Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: IT Staff and Managers Network and systems personnel and engineers Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment. This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics. Overview Following completion of this course, students will understand, Install, Configure, Monitor, and Troubleshoot the following: Navigate and Configure the dashboard Add MX/MS devices to the Dashboard Understand and Configure Configuration Templates Understand and Configure Group Policies Manage/Configure/Integrate Users and Radius Policies Configure, Monitor, and Troubleshoot MS Switches Troubleshoot devices and Connectivity This 3-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students will learn how to install and optimize Meraki MS Switches. Students will also learn how to configure the Meraki Dashboard. Student will troubleshoot and configure the Meraki environment and learn how to diagnose and resolve user and Network issues that may arise. Introduction to Meraki The Meraki Mission Cisco Meraki: Bringing the Cloud to Enterprise Networks Cloud-Managed Networking Architecture Benefits of a Cloud-Based Solution The Meraki Full Stack: New and Unique Value Proposition Meraki Deployment ? How it works Why Customers Choose Meraki Meraki MS Switches Overview Meraki API Overview Meraki Licensing Enterprise Support Cisco Meraki Documentation Cloud Management with the Meraki Dashboard The Meraki Dashboard Dashboard: Organizational Structure Out-of-band Cloud Management Loss of Connectivity to the Cisco Meraki Cloud Meraki Dashboard Logins Create Dashboard Accounts and Organization MSP Logins - Manage Multiple Organizations Modify an Organization View Organizations Health Meraki Dashboard Best Practices Dashboard Search Meraki Help Organizational Wide Settings Configure Monitor Create and Manage Configuration Templates Network-Wide Settings Configure Meraki Switching MS Switch Platforms and Features MS Feature: Multi-gigabit Ethernet Cisco Meraki MS Access Switches Cisco Meraki MS Aggregation Switches Using Tags to search, monitor and configure Meraki Switches Meraki Switch Configuration Port Configuration Meraki Switch Monitoring Troubleshooting Tools Managing Firmware Upgrades
Duration 4 Days 24 CPD hours This course is intended for This course is recommended for:OperatorsDevelopersAdministrators Overview After completing this course, you should be able to:Run and manage automated workflows using HP Operations Orchestration (OO) 10.xPerform a wide range of system administration, monitoring, and management tasks using OO CentralAuthor, maintain, document, and package new automated workflows using the OO Studio applicationTest and debug the flows locally and remotelyWork with Looping and Iteration operationsApply parallel processing methods to your flows in HP Operations Orchestration (OO)Use responses, rules, and transitions to control flow runUse XML operations and XML filters for processing XML content in OOWork with JavaScript Object Notation (JSON) operationsUse the file system content in the OO libraryAdd email notifications to your flowsExecute scriptlet methods in OO to manage flow data and flow executionInstall, configure, and update OO This four-day course introduces students to the essential concepts and usage, as well as to more advanced features of the HP Operations Orchestration (OO) software. OO is part of HP Cloud Automation solutions. This four-day course introduces students to the essential concepts and usage, as well as to more advanced features of the HP Operations Orchestration (OO) software. OO is part of HP Cloud Automation solutions. Additional course details: Nexus Humans OO220 - Operations Orchestration 10.x Flow Development training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the OO220 - Operations Orchestration 10.x Flow Development course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Project managers and consultants involved in and concerned with the implementation of an ISMS, expert advisors seeking to master the implementation of an ISMS, individuals responsible for ensuring conformity to information security requirements within an organization Overview Master the concepts, approaches, methods and techniques used for the implementation and effective management of an ISMS Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks Acquire the expertise to advise an organization in implementing Information Security Management System best practices This training course is designed to prepare you to implement an information security management system (ISMS) based on the requirements of ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement. Introduction to ISO/IEC 27001 and initiation of an ISMS Training course objectives and structure Standards and regulatory frameworks Information Security Management System (ISMS) Fundamental information security concepts and principles Initiation of the ISMS implementation Understanding the organization and its context ISMS scope Planning the implementation of an ISMS Leadership and project approval Organizational structure Analysis of the existing system Information security policy Risk management Statement of Applicability Implementation of an ISMS Documented information management Selection and design of controls Implementation of controls Trends and technologies Communication Competence and awareness Security operations management ISMS monitoring, continual improvement, and preparation for the certification audit Monitoring, measurement, analysis, and evaluation Internal audit h Management review Treatment of nonconformities Continual improvement Preparing for the certification audit Certification process and closing of the training course
