Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Cisco Unified Communications system channel partners and resellers who are responsible for deployment and application engineering for Cisco Unified Contact Center Express customers. System and technical support engineers. Day 1 and Day 2 support personnel. Customers deploying and maintaining Cisco Unified CCX Overview Upon completing this course, the learner will be able to meet these overall objectives: Review Cisco Unified CCX environment components Create prompt recording tools Create a helpdesk script Apply common sense principles for scripting and system management, such as: Prompt, document, and grammar management Using the default script Scripting for proper call termination and ending a script Abandon rates Exception handling Check Agent Availability before and after entering queue Using Java Methods for Holiday and Time of Day routing Setup access and use an external database Define and use skills Script for conditional routing Script for basic callback scenarios Setup and use enterprise data and session management Script for queuing and scheduled callback scenarios Building on the knowledge base and scripting experience learned in the UCCXD class, the student will explore advanced techniques in scripting and overall Cisco Unified CCX functionality. During this five day class the students will use advanced scripting to implement features that extend the functionality of Cisco Unified CCX using many of the tools that are already available in the premium version of the product. Students should expect to spend time using the script editor and other tools to create developer tools and enhanced scripts to provide for a more functional and user-friendly customer experience. Activities include creating prompt recording tools, applying common sense scripting principles, creating simple and complex ACD routing scripts, holiday routing, external database access, various callback scenarios such as non-queuing, queuing, and scheduled callbacks, defining and using enterprise data, passing data from one script to another using session management, and much more. Additionally, since this class focuses on complex scripting concepts, it requires the student to learn more about fundamental scripting requirements such as data manipulation and formatting, using variables and array variables, and using Java programming methods. Course Introduction Learner Prerequisite Skills and Knowledge Course Goal Course Objectives Course Flow General Administration Lab Diagram Please Introduce Yourself Lesson 1: Cisco Unified CCX Overview Components of the Cisco Unified CCX Environment Gateways Routers Cisco Unified Communications Manager Cisco Unified CCX Script Editor Cisco Finesse Cisco Unified Intelligence Center Cisco Unified CCX Agent External Servers Cisco Unified CCX System Cluster Components Engine Database Server Call Flow Terms The Call Flow The Debug Process Reactive Non-Reactive Lesson 2: Prompt Recording Utilities Prompt Recorder Emergency Message Recorder Lesson 3: Basic ACD Routing Review Script Steps used in a Simple ACD Routing Script Resource Group Routing Defining the Contact Service Queue Create a Simple ACD routing script Lesson 4: Common Scripting Concepts Prompt Management Using the Default Script Terminating a Call and Ending a Script Abandon Rates Exception Handling Script Interruptions Check Agent Availability before and after entering queue Using Java Methods for Holiday and Time of Day routing Lesson 5: Accessing an External Database Database architecture and supported databases Setting up the Database Subsystem Using Database script steps Lesson 6: Skills Based Routing Appling skills to agents Defining the Contact Service Queue Specifying the CSQ in the Script Lesson 7: Advanced ACD Routing Overflow Routing When to Overflow How to get the Data Needed for Making Decisions Describe Methods of Overflowing Lesson 8: Basic ACD Callback Options Setup the Email Subsystem Script for Email Notification Script for Leaving a Recorded Message Script for Callback when Queue Times have Decreased Lesson 9: Enterprise Data and Session Management Define Enterprise Data in Cisco Finesse Define a Call Variable Layout in Cisco Finesse Define ECC Variables in the script editor Set Enterprise Data in the script Define Session Management Setup Session Management Use Session Management to Pass Variable Information Between Scripts Lesson 10: Advanced ACD Callback Options Leave Queued Message with an Option for Callback Scheduled Callback
Duration 5 Days 30 CPD hours This course is intended for This course is intended for new and experienced programmers that want to learn how to write and troubleshoot Python code. This is the Microsoft recommended course for preparing for the 98-381 test. Previous programming experience is not required but recommended. Overview By the end of this course, you will be able to: Create Operations using Data Types and Operators Create Control Flow Operations Create Input and Output Operations Write and Document code to solve a specified problem Troubleshoot Problems and Write Error Handling Operations Perform Operations Using Modules and Tools This five-day instructor-led course (three-day boot camp) is intended for students who want to learn how to write, debug and document Python code Module 1: Perform Operations Using Data Types and Operators Assign data types to variables Perform data and data type operations Perform Arithmetic, Comparison and Logical Operations Review Module 2: Control Flow with Decisions and Loops Construct and analyze code segments that use branching statements Construct and analyze code segments that perform iterations Review Module 3: Perform Input and Output Operations Create Python code segments that perform file input and output operations Create Python code segments that perform console input and output operations Review Module 4: Document and Structure Code Construct and analyze code segments Document code segments using comments and documentation strings Review Module 5: Perform Troubleshooting and Error Handling Analyze, Detect and Fix code segments that have errors Analyze and construct code segments that handle exceptions Review Module 6: Perform Operations Using Modules and Tools Use Built-In Modules to perform basic operations Use Built-In Modules to perform complex operations Review
Learn the basics of Data Science, combining a supported #CISCO Skills for All online course with practical learning and a project to help consolidate the learning.
