Duration 3 Days 18 CPD hours This course is intended for This course is intended for the following technical professionals who need to use advanced features of fiber optics technology: System installers System integrators System administrators Network administrators Solutions designers Overview After taking this course, you should be able to: Perform the ONS 15454 MSTP node turn-up procedure Describe first generation mesh topologies Describe the Optical Channel Network Connection (OCHNC) prerequisite requirements for provisioning circuits in an ONS 15454 MSTP network Describe the ONS MSTP advanced protocols Describe the OCHNC circuit provisioning for Single Module (SM) Reconfigurable Optical Add-Drop Multiplexer (ROADM) rings Describe the Any-Rate Muxponder Crossponder (AR MXP/XP) cards Describe how the Pseudo Command Line can be used to configure muxponder cards Identify the advantages G.709 encapsulation brings to optical transponder cards Install and provision the Any Rate cards Describe the 100-Gbps and 200-Gbps cards Describe the NCS 2000 400-Gbps Xponder line card and how it is configured Describe the SM ROADM (SMR)-based configurations Describe the 10-Gbps transponder and muxponder cards List the 10GE_XP and GE_XP card options Describe ingress policing and basic egress queuing strategies, and implement the customer QoS scheme into the ONS 15454 crossponder network Identify the principles of Ethernet related to the operation of Cisco optical networking products Configure the 10GE_XP/XPE and GE_XP/XPE cards, install Layer 1 circuits, and read the performance counters for Layer 1 Gigabit Ethernet circuits Turn up an encrypted network and test to ensure that information being passed is secure Add a node to an existing DWDM ring Describe problems with interconnecting circuits between rings, the ONS 15454 MSTP 80-channel manual Multiring feature, and hardware components Describe the ONS 15454 MSTP Troubleshooting Guide The Cisco Optical Technology Advanced (OPT300) v2.0 course gives you the skills you need to deploy advanced features of the Cisco© Optical Networking Services (ONS) 15454 Multiservice Transport Platform (MSTP) and Cisco Network Convergence System (NCS) 2000 Series. In this course you?ll learn to how to use the Cisco Transport Planner Design Tool to create network topologies and advanced network topologies. You will learn how to use advanced Dense Wavelength Division Multiplexing (DWDM) features such as G.709 encapsulation, generic framing protocol G.7041, Layer 1 circuits, Quality of Service (QoS), crossponder networks using T1 over Ethernet, and encryption. Course Outline Cisco Transport Planner Design Tool First-Generation Mesh Topologies Ochnc In A Mesh Network Advanced Protocols Any Rate Muxponder And Crossponders 100-Gbps And 200-Gbps Transponders And Muxponders Cisco Ncs 2000 400-Gbps Xponder Line Card Cisco 10G Web Security Essentials (Wse) Network Encryption Card Adding A New Location With Cisco Transport Planner (Ctp) And Cisco Transport Controller (Ctc) Crossponders And Layer 1 Networks Crossponders And Layer 2 Networks Troubleshooting
Duration 1 Days 6 CPD hours This course is intended for IT Asset Managers and other IT professionals involved in Asset Management, resource budgeting, finance, software licensing, contract management and strategic planning. Overview Students earning a CHAMP certification will see financial benefits of enhanced Hardware Asset Management best practices and uncover many savings opportunities to increase their organizations' bottom line by managing the lifecycle of the hardware asset. They will receive an awareness of several avenues for savings, compliance, global disposal and revenue generation practices for properly managing the lifecycle of hardware assets. Designed to address the numerous issues plaguing professionals in managing hardware assets, the IAITAM Certified Hardware Asset Management Professional (CHAMP) Course follows the lifecycle of IT hardware assets beyond the scope of the cradle to grave analogy and discusses the business practices that can best be used to manage those assets efficiently and cost-effectively. Emphasis is placed on identifying the policies that enhance lifecycle management. In general, policies are only effective if developed by a cross-section of the impacted departments, are reviewed frequently to remain current and are consistently communicated and enforced. The course is followed by a certification test for those that wish to achieve CHAMP certification. Course Outline Basics of Hardware Asset Management The Power of ITAM Centralization Best Practices for Asset Standards Implementing a Program Project Planning Change Management Measuring Success Tools & Automation Repository Tool Discovery Tool Acquisition & Receiving Selection & Negotiations Managing the Inventory Management During Use IMAC Process Improving the Program Improving the Value of Assets Hardware Security Reuse & Disposal Processes E-waste Decisions Evaluating ITAD Vendors Additional course details: Nexus Humans Certified Hardware Asset Management Professional (CHAMP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Hardware Asset Management Professional (CHAMP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1.5 Days 9 CPD hours This course is intended for Application developers on the beginner and intermediate level seeking to create and deploy secure Android applications. Overview Understand Android software architecture. Understand Android?s security model. Build Android applications with security best practices in mind. Build more secure and more robust application that appeals to clients. This is a two-day (12 hours) professional course, which thoroughly