in the following job roles: Collaboration engineers Collaboration administrators Overview After taking this course, you should be able to: Configure Cisco Unity Connection integration Configure and troubleshoot Cisco Unity Connection and Cisco Unity Connection call handlers Configure and troubleshoot Cisco Unity Express Describe SSO for Cisco Unified Communications applications Describe how Cisco Jabber and Cisco Unified Communications Manager IM and Presence are integrated with other Cisco or third-party applications Customize the Cisco Unified Communications Manager IM and Presence and Cisco Jabber functionality Configure and troubleshoot chat rooms and message archiving Troubleshoot Cisco Jabber and Cisco Unified Communications Manager IM and Presence Integrate Cisco Unified Attendant Console Advanced with Cisco Unified Communications Manager and Cisco Unified Communications Manager IM and Presence server Configure call recording and monitoring This course provides you with the knowledge and skills to streamline communication procedures, strengthen compliance measures, and enhance your communication systems and devices with knowledge about Single Sign-On (SSO), Cisco© Unified IM and Presence, Cisco Unity© Connection and Cisco Unity Express. This course will prepare you for certification exam 300-810 Implementing Cisco Collaboration Applications (CLICA). Course Outline Configuring and Troubleshooting Cisco Unity Connection Integration Configuring and Troubleshooting Cisco Unity Connection Call Handlers Troubleshooting Cisco Unity Connection Configuring and Troubleshooting Cisco Unity Express Configuring Single Sign-On (SSO) for Cisco Unified Communications Applications Integrating Cisco Unified Communications Manager IM and Presence and Cisco Jabber Customizing Cisco Unified Communications Manager IM and Presence and Cisco Jabber Functionality Configuring Cisco Unified Communications Manager IM and Presence Service Compliance and Message Archiving Troubleshooting Cisco Unified Communications Manager IM and Presence Service Integrating Cisco Unified Attendant Console Advanced Implementing Call Recording and Monitoring Lab outline Integrate and Set Up Cisco Unity Connection Configure Cisco Unity Connection Call Handlers Implement Toll Fraud Prevention Troubleshoot Cisco Unity Connection Call Handlers Troubleshoot Cisco Unity Connection Configure Cisco Unity Express Troubleshoot Cisco Unity Express Configure Cisco Unified Communications Manager IM and Presence High Availability Implement Cisco Jabber Configure Centralized Cisco Unified Communications Manager IM and Presence Configure Cisco Unified Communications Manager IM and Presence Service Functionality Enable Message Archiving and Chat Rooms Troubleshoot the Cisco Unified Communications IM and Presence Database Connection Troubleshoot Cisco Unified Communications Manager IM and Presence High Availability Troubleshoot Cisco Unified Communications Manager IM and Presence Service Integrate Cisco Unified Attendant Console Advanced Implement Call Recording and Monitoring Using a Switched Port Analyzer (SPAN)-based Solution Implement Cisco Unified Communications Manager Call Recording and Monitoring Additional course details: Nexus Humans Cisco Implementing Cisco Collaboration Applications v1.0 (CLICA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Collaboration Applications v1.0 (CLICA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Collaboration Applications v1.0 (CLICA)
Delivered OnlineFlexible Dates
Price on Enquiry