Duration 2 Days 12 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview Describe the history and rationale for MPLS, as well as its basic terminology. Explain the MPLS label operations (push, pop, swap) and the concept of label-switched path (LSP). Describe the configuration and verification of MPLS forwarding. Describe the functionalities and operation of RSVP and LDP. Configure and verify RSVP-signaled and LDP-signaled LSPs. Select and configure the appropriate label distribution protocol for a given set of requirements. Describe the default Junos OS MPLS traffic engineering behavior. Explain the Interior Gateway Protocol (IGP) extensions used to build the Traffic Engineering Database (TED). Describe the Constrained Shortest Path First (CSPF) algorithm, its uses, and its path selection process. Describe administrative groups and how they can be used to influence path selection. Describe the default traffic protection behavior of RSVP-signaled LSPs. Explain the use of primary and secondary LSPs. Describe the operation and configuration of fast reroute. Describe the operation and configuration of link and node protection. Describe the operation and configuration of LDP loop-free alternate. Describe the LSP optimization options. Explain LSP priority and preemption. Describe the behavior of fate sharing. Describe how SRLG changes the CSPF algorithm when computing the path of a secondary LSP. Explain how extended admin groups can be used to influence path selection. Explain the purpose of several miscellaneous MPLS features. This two-day course is designed to provide students with a solid foundation on Multiprotocol Label Switching (MPLS). Course Outline Course Introduction MPLS Fundamentals MPLS Foundation Terminology MPLS Configuration MPLS Packet Forwarding Label Distribution Protocols Label Distribution Protocols RSVP LDP Routing Table Integration Mapping Next-Hops to LSPs Route Resolution Example Route Resolution Summary IGP Passive Versus Next-Hop Self for BGP Destinations Constrained Shortest Path First RSVP Behavior Without CSPF CSPF Algorithm CSPF Tie Breaking Administrative Groups Inter-area Traffic Engineered LSPs Traffic Protection and LSP Optimization Default Traffic Protection Behavior Primary and Secondary LSPs Fast Reroute RSVP Link Protection LDP LFA and Link Protection LSP Optimization Fate Sharing Junos OS Fate Sharing SRLG Extended Admin Groups Miscellaneous MPLS Features Forwarding Adjacencies Policy Control over LSP Selection LSP Metrics Automatic Bandwidth Container LSPs TTL Handling Explicit Null Configuration MPLS Pings
Duration 3 Days 18 CPD hours This course is intended for Network Security Operations Workload Application Administrators Security Operations Field Engineers Network Engineers Systems Engineers Technical Solutions Architects Cisco Integrators and Partners Overview After taking this course, you should be able to: Define the Cisco telemetry and analytics approach. Explore common scenarios that Cisco Tetration Analytics can solve. Describe how the Cisco Tetration Analytics platform collects telemetry and other context information. Discuss how relative agents are installed and configured. Explore the operational aspects of the Cisco Tetration Analytics platform. Describe the Cisco Tetration Analytics support for application visibility or application insight based on the Application Dependency Mapping (ADM) feature. List the concepts of the intent-based declarative network management automation model. Describe the Cisco Tetration policy enforcement pipeline, components, functions, and implementation of application policy. Describe how to use Cisco Tetration Analytics for workload protection in order to provide a secure infrastructure for business-critical applications and data. Describe Cisco Tetration Analytics platform use cases in the modern heterogeneous, multicloud data center. List the options for the Cisco Tetration Analytics platform enhancements. Explain how to perform the Cisco Tetration Analytics administration. This course teaches how to deploy, use, and operate Cisco© Tetration Analytics? platform for comprehensive workload-protection and application and network insights across a multicloud infrastructure. You will learn how the Cisco Tetration Analytics platform uses streaming telemetry, behavioral analysis, unsupervised machine learning, analytical intelligence, and big data analytics to deliver pervasive visibility, automated intent-based