• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5604 Computing & IT courses delivered Online

MB-240T00 Dynamics 365 for Field Service

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is designed for IT professionals with experience or interest in delivering Field Service solutions for large-scale customers. Overview Identify the key components involved in Field Service Implementations. Define the products and services that will be delivered to customers. Determine which pricing options to use in specific scenarios. Determine which resources are required. Dynamics 365 Field Service helps organizations better position themselves in the market by providing a variety of tools that assist in identifying and scheduling resources and managing workloads for mobile workers. This course will equip students with the skills necessary to identify and configure the key components that are used to deliver Field Service and mobile solutions. Key topics include identifying the organizational considerations that will drive configuration decisions and common configuration aspects. This course helps students better understand the bigger picture and end goals focused around implementations that aid in designing more efficient solutions that align with customer and organizational goals. Configure Field Service Introduction to configuring Field Service Defining products and services Defining tax codes Resource Scheduling Configuration Mapping and location information Configuring resource components Defining account preferences Defining and Configuring Bookable Resources Defining bookable resources Resource pools, crews and facilities Configure Incidents Creating an incident Using service tasks Inventory and Work Order Management Configure Field Service work orders Creating work orders Managing work orders Field Service Agreements Using Field Service agreements Set up bookings Set up invoices Inventory and Purchasing Manage customer assets Manage inventory Purchasing and returns Field Service Mobile Mobile client overview Install and deploy Field Service mobile projects Manage mobile projects Deploy the mobile client Universal Resource Scheduling URS overview and configuration Enabling entities for URS Customize entities for URS Managing Scheduling Options Using the schedule board Schedule items Rescheduling and substituting resources Crew and pool scheduling Customizing the Schedule Board Configure the board Create additional schedule boards Use views to enhance the schedule board Configuring schedule board queries and filters Working with requirement groups Advanced Scheduling Options Working with resource scheduling optimization Defining optimization goals Defining optimization scopes Defining optimization profiles Single resource scheduling Additional course details: Nexus Humans MB-240T00 Dynamics 365 for Field Service training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-240T00 Dynamics 365 for Field Service course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MB-240T00 Dynamics 365 for Field Service
Delivered OnlineFlexible Dates
Price on Enquiry

Getting Started with Google Kubernetes Engine

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for the following participants: Application developers, Cloud Solutions Architects, DevOps Engineers, IT managers. Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with the Google Cloud Platform. Overview At the end of the course, students will be able to: Understand container basics. Containerize an existing application. Understand Kubernetes concepts and principles. Deploy applications to Kubernetes using the CLI. Set up a continuous delivery pipeline using Jenkins Learn to containerize workloads in Docker containers, deploy them to Kubernetes clusters provided by Google Kubernetes Engine, and scale those workloads to handle increased traffic. Students will also learn how to continuously deploy new code in a Kubernetes cluster to provide application updates. Introduction to Containers and Docker Acquaint yourself with containers, Docker, and the Google Container Registry. Create a container. Package a container using Docker. Store a container image in Google Container Registry. Launch a Docker container. Kubernetes Basics Deploy an application with microservices in a Kubernetes cluster. Provision a complete Kubernetes cluster using Kubernetes Engine. Deploy and manage Docker containers using kubectl. Break an application into microservices using Kubernetes? Deployments and Services. Deploying to Kubernetes Create and manage Kubernetes deployments. Create a Kubernetes deployment. Trigger, pause, resume, and rollback updates. Understand and build canary deployments. Continuous Deployment with Jenkins Build a continuous delivery pipeline. Provision Jenkins in your Kubernetes cluster. Create a Jenkins pipeline. Implement a canary deployment using Jenkins. Additional course details: Nexus Humans Getting Started with Google Kubernetes Engine training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Getting Started with Google Kubernetes Engine course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Getting Started with Google Kubernetes Engine
Delivered OnlineFlexible Dates
Price on Enquiry

