Duration 3 Days 18 CPD hours This course is intended for This course is designed for technical professionals who will deploy or have deployed the Ultra M virtual packet core solution in their network, including: Systems engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe the Ultra M hardware and software Describe the features covered in the OpenStack component overview and deployment architecture Describe the Ultra M deployment architecture and operation Describe the Virtualized Packet Core-Distributed Instance (VPC-DI) architecture and packet flow Deploy and operate Ultra M This course teaches you about the hardware components of the Cisco© Ultra M virtual packet core solution, including Cisco Nexus© spine and leaf switches and Cisco Unified Computing System. The course also covers the operation and administration of the Red Hat Enterprise Linux operating system in relation to the Ultra M Undercloud and Overcloud deployments. Cisco Ultra M Hardware and Topology Overview Cisco Ultra M Hardware Components Cisco Ultra M UCS Components Cisco Ultra M UCS Interfaces Cisco Ultra M Networking Components Cisco Ultra M Physical Network Topology OpenStack Deployment Architecture and Components OpenStack Overview Nova ? OpenStack Compute Service Glance ? OpenStack Image Service Neutron ? OpenStack Network Service Keystone ? OpenStack Identity Service Cinder ? OpenStack Block Storage Service OpenStack Horizon Dashboard Ultra M Services Platform Ultra Services Platform Architecture Ultra M VNF Architecture Ultra Automation Services (UAS) Elastic Services Controller OpenStack and Ultra Automation Services VPC-DI Overview and Operation Virtual Packet Core Evolution Ultra M Layer 3 Network Topology VPC-DI Network Topology VPC-DI Packet Flows Ultra M Installation and Deployment Reviewing the Ultra M System Components Planning the Network for Installation and Deployment Deploying Hyperconverged Ultra M Models Using UAS Deploying VNFs Using AutoVNF Ultra Automation Services Additional course details: Nexus Humans Cisco Ultra M Deployment and Operations v1.0 (SPMBL301) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Ultra M Deployment and Operations v1.0 (SPMBL301) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Developed for IT Professionals interested in learning how to manage Citrix Endpoint Management on-premises or cloud environments using leading practices. Potential students include Administrators and Implementers. Overview How to manage a Citrix Endpoint Management implementation in a On-premises or cloud environment How to perform common enterprise mobility management tasks and mobile application managementUnderstand the device enrollment processHow to perform monitoring, troubleshooting, and reporting on a Citrix Endpoint Management Enterprise solution Students will explore how to manage Citrix Endpoint Management in this course. Venture into the cloud as students learn to manage devices, apps, and users. Students will learn how the architecture, management, and communication flow function with Citrix Endpoint Management Service and how they can fit their organization?s needs. Students will learn how to administer their Citrix Endpoint Management environment and how to support your end users, as well as working with applications and securing a variety of endpoints. Introduction to Citrix Endpoint Management Citrix Endpoint Management Features Citrix Cloud and Citrix Endpoint Management Citrix Endpoint Management User Experience and Security Citrix Endpoint Management Entitlements Citrix Endpoint Management Architecture Citrix Endpoint Management Prerequisites Citrix Endpoint Management Server Citrix Endpoint Management and Microsoft Intune Apple APNs and Google Firebase Cloud Messaging MDX Architecture and Features Cloud Components Cloud Component Overview Onboarding and Access Cloud Connector and Cloud Resource Locations Cloud Migration Cloud Updates and Features Common Device Management Tasks Administrative Console Overview Delivery Groups Device Policies Device Enrollment Enrollment Methods iOS Device Enrollment Android Device Enrollment Windows 10 Enrollment Other Devices Managing Device Security Security Policies Automated Actions Android for Work ActiveSync Filtering Shared Devices Working with Apps Application Integration Citrix Endpoint Management Productivity Apps Application Security with MDX 3rd Part Applications Integrating Citrix Content Collaboration Citrix Content Collaboration Overview Integrating Citrix Endpoint Management with Content Collaboration Content Collaboration Workflows Maintaining and Troubleshooting Maintaining Citrix Endpoint Management Maintaining Certificates Troubleshooting Citrix Gateway (formerly NetScaler Gateway) Troubleshooting Tools for Citrix Productivity Apps Firewall Issues Monitoring and Reporting Monitoring and Reporting of Devices Monitoring and Reporting of Citrix Content Collaboration Additional course details: Nexus Humans CEM-205 Manage Citrix