policy, workload protection, and performance management. Exploring Cisco Tetration Data Center Challenges Define and Position Cisco Tetration Cisco Tetration Features Cisco Tetration Architecture Cisco Tetration Deployment Models Cisco Tetration GUI Overview Implementing and Operating Cisco Tetration Explore Data Collection Install the Software Agent Install the Hardware Agent Import Context Data Describe Cisco Tetration Operational Concepts Examining Cisco Tetration ADM and Application Insight Describe Cisco Tetration Application Insight Perform ADM Interpret ADM Results Application Visibility Examining Cisco Tetration Intent-Based Networking Describe Intent-Based Policy Examine Policy Features Implement Policies Enforcing Tetration Policy Pipeline and Compliance Examine Policy Enforcement Implement Application Policy Examine Policy Compliance Verification and Simulation Examining Tetration Security Use Cases Examine Workload Security Attack Prevention Attack Detection Attack Remediation Examining IT Operations Use Cases Key Features and IT Operations Use Cases Performing Operations in Neighborhood App-based Use Cases Examining Platform Enhancement Use Cases Integrations and Advanced Features Third-party Integration Examples Explore Data Platform Capabilities Exploring Cisco Tetration Analytics Administration Examine User Authentication and Authorization Examine Cluster Management Configure Alerts and Syslog Additional course details: Nexus Humans Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Developed for IT Professionals with extensive networking and Citrix ADC experience. This course is built for IT Professionals who are responsible for defining the overall structure or architecture of a Citrix networking environment. This course encompasses advanced Citrix networking configurations and leading Citrix design principles. Overview How to identify and prioritize business drivers, constraints, and requirements using the Citrix Consulting methodologyAssess environment requirements and learn to apply leading design principles to address them in a multi-site Citrix ADC deploymentApply advanced authentication and load balancing principles In this expert training course students will be exposed to advanced networking and Citrix ADC concepts and configurations. Through lecture, lab exercises, and real-world case studies, students will learn to look critically at environment requirements, constraints, and business drivers to create a complex Citrix networking solution. Topics to be covered in this course include multi-site and multitenant deployments, advanced authentication and load balancing, and automation and orchestration and advanced troubleshooting. This training will also prepare students for the Citrix Certified Expert in Networking (CCE-N) exam.This course includes a voucher to take the related exam (1Y0-440: Citrix Networking Assessment, Design, and Advanced Configuration) and earn your Citrix Certified Expert ? Networking (CCE-N) certification. Networking Methodology and Assessment Understanding the Citrix methodology Business Drivers and Requirements User Segmentation Application Assessment Capabilities Assessment Citrix Networking Deployment Architecture and Topology Multi-Site Deployments Multi Tennant Infrastructure Cloud Deployments High Availability Citrix ADC Double-Hop Scenarios Secure Web Gateway Advanced Authentication and Authorization Authorization Policies Access Policies Advanced Authentication Options Multi-Factor Authentication nFactor Authentication AAA Session Management Citrix ADC Security Authorization Pre-authentication and Endpoint Analysis Scans Protection against Layer 4-7 Attacks Web App Firewall Citrix Gateway Configuration Considerations ICA Proxy Configuration VPN Access Clientless Access Split Tunneling RDP Proxy Deployment and Configuration Advanced Load Distribution and Link Load balancing Advanced Load Balancing Link Load Balancing Firewall Load Balancing Microsoft Exchange Load Balancing Advanced Global Server Load Balancing Global Server Load Balancing Persistence DNS, Policies, Expressions, Actions, and Views GSLB Monitoring and Considerations Application Delivery Management Automation and Orchestration Application Delivery Management Outbound Traffic Dashboard Automation Orchestration Configuration Jobs Configuration Audit NITRO API StyleBooks (Net-new) Additional course details: Nexus Humans CNS-420 Citrix Networking Assessment, Design, and Advanced