Learning Objectives Introduction , Linking Workbooks and Worksheets , Working with Range Names , Sorting, Filtering, and Subtotaling , Analyzing and Organizing with Tables , Using Conditional Formatting , Displaying Data Graphically , Understanding PivotTables, PivotCharts, and Slicers , Working with Advanced PivotTables and PowerPivot Features , Conclusion Pre-Requisites Excel 365 Introduction course or equivalent knowledge or experience. Description In this course, students will learn how to link workbooks and worksheets, work with range names, sort and filter range data, and analyze and organize with tables. Students will also apply conditional formatting, outline with subtotals and groups, display data graphically with charts and sparklines. Additionally, students will also understand PivotTables, PivotCharts, and slicers and work with advanced PivotTables and PowerPivot features. Section 01 Lesson 01: Linking Workbooks and Worksheets 00:06:00 Lesson 02: Linking Workbooks with 3D References 00:05:00 Lesson 03: Understanding the Consolidate Feature 00:06:00 Section 02 Lesson 01: What are Range Names 00:04:00 Lesson 02: Creating Range Names Using the Name Box and Define Name 00:06:00 Lesson 03: Creating Range Names Using Create from Selection 00:03:00 Section 03 Lesson 01: Understanding the Differences Between Sorting and Filtering 00:03:00 Lesson 02: Sorting Lists 00:06:00 Lesson 03: Filtering Lists 00:08:00 Lesson 04: Creating Subtotals 00:06:00 Section 04 Lesson 01: Creating Tables and Understanding the Benefits 00:07:00 Lesson 02: Understanding the Elements of a Table 00:06:00 Lesson 03: Formatting a Table 00:08:00 Lesson 04: Sorting and Filtering Tables 00:03:00 Lesson 05: Filtering with Slicers 00:04:00 Lesson 06: Calculating with Tables 00:04:00 Lesson 07: Removing Erroneous Table Data 00:03:00 Lesson 08: Exporting, Refreshing, and Converting Tables 00:05:00 Section 05 Lesson 01: What is Conditional Formatting 00:04:00 Lesson 02: Conditional Formatting Highlight Cells and Top Bottom Rules 00:07:00 Lesson 03: Conditional Formatting Data Bars, Icon Sets, and Color Scales 00:06:00 Lesson 04: Using Custom Fonts and Colors 00:04:00 Lesson 05: Using Custom Conditional Formatting 00:06:00 Lesson 06: Modifying or Removing Conditional Formatting 00:05:00 Section 06 Lesson 01: What are Charts 00:05:00 Lesson 02: Creating Charts 00:06:00 Lesson 03: Understanding Chart Elements 00:05:00 Lesson 04: Modifying Chart Elements 00:09:00 Lesson 05: Changing and Moving Charts 00:04:00 Lesson 06: Filtering a Chart 00:04:00 Lesson 07: Formatting Charts 00:07:00 Lesson 08: Adjusting Numbering 00:06:00 Lesson 09: Creating Dual Axis Charts 00:05:00 Lesson 10: Forecasting with Trendlines 00:05:00 Lesson 11: Creating a Chart Template 00:04:00 Lesson 12: Displaying Trends with Sparklines 00:07:00 Section 07 Lesson 01: What is a PivotTable 00:06:00 Lesson 02: Creating a PivotTable 00:07:00 Lesson 03: Working with the PivotTable Fields Pane 00:09:00 Lesson 04: Basic Data Organization and Analysis with PivotTables 00:06:00 Lesson 05: Formatting PivotTables 00:06:00 Lesson 06: Creating a PivotChart 00:04:00 Lesson 07: Modifying and Formatting a PivotChart 00:04:00 Lesson 08: Adding Slicers and Timeline Slicers 00:03:00 Lesson 09: Formatting Slicers 00:04:00 Lesson 10: Using the Ideas Feature 00:03:00 Section 08 Lesson 01: Using the PivotTable and PivotChart Wizard 00:02:00 Lesson 02: Adding a Calculated Field 00:05:00 Lesson 03: Adding a Calculated Item 00:04:00 Lesson 04: Applying Conditional Formatting to a PivotTable 00:02:00 Lesson 05: Creating Filter Pages for a PivotTable_1 00:03:00 Lesson 06: Enabling the PowerPivot Add: In 00:06:00 Final Exam Final Exam - Excel 365 Intermediate 00:20:00
Information on the risks and practical advice to address them TSC's eBooks, whitepapers, and reports cover some of the most important risks in information and cyber security — risks that constantly challenge information and cyber security professionals who work tirelessly to reduce them across their organisations and home users alike.