Duration 5 Days 30 CPD hours This course is intended for This course is recommended for technical professionals who support, install, deploy or administer Check Point products. This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview CCSA Know how to perform periodic administrator tasks. Describe the basic functions of the Gaia operating system. Recognize SmartConsole features, functions, and tools. Understand how SmartConsole is used by administrators to give user access. Learn how Check Point security solutions and products work and how they protect networks. Understand licensing and contract requirements for Check Point security products. Describe the essential elements of a Security Policy. Understand the Check Point policy layer concept. Understand how to enable the Application Control and URL Filtering software. Blades to block access to various applications. Describe how to configure manual and automatic NAT. Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements. Describe different Check Point Threat Prevention solutions for network attacks. Articulate how the Intrusion Prevention System is configured, maintained and tuned. Understand the Infinity Threat Prevention system. Knowledge about Check Point's IoT Protect. CCSE Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. CCSA Outline Configure the Security Management Server. Use the WebUI to run the First Time Wizard. Install the Smart Console. Install the Alpha Gateway using the network detailed in the course topology. Demonstrate how the Security Management Server and Gateway communicate. Test SIC Status. Create multiple administrators and apply different roles and permissions for simultaneous administration. Validate existing licenses for products installed on the network. Create and configure host, network and group objects. Create a simplified Security Policy. Demonstrate how to use Security Zones in policy. Demonstrate how to share a layer between Security Polices. Configure Network Address Translation for server and network objects. Enable Identity Awareness. Deploy user access roles for more granular control of the security Policy. Generate network Traffic and use traffic visibility tools to monitor the data. Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic. CCSE Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent
Duration 1 Days 6 CPD hours This course is intended for This course is designed for end users who are familiar with computers and who need to use the features and functionality of the Windows 10 operating system for personal and/or professional reasons. In this course, students will learn the features and functionality of the Windows 10 operating system for professional and personal use. Accessing Windows 10 Topic A: Navigate the Windows 10 Desktop Topic B: Manage the Start Menu Topic C: Sign In to Windows 10 Using Windows Apps and Desktop Applications Topic A: Navigate Desktop Applications Topic B: Navigate Windows Apps Features Topic C: Navigate the Cortana Virtual Assistant App Working with Files and Folders Topic A: Manage Files and Folders with File Explorer Topic B: Store and Share Files with OneDrive Topic C: Multitask with Open Apps Accessing the Internet using Microsoft Edge Topic A: Use Microsoft Edge Topic B: Customize Microsoft Edge Customizing the Windows 10 Environment Topic A: Customize the Start Screen Topic B: Customize the Desktop Installing and Removing Devices Topic A: Manage Printers Topic B: Manage Peripheral Devices Using Windows 10 Security Features Topic A: Manage Passwords and Privacy Levels Topic B: Use Windows Defender Additional course details: Nexus Humans Using Microsoft Windows 10 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Using Microsoft Windows 10 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Anyone who is preparing to build and run Kubernetes clusters Overview By the end of the course, you should be able to meet the following objectives: Build, test, and publish Docker container images Become familiar with YAML files that define Kubernetes objects Understand Kubernetes core user-facing concepts, including pods, services, and deployments Use kubectl, the Kubernetes CLI, and become familiar with its commands and options Understand the architecture of Kubernetes (Control plane and its components, worker