Configuration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNS-420 Citrix Networking Assessment, Design, and Advanced Configuration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Channel Field Engineers Employees Overview After taking this course, you should be able to: Define Cisco Business TelePresence Solutions components and architectures Implement Cisco TelePresence Video Communication Server (Expressway) for basic and advanced video networks Implement Cisco TelePresence Management Suite (TMS) Configure Cisco Meeting Server Features Define integration of Cisco Collaboration Premise Solutions with Cisco Cloud, including Cisco Spark, Cisco Spark Hybrid, and WebEx Cisco Video Infrastructure Implementation (VII) v1.0 will provide you with the necessary knowledge and skills to implement a complete Cisco TelePresence solution, including TelePresence endpoints, integration of premise with cloud solutions, meeting solutions, and management software. It describes Cisco business TelePresence solutions and enables students to implement and troubleshoot basic and advanced TelePresence network solutions. Module 1: Advanced Cisco Expressway Features Lesson 1: Introducing Cisco Video Network Solutions Lesson 2: Exploring Cisco Expressway Basic Setup Lesson 3: Explaining Regular Expressions in a Cisco Expressway Environment Lesson 4: Deploying Components of Cisco Expressway Security Lesson 5: Exploring the Fundamentals of Subzones on a Cisco Expressway Lesson 6: Administering Call Control on a Cisco Expressway Lesson 7: Implementing Subzone Bandwidth Management on a Cisco Expressway Lesson 8: Implementing Zones on a Cisco Expressway Lesson 9: Exploring Clustering on the Cisco Expressway Lesson 10: Applying Troubleshooting on the Cisco Expressway Module 2: Advanced Cisco Meeting Server Features Lesson 1: Introducing the Cisco Meeting Server Lesson 2: Exploring Cisco Meeting Server API Configuration Lesson 3: Exploring Cisco Meeting Server Resilient and Scalable Deployments Lesson 4: Exploring Additional Features with Cisco Meeting Server Module 3: Cisco Collaboration Meetin gRoom Solutions wiht Cisco TelePresence Server Lesson 1: Introducing Cisco Collaboration Meeting Room Cloud, Premises, and Hybrid Products Lesson 2: Deploying the Cisco TelePresence Server and Cisco TelePresence Conductor Lesson 3: Applying Troubleshooting to Cisco CMR Premises Solutions Module 4: Cisco TelePresence Management Suite Solution Lesson 1: Explaining Cisco TMS Installation Lesson 2: Describing Cisco TMS Operation Lesson 3: Explaining Cisco TMS Conference Scheduling and Management Lesson 4: Configuring Permissions on Cisco TMS for Administration Lesson 5: Applying Troubleshooting to Cisco TMS Module 5: Cisco Cloud Solutions?WebEx and Spark Lesson 1: Introducing Cisco WebEx and Cisco Spark Cloud Solutions Lesson 2: Exploring Cisco Spark Administration Configuration Lesson 3: Deploying Cisco Spark Hybrid Services Lesson 4: Exploring Cisco Spark APIs and BOTs Configuration Module 6: Cisco TelePresence Content Server (Optional Module) Lesson 1: Examining Cisco TCS Operation and Configuration
Duration 3 Days 18 CPD hours This course is intended for Application Consultant Business Process Owner / Team Lead / Power User Help Desk/CoE Support Trainer Overview This course will prepare you to: Configure organizational structure elements and service products for SAP S/4HANA Service Perform general configuration of service processes in SAP S/4HANA Service Configure an on-site service process in SAP S/4HANA Service Configure an in-house repair process in SAP S/4HANA Service Configure service contracts in SAP S/4HANA Service This course will prepare you to configure the most important business processes in SAP S/4HANA Service. The configuration for both and on-site service process and an in-house repair process is explained. Service contract configuration is also a topic. The integration with Controlling, the Cross-Application Time Sheet (CATS) and integration with Logistics in SAP S/4HANA is also discussed. Service Processing in SAP S/4HANA - Overview and Process Steps Executing a Service Process in SAP S/4HANA Configuring Organizational Structure Elements and Service Products Configuring Organizational Structure Elements for SAP S/4HANA Service Configuring Service Products General Configuration of Service Processes Configuring a Transaction Type Configuring an Item Category Configuring Item Category Determination Copying Control for Business Transactions Configuring the Integration with Controlling Configuring the Integration with the Cross-Application Time Sheet (CATS) Configuring Pricing for Service Transactions Other Basic Settings for Business Transactions Configuring an On-site Service Process Settings for Service Requests Settings for Service Order Quotations and Service Orders Settings for Service Confirmations and Service Billing Test the New Configuration in the System Configuring In-House Repair In-House Repair Processing In-House Repair Customizing Configuring Service Contracts Configuring Service Contracts
