Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting This course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA). Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface
Duration 3 Days 18 CPD hours This course is intended for Platform operators who are responsible for deploying and managing Tanzu Kubernetes clusters Overview By the end of the course, you should be able to meet the following objectives: Describe how Tanzu Kubernetes Grid fits in the VMware TanzuTM portfolio Describe the Tanzu Kubernetes Grid architecture Deploy and manage Tanzu Kubernetes Grid management clusters Deploy and manage Tanzu Kubernetes Grid workload clusters Deploy, configure, and manage Tanzu Kubernetes Grid packages Perform basic troubleshooting During this three-day course, you focus on installing VMware Tanzu© Kubernetes Grid? on a VMware vSphere© environment and then provisioning and managing Tanzu Kubernetes Grid clusters. The course covers how to install Tanzu Kubernetes Grid packages for image registry, authentication, logging, ingress, multi-pod network interfaces, service discovery, and monitoring. The concepts learned in this course are transferable for users who must install Tanzu Kubernetes Grid on other supported clouds. Course Introduction Introductions and course logistics Course objectives Introducing VMware Tanzu Kubernetes Grid Identify the VMware Tanzu products responsible for Kubernetes life cycle management and describe the main differences between them Explain the core concepts of Tanzu Kubernetes Grid, including bootstrap, Tanzu Kubernetes Grid management and workload clusters, and the role of Cluster API List the components of a Tanzu Kubernetes Grid instance Illustrate how to use the Tanzu CLI Identify the requirements for a bootstrap machine Define the Carvel Tool set Define Cluster API Identify the infrastructure providers List the Cluster API controllers Identify the Cluster API Custom Resource Definitions Management Clusters List the requirements for deploying a management cluster Differentiate between deploying on vSphere 6.7 Update 3 and vSphere 7 Describe the components of NSX Advanced Load Balancer Explain how Tanzu Kubernetes Grid integrates with NSX Advanced Load Balancer Explain how Kubernetes manages authentication Define Pinniped Define Dex Describe the Pinniped authentication workflow List the steps to install a Tanzu Kubernetes Grid management cluster Summarize the events of a management cluster creation Demonstrate how to use commands when working with management clusters Tanzu Kubernetes Clusters List the steps to build a custom image Describe the available customizations Identify the options for deploying Tanzu Kubernetes Grid clusters Explain how Tanzu Kubernetes Grid clusters are created Discuss which VMs make up a Tanzu Kubernetes Grid cluster List the pods that run on a Tanzu Kubernetes cluster Describe the Tanzu Kubernetes Grid core add-ons that are installed on a cluster Configuring and Managing Tanzu Kubernetes Grid Instances Define the Tanzu Kubernetes Grid packages Describe the Harbor Image Registry Define Fluent Bit Identify the logs that Fluent Bit collects Explain basic Fluent Bit configuration Describe the Contour ingress controller Demonstrate how to install Contour on a Tanzu Kubernetes Grid cluster Demonstrate how to install Service Discovery with ExternalDNS. Define Multus CNI Define Prometheus Define Grafana Troubleshooting Discuss the various Tanzu Kubernetes Grid logs Identify the location of Tanzu Kubernetes Grid logs Explain the purpose of crash diagnostics Demonstrate how to use SSH to connect to a Tanzu Kubernetes Grid VM Describe the steps for troubleshooting a failed cluster deployment Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V1.5] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V1.5] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Network analysts Network investigators Cisco integrators and partners Overview After taking this course, you should be able to: Describe the stages of the network attack lifecycle and identify ITD solution platform placement based on a given stage Detail how to locate and mitigate email malware attacks Describe email phishing attacks and the steps taken to locate and mitigate them on the network Identify and mitigate data exfiltration threats on the network Identify malware threats on the network and mitigate those threats after investigation The Cisco Integrated Threat Defense Investigation and Mitigation (SECUR202) v1.0 course shows you how to identify, isolate, and mitigate network threats using the Cisco© Integrated Threat Defense solution platform. Through expert instruction and lab-based scenarios, you will be introduced to network threat investigation, and learn how to identify relationships between Cisco products and the stages of the attack lifecycle. This course is the second in a pair of courses (SECUR201) covering the Cisco Integrated Threat Defense (ITD) solution. Network Threat Investigation Introduction Network Attack Introduction Hunting Network Threats in the Enterprise Investigation and Mitigation of Email Malware Threats Examining Email Malware Threats Investigating and Verifying Email Malware Threat Mitigation Investigation and Mitigation of Email Phishing Threats Examining Email Phishing Attacks Configuring Cisco Email Security Appliance (ESA) for URL and Content Filtering Investigating and Verifying Email Phishing Threat Mitigation Investigation and Mitigation of Data Exfiltration Threats Exploiting Vulnerable Network Servers Investigating Data Exfiltration Threats Mitigating and Verifying Data Exfiltration Threats nvestigation and Mitigation of Malware Threats Examining Endpoint Malware Protection Investigating and Mitigating Endpoint Malware Threats