nodes, and kubelet) Learn how to troubleshoot issues with deployments on Kubernetes Apply resource requests, limits, and probes to deployments Manage dynamic application configuration using ConfigMaps and Secrets Deploy other workloads, including DaemonSets, Jobs, and CronJobs Learn about user-facing security using SecurityContext, RBAC, and NetworkPolicies This four-day course is the first step in learning about Containers and Kubernetes Fundamentals and Cluster Operations. Through a series of lectures and lab exercises, the fundamental concepts of containers and Kubernetes are presented and put to practice by containerizing and deploying a two-tier application into Kubernetes. Course Introduction Introductions and objectives Containers What and Why containers Building images Running containers Registry and image management Kubernetes Overview Kubernetes project Plugin interfaces Building Kubernetes Kubectl CLI Beyond Kubernetes Basics Kubernetes objects YAML Pods, replicas, and deployments Services Deployment management Rolling updates Controlling deployments Pod and container configurations Kubernetes Networking Networking within a pod Pod-to-Pod Networking Services to Pods ClusterIP, NodePort, and LoadBalancer Ingress controllers Service Discovery via DNS Stateful Applications in Kubernetes Stateless versus Stateful Volumes Persistent volumes claims StorageClasses StatefulSets Additional Kubernetes Considerations Dynamic configuration ConfigMaps Secrets Jobs, CronJobs Security Network policy Applying a NetworkPolicy SecurityContext runAsUser/Group Service accounts Role-based access control Logging and Monitoring Logging for various objects Sidecar logging Node logging Audit logging Monitoring architecture Monitoring solutions Octant VMware vRealize Operations Manager Cluster Operations Onboarding new applications Backups Upgrading Drain and cordon commands Impact of an upgrade to running applications Troubleshooting commands VMware Tanzu portfolio overview
Duration 5 Days 30 CPD hours This course is intended for Channel Partner/Reseller Customer Employee Overview To provide learners with the necessary knowledge and skills that are common in all Cisco Unified Communications Manager deployments and additionally, those that are required to fully implement a single site solution. Implementing Cisco Unified Communications Security (UCSEC) v1.0 is a new 5-day ILT class designed to provide students with the necessary knowledge and skills to implement security features in a Cisco Unified Communications environment. Cisco Unified Communications support several features and mechanisms to secure voice signaling and communications and to mitigate attacks against Cisco Unified Communications networks. The Implementing Cisco Unified Communications Security (UCSEC) v1.0 course introduces security mechanisms and describes different implementation scenarios that increase the security level of Cisco Unified Communications networks. Course Outline Course Overview Module 1 - Vulnerabilities of Cisco Unified Communications Networks and Security Fundamentals Module 2 - Network Infrastructure Security Module 3 - Cisco Unified Communications Manager and Endpoint Security Features Module 4 - Secure Cisco Unified Communications Integration and Features
Duration 4 Days 24 CPD hours Overview By the end of the course, you should be able to meet the following objectives: Describe how Tanzu Kubernetes Grid fits in the VMware Tanzu portfolio Describe the Tanzu Kubernetes Grid architecture Deploy and manage Tanzu Kubernetes Grid management and supervisor clusters Deploy and manage Tanzu Kubernetes Grid workload clusters Deploy, configure, and manage Tanzu Kubernetes Grid packages Perform basic troubleshooting During this four-day course, you focus on installing VMware Tanzu© Kubernetes Grid? in a VMware vSphere© environment and provisioning and managing Tanzu Kubernetes Grid clusters. The course covers how to install Tanzu Kubernetes Grid packages for image registry, authentication, logging, ingress, multipod network interfaces, service discovery, and monitoring. The concepts learned in this course are transferable for users who must install Tanzu Kubernetes Grid on other supported clouds. Course Introduction Introductions and course logistics Course objectives Introducing VMware Tanzu Kubernetes Grid Identify the VMware Tanzu products responsible for Kubernetes life cycle management and describe the main differences between them Explain the core concepts of Tanzu Kubernetes Grid, including bootstrap, Tanzu Kubernetes Grid management, supervisor, and workload clusters List the components of a Tanzu Kubernetes Grid instance VMware Tanzu Kubernetes Grid CLI and API Illustrate how to use the Tanzu CLI Define the Carvel Tool set Define Cluster API Identify the infrastructure providers List the Cluster API controllers Identify the Cluster API custom resource definitions Authentication Explain how Kubernetes manages authentication with Management clusters Explain how Kubernetes manages