Architecting with Google Kubernetes Engine

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following participants: Cloud architects, administrators, and SysOps/DevOps personnel Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with the Google Cloud Platform. Overview This course teaches participants the following skills: Understand how software containers work Understand the architecture of Kubernetes Understand the architecture of Google Cloud Platform Understand how pod networking works in Kubernetes Engine Create and manage Kubernetes Engine clusters using the GCP Console and gcloud/ kubectl commands Launch, roll back and expose jobs in Kubernetes Manage access control using Kubernetes RBAC and Google Cloud IAM Managing pod security policies and network policies Using Secrets and ConfigMaps to isolate security credentials and configuration artifacts Understand GCP choices for managed storage services Monitor applications running in Kubernetes Engine This class introduces participants to deploying and managing containerized applications on Google Kubernetes Engine (GKE) and the other services provided by Google Cloud Platform. Through a combination of presentations, demos, and hands-on labs, participants explore and deploy solution elements, including infrastructure components such as pods, containers, deployments, and services; as well as networks and application services. This course also covers deploying practical solutions including security and access management, resource management, and resource monitoring. Introduction to Google Cloud Platform Use the Google Cloud Platform Console Use Cloud Shell Define cloud computing Identify GCPs compute services Understand regions and zones Understand the cloud resource hierarchy Administer your GCP resources Containers and Kubernetes in GCP Create a container using Cloud Build Store a container in Container Registry Understand the relationship between Kubernetes and Google Kubernetes Engine (GKE) Understand how to choose among GCP compute platforms Kubernetes Architecture Understand the architecture of Kubernetes: pods, namespaces Understand the control-plane components of Kubernetes Create container images using Google Cloud Build Store container images in Google Container Registry Create a Kubernetes Engine cluster Kubernetes Operations Work with the kubectl command Inspect the cluster and Pods View a Pods console output Sign in to a Pod interactively Deployments, Jobs, and Scaling Create and use Deployments Create and run Jobs and CronJobs Scale clusters manually and automatically Configure Node and Pod affinity Get software into your cluster with Helm charts and Kubernetes Marketplace GKE Networking Create Services to expose applications that are running within Pods Use load balancers to expose Services to external clients Create Ingress resources for HTTP(S) load balancing Leverage container-native load balancing to improve Pod load balancing Define Kubernetes network policies to allow and block traffic to pods Persistent Data and Storage Use Secrets to isolate security credentials Use ConfigMaps to isolate configuration artifacts Push out and roll back updates to Secrets and ConfigMaps Configure Persistent Storage Volumes for Kubernetes Pods Use StatefulSets to ensure that claims on persistent storage volumes persist across restarts Access Control and Security in Kubernetes and Kubernetes Engine Understand Kubernetes authentication and authorization Define Kubernetes RBAC roles and role bindings for accessing resources in namespaces Define Kubernetes RBAC cluster roles and cluster role bindings for accessing cluster-scoped resources Define Kubernetes pod security policies Understand the structure of GCP IAM Define IAM roles and policies for Kubernetes Engine cluster administration Logging and Monitoring Use Stackdriver to monitor and manage availability and performance Locate and inspect Kubernetes logs Create probes for wellness checks on live applications Using GCP Managed Storage Services from Kubernetes Applications Understand pros and cons for using a managed storage service versus self-managed containerized storage Enable applications running in GKE to access GCP storage services Understand use cases for Cloud Storage, Cloud SQL, Cloud Spanner, Cloud Bigtable, Cloud Firestore, and Bigquery from within a Kubernetes application

Architecting with Google Kubernetes Engine
Delivered OnlineFlexible Dates
Price on Enquiry

5G Essentials - WIFI RAN

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for AT&T Custom Course - 5G Essentials - WiFi Ran Overview AT&T Custom Course - 5G Essentials - WiFi Ran AT&T Custom Course - 5G Essentials - WiFi Ran AT&T Custom Course - 5G Essentials - WiFi Ran