Information on the risks and practical advice to address them TSC's eBooks, whitepapers, and reports cover some of the most important risks in information and cyber security — risks that constantly challenge information and cyber security professionals who work tirelessly to reduce them across their organisations and home users alike.
Duration 5 Days 30 CPD hours This course is intended for This basic course is intended for anyone who is new to software development and wants, or needs, to gain an understanding of the fundamentals of coding and basics of Java and object-oriented programming concepts. Attendees might include: Technically-minded attendees who want or who want to begin the process of becoming an OO application developer Technical team members from non-development roles, re-skilling to move into software and application development roles within an organization Recent college graduates looking to apply their college experience to programming skills in a professional environment, or perhaps needing to learn the best practices and standards for programming within their new organization Technical managers tasked with overseeing programming teams, or development projects, where basic coding knowledge and exposure will be useful in project oversight or communications needs Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in basic coding with Java, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will learn: The steps involved in the creation and deployment of a computer program What OO programming is and what the advantages of OO are in today's world To work with objects, classes, and OO implementations The basic concepts of OO such as encapsulation, inheritance, polymorphism, and abstraction The basic constructs that all programming languages share The basic Java constructs supporting processing as well as the OO orientation How to use Java exception handling About and how to use classes, inheritance and polymorphism About use collections, generics, autoboxing, and enumerations How to take advantage of the Java tooling that is available with the programming environment being used in the class Getting Started with Programming, OO and Java Basics for Non-Developers is a skills-focused, hands-on coding course that teaches students the fundamentals of programming object oriented (OO) applications with Java to a basic level, using sound coding skills and best practices for OO development. This course is presented in a way that enables interested students to embrace the fundamentals of coding as well as an introduction to Java, in a gentle paced environment that focuses on coding basics.Students are introduced to the application development cycle, structure of programs, and specific language syntax. The course introduces important algorithmic constructs, string and character manipulation, dynamic memory allocation, standard I/O, and fundamental object-oriented programming concepts. The course explains the use of inheritance and polymorphism early on so the students can practice extensively in the hands-on labs. Structured programming techniques and error handling are emphasized. The course includes the processing of command line arguments and environment variables, so students will be able to write flexible, user-friendly programs. Students will leave this course armed with the required skills to begin their journey as a Java programmer using modern coding skills and technologies. Introduction to Computer Programming Introduction to Programming Programming Tools Programming Fundamentals Thinking About Objects Program Basics Programming Constructs Java: A First Look The Java Platform Using the JDK The Eclipse Paradigm Writing a Simple Class OO Concepts Object-Oriented Programming Inheritance, Abstraction, and Polymorphism Getting Started with Java Adding Methods to the Class Language Statements Using Strings Specializing in a Subclass Essential Java Programming Fields and Variables Using Arrays Java Packages and Visibility Advanced Java Programming Inheritance and Polymorphism Interfaces and Abstract Classes Exceptions Java Developer's Toolbox Utility Classes Enumerations and Static Imports Formatting Strings Collections and Generics Introduction to Generics Collections
