Duration 5 Days 30 CPD hours This course is intended for This intermediate-level course requires students have incoming experience working with Oracle Database 18 or higher. Overview Working in a hands-on learning environment led by our expert facilitator, you'll explore: The Oracle Database Architecture Query Optimizer Tuning Container Databases and Pluggable Databases Oracle 19c Tuning features Evaluating Execution Plans Oracle Tuning Tools Using Automatic Workload Repository Join Types AWR Using Baselines Additional AWR performance tools Optimizer Statistics Monitoring a Service Bind Variables and database parameters Oracle's Real Application Testing (RAT) SQL Tuning Advisor Automatic Sql Tuning Sql Plan Management Shared Pool Tuning Tuning the database buffer cache Tuning the PGA (Program Global Area) Automatic Memory Management (AMM) Tuning Segment Space Utilization (ASSM) Automatic Storage Management Oracle 19C Database Tuning is an intermediate level course for Oracle database experienced attendees that explores core tuning skills such as Database parameters, SQL Tuning Advisor, SQL Access Advisor, Adaptive SQL plans and more. Overview Oracle Database Architecture Instance Definition Define SGA Define Background Processes Datafile Definition Query Optimizer SQL Parsing Optimizing Terms Optimizing Methods Query Plan Generation Query Plan Control Tuning Container Databases and Pluggable Databases Pluggable tuning parameters Define Container tuning structure Using PDB$SEED Create a new PDB Plug and unplug a PDB Oracle 12c Tuning features Identifying and Using Oracle's Heat Map 12c Compression Levels and Types Evaluating Execution Plans Defining SQL execution plans Automatic Workload Repository Reading execution plans Oracle Tuning Tools Monitoring tools overview Enterprise Manager Dynamic Performance Views Automatic Workload Repository Automatic Database Diagnostic Monitor Sql Tuning Advisor SQL Access Advisor Sql Access Advisor DB operation Tuning DB operation Active Reporting Using Automatic Workload Repository Defining AWR AWR Settings Creating AWR Baselines Metrics, Alerts, and Thresholds Defining Metrics Setting Alerts Setting Corrective Actions User Defined Metrics Metric Dynamic Views Join Types Nested Loops Join Sort Merge join Hash Join and Cartesian Join Equijoins and Nonequijoins Outer Joins Semijoins AWR Using Baselines Creating AWR baselines Creating AWR Repeating baselines Moving Window Baseline Additional AWR performance tools Automatic Maintenance Tasks Segment Advisor Statistics Gathering Automatic Tuning Optimizer Automatic Database Diagnostic Monitor Active Session History (ASH) Optimizer Statistics Optimizer Statistics Overview Table and Index Statistics Statistic Preferences Statistics Gathering e) Locking Statistics, Export/Import Statistics Pending and published statistics Optimizer Hints Optimizer Paths Cost Base Optimization Monitoring a Service Overview of what is an Oracle Service Creating an Oracle Service for Single instance and RAC Monitoring a Service Resource Management and a Service Enterprise Manager and a Service Bind Variables and database parameters Bind variable definition Cursor_sharing parameter Adaptive Cursor Sharing Oracle's Real Application Testing (RAT) Sql Performance Analyzer overview Sql Performance Analyzer Options Database Parameter changes Database version changes Creating SQL Tuning Sets Database Replay Overview Database Replay Configuration Database Replay Options SQL Tuning Advisor SQL Tuning Advisor: Overview SQL Tuning Advisor Limited Mode Sql Tuning Advisor Comprehensive mode Sql Tuning Profiles SQL Access Advisor SQL Access Advisor: Overview Sql Access Advisor options SQL Access Advisor and Sql Tuning Sets Sql Access Advisor and AWR Results and Implementation Automatic Sql Tuning Automatic Sql Tuning Maintenance Task Automatic Tuning Optimization implementation(ATO) Automatic Tuning Optimization Results Enable/Disable Automatic Tuning Optimization Sql Plan Management Sql plan Management and baseline overview Enable sql plan management Loading Sql Plan baselines into the SGA Adaptive plan management Shared Pool Tuning Shared pool architecture Shared pool parameters Library Cache Dictionary cache Large pool considerations and contents Tuning the database buffer cache Database buffer cache overview Database buffer cache parameters Oracle and Dirty reads and writes Automatic Shared Memory Management (ASMM) Buffer Cache goals and responsibility Buffer Cache pools Tuning the PGA (Program Global Area) PGA Overview PGA Database Parameters Temporary Segments Temporary Tablespace Sizing the PGA Automatic Memory Management (AMM) Oracle's Automatic Memory Management Overview Database Auto-tuned Parameters Database Non Auto-tuned Parameters Automatic Memory Management Hints and Sizing suggestions AMM versus ASMM Tuning Segment Space Utilization (ASSM) Overview of Automatic Segment Space Management Defining the DB_BLOCK_SIZE Defining DB_nk_CACHE_SIZE parameter The DB_BLOCK_SIZE Parameter Overview of table compression, block chaining, and block migration Automatic Storage Management Overview of ASM Definition of Grid Infrastructure ASM Instance ASM Diskgroups ASM Diskgroup parameters and templates ASMCMD