Duration 4 Days 24 CPD hours This course is intended for This course assumes the student has successfully taken and passed the NCSF Foundation 2.0 course based on the NIST Cybersecurity Framework version 1.1, release April 2018. Following the course introduction, the course provides an introduction to the intersection between digital transformation and cybersecurity, which is followed by an overview of the threat landscape. Following an approach to the implementation of cybersecurity controls, the course delves into an organizational approach to cybersecurity that starts governance, management, and a supportive culture,Finally, the course provides additional guidance for the cybersecurity practitioner to determine the current state, the desired state, and a plan to close the gap - and to do this over and over again to inculcate it into organizational DNA. Overview This course looks at the impact of digital transformation on cybersecurity risks, an understanding of the threat landscape, and an approach to the application of cybersecurity controls. It provides guidance for students on the best approach to design and build a comprehensive cybersecurity program. Executives are keenly aware of the risks but have limited knowledge on the best way to mitigate these risks. This course also enables our executives to answer the critical question - Are we secure? The class includes lectures, informative supplemental reference materials, quizzes, exercises, and formal examination. The exercises are a critical aspect of the course; do not skip them. Outcomes and benefits from this class is a practical approach that students can use to build and maintain comprehensive cybersecurity and cyber-risk management programs. This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain. Digital Transformation Explores what the Practitioner needs to know about the relationship between digital transformation and cybersecurity Explain how to determine the impact of cybersecurity on DX. Explain the relationships between culture and digital transformation from the perspective of a practitioner. Explain the delivery of value to stakeholders in a DX & cybersecurity environment. Illustrate the interdependent relationship between cybersecurity and DX. Threat Landscape The Practitioner needs to understand what threat actors do and their capabilities. Compare the evolving attack type impact to the threat environment. Apply knowledge about the threat landscape to maintain a readiness to respond. Develop a risk profile based on business impact analysis Establish the relationship between awareness and training in the continual improvement of cybersecurity posture. Develop and treat training & awareness as a critical aspect of deterrence Use knowledge about the threat landscape as a predicate to the adoption and adaptation of your cybersecurity posture. The Controls This chapter provides a sample set of controls based on an informative reference. Understand the purpose goals & objectives for each control. Characterize & explain the informative reference controls Discover how to apply the controls in an organizational context. Adopt & Adapt Adopt is a decision about governance; adapt is the set of management decisions that result from the decision to adopt. Distinguish Adopt, Adapt, Management & Governance. Develop an approach to adoption & adaptation. Distinguish & demonstrate the impact of organizational culture on developing cybersecurity as a capability. Develop an assessment approach to define current state. Adaptive Way of Working Threat actors are agile and highly adaptive. The cybersecurity Practitioner must develop the same capabilities Break down what constitutes an adaptive approach. Characterize & apply the need for crossfunctional teams. Recognize and prioritize the first steps (get started). Demonstrate & establish cybersecurity