Endpoint Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CEM-205 Manage Citrix Endpoint Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Channel partners and reseller engineers installing, configuring, and maintaining scalable and resilient deployments of Cisco Meeting Server Channel partners and reseller engineers providing presales support for scalable and resilient Cisco Meeting Server deployments Customer engineers supporting scalable and resilient Cisco Meeting Server deployments Overview Upon completion of this course, the learner should be able to meet the following objectives: Cisco Meeting Server API commands Scalable and resilient deployments Customization Recording In this 3-day course Cisco Meeting Server Advanced (COLLAB350), you will learn advanced techniques in installing, troubleshooting, and maintaining a single server and single server split deployment of Cisco Meeting Servers. The recently purchased Acano collaboration hardware and software includes video and audio-bridging technology that allows customers to connect video systems from multiple vendors across both cloud and hybrid environments. Cisco has incorporated Acano collaboration technologies into the new Meeting Server tool. Module 1: Reviewing Cisco Meeting Server Intermediate Component parts of a Cisco Meeting Solution Configuration steps for a Cisco Meeting Solution Module 2: APIs Purpose of APIs Benefits of APIs Types of APIs Function of the GET, POST, PUT, and DELETE commands Module 3: Configuring Software with an API How a user can interact with software using an API Download and install Chrome Postman Other API software Download the Cisco Meeting Server API guide Module 4: Configuring Spaces with the Cisco Meeting Server API Cisco Meeting Server API structure Use Chrome Postman for information on calls and spaces with the GET command Use Chrome Postman to post a new call space with the POST command Use Chrome Postman to place changes in a space, including adding a member, with the PUT command Use Chrome Postman to delete a space with the DELETE command Module 5: Customization Configuration Create and modify a user profile and assign users Create and modify a dual-tone multifrequency (DTMF) profile and apply to a user profile Modify the interactive voice response (IVR), color scheme, and background Module 6: Planning a Resilient and Scalable Cisco Meeting Server Deployment Resilient server solutions Scalable server solutions Geographically dispersed configurations and GeoDNS Domain Name System (DNS) records required for a resilient and scalable solution Certificate requirements for a resilient and scalable solution Module 7: Configuring a Database Cluster Relationship between cluster master and cluster slaves in a database cluster Certificate requirements for a secure database cluster Configure the certificates for a database cluster Configure a database cluster Module 8: Configuring a Call Bridge Cluster Relationship between the Call Bridge and the Database How cross-cluster spaces behave Configure certificates for Call Bridge clustering Storage of configuration when entering with the API and the individual web interfaces for Lightweight Directory Access Protocol (LDAP) and Call Bridge clustering Configure a Call Bridge Cluster Connect XMPP server to multiple Call Bridges Module 9: Configuring Load Balancers and Trunks Relationship between the XMPP server, Trunk and Load Balancer Configure certificates for multiple trunks and load balancers Configure multiple Trunks to multiple Load Balancers Module 10: Configuring Multiple Web Bridges Relationship between multiple Web Bridges and Call Bridges Internal and external DNS records support for both internal and external Web Bridges Configure certificates for multiple Web Bridges Configure multiple Web bridges Connect multiple Call Bridges to multiple Web Bridges Module 11: Configuring Multiple TURN Servers Relationship between multiple TURN servers and multiple Call Bridges Configure certificates for multiple TURN servers Configure multiple TURN servers Connect multiple Call Bridges to multiple TURN servers Module 12: Configuring Multiple Recorders Features of the recording capability Software, hardware, and licensing requirements for recording DNS records Configure the Recorder Relationship between multiple Recorders and multiple Call Bridges Configure a Call Bridge to use a Recorder Configure certificates for multiple Recorders servers Configure multiple Recorder servers Connect multiple Call Bridges to multiple Recorder servers Module 13: Integrating with a Resilient and Scalable Cisco Meeting Server Deployment Integration with Cisco TelePresence Video Communication Server (VCS) or Cisco Unified Communications Manager and multiple Call Bridges Integration with Cisco Expressway technology and multiple Call Bridges Integration with Microsoft Skype for Business and multiple Call Bridges Integration with Cisco TelePresence Management Suite and multiple Call Bridges Module 14: Deploying an H.323 Gateway Cisco preferred architecture for H.323 and Session Initiation Protocol (SIP) interoperability Functionality of the Cisco Meeting Server H.323 gateway Configuration the Cisco Meeting Server H.323 gateway Module 15: Multitenancy Options Purpose of the multitenancy capabilities Options for multitenancy capabilities on the Cisco Meeting Server Module 16: Customization Options Options available to customize Cisco Meeting Apps License keys required for customization Web Server requirements for customization Options available to customize recorded messaging Customization options available for invitation text
Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who automate, orchestrate, and troubleshoot Check Point secured environments. Overview Explain how automation and orchestration work together Understand the key drivers for incorporating automation and orchestration into security management Execute a shell script that demonstrates how to build a comprehensive Security Policy. Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions Demonstrate how to define new objects and modify existing ones by using the Check Point API The goal of this course is to provide an understanding of the advanced concepts and skills necessary to automate and orchestrate tasks relating to managing Check Point Security Policies Course Ouline Explain how automation and orchestration work together Understand the key drivers for incorporating automation and orchestration into security management Execute a shell script that demonstrates how to build a comprehensive Security Policy. Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions Demonstrate how to define new objects and modify existing ones by using the Check Point API Demonstrate how to create API commands to efficiently maintain the Check Point Security Management Server database Demonstrate how to use different methods to update the database with API commands Become familiar with client-side and server-side scripting and scripting languages Understand how to use the Bash shell to develop APIs Recognize and describe many of the open source tools that are available to assist with API development Demonstrate how to use a custom REST application to update the database of a Security Management Server Demonstrate how to use Postman to manage the Security Policy database through the Check Point API Understand what steps to take to troubleshoot and debug API scripts Demonstrate basic troubleshooting techniques by reviewing debugging messages in various forms Understand how to use self-service portal capabilities to provide general IT services Recognize how automation tools work with Check Point APIs to automate security management tasks and orchestrate workflow behind service portals Demonstrate common tasks that are automated in a Web portal to manage the Security Policy LAB Exercises Demonstrate Check Point automation and orchestration Manage objects using the Check Point API Create a management API shell script Use a variety of methods to execute API commands Use a custom REST tool for API calls Use Postman for API calls Debug the Check Point management API Automate tasks using a Check Point API enabled Web portal Additional course details: Nexus Humans CCAS Check Point Certified Automation Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCAS Check Point Certified Automation Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Nowadays not only do we rely on our commercial and sales staff to hit that bottom line but we expect our engineers and project teams to play their part too - not only through their engineering and management skills but by behaving in a commercially minded way in their dealings with their counterparts in customer or supplier organisations. This means understanding, amongst other things, the issues surrounding the commencement of work ahead of contract, having a clear contract baseline, recognising the broader implications of contract change, the need for timeliness and the consequences of failing to meet the contracted timetable. This practical one-day programme has been designed specifically to give engineers, project staff and others just that understanding. The course is designed principally to provide engineers and project staff with an appreciation of contractual obligations, liabilities, rights and remedies so that they understand the implications of their actions. It is also suitable for business development staff who are negotiating contracts on behalf of the business. The main focus of the day is on creating an awareness of when a situation may have commercial implications that would harm an organisation's business interests if not recognised and handled appropriately and how taking a positive but more commercial approach to those situations can lead to a more positive outcome for the business. As well as providing an understanding of the commercial imperatives the day also focuses on specific areas