authentication with supervisor clusters Define Pinniped Define Dex Describe the Pinniped authentication workflow Load Balancers Illustrate how load balancing works for the Kubernetes control plane Illustrate how load balancing works for application workload Explain how Tanzu Kubernetes Grid integrates with VMware NSX Advanced Load Balancer List load balancing options available on public clouds VMware Tanzu Kubernetes Grid on vSphere List the requirements for deploying a supervisor cluster List the steps to install a Tanzu Kubernetes Grid supervisor cluster Summarize the events of a supervisor cluster creation List the requirements for deploying a management cluster List the steps to install a Tanzu Kubernetes Grid management cluster Summarize the events of a management cluster creation Demonstrate how to use commands when working with management clusters VMware Tanzu Kubernetes Grid on Public Clouds List the requirements for deploying a management cluster on AWS and Microsoft Azure List the configuration options to install a Tanzu Kubernetes Grid a management cluster on AWS and Azure Tanzu Kubernetes Workload Clusters List the steps to build a custom image Describe the available customizations Identify the options for deploying Tanzu Kubernetes Grid clusters Explain the difference between the v1alpha3 and v1beta1 APIs Explain how Tanzu Kubernetes Grid clusters are created Discuss which VMs compose a Tanzu Kubernetes Grid cluster List the pods that run on a Tanzu Kubernetes Grid cluster Describe the Tanzu Kubernetes Grid core add-ons that are installed on a cluster Tanzu Kubernetes Grid Packages Define the Tanzu Kubernetes Grid packages Explain the difference between Auto-Managed and CLI-Managed packages Define packages repositories Configuring and Managing Tanzu Kubernetes Grid Operation and Analytics Packages Describe Cert-Manager Describe the Harbor Image Registry Describe Fluent Bit Identify the logs that Fluent Bit collects Explain basic Fluent Bit configuration Describe Prometheus and Grafana Configuring and Managing Tanzu Kubernetes Grid Networking Packages Describe the Contour ingress controller Demonstrate how to install Contour on a Tanzu Kubernetes Grid cluster Describe ExternalDNS Demonstrate how to install Service Discovery with ExternalDNS Describe Multus CNI Tanzu Kubernetes Grid Day 2 Operations List the load balancer configuration options in vSphere to load balance applications Demonstrate how to configure Ingress with the NodePortLocal Mode Explain how to install VMware Tanzu Application Platform Describe life cycle management in Tanzu Kubernetes Grid Explain how backup and restore are implemented in Tanzu Kubernetes Grid Describe Velero and Restic List the steps to back up a Workload cluster using Velero and Restic Troubleshooting Tanzu Kubernetes Grid Discuss the various Tanzu Kubernetes Grid logs Identify the location of Tanzu Kubernetes Grid logs Explain the purpose of crash diagnostics Demonstrate how to check the health of a Tanzu Kubernetes Grid cluster Explain packages cleanup procedures Explain management recovery procedures Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V2.0] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V2.0] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for API developers. Overview Configure services in Cloud Manager for an on-premises installation of API Connect Create a catalog and Developer Portal Create consumer and provider organizations Create, test, and publish SOAP, REST, and GraphQL APIs Create message processing policies that transform API requests and responses Authorize client API requests with security definitions Enforce an OAuth flow with an OAuth 2.0 API security provider Perform advanced testing of APIs by using the Test tab and the Local Test Environment Define products and plans in API Manager Stage, publish, version, migrate, deprecate, and retire products and APIs Manage member roles and permissions in the Developer Portal Create an application and subscribe to a plan Review API analytics in the Developer Portal Review analytics dashboards and visualizations in API Manager Customize the Developer Portal This course teaches you how to configure a newly built API Connect 10 environment. You are taught how to configure a catalog with the gateway, portal, and analytics services and set up the environment for API development. You then define API interfaces according to the OpenAPI specification. You build SOAP and REST based APIs along with a GraphQL API. You assemble message processing policies and define client authorization schemes, such as OAuth 2.0, in the API definition. You verify the proper sequencing of policies in the assembly tester and further test your APIs in the new Test tab and Local Test Environment. After building and testing your APIs, you publish them and make them available on the Developer Portal. You manage all aspects of the provider organization in the API Manager user interface to create, publish, version, and retire API artifacts such as products, plans