phases. Break down the impact of the flows. Rapid Adoption & Rapid Adaptation FastTrack FastTrack? is an approach to allow organizations to learn to adapt to an evolving threat landscape rapidly. Approach: Establish what it takes to adopt CS. Determine how that impacts management adaptation of CS. Determine how that impacts the capability to assess. CS Capability: Determine the gap between existing & needed capabilities. Establish what must be developed. Develop appropriate risk management profile. Discover how cybersecurity impacts people, practice & technology impacts organization. Differentiate CIS Implementation groups. Determine appropriate implementation group & approach. Develop appropriate phase approaches. CIIS Practice Cybersecurity is an ongoing game of cat and mouse. Organizations must learn how to inculcate cybersecurity improvement into their DNA. Break down & develop mechanisms for ongoing cybersecurity improvement that includes developing a learning organization. Illustrate an improvement plan based on the NIST 7-Step Approach. Illustrate an improvement plan based on the Improvement GPS Demonstrate understanding of Cybersecurity Maturity Model Certification Break down the balancing loop & how it fits into the escalation archetype Use the Fast Track? (improvement & implementation) cycles.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP LTM system. This course gives network professionals a functional understanding of BIG-IP Local Traffic Manager, introducing students to both commonly used and advanced BIG-IP LTM features and functionality. Incorporating lecture, extensive hands-on labs, and classroom discussion, the course helps students build the well-rounded skill set needed to manage BIG-IP LTM systems as part of a flexible and high performance application delivery network. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Module 2: Reviewing Local Traffic Configuration Reviewing Nodes, Pools, and Virtual Servers Reviewing Address Translation Reviewing Routing Assumptions Reviewing Application Health Monitoring Reviewing Traffic Behavior Modification with Profiles Reviewing the TMOS Shell (TMSH) Reviewing Managing BIG-IP Configuration Data Module 3: Load Balancing Traffic with LTM Exploring Load Balancing Options Using Priority Group Activation and Fallback Host Comparing Member and Node Load Balancing Module 4: Modifying Traffic Behavior with Persistence Reviewing Persistence Introducing SSL Persistence Introducing SIP Persistence Introducing Universal Persistence Introducing Destination Address Affinity Persistence Using Match Across Options for Persistence Module 5: Monitoring Application Health Differentiating Monitor Types Customizing the HTTP Monitor Monitoring an Alias Address and Port Monitoring a Path vs. Monitoring a Device Managing Multiple Monitors Using Application Check Monitors Using Manual Resume and Advanced Monitor Timer Settings Module 6: Processing Traffic with Virtual Servers Understanding the Need for Other Virtual Server Types Forwarding Traffic with a Virtual Server Understanding Virtual Server Order of Precedence Path Load Balancing Module 7: Processing Traffic with SNATs Overview of SNATs Using SNAT Pools SNATs as Listeners SNAT Specificity VIP Bounceback Additional SNAT Options Network Packet Processing Module 8: Modifying Traffic Behavior with Profiles Profiles Overview TCP Express Optimization TCP Profiles Overview HTTP Profile Options OneConnect Offloading HTTP Compression to BIG-IP HTTP Caching Stream Profiles F5 Acceleration Technologies Module 9: Selected Topics VLAN, VLAN Tagging, and Trunking Restricting Network Access SNMP Features Segmenting Network Traffic with Route Domains Module 10: Deploying Application Services with iApps Simplifying Application Deployment with iApps Using iApps Templates Deploying an Application Service Leveraging the iApps Ecosystem on DevCentral Module 11: Customizing Application Delivery with iRules and Local Traffic Policies Getting Started with iRules Configuring and Managing Policy Rules Module 12: Securing Application Delivery with LTM Understanding Today?s Threat Landscape Integrating LTM Into Your Security Strategy Defending Your Environment Against SYN Flood Attacks Defending Your Environment Against Other Volumetric Attacks Addressing Application Vulnerabilities with iRules and Local Traffic Policies Detecting and Mitigating Other Common HTTP Threats Module 13: Final Lab Project About the Final Lab Project