affecting engineers and project staff, such as the recognition and management of change, the risks when working outside the contract and managing delays in contracts. The course identifies the different remedies that may apply according to the reasons for the delay and provides some thoughts on pushing back should such situations arise. On completion of this programme the participants will: appreciate the need for contractual controls and will have a better understanding of their relevance and how they can be applied, particularly the issues of starting work ahead of contract, implementing changes and inadvertently creating a binding contract by their behaviour; have gained an understanding of the terminology and procedural issues pertaining to contracting within a programme; and be more commercially aware and better equipped for their roles. 1 Basic contract law - bidding and contract formation Purpose of a contract Contract formation - the key elements required to create a legally binding agreement Completeness and enforceability Express and implied terms Conditions v warranties The use of, and issues arising from, standard forms of sale and purchase Use of 'subject to contract' Letters of intent Authority to commit 2 Change management Recognising changes to a contracted requirement Pricing change Implementation and management of change 3 Key contracting terms and conditions By the end of this module participants will be able to identify the key principles associated with: Pricing Getting paid and retaining payment Cashflow Delivery and acceptance Programme delaysExamining some reasons for non-performance...Customer failureContractor's failureNo fault delays ... and the consequences of non-performance: Damages claimsLiquidated damagesForce majeureContinued performance Waiver clauses and recent case law Use of best/reasonable endeavours Contract termination 4 Warranties, indemnities and liability Express and implied warranties Limiting liability 5 Protection of information Forms of intellectual property Background/foreground intellectual property Marking intellectual property Intellectual property rights Copyright Software Confidentiality agreements Internet
Duration 3 Days 18 CPD hours This course is intended for Deployment engineer Sales engineer Overview After taking this course, you should be able to: Describe the components, protocols, and call flow of Cisco Packaged Contact Center Enterprise (PCCE) by referencing the discovery platform to prepare for further scripting and configuration activities. Run the CCE Bulk Import utility using the CCE Web Administration tool to develop a base line CCE configuration. Configure an advanced VoiceXML (VXML) application implementing DB lookup functionality and digit collection using Call Studio and CCE Scripting tools; present call data collected from the caller to the Agent desktop. Provision CCE to support Cisco Unified Communications Manager (CUCM) calls to the Contact Center using CUCM and CCE configuration tools. This functionality enables CCE Route Requests from CUCM to support contacts initiated from a CUCM managed device (Gateways, Phones, Line Side Interactive Voice Response [IVR] Ports). This functionality can also enable non-Contact Center calls and calls handled by Agents, whether existing or new. Access and deploy custom gadgets to the Finesse desktop using the CCE Web Administration tool to further enhance functionality of the Finesse Agent Desktop. Successfully deploy Mobile Agent in a CCE Environment. Successfully deploy Post Call Survey in a CCE Environment. The Administering Advanced Cisco Contact Center Enterprise (CCEAA) v1.0 course teaches you how to execute advanced administration tasks associated with the Cisco Contact Center Enterprise (CCE) solution. PCCE Review Review PCCE Architecture and Components Review PCCE Protocols Introducing Bulk Import Tools Use the PCCE Bulk Import Tool Use Bulk Import Templates Configuring Advanced Scripting and CCE Data Exchange Design for Advanced Scripting CCE Data Exchange Cisco Unified Communications Manager Initiated Call Flows Understand Transfer Types and Cisco Unified Custom Voice Portal (CVP) Call Flow Models Describe Subsequent Transfers Using Gadgets to Customize the Finesse Desktop Obtain Finesse Custom Gadgets Deploy Finesse Custom Gadgets Implementing Mobile Agent Examine Mobile Agent Functionality Identify Mobile Agent Architecture and Components Implementing Post Call Survey Examine Post Call Survey Functionality Configure Post Call Survey Lab practice Review Discovery Navigate CCE Discovery Architecture and Components Import Bulk Data Create a VXML Application Using Call Studio Configure Precision Queues Create a CCE Routing Script Customize the Finesse Desktop Test Your Call Flow Configure Cisco Unifi