and APIs themselves. You also learn how to manage consumer organizations who use the APIs that are made available on the Developer Portal. You learn how to add members to the consumer organization that provides access to the APIs on the Developer Portal. You learn how the layout of the Developer Portal can be customized. Finally, you call the APIs on the secure gateway and you view the graphs and metrics of API usage. Course Outline Introduction to IBM API Connect V10 Exercise: Reviewing the API Connect development and runtime environments Managing catalogs and organizations Exercise: Managing catalogs and consumer organizations Defining APIs in API Manager Exercise: Defining an API that calls an existing SOAP service Defining a REST API in API Manager Exercise: Defining a REST API from a target service Assembling message processing policies Exercise: Assembling message processing policies Declaring client authorization requirements Creating an OAuth 2.0 provider Exercise: Implementing OAuth 2.0 security Testing and debugging APIs Exercise: Introduction to the Test tab Creating and testing a GraphQL API Exercise: Creating and testing a GraphQL API Testing an API in the Local Test Environment Exercise: Testing an API in the Local Test Environment Publishing and managing products and APIs Exercise: Define and publish an API product The product lifecycle Exercise: Subscribing and testing APIs in the Developer Portal Exercise: Managing and approving API Products Subscribing and testing APIs in the Developer Portal API Analytics Exercise: Calling an API on the gateway and monitoring API usage Customizing the Developer Portal Exercise: Customizing the Developer Portal Additional course details: Nexus Humans WD515G Create, Secure, and Publish APIs with IBM API Connect 10 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WD515G Create, Secure, and Publish APIs with IBM API Connect 10 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy and manage a Cisco Firepower NGIPS in their network environment. Security administrators Security consultants Network administrators System engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe the components of Cisco Firepower Threat Defense and the managed device registration process Detail Next-Generation Firewalls (NGFW) traffic control and configure the Cisco Firepower system for network discovery Implement access control policies and describe access control policy advanced features Configure security intelligences features and the Advanced Malware Protection (AMP) for Networks implementation procedure for file control and advanced malware protection Implement and manage intrusion and network analysis policies for NGIPS inspection Describe and demonstrate the detailed analysis techniques and reporting features provided by the Cisco Firepower Management Center Integrate the Cisco Firepower Management Center with an external logging destination Describe and demonstrate the external alerting options available to Cisco Firepower Management Center and configure a correlation policy Describe key Cisco Firepower Management Center software update and user account management features Identify commonly misconfigured settings within the Cisco Firepower Management Center and use basic commands to troubleshoot a Cisco Firepower Threat Defense device This course shows you how to deploy and use Cisco Firepower© Next-Generation Intrusion Prevention System (NGIPS). This hands-on course gives you the knowledge and skills to use the platform features and includes firewall security concepts, platform architecture and key features; in-depth event analysis including detection of network-based malware and file type, NGIPS tuning and configuration including application control, security intelligence, firewall, and network-based malware and file controls; Snort© rules language; file and malware inspection, security intelligence, and network analysis policy configuration designed to detect traffic patterns; configuration and deployment of correlation policies to take action based on events detected; troubleshooting; system and user administration tasks, and more. This course helps you prepare to take the exam, Securing Networks with Cisco Firepower (300-710 SNCF), which leads to CCNP Security and Cisco Certified Specialist ? Network Security Firepower certifications. The 300-710 SNCF exam has a second preparation course as well, Cisco© Securing Networks with Cisco© Firepower Next Generation Firewall (SSNGFW). You can take these courses in any order. Course Outline Cisco Firepower Threat Defense Overview Cisco Firepower NGFW Device Configuration Cisco Firepower NGFW Traffic Control Cisco Firepower Discovery Implementing Access Control Policies Security Intelligence File Control and Advanced Malware Protection Next-Generation Intrusion Prevention Systems Network Analysis Policies Detailed Analysis Techniques Cisco Firepower Platform Integration Alerting and Correlation Policies Performing System Administration Troubleshooting Cisco Firepower