ITIL® 4 Specialist: Create, Deliver and Support: Virtual In-House Training The ITIL® 4 Specialist: Create, Deliver, and Support module is part of the Managing Professional stream for ITIL® 4. Candidates need to pass the related certification exam for working towards the Managing Professional (MP) designation. This course is based on the ITIL® 4 Specialist: Create, Deliver, and Support exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. What You Will Learn The learning objectives of the course are based on the following learning outcomes of the ITIL® 4 Specialist: Create, Deliver, and Support exam specification: Understand how to plan and build a service value stream to create, deliver, and support services Know how relevant ITIL® practices contribute to the creation, delivery, and support across the SVS and value streams Know how to create, deliver, and support services Organization and Culture Organizational Structures Team Culture Continuous Improvement Collaborative Culture Customer-Oriented Mindset Positive Communication Effective Teams Capabilities, Roles, and Competencies Workforce Planning Employee Satisfaction Management Results-Based Measuring and Reporting Information Technology to Create, Deliver, and Support Service Integration and Data Sharing Reporting and Advanced Analytics Collaboration and Workflow Robotic Process Automation Artificial Intelligence and Machine Learning CI / CD Information Model Value Stream Anatomy of a Value Stream Designing a Value Stream Value Stream Mapping Value Stream to Create, Deliver, and Support Services Value Stream for Creation of a New Service Value Stream for User Support Value Stream Model for Restoration of a Live Service Prioritize and Manage Work Managing Queues and Backlogs Shift-Left Approach Prioritizing Work Commercial and Sourcing Considerations Build or Buy Sourcing Models Service Integration and Management
Course Overview Julia is one of the highest performing programming languages. The Tutorials - The Julia Programming Language course is designed to train you in this valuable programing language. In this course, you will get equipped with the skills to code in Julia and add available skill sets to your resume. The Tutorials - The Julia Programming Language course will introduce you to the basic principles of Julia programming language. In this course, you will learn the steps to install Julia. You will get introduced to Julia variables, integers, sign function and more. The course will provide you with lectures based on Cher types and strings. You will start to understand all the functions of this programming language. The course will give you an extensive understanding of Julia Dict and type. By the end of the course, you will pick up all the valuable information and skills to use this language. Learn the ins and outs of Julia programming language from the Tutorials - The Julia Programming Language course. This course will increase your abilities and boost your employability in the relevant industry. Learning Outcomes Understand the process of installing Julia Familiarize yourself with Julia variables and functions Enrich your understanding of Cher types and strings Learn the details of conditional and non-conditional blocks Grasp the skills essential for Juila Dict operations Who is this course for? This Tutorials - The Julia Programming Language course is suitable for programmers, data scientists, or individuals who want to learn a new programming language. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path The Tutorials - The Julia Programming Language course is a useful qualification to possess and would be beneficial for any related profession or industry such as: Programmer Data Scientist Introduction Learning Julia 00:01:00 Installing Julia 00:06:00 Installing Juno 00:04:00 Begin Dancing with Julia Julia Variables 00:05:00 Julia Integers and Floats 00:05:00 Julia Convert and Comparisons 00:03:00 Rounding Operations 00:05:00 Division Function 00:04:00 Sign Function and Power 00:05:00 Complex and Rational Numbers 00:05:00 Julia Chars and Strings Julia Char type 00:03:00 String Literals 00:02:00 Extract Char and String 00:02:00 Concatenate and Interpolate 00:03:00 isEqual and Comparisons 00:04:00 Find and OccursIn 00:05:00 Repeat and Regex 00:04:00 Julia Functions Julia Function Object 00:04:00 Function Return Type 00:06:00 Functions as Objects and Arguments 00:04:00 Operators as Functions 00:02:00 Anonymous Function 00:04:00 Function Arguments Tuples 00:05:00 Unpacking Tuples 00:02:00 Varargs 00:03:00 Optional Arguments 00:03:00 Keyword Arguments 00:03:00 Conditional and Non-Conditional Blocks Do Block 00:04:00 Compound Expression 00:02:00 If Statements 00:05:00 If Statement Return Value 00:02:00 Short Circuit Evaluation 00:03:00 Loops and Exceptions For Loop 00:02:00 Control and Nest For Loops 00:03:00 Exceptions 00:03:00 Julia Try and Catch 00:03:00 While Loop 00:02:00 Variable Scope 00:05:00 Arrays in Julia Arrays 00:04:00 Pop and Push 00:03:00 Multidimensional Arrays 00:03:00 Copying Arrays 00:02:00 Julia Dicts Dicts 00:02:00 Dict Operations 00:02:00 More Dict Operations 00:04:00 More Cool Dict Operations 00:03:00 One More Cool Dict Operation 00:04:00 Broadcasting 00:04:00 Julia Types Julia Types 00:01:00 Verify and Specify Types 00:03:00 More Verification and Specification 00:05:00 Julia Methods 00:02:00 Composite Types 00:05:00 Mutable Structs 00:02:00 Constructor Functions 00:04:00 Modules and Packages Julia Modules 00:02:00 Using Packages 00:04:00 User Defined Modules 00:05:00 Working with Text Files Reading Text Files 00:04:00 Writing To Text Files 00:03:00 Writing Collections To Files 