Duration 3 Days 18 CPD hours This course is intended for Deployment engineer Sales engineer Overview After taking this course, you should be able to: Examine components, protocols, and variables that influence selection of the design and sizing of a PCCE deployment Identify concepts necessary to create CCE system design specifications and deployment plans Configure an advanced VXML application implementing DB lookup functionality and digit collection; use Call Studio and CCE Scripting tools to present call data collected from the caller to the gent desktop Discover how to install CCE software Administer CA signed security certificates to support the successful addition of a PCCE site Identify the tasks associated with adding Remote Site functionality to the PCCE environment Discuss integration of the CUIC, LiveData, and Finesse reporting environments Configure the PCCE Dial Plan end-to-end, incorporating the use of Cisco Unified Border Element (CUBE), Cisco Unified SIP Proxy (CUSP), Cisco Virtualized Voice Browsers (VVBs), Voice XML (VXML) Gateways (GW), and Significant Digits Examine concepts necessary to create CCE system design specifications and deployment plans Create a series of routing scripts using PCCE Configure Single sign-on for Unified CCE The Implementing Cisco Contact Center Enterprise (CCEI) v1.0 course teaches you how to build and implement a Cisco© Packaged Contact Center Enterprise (PCCE) solution, including advanced integration of external data, Single Sign-On (SSO), and process detail for the Contact Center Enterprise (CCE) solution with examples of the various deployment models. This integration process enables businesses and organizations to deliver a connected digital experience of continuous and capability-rich journeys for your customers, across time and channels. This course teaches you to install the CCE solution and provide Tier 2?3 solution support. The focus is on Day 1 support for a new CCE deployment. Planning a Cisco Packaged Contact Center Enterprise Deployment Packaged CCE Component Overview Call Flows Review Staging a Packaged CCE Deployment PCCE Deployment Planning and System Design Specification Software Compatibility and OS Requirements Preparing CCE Software for Installation General Considerations and System Requirements Active Directory Considerations Administering Security Certificates Security Certificate Overview Install and Configure Certificate Authority Introducing the Packaged CCE Integration Wizard PCCE Inventory and Service Accounts Run the PCCE Wizard Adding a Site to Packaged CCE Adding a Site to Packaged CCE PCCE Remote Site Overview Remote Site Security Certificate Considerations Integrating Cisco Unified Intelligence Center, LiveData, and Finesse Compare Real Time vs. Live Data Complete Cisco Unified Intelligence Center Integration Personalizing the Packaged CCE Dial Plan CCE Dial Plan Components Ingress Gateway and Cisco Unified Border Element Dial Plans Configuring to Validate Deployment Configuring to Validate Deployment Confirm Configuration Readiness Cisco Unified Communications Manager Administration Scripting for Packaged Contact Center Enterprise Configure Script Editor Use Microapps Configuring Single Sign-On SSO Overview Configure SSO Prerequisites Additional course details: Nexus Humans Cisco Implementing Cisco Contact Center Enterprise v2.0 (CCEI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Contact Center Enterprise v2.0 (CCEI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for IT Asset Managers and other professionals involved in Asset Management, strategic planning, security programs and those affected or influenced by ITAM and security initiatives. The mission of IAITAM?s CAMSE course is to maximize the contribution of IT Asset Management professionals to the information security and physical security of the organization by bridging the gap between ITAM and IT security processes while incorporating security strategies throughout the ITAM policies, processes and procedures so that ITAM enhances the security program and improves the applicable governance. This course includes the comprehensive online examination necessary for achieving CAMSE Certification. Course Outline Scope of IT Security & ITAM Threat Prevention vs. Threat Protection Decentralized vs. Centralized Security The IT Security Plan ITAM?s Role in Risk Management The 12 KPAs & Security Program Management & Security Communication & Education Management & Security Policy Management & Security Acquisition Management & Security Asset Identification Management & Security Disposal Management & Security Project Management & Security Documentation Management & Security Financial Management & Security Legislation Management & Security Compliance Management & Security Vendor Management & Security Assessing Asset Risk Level Program Issues by Asset Type ITAM Program Assessment for Security