covers the Android security model and concerns of both the developer and end-user point of view. This course is mapped for AND-802 exam. PermissionsManaging the Policy FileUsers? Data Privacy and ProtectionSecuring Storage Additional course details: Nexus Humans Android Security Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Android Security Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is targeted towards developers looking to build a career as a Node.js developer. This course offers you a deep but gentle dive into Node.js. You will start off by discovering the basic building blocks of the modern JavaScript language, which are necessary for you to have a good grasp of Node.js, before delving into the fundamentals of Node.js.Most courses quickly dive into Node.js forgetting that, at the end of the day, Node.js is still JavaScript. This can be challenging for JavaScript newbies who are then trying to build a solid house on a shaky foundation.This course overcomes that obstacle by beginning with a quick introduction to the modern JavaScript language (ES6+). You will then discover Node's asynchronous programming model and examine Node's module system, including built-in modules and application modularization, as well as the NPM third-party module registry. We will finish off by working on a simple web application API using the Hapi.js and Knex.js frameworks. Introducing React and UI Design What is React? How to Set Up a React-Based Application How to Design a UI Creating Components Definition of a Component Using JSX Composing Components Data Propagation Managing the Internal State Managing User Interactivity Managing User Interaction Component Lifecycle Events Additional course details: Nexus Humans Beginning Frontend Development with React training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Beginning Frontend Development with React course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate-level programming course, designed for experienced .Net developers who wish to get up and running on developing well defended software applications. Real world programming experience with .Net is required. Overview Students who attend Attacking and Securing .Net Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a .Net perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on .Net security training that offers a unique look at .Net application security. Beginning with penetration testing and hunting for bugs in .Net web applications, you thoroughly examine best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, driving home the mechanics of how to secure .Net web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Injection Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? .NET Issues and Best Practices Making Application Security Real Time Permitting Topics Cryptography Overview .NET Cryptographic Services
Duration 2 Days 12 CPD hours This course is intended for This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants who are charged with the configuration and day-to-day management of Symantec Endpoint Protection in a variety of network environments. Overview By the completion of this course, you will be able to: Manage Virus and Spyware Protection policies. Manage SONAR scans. Manage Firewall and Intrusion Prevention policies. Manage Application and Device Control policies. Manage System Lockdown. Manage Host Integrity. Manage Virtualized clients. This course is designed for the network, IT security, and systems administration professional tasked with implementing and monitoring virus and spyware protection, zero-day protection, and network threat protection solutions. Introduction Course overview The classroom lab environment Introducing Antivirus, Insight, and SONAR Virus and spyware protection needs and solutions Reputation and Insight Administrator-defined scans Auto-Protect Download Insight SONAR Included Virus and Spyware Protection policies Managing Virus and Spyware Protection Policies for Windows Configuring administrator-defined scans Configuring protection technology settings and scans Configuring e-mail scans Configuring advanced options Managing scanned clients Managing Virus and Spyware Protection Policies for Mac and Linux Configuring Virus and Spyware settings for Mac Configuring Virus and Spyware settings for Linux Configuring advanced options Managing Exception Policies Exceptions and exclusions Configuring the Exceptions policy Introducing Network Threat Protection The OSI model and network threats Network threat tools and attack methods Attack and mitigation Managing Firewall Policies Firewall policy overview Defining rule components Modifying firewall rules Configuring built-in rules Configuring protection and stealth settings Configuring Windows integration settings Managing Intrusion Prevention Policies Configuring network and browser intrusion prevention Managing custom signatures Compliance Management Application and Device Control System Lockdown Host Integrity Virtualization Introducing virtualization features Virtual image exception Network and vShield Shared Insight Cache Virtual client tagging Offline image scanner Windows Azure support Additional course details: Nexus Humans Symantec Endpoint Protection 12.X - Manage And Administer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Endpoint Protection 12.X - Manage And Administer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Application Consultant Business Process Owner / Team Lead / Power User Help Desk/CoE Support Trainer Overview This course will prepare you to: Configure organizational structure elements and service products for SAP S/4HANA Service Perform general configuration of service processes in SAP