00:02:00 Julia Date and Time Date And Time 00:03:00 Date Queries 00:02:00 Date Arithmetic 00:03:00 Meta Programming in Julia Meta Programming 00:02:00 Quoted Expression 00:04:00 Macros 00:02:00 REST APIs and MySQL Using Genie 00:04:00 Payloads and POST Requests 00:05:00 Julia and MySQL 00:08:00 DataFrames and Plots DataFrames 00:05:00 Plotting with Plots 00:02:00 Where to go from here 00:01:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Duration 3 Days 18 CPD hours This course is intended for This course is intended for Cisco Partner Sales Engineers and Field engineers supporting customers with 802.1x solutions. The primary audience for this course is Cisco Channel Partner SEs and FEs that are seeking to meet the education requirements to attain ATP authorization to sell Cisco ISE. The secondary audience for this course is security architects, design engineers, and others seeking hands-on experience with Cisco TrustSec 802.1X deployments with Cisco ISE Overview Upon completing this course, students will be able to meet these objectives:- Describe identity-based networking concepts and components - Define the components and processes of port-based authentication - Identify the 802.1X components and their interrelation at a high level - Identify requirements and options for non-supplicant devices - Position individual components of an 802.1X network and identify compatibilities Students will gain the foundational knowledge of IEEE 802.1X protocol; the skills that are needed to configure the Cisco Identity Services Engine (ISE) for 802.1X operation; hands-on experience configuring a network for 802.1X-based network services. Cisco TrustSec Surveying Cisco TrustSec Surveying Cisco TrustSec Architecture Components Port-Based Authentication Surveying the IEEE 802.1X Standard Surveying 802.1X and EAP Surveying 802.1X and EAP Configure Devices for 802.1X Operation Identifying 802.1X Components and Topologies Identifying 802.1X Components and Topologies Configuring Network Devices for 802.1X Configuring Supplicants for 802.1X Operation Configure Guest Access Configuring Cisco TrustSec for Non-Supplicant Devices Configuring Cisco WebAuth for Non-Supplicant Devices Design Cisco TrustSec Networks with Cisco ISE and 802.1X Identifying Component Compatibilities with 802.1X Reviewing 802.1X Design Considerations that Impact Implementation Reviewing Scalable 802.1X Architectures Additional course details: Nexus Humans Cisco Introduction to 802.1X Operations for Cisco Security Professionals v1.0 (8021X) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Introduction to 802.1X Operations for Cisco Security Professionals v1.0 (8021X) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance. Articulate how utilizing multiple traffic queues can make traffic handling more efficient. Discuss Site-to-Site VPN basics, deployment and communities. Describe how to analyze and interpret VPN tunnel traffic. Explain Link Selection and ISP Redundancy options. Explain tunnel management features. Discuss Check Point Remote Access solutions and how they differ from each other. Describe how client security can be provided by Remote Access . Explain authentication methods including machine authentication. Explain Multiple Entry Point (MEP). Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. Course Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent
Duration 3 Days 18 CPD hours This course is intended for Network Security Operations Workload Application Administrators Security Operations Field Engineers Network Engineers Systems Engineers Technical Solutions Architects Cisco Integrators and Partners Overview After taking this course, you should be able to: Define the Cisco telemetry and analytics approach. Explore common scenarios that Cisco Tetration Analytics can solve. Describe how the Cisco Tetration Analytics platform collects telemetry and other context information. Discuss how relative agents are installed and configured. Explore the operational aspects of the Cisco Tetration Analytics platform. Describe the Cisco Tetration Analytics support for application visibility or application insight based on the Application Dependency Mapping (ADM) feature. List the concepts of the intent-based declarative network management automation model. Describe the Cisco Tetration policy enforcement pipeline, components, functions, and implementation of application policy. Describe how to use Cisco Tetration Analytics for workload protection in order to provide a secure infrastructure for business-critical applications and data. Describe Cisco Tetration Analytics platform use cases in the modern heterogeneous, multicloud data center. List the options for the Cisco Tetration Analytics platform enhancements. Explain how to perform the Cisco Tetration Analytics administration. This course teaches how to deploy, use, and operate Cisco© Tetration Analytics? platform for comprehensive workload-protection and application