Duration 5 Days 30 CPD hours This course is intended for This course provides an immersive learning experience for business and technical professionals who need a thorough understanding of the CMMC program. It does this by taking the point of view of a CMMC Certified Professional. Students might consider taking this course to learn more about the overall CMMC program, how DoD contractors are assessed, and how to help their organizations prepare for a CMMC Assessment. Overview In this course, you will learn about the CMMC Model, framework, context, and application within the DoD, as well as the expectations and requirements imposed upon organizations that do business with the DoD. You will: Identify the threats to the Defense Supply Chain and the established regulations and standards for managing the risk. Identify the sensitive information that needs to be protected within the Defense Supply Chain and how to manage it. Describe how the CMMC Model ensures compliance with federal acquisitions regulations. Identify responsibilities of the Certified CMMC Professional, including appropriate ethical behavior. Establish the Certification and Assessment scope boundaries for evaluating the systems that protect regulated information. Prepare the OSC for an Assessment by evaluating readiness. Use the CMMC Assessment Guides to determine and assess the Evidence for practices. Implement and evaluate practices required to meet CMMC Level 1. Identify the practices required to meet CMMC Level 2. Work through the CMMC Assessment process. The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices, as well as their integration of corresponding policies and plans into their overall business operations. Once rule-making has concluded and CMMC 2.0 has been implemented, all organizations providing products or services to the United States Department of Defense (DoD) must comply with the requirements of their applicable CMMC Level. This course provides a complete review of the key elements of this important program. Lesson 1: Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses against Threats Lesson 2: Handling Sensitive Information Topic A: Identify Sensitive Information Topic B: Manage the Sensitive Information Lesson 3: Ensuring Compliance through CMMC Topic A: Describe the CMMC Model Architecture Topic B: Define the CMMC Program and Its Ecosystem Topic C: Define Self-Assessments Lesson 4: Performing CCP Responsibilities Topic A: Identify Responsibilities of the CCP Topic B: Demonstrate Appropriate Ethics and Behavior Lesson 5: Scoping Certification and Assessment Boundaries Topic A: Use the CMMC Assessment Scope Documentation Topic B: Get Oriented to the OSC Environment Topic C: Determine How Sensitive Information Moves Topic D: Identify Systems in Scope Topic E: Limit Scope Lesson 6: Preparing the OSC Topic A: Foster a Mature Cybersecurity Culture Topic B: Evaluate Readiness Lesson 7: Determining and Assessing Evidence Topic A: Determine Evidence Topic B: Assess the Practices Using the CMMC Assessment Guides Lesson 8: Implementing and Evaluating Level 1 Topic A: Identify CMMC Level 1 Domains and Practices Topic B: Perform a CMMC Level 1 Gap Analysis Topic C: Assess CMMC Level 1 Practices Lesson 9: Identifying Level 2 Practices Topic A: Identify CMMC Level 2 Practices Lesson 10: Working through an Assessment Topic A: Identify Assessment Roles and Responsibilities Topic B: Plan and Prepare the Assessment Topic C: Conduct the Assessment Topic D: Report the Assessment Results Topic E: Conduct the CMMC POA&M Close-Out Assessment
Duration 5 Days 30 CPD hours This course is intended for Channel Partner/Reseller Customer Employee Overview Upon completing this course, the learner will be able to meet these overall objectives: These are the ones listed in the Objectives Table I put together: Identify the basic components and operations of the Unified CCE solution. Use the available UCCE tools to complete a basic UCCE system installation. Discuss the installation and configuration steps required to support agent functionality in a UCCE deployment. Install a basic CCE VXML Solution. Install, configure and run a CCE Outbound Option Campaign. Describe how to support CCE. Deploying Cisco Unified Contact Center Enterprise (DUCCE) v2.0 is a 5-day instructor-led course presented by training partners. The course allows learners to deploy the Unified CCE v10.0 solution including installation, deploying HA and using troubleshooting tools to identify issues with inbound and outbound Contact Center functionality. This course is intended for those installing the Unified CCE solution, or those providing Level 3 solution support. This course also serves as a foundation for the two corresponding UCCE Administration courses, but is not a prerequisite. Students will learn enough about CCE scripting in this course to ensure system functionality only. A separate course exists for advanced scripting. Course Outline Module 1: Cisco Unified Contact Center Enterprise v10 Foundations Module 2: Preparing UCCE for Basic IVR Scripting Module 3: Preparing UCCE for Basic Agent Functionality Module 4: Installing and Configuring CCE VXML Solution Module 5: Installing CCE Outbound Option Module 6: Supporting CCE