5G Essentials - WIFI RAN
Delivered OnlineFlexible Dates
Price on Enquiry

Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer Overview Implement and Configure Cisco Endpoints Implement and Configure Cisco Unified Communications Manager for Video Endpoints Implement and Configure Cisco IMP for Jabber Implement and Configure Cisco Expressway Implement and Configure Cisco Video Communications Server (VCS) Control Implement and Configure Cisco Video Communications Server (VCS) Expressway Implement and Configure connectivity between a Cisco VCS and Cisco UCM Implement and Configure a Cisco Conductor Implement, Configure, and Operate Cisco TelePresence Management Suite (TMS) and provision devices using Cisco TMS Provisioning Extension (TMSPE) Implement and Configure Cisco Meeting Server This one of kind Cisco Collaboration in-depth course takes student from initial endpoint configuration to a full solution deployment using all of the Cisco Collaboration Components. Students will have extensive labs in which they will configure and troubleshoot a full Cisco Telepresence Deployment. Participants will gain in-depth practical knowledge with exercises on installing, configuring, maintaining and troubleshooting of all Cisco Telepresence Components.The software applications that are covered in this course include:Cisco Unified Communications Manager (CUCM)Cisco Unified Communications Manager IM and PresenceCisco ExpresswayCisco Video Communication Server (VCS)Cisco ConductorCisco Telepresence Server (TS)Cisco Meeting Server (CMS)Cisco Telepresence Management Suite (TMS)Cisco TMS Extensions Understanding Cisco TelePresence Endpoints Cisco TelePresence Endpoint Solutions Overview Cisco DX Series Endpoint Characteristics Cisco TelePresence TC Software-Based Endpoint Characteristics Cisco TelePresence EX60 and EX90 Cisco TelePresence MX Series Cisco TelePresence SX Series Endpoints Cisco TelePresence Room Kits Cisco Intelligent Proximity Cisco TelePresence TC Software-Based Endpoint Peripherals Cisco TelePresence TC Software-Based Endpoint Deployments Cisco TelePresence Integrator C Series-Based Endpoints Cisco Jabber Video for TelePresence Characteristics Cisco Jabber Understanding the Cisco Video Network Network Overview H323 Overview SIP Overview VCS vs Unified Communications Manager Internetworking QOS Overview Implementing and Configuring Unified Communication Manager Unified Communications Manager Initial Settings Service Activation Enterprise and Service Parameters SIP Domains Configure IMP for Jabber Configure Jabber Settings Registering Endpoints Verifying Network Registration Cisco VCS / Expressway Overview and Configuration Configuring Initial VCS Setting Configuring Authentication Registration Conflict Policy Registration Restriction Policy Local Zone Components Membership Rules Transforms Purpose of Zones Search Priority Neighbor Zones Creating Neighbor Zones Need for Traversal Zones H.460 and Assent Protocols Traversal Zone Configuration Domain Name System Dialing E.164 Number Mapping Bandwidth Management Pipes Subzones and Zones Subzone Call Failure Call Processing Order Certificates Certificate Installation Clustering and the Cisco VCS Clustering Configuration Collecting Information Log Files Search History Connecting VCS-C to CUCM Connect VCS-C to VCS-E Connecting CUCM to VCS-C Understanding the Cisco TelePresence Conductor What is Conductor? Conductor ? How it works Installing Cisco Conductor Configuring Conductor Network Settings Configuring Conductor for a CUCM Configuration MCU Configuration Telepresence Server Telepresence Conductor Server Configuration Configuring TelePresence Conductor for ad hoc conferences Configuring TelePresence Conductor for rendezvous conferences Configuring Unified CM Configuring general settings on Unified CM Locations in Unified CM Unified CM trusts TelePresence Conductor's server certificate SIP trunk security profile Configuring Unified CM for rendezvous conferences Sip Trunk Configuration Conference Bridge Configuration MRG and MRGL Configuration Unified CM normalization scripts Configuring Unified CM for ad hoc conferences Sip Trunk Configuration Route pattern to match the SIP Trunk Configuration Unified CM normalization scripts