Duration 3 Days 18 CPD hours This course is intended for Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks should attend this course. You should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course. Overview After completing this course, the successful student should be able to: Deploy the appropriate operation mode for your network Use the GUI and CLI for administration Control network access to configured networks using firewall policies Apply port forwarding, source NAT, and destination NAT Authenticate users using firewall policies Understand encryption functions and certificates Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports Fight hacking and denial of service (DoS) Collect and interpret log entries Identify the characteristics of the Fortinet Security Fabric In this three-day course, you will learn how to use the most common FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, the Fortinet Security Fabric, user authentication, and how to protect your network using security profiles, such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security. Product Version FortiOS 7.2 Course Outline 1. Introduction and Initial Configuration 2. Firewall Policies 3. Network Address Translation 4. Firewall Authentication 5. Logging and Monitoring 6. Certificate Operations 7. Web Filtering 8. Application Control 9. Antivirus 10. Intrusion Prevention and Denial of Service 11. Security Fabric
Duration 5 Days 30 CPD hours This course is intended for Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks. Overview In interactive labs, you will explore firewall policies, user authentication, basic VPNs, explicit proxy, virus detection, web filtering, application control and more. These administrative fundamentals will provide you with a solid understanding of how to integrate and maintain basic network security. In the last three days you will review topics including features commonly used in complex or larger enterprise/MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, security-as-a-service (SaaS), advanced IPsec VPN, IPS, SSO, certificates, data leak prevention, diagnostics, and fine-tuning performance. The Fortinet NSE 4 Bundle is a 5-day event that provides the basic configuration and administration of the most commonly used features of FortiGate appliances and a selection of advanced FortiGate networking and security features. The Fortinet NSE 4 Bundle is a 5-day event that provides the basic configuration and administration of the most commonly used features of FortiGate appliances and a selection of advanced FortiGate networking and security features. Additional course details: Nexus Humans NSE 4 Bundle training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the NSE 4 Bundle course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Deployment engineer Sales engineer Overview After taking this course, you should be able to: Describe the components, protocols, and call flow of Cisco Packaged Contact Center Enterprise (PCCE) by referencing the discovery platform to prepare for further scripting and configuration activities. Run the CCE Bulk Import utility using the CCE Web Administration tool to develop a base line CCE configuration. Configure an advanced VoiceXML (VXML) application implementing DB lookup functionality and digit collection using Call Studio and CCE Scripting tools; present call data collected from the caller to the Agent desktop. Provision CCE to support Cisco Unified Communications Manager (CUCM) calls to the Contact Center using CUCM and CCE configuration tools. This functionality enables CCE Route Requests from CUCM to support contacts initiated from a CUCM managed device (Gateways, Phones, Line Side Interactive Voice Response [IVR] Ports). This functionality can also enable non-Contact Center calls and calls handled by Agents, whether existing or new. Access and deploy custom gadgets to the Finesse desktop using the CCE Web Administration tool to further enhance functionality of the Finesse Agent Desktop. Successfully deploy Mobile Agent in a CCE Environment. Successfully deploy Post Call Survey in a CCE Environment. The Administering Advanced Cisco Contact Center Enterprise (CCEAA) v1.0 course teaches you how to execute advanced administration tasks associated with the Cisco Contact Center Enterprise (CCE) solution. PCCE Review Review PCCE Architecture and Components Review PCCE Protocols Introducing Bulk Import Tools Use the PCCE Bulk Import Tool Use Bulk Import Templates Configuring Advanced Scripting and CCE Data Exchange Design for Advanced Scripting CCE Data Exchange Cisco Unified Communications Manager Initiated Call Flows Understand Transfer Types and Cisco Unified Custom Voice Portal (CVP) Call Flow Models Describe Subsequent Transfers Using Gadgets to Customize the Finesse Desktop Obtain Finesse Custom Gadgets Deploy Finesse Custom Gadgets Implementing Mobile Agent Examine Mobile Agent Functionality Identify Mobile Agent Architecture and Components Implementing Post Call Survey Examine Post Call Survey Functionality Configure Post Call Survey Lab practice Review Discovery Navigate CCE Discovery Architecture and Components Import Bulk Data Create a VXML Application Using Call Studio Configure Precision Queues Create a CCE Routing Script Customize the Finesse Desktop Test Your Call Flow Configure Cisco Unifi
Duration 2 Days 12 CPD hours This course is intended for System Security Administrator Security Architect Technology Consultant Overview This course will prepare you to Understand SAP Security fundamentals Get an overview of the main SAP concepts for security Be prepared to learn more in detail about each SAP concept for security This course will prepare you to Understand SAP Security fundamentals. Get an overview of the main SAP concepts for security. Be prepared to learn more in detail about each SAP concept for security. SAP Access Governance and Control Overview of Security Fundamentals Introduction to SAP Access Governance SAP NetWeaver Application Security Overview Describe SAP User Experience Explain Basic User Administration for AS ABAP Explain Basic Role Administration for AS ABAP Describe SAP Fiori Catalog and Group Administration Concept Describe AS JAVA Security Discuss Custom Development and Security SAP Access Governance and Compliance Describe SAP Access Governance Explain SAP GRC Access Control Describe SAP Identity Management Describe SAP Cloud Identity Access Governance Infrastructure Security Explaining Network Topology Enabling Secure Network Communication (SNC) Enabling Secure Sockets Layer (SSL) Implementing Single Sign-On (SSO) in SAP Systems Security Monitoring with SAP Solution Manager Monitoring Security with SAP Solution Manager SAP Data Privacy Governance and Cybersecurity Introduce EU General Data Privacy Regulation (GDPR) Discuss SAP Support for GDPR Compliance Additional course details: Nexus Humans SAP System Security Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SAP System