Duration 4.375 Days 26.25 CPD hours This course is intended for The target audience for this course is all Oracle professionals. Among the specific groups for whom this course will be helpful are: Application designers and database developers Database administrators Web server administrators Overview This eTextbook begins with an explanation of the intent and usage of the PL/SQL programming language for database applications. Important reasons why one should incorporate PL/SQL modules within the application architecture right from the initial design and planning phase are presented. Next one learns how to begin building executable PL/SQL program units. One learns about each of the major segments of a working program and how these interact with each other during program execution, including the important error or exception handling capabilities of the language. The final section goes beyond the basics and begins to explore advanced topics that will be useful later in the Sideris Oracle PL/SQL developer textbook series. One learns techniques and features that allow modular and reusable programs to be developed, increasing productivity and maintainability of database applications. his eTextbook introduces one to Oracle database programming using the PL/SQL programming language. One will learn the syntax, structure and features of the language. This textbook will also lay the foundation for the entire Sideris Oracle PL/SQL programming series, allowing one to progress from introductory topics to advanced application design and programming and finally onto writing complex high-performance applications. his eTextbook introduces one to Oracle database programming using the PL/SQL programming language. One will learn the syntax, structure and features of the language. This textbook will also lay the foundation for the entire Sideris Oracle PL/SQL programming series, allowing one to progress from introductory topics to advanced application design and programming and finally onto writing complex high-performance applications.
Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevOps Engineering Foundation course are individuals involved in engineering and technical practices such as: DevOps Practice owners and process designers Developers, QA engineers and Managers who are interested in understanding how DevOps works. Employees and managers responsible for engineering or improving processes. Consultants guiding their clients through process improvement and DevOps initiatives. Anyone responsible for: Managing process-related requirements Ensuring the efficiency and effectiveness of processes Maximizing the value of processes Overview The learning objectives for DevOps Engineering Foundation include an understanding of: How to engineer DevOps solutions DevOps Technologies Applications Architectures Continuous Integration Continuous Testing Ephemeral Elastic Infrastructures Continuous Delivery and Deployment Metrics, Monitoring, Observability and Governance DevOps Humans Future Trends This course explains the many aspects of DevOps engineering that leaders and practitioners can execute upon. While DevOps Foundation provides an overview of DevOps, this course will provide a closer look at the implementation process from an engineering perspective. It is an in depth view of the major aspects of engineering DevOps. An engineering approach is critical to DevOps journeys. This course provides the foundations of knowledge, principles and practices from a technical perspective needed to engineer a successful DevOps solution. DevOps Engineering Introduction DevOps Foundations Principles and Practices Related Frameworks Performance and Benefits DevOps Technology Source and Artifacts Control CI/CD pipelines Tools and Toolchains Application Release Automation Value Stream Management Applications Architectures and Continuous Integration Application Architectures Containers Continuous integration Continuous Testing CT Tenets Test creation & TDD Test acceleration Test results Test management Test environment management Ephemeral Elastic Infrastructures Virtual and Cloud Configuration management Infra-as-code Containers Orchestration GitOps Continuous Delivery and Deployment Continuous Delivery and