Configuring the Cisco VCS with TelePresence Conductor Designing a Dial Plan MCU Configuration Telepresence Server Configuring the Cisco VCS Telepresence Conductor Server Configuration Backing Up Conductor Troubleshooting Conductor Overview of Cisco Telepresence Management Server (TMS) Windows Server Installation SQL Server Installation Server Pre-requisites and configuration Installing TMS Installing TMS Provisioning Extensions Initial Configuration Endpoint Configuration Adding Systems to TMS Configuration Templates Setting Configuration VCS Configuration for TMS Direct Endpoint Management VCS/TMS CUCM Configuration for TMS Direct Endpoint Management?CUCM Phonebooks & Phonebook Sources Conference Creation Advanced Conference Settings Booking & Scheduling Participant Types Methods Conference Monitoring Dial Plans, Configuration Templates Scheduler/Smart Scheduler Managing and Troubleshooting Cisco TMS Using the Logs Cisco TMS Ticketing System Troubleshooting VCS Registrations Troubleshooting CUCM Registrations System Maintenance Configuring Cisco Meeting Server (formerly Acano) Setting up CMS Installing Certificates Configuring CUCM with CMS Provision the RTC Client Configuring Meeting Spaces Additional course details: Nexus Humans Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Optical Technology Intermediate (OPT200)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Technical professionals who are responsible for installation, deployment, and maintenance of the Cisco ONS 15454 MSTP network Network operations, planners, and designers Network operations engineers Overview Upon completing this course, the learner will be able to meet these overall objectives: Connect to a Cisco ONS 15454 MSTP chassis using Cisco Transport Controller (CTC) Identify Node configurations according to card population Provision DWDM circuits using the Cisco Transport Controller (CTC) Conduct performance monitoring, alarm verification, and fault isolation Provision M12 WSS in linear and M6 SMR nodes in ring topologies Configuration options for the any rate muxponder and crossponder Perform Raman amplifier initialization Isolate optical network issues In this course, you will learn the skills necessary to deploy a Cisco Network Convergence System (NCS) 2000 Series network. You will also learn how to perform node turnup. The course covers three shelf types, the Cisco ONS 15454 M12 Multiservice Transport Platform (MSTP), NCS 2006, and NCS 2002. You will learn how to deploy linear and ring dense-wavelength-division-multiplexing (DWDM) topologies. The course covers multiplexer-demultiplexer cards, Erbium-doped-fiber amplifier cards, Raman amplifiers, transponder cards, and the newest Cisco Any Rate muxponder cards and crossponder cards. These cards are used in terminal, amplifier, and reconfigurable optical add-drop multiplexer (ROADM) node configurations. You configure wavelength-selective switch (WSS) linear and single-module ROADM (SMR) rings. This Optical Technical Training Intermediate course covers 10-gigabit unprotected circuits and 10-gigabit protection using Y-cable, optical channel transport unit-2 (OTU-2), and protection switch module (PSM) cards. Learn more about this NCS 2000 training course below. Course Outline Lesson 1: CTC Operations Lesson 2: MSTP Topologies Lesson 3: Shelf and Card Installation Lesson 4: Fiber jumper installation Lesson 5: Linear Configurations Lesson 6: Node Turn-Up Lesson 7: Optical Channel Network Connection Circuits Lesson 8: Transponder and Optical Channel Client Connection Circuits Lesson 9: Multishelf Lesson 10: MSTP M6 SMR-Based Rings Lesson 11: 10-Gigabit Muxponder and Transponder Cards Lesson 12: 10-Gigabit with Y-Cable Protection Lesson 13: Alternative 10-GB Protection (PSM and OTU-2) Lesson 14: Any Rate Muxponder and Crossponder Lesson 15: Raman Amplifier Lesson 16: 40- and 100-Gigabit Transponder and Muxponder Lesson 17: Troubleshooting Additional course details: Nexus Humans Cisco Optical Technology Intermediate (OPT200) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Optical Technology Intermediate (OPT200) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Optical Technology Intermediate (OPT200)
Delivered OnlineFlexible Dates
Price on Enquiry