Duration 2 Days 12 CPD hours This course is intended for This course is designed for security experts and Check Point resellers who desire to obtain the necessary knowledge required to perform more advanced troubleshooting skills while managing their security environments. Overview Understand how to use Check Point diagnostic tools to determine the status of a network. Understand how to use network packet analyzers and packet capturing tools to evaluate network traffic.Become familiar with more advanced Linux system commands. Obtain a deeper knowledge of the Security Management architecture. Understand how the Management database is structured and how objects are represented in the database. Understand key Security Management Server processes and their debugs. Understand how GuiDBedit operates. Understand how the kernel handles traffic and how to troubleshoot issues with chain modules. Understand how to use the two main procedures for debugging the Firewall kernel and how they differ. Recognize User mode processes and how to interpret their debugs. Discuss how to enable and use core dumps. Understand the processes and components used for policy installs and processing packets in Access Control policies. Understand how to troubleshoot and debug issues that may occur with App Control and URLF. Understand how to debug HTTPS Inspection-related issues. Understand how to troubleshoot and debug Content Awareness issues. Understand how IPS works and how to manage performance issues. Understand how to troubleshoot Anti-Bot and Antivirus. Recognize how to troubleshoot and debug Site-to-Site VPN related issues. Understand how to troubleshoot and debug Remote Access VPNs. Understand how troubleshoot Mobile Access VPN issues. Recognize how to use SecureXL features and commands to enable and disable accelerated traffic. Understand how the server hardware and operating system affects the performance of Security Gateways. Understand how to evaluate hardware configurations for optimal performance. Provide advanced troubleshooting skills to investigate and resolve more complex issues that may occur while managing your Check Point Security environment. Course Outline Advanced Troubleshooting Management Database and Processes Advanced Kernel Debugging User Mode Troubleshooting Advanced Access Control Understanding Threat Prevention Advanced VPN Troubleshooting Acceleration and Performance Tuning Additional course details: Nexus Humans CCTE Check Point Troubleshooting Expert training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCTE Check Point Troubleshooting Expert course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Pen Testers Ethical Hackers Network Auditors Cybersecurity Professionals Vulnerability Assessors Cybersecurity Managers IS Managers Overview A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system. You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system. Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants. In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system.ÿ You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system.ÿ ÿ Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants.ÿ In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. Course Outline Business & Technical Logistics of Pen Testing Information Gathering Reconnaissance ? Passive (External Only) Detecting Live Systems ? Reconnaissance (Active) Banner Grabbing and Enumeration Automated Vulnerability Assessment Hacking Operating Systems Advanced Assessment and Exploitation Techniques Evasion Techniques Hacking with PowerShell Networks and Sniffing Accessing and Hacking Web Techniques Mobile and IoT Hacking Report Writing Basics
Duration 5 Days 30 CPD hours This course is intended for IS Security Owners Security Officers Ethical Hackers Information Owners Penetration Testers System Owners and Managers Cyber Security Engineers Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam. To protect an information system you need to be able to see that system through the eyes of the attacker.ÿThe Certified Professional Ethical Hackerÿcertification course is the foundational training to Mile2?s line of penetration testing courses because it teaches you to think like a hacker.ÿ Therefore, you can set up dynamic defenses to prevent intrusion. First, you will learn the value of vulnerability assessments.ÿ Then, you will discover how to use those assessments to make powerful changes in an information system?s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack. Course Introduction Introduction to Ethical Hacking Linux Fundamentals Protocols Cryptography Password Cracking Malware Security Devices Information Gathering ? Passive Reconnaissance Social Engineering Active Reconnaissance Vulnerability Assessment Network Attacks Hacking Servers Hacking Web Technologies Hacking Wireless Technologies Maintaining Access and Covering Tracks
Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to install, configure, and manage multiple security domains within their network security environment. Overview Discuss challenges associated with securing large-scale business organizations with distributed network environments. Describe the Check Point Multi-Domain Security Management solution and its benefits. Understand the components of MDSM and how they work together to help administrators manage multiple network security environments within a single management framework. Understand how to install and configure the Multi-Domain Security Management environment. Describe how to implement Management High Availability within the MDSM environment. Discuss the two types of log server options used to store logs in the Multi-Domain Security Management environment, and how they differ. Understand how to manage and view Multi-Domain activity logs in SmartConsole. Understand how to configure and implement Global Policy to manage rules for multiple domains. Identify various MDSM command line tools commonly used to retrieve information and perform configuration changes on a MDSM Server. Describe troubleshooting tools to use for addressing MDSM Server issues. Understand how VSX works and how to integrate the technology within the MDSM environment. This course provides a comprehensive understanding of the Check Point Multi-Domain Security Management solution and describes how to deploy it within the corporate network environment. Course Outline Multi-Domain Security Management MDSM Installation and Configuration MDSM Log Management Global Policy Management MDSM Troubleshooting Incorporating VSX