Deployment Release Automation Deployment Strategies Metrics, Monitoring, Observability, Governance DevOps Metrics Monitoring Observability Governance DevOps Engineering Humans Culture Team Topologies Continuous Learning Future DevOps Trends Additional course details: Nexus Humans DevOps Engineering Foundation (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DevOps Engineering Foundation (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This in an intermediate level Java development course geared for students experienced with Java 8 or later programming essentials who wish to quickly get up and running with advanced Java skills. This course does not cover Java programming fundamentals. Overview Students will leave this course armed with the required skills to improve their Java applications using sound coding techniques and best practices. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in advanced development skills, coupling the most current, effective techniques with the soundest industry practices. Working in a hands-on learning environment, guided by our expert team, attendees will learn to: Develop modular applications in Java Utilize the tooling that is provided in Java 9 to migrate, monitor and optimize applications Use the new JShell tool to quickly test java constructs Understand how the implementation of the String class has been updated to decrease the memory footprint Use the enhancements made to the Concurrency API, working with Completable Future instance of Thread pools Specific Java 9 features that are covered in the course include: The Java Module System (project Jigsaw) JShell Updated try-with-resources Performance enhancements in Java 9 Multi-Release Jar files This fast-track course is designed for experienced developers who have prior working knowledge of basic Java 8 or Java 9 and want to take advantage of the newest features of Java 9 that can help improve performance and functionality of Java 9 applications. You will gain invaluable insight into how to leverage Modules, scale applications into multi-core environments, improve performance, and become a more effective Java 9 developer. Java 9 Updates Review of What is New in Java 9 Milling Project Coin The Java Module system (Jigsaw) Why JigSaw? Introduction to the Module System The Module Descriptor Working with Modules JShell JShell More Java 9 Other New Java 9 Features Performance Optimizations Memory Management (Optional) Multithreading and Concurrency Multithreading Concurrent Java Java 8 Concurrency Updates Reflection and References Introspection and Reflection Reference Objects Effective Java Objects, Declarations, and Initializations Exceptions Writing High-Performance Applications Profiling and Benchmarking Profiling Tools Code Optimization Techniques Code Optimization Myths Design Optimization Techniques
Duration 1 Days 6 CPD hours This course is intended for This course benefits cloud consumers and administrators of public cloud, private cloud, and hybrid cloud infrastructures: Security architects Cloud architects Network engineers and administrators System engineers and adminstrators Cloud security consumers Cloud application administrators IT managers Line of business managers Cisco integrators and partners Overview After taking this course, you should be able to: Describe public, private, and hybrid cloud models, concepts, and design Explain the concepts and components for securing cloud environments Describe Cisco security offerings for Amazon Web Services (AWS) Define methods to secure SaaS application usage The Introducing Cisco Cloud Consumer Security (SECICC) v1.0 course gives you a technical overview of basic concepts and components of the cloud, and the Cisco© solutions used to provide comprehensive security of your cloud-based environment. In this primarily lecture-based course, you?ll learn the basics from a cloud consumer perspective including securing cloud and Software as a Service (SaaS) application environments. This introductory course provides insights on using Cisco Stealthwatch? Cloud, Cisco CloudLock, Cisco Umbrella? and more to protect the user when using cloud-based applications. Introducing the Cloud Describe the Evolution of Cloud Computing Explain Cloud Service Models Explore Cloud Deployment Models Introducing Securing the Cloud Describe the Cisco Threat-Centric Approach to Network Security Describe Cloud Physical Environment Security Describe Cloud Network Infrastructure Security Explain Application Security Explore Cloud Management and API Security Describe Cisco Cloud-Based Security Solutions Describe Network Functions Virtualization (NFV), Virtual Network Function (VNF), and Secure Agile Exchange (SAE) Describe Cisco CloudCenter for