Attacking and Securing Java / JEE Web Applications (TT8320-J)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate -level programming course, designed for experienced Java developers who wish to get up and running on developing well defended software applications. Familiarity with Java and JEE is required and real world programming experience is highly recommended. Ideally students should have approximately 6 months to a year of Java and JEE working knowledge. Overview Students who attend Attacking and Securing Java Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a Java/JEE perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on Java / JEE security training that offers a unique look at Java application security. Beginning with penetration testing and hunting for bugs in Java web applications, you embrace best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, allowing you to experience the mechanics of how to secure JEE web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? Making Application Security Real

Attacking and Securing Java / JEE Web Applications (TT8320-J)
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Configuring BIG-IQ

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for system and network administrators or operators responsible for the installation, setup, configuration, and administration of the BIG-IQ system or management of BIG-IP devices and F5 products running on those devices. This course uses lectures and hands-on exercises to give participants real-time experience in configuring and using the BIG-IQ© product. Students are introduced to BIG-IQ, its interface, and its various functionality. We first look at administering and operating the BIG-IQ system itself, then detail how it is used to remotely manage BIG-IP devices running BIG-IP Local Traffic Manager (LTM). We then look configuring a BIG-IQ Data Collection Device (DCD) system and see how it is used for the remote storage and examination of BIG-IP log events and statistics. Module 1: BIG-IQ Overview BIG-IQ Centralized Management BIG-IQ Components BIG-IQ Core Functionality REST API BIG-IQ Data Collection Device (DCD) BIG-IP Cloud Edition (CE) Setting up the BIG-IQ System Module 2: Administering the BIG-IQ System Controlling Access to the BIG-IQ Creating, Authenticating, Configuring Users Backups Local Host Settings Configuring DNS, NTP, and SMTP Monitoring BIG-IQ, DCD, and BIG-IP Events with Alerts Monitoring BIG-IQ with iHealth Post Installation Issues; Licensing, Changing Management IP, Master Key, Restoring Backups Module 3: Managing BIG-IP LTM Devices BIG-IP LTM Device Discovery BIG-IP Device Backup Deploying to BIG-IP Devices Deployment and Deployment Logs Configuration Snapshots Managing BIG-IP Certificates Managing BIG-IP Licenses Monitoring BIG-IP Devices with iHealth Management of QKView Reports from Managed BIG-IP Devices Module 4: Setting Up the BIG-IQ Data Collection Device Custom Roles Types and Groups Setting up User Accounts with custom roles and privileges Managing BIG-IP DSC Discovery and management of BIG-IP Device Clusters (DSC) with BIG-IQ Administering BIG-IQ High Availability Configuration and management of BIG-IQ systems in a High Availability pair

F5 Networks Configuring BIG-IQ
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Managing Enterprise Networks with Cisco Prime Infrastructure (MENPI)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Network Engineers Technicians Overview Upon completing this course, the learner should be able to meet these overall objectives: Fundamental network management concepts and introduce the features of Cisco Prime Infrastructure Manage the inventory with Cisco Prime Infrastructure Map the network using the tools in Cisco Prime Infrastructure Manage user access to tasks, functions, and devices in Cisco Prime Infrastructure Manage the devices and configuration archive in Cisco Prime Infrastructure Work with Cisco AVC, QoS, and Cisco IWAN services using Cisco Prime Infrastructure tools and deploy Cisco TrustSec identity services using Cisco Prime Infrastructure Monitor and troubleshoot your network with Cisco Prime Infrastructure Perform system administration tasks in Cisco Prime Infrastructure In this Cisco Prime Infrastructure training course, you will learn how to design, deploy, operate, and optimize enterprise networks with the Cisco Prime Infrastructure solution (PI). Cisco Prime Infrastructure is part of a Unified Access solution that converges traditional wired and wireless networks into a single network management tool. The Managing Enterprise Networks labs put you in a realistic customer scenario and let you practice what you learned using Cisco Prime Infrastructure 3.7. This MENPI training course?s network management perspective has a heavier lean to the wired side of the network management. We suggest students have a working understanding of networks and networking terminology with regards to CCNA Routing and Switching. Course Outline Module 1: Cisco Prime Infrastructure Overview Module 2: Inventory Management Module 3: Map the Network Module 4: Role-Based Access Control Module 5: Configuration Management Module 6: Compliance Management Module 7: Services Management Module 8: Monitor and Troubleshoot Module 9: System Administration

Cisco Managing Enterprise Networks with Cisco Prime Infrastructure (MENPI)
Delivered OnlineFlexible Dates
Price on Enquiry

CCSE Check Point Certified Security Expert

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance. Articulate how utilizing multiple traffic queues can make traffic handling more efficient. Discuss Site-to-Site VPN basics, deployment and communities. Describe how to analyze and interpret VPN tunnel traffic. Explain Link Selection and ISP Redundancy options. Explain tunnel management features. Discuss Check Point Remote Access solutions and how they differ from each other. Describe how client security can be provided by Remote Access . Explain authentication methods including machine authentication. Explain Multiple Entry Point (MEP). Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. Course Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent

CCSE Check Point Certified Security Expert
Delivered OnlineFlexible Dates
Price on Enquiry