and network insights across a multicloud infrastructure. You will learn how the Cisco Tetration Analytics platform uses streaming telemetry, behavioral analysis, unsupervised machine learning, analytical intelligence, and big data analytics to deliver pervasive visibility, automated intent-based policy, workload protection, and performance management. Exploring Cisco Tetration Data Center Challenges Define and Position Cisco Tetration Cisco Tetration Features Cisco Tetration Architecture Cisco Tetration Deployment Models Cisco Tetration GUI Overview Implementing and Operating Cisco Tetration Explore Data Collection Install the Software Agent Install the Hardware Agent Import Context Data Describe Cisco Tetration Operational Concepts Examining Cisco Tetration ADM and Application Insight Describe Cisco Tetration Application Insight Perform ADM Interpret ADM Results Application Visibility Examining Cisco Tetration Intent-Based Networking Describe Intent-Based Policy Examine Policy Features Implement Policies Enforcing Tetration Policy Pipeline and Compliance Examine Policy Enforcement Implement Application Policy Examine Policy Compliance Verification and Simulation Examining Tetration Security Use Cases Examine Workload Security Attack Prevention Attack Detection Attack Remediation Examining IT Operations Use Cases Key Features and IT Operations Use Cases Performing Operations in Neighborhood App-based Use Cases Examining Platform Enhancement Use Cases Integrations and Advanced Features Third-party Integration Examples Explore Data Platform Capabilities Exploring Cisco Tetration Analytics Administration Examine User Authentication and Authorization Examine Cluster Management Configure Alerts and Syslog Additional course details: Nexus Humans Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Developed for IT Professionals with extensive networking and Citrix ADC experience. This course is built for IT Professionals who are responsible for defining the overall structure or architecture of a Citrix networking environment. This course encompasses advanced Citrix networking configurations and leading Citrix design principles. Overview How to identify and prioritize business drivers, constraints, and requirements using the Citrix Consulting methodologyAssess environment requirements and learn to apply leading design principles to address them in a multi-site Citrix ADC deploymentApply advanced authentication and load balancing principles In this expert training course students will be exposed to advanced networking and Citrix ADC concepts and configurations. Through lecture, lab exercises, and real-world case studies, students will learn to look critically at environment requirements, constraints, and business drivers to create a complex Citrix networking solution. Topics to be covered in this course include multi-site and multitenant deployments, advanced authentication and load balancing, and automation and orchestration and advanced troubleshooting. This training will also prepare students for the Citrix Certified Expert in Networking (CCE-N) exam.This course includes a voucher to take the related exam (1Y0-440: Citrix Networking Assessment, Design, and Advanced Configuration) and earn your Citrix Certified Expert ? Networking (CCE-N) certification. Networking Methodology and Assessment Understanding the Citrix methodology Business Drivers and Requirements User Segmentation Application Assessment Capabilities Assessment Citrix Networking Deployment Architecture and Topology Multi-Site Deployments Multi Tennant Infrastructure Cloud Deployments High Availability Citrix ADC Double-Hop Scenarios Secure Web Gateway Advanced Authentication and Authorization Authorization Policies Access Policies Advanced Authentication Options Multi-Factor Authentication nFactor Authentication AAA Session Management Citrix ADC Security Authorization Pre-authentication and Endpoint Analysis Scans Protection against Layer 4-7 Attacks Web App Firewall Citrix Gateway Configuration Considerations ICA Proxy Configuration VPN Access Clientless Access Split Tunneling RDP Proxy Deployment and Configuration Advanced Load Distribution and Link Load balancing Advanced Load Balancing Link Load Balancing Firewall Load Balancing Microsoft Exchange Load Balancing Advanced Global Server Load Balancing Global Server Load Balancing Persistence DNS, Policies, Expressions, Actions, and Views GSLB Monitoring and Considerations Application Delivery Management Automation and Orchestration Application Delivery Management Outbound Traffic Dashboard Automation Orchestration Configuration Jobs Configuration Audit NITRO API StyleBooks (Net-new) Additional course details: Nexus Humans CNS-420 Citrix Networking Assessment, Design, and Advanced Configuration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNS-420 Citrix Networking Assessment, Design, and Advanced Configuration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.