MultiCloud Management Describe Cisco Stealthwatch Describing Cloud Security Solutions Using AWS Identify AWS Security Offerings Identify Cisco Security Solutions in AWS Introducing Security in an SaaS Environment Describe SaaS Applications Describe SaaS Security Challenges Explain Cloud Access Security Broker Describe Cisco CloudLock Describe OAuth and OAuth Attacks Describe Cisco Advanced Malware Protection for Endpoints Describe Cisco Cloud Email Security Describe Cisco Umbrella Lab outline Explore Cisco Stealthwatch Cloud Explore Stealthwatch Cloud Alerts Settings, Watchlists, and Sensors Explore Cisco Security Solutions in AWS Marketplace Explore the Cisco CloudLock Dashboard and User Security Explore Cisco CloudLock Application and Data Security Explore Cisco Advanced Malware Protection (AMP) Endpoints Explore the Cisco Umbrella Roaming Client Additional course details: Nexus Humans Cisco Introducing Cisco Cloud Consumer Security v1.0 (SECICC) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Introducing Cisco Cloud Consumer Security v1.0 (SECICC) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Business application consultant Data Consultant / Manager Database Administrator Application developer BI specialist Overview This course will prepare you to: Understand and put into practice the main advanced modeling capabilities of SAP HANA 2.0 SPS04 in the areas of text search and analysis, graph modeling, spatial analysis and predictive modeling. Promote these advanced modeling capabilities to extend the core SAP HANA Modeling features. Broaden your experience with the modern SAP HANA tooling in XS Advanced (SAP Web IDE for SAP HANA) This course provides advanced knowledge and practical experience on several topics that are included in, or connected to, the scope of the modeler role. Its purpose is to take a step further, beyond the core modeling knowledge from HA300, and to demonstrate how applications powered by SAP HANA can benefit from innovations such as Spatial Data Storage and Processing, Text Search and Analysis, Predictive Analysis and Graph Modeling.The course is supported by many demos and exercise, which demonstrate the advanced modeling capabilities in several scenarios. For example, working with classical schemas or HDI containers in XS Advanced, using the SQL console, developing graphical models. Some of the proposed case studies blend together several modeling capabilities, such as text with spatial, or text with graph.An introduction to SAP HANA Series Data is also provided. Introduction to Advanced ModelingSAP HANA Predictive Analysis Library (PAL) Describing SAP HANA PAL Using PAL in Flowgraphs Calling PAL Functions in Calculation Views Calling PAL Procedures in SQL Scripts Exploring the PAL Library SAP HANA Spatial Introducing SAP HANA Spatial Working with Spatial Data Types Importing and Exporting Spatial Data Accessing and Manipulating Spatial Data Using Spatial Clustering SAP HANA Graph Defining SAP HANA Graph Workspace Describing the Different Graph Algorithms Using the Graph Node in Calculation Views Using GraphScript Procedures SAP HANA Text Understanding Full Text Search Understanding Text Analysis Understanding Text Mining SAP HANA Series Data Getting Started with SAP HANA Series Data
Duration 5 Days 30 CPD hours This course is intended for This intermediate course is designed for experienced Integration Specialists and Senior-Level Developers with experience in application development, messaging middleware applications, and transport protocols such as HTTP and FTP. Overview Describe the features and uses of the IBM Integration BusDevelop, deploy, and test message flow applicationsGenerate message flow applications from predefined patternsUse IBM Integration Bus problem determination aids to diagnose and solve development and runtime errorsDescribe the function and appropriate use of IBM Integration Bus processing nodesWrite basic Extended Structured Query Language and Java programs to transform dataUse the IBM Graphical Data Mapping editor to transform dataDefine, use, and test simple XML and Data Format Description Language (DFDL) data modelsDescribe supported transport protocols and how to call them in message flows This course teaches you how to use IBM Integration Bus to develop, deploy, and support message flow applications. Students will learn how to construct applications to transport and transform data. Course Outline Course introduction Introduction to IBM Integration Bus Application development fundamentals Exercise: Importing and testing a message flow Creating message flow applications Exercise: Creating a message flow application Connecting to IBM MQ Exercise: Connecting to IBM MQ Controlling the flow of messages