S/4HANA Service Configure an on-site service process in SAP S/4HANA Service Configure an in-house repair process in SAP S/4HANA Service Configure service contracts in SAP S/4HANA Service This course will prepare you to configure the most important business processes in SAP S/4HANA Service. The configuration for both and on-site service process and an in-house repair process is explained. Service contract configuration is also a topic. The integration with Controlling, the Cross-Application Time Sheet (CATS) and integration with Logistics in SAP S/4HANA is also discussed. Service Processing in SAP S/4HANA - Overview and Process Steps Executing a Service Process in SAP S/4HANA Configuring Organizational Structure Elements and Service Products Configuring Organizational Structure Elements for SAP S/4HANA Service Configuring Service Products General Configuration of Service Processes Configuring a Transaction Type Configuring an Item Category Configuring Item Category Determination Copying Control for Business Transactions Configuring the Integration with Controlling Configuring the Integration with the Cross-Application Time Sheet (CATS) Configuring Pricing for Service Transactions Other Basic Settings for Business Transactions Configuring an On-site Service Process Settings for Service Requests Settings for Service Order Quotations and Service Orders Settings for Service Confirmations and Service Billing Test the New Configuration in the System Configuring In-House Repair In-House Repair Processing In-House Repair Customizing Configuring Service Contracts Configuring Service Contracts
Duration 4 Days 24 CPD hours This course is intended for Primary target audiences for this training are developers and development consultants but also other roles involved with implementing or reviewing program code to optimize ABAP based applications for SAP HANA. This course will prepare students to develop and optimize ABAP applications that access data stored in the SAP HANA Database. Course Outline Technical concepts of SAP HANA Introduction to HANA Studio Introduction to ADT (ABAP Development Tools, also known as ABAP in Eclipse) Tools to detect potential functional and performance issues when migrating to SAP HANA: Code Inspector and ABAP Test Cockpit, ABAP Trace and ABAP Profiler, SQL Trace Tools to prioritize performance issues: SQL Monitor, SQL Performance Tuning Worklist Performance Rules and Guidelines for ABAP in the context of SAP HANA Optimizing ABAP by accessing SAP HANA as a Secondary Database Optimizing ABAP using SAP HANA as Primary Database Using SAP HANA Fuzzy Search in ABAP Enabling input fields for Type-Ahead search. SAP List Viewer (ALV) for SAP HANA Additional course details: Nexus Humans HA400 SAP ABAP Programming for SAP HANA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the HA400 SAP ABAP Programming for SAP HANA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate -level programming course, designed for experienced Java developers who wish to get up and running on developing well defended software applications. Familiarity with Java and JEE is required and real world programming experience is highly recommended. Ideally students should have approximately 6 months to a year of Java and JEE working knowledge. Overview Students who attend Attacking and Securing Java Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a Java/JEE perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on Java / JEE security training that offers a unique look at Java application security. Beginning with penetration testing and hunting for bugs in Java web applications, you embrace best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, allowing you to experience the mechanics of how to secure JEE web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? Making Application Security Real
Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Network administrators Network engineers Network managers System engineers Overview After taking this course, you should be able to: Describe the Cisco ThousandEyes solution and its high-level use cases Identify different types of ThousandEyes agents and supported tests Describe different Enterprise Agent deployment options, requirements, and procedures for agent deployment Describe different ThousandEyes test types Compare Thousand Eyes web layer tests Describe the role of an Endpoint Agent Deploy and Configure an Endpoint Agent Utilize ThousandEyes when performing the root cause analysis Discuss the challenges that ThousandEyes Internet Insights can address Describe the role and configuration of default and custom alerts Distinguish between usability of dashboards and reports Utilize ThousandEyes to monitor solutions end-to-end Describe how to perform system administration The Implementing and Troubleshooting Networks Using Cisco ThousandEyes (ENTEIT) v1.0 course is designed to introduce you to and familiarize you with Cisco© ThousandEyes. Through a combination of lectures and hands-on experience, you will learn to implement and configure the Cisco ThousandEyes solution. You will also learn to install and configure the Cisco ThousandEyes agents with different test types. This solution will also enable you to perform root cause analysis when troubleshooting. Course Outline Introducing Cisco ThousandEyes Introducing Cisco ThousandEyes Agents and Tests Deploying Enterprise Agents Describing ThousandEyes Routing, Network DNS, and Voice Tests Describing Cisco ThousandEyes Web Tests Introducing Endpoint Agents Deploying Endpoint Agents Troubleshooting with Cisco ThousandEyes Using Internet Insights Configuring Alerts Customizing Dashboards and Reports Monitoring Solutions Administrating the System