Duration 2 Days 12 CPD hours This course is intended for Operators and application owners who are responsible for deploying and managing policies for multiple Kubernetes clusters across on-premises and public cloud environments. Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Tanzu Mission Control architecture Configure user and group access Create access, image registry, network, security, quota, and custom policies Connect your on-premises vSphere with Tanzu Supervisor cluster to VMware Tanzu Mission Control Create, manage, and backup Tanzu Kubernetes clusters Perform cluster inspections Monitor and secure Kubernetes environments During this two-day course, you focus on using VMware Tanzu© Mission Control? to provision and manage Kubernetes clusters. The course covers how to apply access, image registry, network, security, quota, and custom policies to Kubernetes environments. For cluster provisioning and management, the course focuses on deploying, upgrading, backing up and monitoring Kubernetes clusters on VMware vSphere© with Tanzu. Given the abstractions of VMware Tanzu Mission Control, the learnings should be transferrable to public cloud. Introducing VMware Tanzu Mission Control VMware Tanzu Mission Control Accessing VMware Tanzu Mission Control VMware Cloud? services access control VMware Tanzu Mission Control architecture Cluster Management Attached clusters Management clusters Provisioned clusters Cluster inspections Data protection VMware Tanzu© Observability? by Wavefront VMware Tanzu© Service Mesh? Policy Management Policy management Access policies Image registry policies Network policies Security policies Quota policies Custom policies Policy insights
Duration 3 Days 18 CPD hours This course is intended for This course is for IT professionals who manage on-premises Windows Server environments and want to use Azure to manage server workloads and run their virtual workloads on Windows Server 2019. They also want to use existing Microsoft System Center products to implement and manage software-defined datacenters with Windows Server 2019. Overview Describe the Azure Stack portfolio, including Azure Stack HCI, Azure Stack Hub, and Azure Stack Edge Describe the Azure Stack HCI core technologies and management tools. Describe the process of a typical Azure Stack HCI implementation. Identify Azure Stack HCI hybrid capabilities. Implement, manage, and maintain workloads on Azure Stack HCI. Plan for and implement Azure Stack HCI Storage, including Storage QoS and Storage Replica. Plan for Azure Stack HCI Networking. Implement Software Defined Networks in Azure Stack HCI. This three-day course WS-013T00-A is intended primarily for IT Professionals who already have significant experience with managing an on-premises Windows Server environment. Its purpose is to cover advanced topics related to Windows Server software-defined datacenter, Azure Stack HCI, and other Azure Stack products. The course also describes the use of existing Microsoft System Center products to implement and manage software-defined datacenters with Windows Server 2019. This course is advanced and is designed for people that want to run their virtual workloads on Windows Server 2019 at medium-to-large scale using software-defined datacenter and hyper-converged principles. Introducing Azure Stack HCI Overview of Azure Stack HCI Overview of Azure Stack HCI technologies Overview of Azure Stack HCI management tools Overview of the Azure Stack HCI hybrid capabilities Operating and maintaining Azure Stack HCI Implementing and managing workloads on Azure Stack HCI Maintaining Azure Stack HCI Planning for and implementing Azure Stack HCI storage Overview of Azure Stack HCI Storage core technologies Planning for Storage Spaces Direct in Azure Stack HCI Implementing a Storage Spaces Direct-based hyper-converged infrastructure Managing Storage Spaces Direct in Azure Stack HCI Planning for and implementing Storage QoS Planning for and implementing Storage Replica Planning for and implementing Azure Stack HCI networking Overview of Azure Stack HCI core networking technologies Overview of network virtualization and Software-Defined Networking Planning for and implementing Switch Embedded Teaming Planning for and implementing Datacenter Firewall Planning for and implementing Software Load Balancing Planning for and implementing RAS Gateways
Duration 2 Days 12 CPD hours This course is intended for Database Administrator Help Desk/CoE Support System Administrator Technology Consultant Overview This course will prepare you to: Use the SAP HANA cockpit to perform emergency trouble shooting, the SAP HANA traces to investigate for costly statements and to setup SAP HANA Workload Management and SAP HANA Capture and Replay tools. In this course, students will learn how to describe the methods and the tools needed for analyzing performance issues in SAP HANA. Emergency Analysis and Troubleshooting using SAP HANA cockpit 2.0 SP10 Handling System Offline Situations Handling System Hanging but Reachable Situations Analyzing a Suddenly Slow System Structural System Performance Root Cause Analysis Analyzing Memory Issues Analyzing CPU Issues Analyzing Expensive Statements Issues Analyzing Disk and I/O Issues Proactive Monitoring and Performance Safeguarding Configuring SAP HANA Alerting Framework Setting up SAP HANA Workload Management Using SAP HANA Capture and Replay Additional course details: Nexus Humans SAP HANA 2.0 SPS04 - Using Monitoring and Performance Tools training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SAP HANA 2.0 SPS04 - Using Monitoring and Performance Tools course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.