Exercise: Adding flow control to a message flow application Modeling the data Exercise: Creating a DFDL model Processing file data Exercise: Processing file data Using problem determination tools and help resources Exercise: Using problem determination tools Exercise: Implementing explicit error handling Mapping messages with the Graphical Data Mapping editor Referencing a database in a message flow application Exercise: Referencing a database in a map Using Compute nodes to transform messages Exercise: Transforming data by using the Compute and JavaCompute nodes Processing JMS, HTTP, and web service messages Preparing for production Exercise: Creating a runtime-aware message flow Course summary Additional course details: Nexus Humans WM666 IBM Integration Bus V10 Application Development I training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WM666 IBM Integration Bus V10 Application Development I course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4.375 Days 26.25 CPD hours This course is intended for This course provides a jump start on learning material that relates to the CMMC program, and to the planned Certified Professional (CP) certification in particular. It discusses the CMMC program, the current CMMC Model, and other CMMC materials as they exist today. The course may be of interest to individuals who wish to pursue the CMMC-CP certification when it is released. It may also be useful to stakeholders in organizations who will be involved in CMMC assessments, and who wish to gain a general understanding of the program and its requirements for their business planning purposes Overview In this course, you will examine the current CMMC model (Version 1.02), framework, context, and application within the DoD, as well as the expectations and requirements that will be imposed upon organizations that do business with the DoD. It will also help you to identify threats to cybersecurity and privacy within an IoT ecosystem and implement appropriate countermeasures. You will gain the skills to: · Identify risks within the defense supply chain and the established standards for managing them. · Describe how the CMMC model ensures compliance with federal acquisition regulations. · Identify responsibilities of the CMMC Certified Professional, including appropriate ethics and behavior. · Identify regulated information and establish the Certification and Assessment scope boundaries for evaluating the systems that protect that regulated information. · Evaluate OSC readiness and determine the objective evidence you intend to present to the assessor. · Use the NIST 800-171A and CMMC Assessment Guide to assess objective evidence for processes and practices. · Implement and evaluate practices required to meet CMMC maturity level 1. · Implement and evaluate processes and practices required to meet CMMC maturity level 2. · Implement and evaluate processes and practices required to meet CMMC maturity level 3. · Identify processes and practices required to meet CMMC maturity levels 4 and 5. · Work through the logistics of a CMMC assessment, including planning for and conducting the assessment, as well as any follow-up processes, such as remediation and adjudication. The Cybersecurity Maturity Model Certification (CMMC), managed by the CMMC Accreditation Body (CMMC-AB), is a program through which an organization's cybersecurity program is measured by their initial and ongoing compliance with applicable cybersecurity practices as well as their integration of corresponding policies and plans into their overall business operations. By Fiscal Year 2026, all organizations providing products or services to the United States Department of Defense (DoD) must obtain at least a Maturity Level 1 certification under this program. Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses Against Threats Ensuring Compliance through CMMC Topic A: Identify Limitations of Self-Certification Topic B: Identify Benefits of CMMC Topic C: Describe the CMMC Model Architecture Performing the General Responsibilities of a CMMC CP Topic A: Identify Responsibilities of the CMMC CP Topic B: Demonstrate Appropriate Ethics and Behavior Identifying and Scoping Regulated Information Topic A: Identify Regulated Information Topic B: Establish the Certification and Assessment Scope Boundaries Initiating the Assessment Process Topic A: Evaluate Readiness Topic B: Determine Objective Evidence Assessing Objective Evidence Topic A: Assess the Practices Using the CMMC Assessment Guides Topic B: Assess the Processes Using the CMMC Assessment Guide Level 3 Implementing and Evaluating CMMC Level 1 TTopic A: Maturity Level 1 Domains and Practices Topic B: Determine Scope Boundaries at Maturity Level 1 Topic C: Perform a Maturity Level 1 Gap Analysis Topic D: Perform a Maturity Level 1 Evidence Validation Implementing and Evaluating CMMC Levels 2 and 3 Topic A: Process Maturity Requirements for CMMC Levels 2 and 3 Topic B: Maturity Level 2 Practices Topic C: Maturity Level 3 Practices Identifying CMMC Levels 4 and 5 Topic A: Maturity Level 4 Processes and Practices Topic B: Maturity Level 5 Processes and Practices Working Through a CMMC Assessment Topic A: Define the Assessment Logistics Topic B: Resolve Assessment Related Issues Appendix A: Additional Documentation the CP Should Study
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: Channel Partner System Engineers System Administrators Architects Security Professionals Overview Upon successful completion of this course, the student will gain the following knowledge:How to describe and position Cisco UmbrellaDiscuss Secure Internet Gateway and Ransomware ProtectionLearn about DNS & IP layer enforcement & Intelligent ProxyDescribe Command and control callback blockingDiscuss Threat IntelligenceCompare Umbrella PackagesUnderstand Roaming SecurityBasic understanding of Cisco Roaming ClientUnderstand how to use Cisco Umbrella Virtual ApplianceExplain the ease of Integrating Cisco Umbrella into Active DirectoryDiscuss Umbrella ReportingUnderstand Utilize Multi-Organization Tools Cisco Umbrella? is a cloud security platform that provides the first line of defense against threats on the Internet. Being able to understand and position how Cisco Umbrella? works and what are the features is the key focus of this 2-day Cisco© online IT class. Students who enter the course with a basic understanding of Cisco© products and IT solutions will be able to describe the Cisco Umbrella?, understand Secure Internet Gateway and Ransomware Protection, discuss Threat Intelligence, use Cisco© Roaming Client. Cisco Umbrella- Security Solution Discuss Security Internet Gateway Explain Ransomware Protection DNS & IP layer enforcement Intelligent Proxy Command & control callback blocking Threat Intelligence Umbrella Packages Implementing Cisco Umbrella Overview of Cisco Umbrella How do you Protect your network Review how to Point your DNS to Cisco Umbrella What are the custom policies? Discuss Intelligent Proxy Umbrella Policy Tester Policy Precedence Roaming Client Introduction to Umbrella Roaming Client Prerequisites Downloading and Installing Adding IP Layer Enforcement Status, States, and Functionality Virtual Appliances Internal Domains Umbrella Roaming Security AnyConnect: Cisco Umbrella Roaming Security Client Administrator Guide Cisco Umbrella Dashboard at a glance Cisco Certificate Import Virtual Appliance Setup Guide Discuss Deployment Guidelines How to Deploy the VAs Review via VMware Review via Hyper-V Understand Your VAs Local DNS Forwarding Overview of DNS Explain Sites and Internal Networks Sizing Active Directory Overview of Active Directory Discuss Up DNS Forwarding with your VAs Active Directory Environment Route DNS Traffic Communication Flow Multiple Active Directory and Umbrella Sites Reporting Overview Reporting Basics Understanding Security Categories Scheduled Reports: Overview Security Overview Report Activity Search Report Security Activity Report Destinations Report Identities Report Cloud Services Report Admin Audit Log Report Umbrella Multi-Org Overview Cisco Umbrella Multi-Org Overview Centralized Settings Centralized Reports: Service Status Centralized Reports: Cloud Services Additional course details: Nexus Humans Cisco Administering and Positioning Cisco Umbrella Operations (ADMUMB) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Administering and Positioning Cisco Umbrella Operations (ADMUMB) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Security Engineers Network Engineers Overview Upon completion of this course, students will be able to: Deploy gateways using the Gaia web interface Configure a Security Policy Learn about managing and monitoring a secure network Upgrade and configure a Security Gateway to implement a virtual private network for both internal and external, remote users The growing frequency and sophistication of security threats makes protecting your organization more difficult every year. Check Point?s integrated products provide end-to-end security from the enterprise to the cloud to your mobile worker?s personal devices. They prevent and mitigate cyberattacks and limit the data theft that often results from these threats. Introduction to Check Point TechnologyDeployment PlatformsIntroduction to the Security PolicyMonitoring Traffic & ConnectionsNetwork Address TranslationUsing SmartUpdateUser Management & AuthenticationIdentity AwarenessIntroduction to Check Point VPNsSmartLog