Security Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is individuals who administer and maintain SQL Server databases. These individuals perform database administration and maintenance as their primary area of responsibility, or work in environments where databases play a key role in their primary job. The secondary audiences for this course are individuals who develop applications that deliver content from SQL Server databases. Overview After completing this course, you will be able to: Authenticate and authorize users Assign server and database roles Authorize users to access resources Use encryption and auditing features to protect data Describe recovery models and backup strategies Backup and Restore SQL Server databases Automate database management Configure security for the SQL Server agent Manage alerts and notifications Managing SQL Server using PowerShell Trace access to SQL Server Monitor a SQL Server infrastructure Troubleshoot a SQL Server infrastructure Import and export data This course will provide training in how to administer and maintain SQL Server, Azure SQL Database and other cloud-based SQL Server databases. IT professionals who work in environments where databases play a key role in their job will find this material useful. By using demonstrations and hands-on lab exercises, students will learn to carry out these important tasks. This course covers content that was in retired Microsoft Course 20764: Administering a SQL Database Infrastructure. 1 - Creating advanced functions Lesson 1: Converting a command into an advanced function Lesson 2: Creating a script module Lesson 3: Defining parameter attributes and input validation Lesson 4: Writing functions that accept pipeline input Lesson 5: Producing complex pipeline output Lesson 6: Using comment-based Help Lesson 7: Using Whatif and Confirm parameters 2 - Using Microsoft .NET Framework and REST API in Windows PowerShell Lesson 1: Using .NET Framework in PowerShell Lesson 2: Using REST API in PowerShell 3 - Writing controller scripts Lesson 1: Understanding controller scripts Lesson 2: Writing controller scripts with a user interface Lesson 3: Writing controller scripts that create reports 4 - Handling script errors Lesson 1: Understanding error handling Lesson 2: Handling errors in a script 5 - Using XML, JSON, and custom-formatted data Lesson 1: Working with XML formatted data Lesson 2: Working with JSON formatted data Lesson 3: Working with custom-formatted data 6 - Enhancing server management with Desired State Configuration and Just Enough Administration Lesson 1: Implementing Desired State Configuration Lesson 2: Implementing Just Enough Administration 7 - Analyzing and debugging scripts Lesson 1: Debugging in Windows PowerShell Lesson 2: Analyzing and debugging an existing script 8 - Understanding Windows PowerShell Workflow Lesson 1: Understanding Windows PowerShell Workflows Lesson 2: Running Windows PowerShell Workflows
Duration 5 Days 30 CPD hours This course is intended for Implementers and administrators who are new to IBM Spectrum Protect data management. Overview Describe the purpose of IBM Spectrum Protect Install and configure the IBM Spectrum Protect components Use the administrative and client interfaces Discuss storage methodology options and create storage pool Customize data movement and retention policies to meet business requirements Configure the IBM Spectrum Protect database and storage pools for protection Optimize client configuration Perform backup, restore, archive and retrieve operations Organize daily tasks required to protect the IBM Spectrum Protect environment Automate and monitor client and administrative tasks and events IBM Spectrum Protect 8.1.12 is a data backup and recovery solution designed to help you manage your data retention, reduce the cost of storage, and provide appropriate recovery point objectives to meet any service level agreement. IBM Spectrum Protect offers improved efficiency and flexibility using object-based data management and policy driven retention.This five-day course will focus on implementation and basic administration of an IBM Spectrum Protect environment. The hands-on lab exercises are performed on a Windows 2016 environment. The course materials include examples of AIX and Linux commands, when different from Windows. Unit 1 Concepts and components Unit 2 Installation and configuration Unit 3 Interfaces and monitoring Unit 4 Storage pools and devices Unit 5 Policy management, data movement, and expiration Unit 6 Server database and storage pool management Unit 7 Client configuration and management Unit 8 Client data protection Unit 9 Daily operations and maintenance Unit 10 Schedules and reports Additional course details: Nexus Humans TS619G IBM Spectrum Protect version 8.1.12 Implementation and Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TS619G IBM Spectrum Protect version 8.1.12 Implementation and Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours Overview At the completion of this course, students already familiar with the RHCT/RHCSA administration skills will have exposure to all competencies tested by the RHCSA and RHCE exams. This course is designed for experienced Linux administrators who require networking and security administration skills. Getting Started with the Classroom Environment Given a virtualized environment, begin to administrate multiple systems using prerequisite skills Enhance User Security Configure system to use Kerberos to verify credentials and grant privileges via sudo Bash Scripting and Tools Automate system administration tasks utilizing Bash scripts and text-based tools File Security with GnuPG Secure files with GnuPG. Software Management Use yum plugins to manage packages and understand the design of packages to build a simple package Network Monitoring Profile running services then capture and analyze network traffic Route Network Traffic Configure system to route traffic and customize network parameters with sysctl Secure Network Traffic Secure network traffic through SSH port forwarding and iptables filtering/network address translation (NAT) NTP Server Configuration Configure an NTP server Filesystems and Logs Manage local file system integrity, monitor system over time, and system logging Centralized and Secure Storage Access centralized storage (iSCSI) and encrypt filesystems SSL-encapsulated Web Services Understand SSL certificates and deploy an SSL encapsulated web service Web Server Additional Configuration Configure web server with virtual hosts, dynamic content, and authenticated directories Basic SMTP Configuration Configure an SMTP server for basic operation (null client, receiving mail, smarthost relay) Caching-Only DNS Server Understand DNS resource records and configure a caching-only name server File Sharing with NFS Configure file sharing between hosts with NFS File Sharing with CIFS Configure file and print sharing between hosts with CIFS File Sharing with FTP Configure file sharing with anonymous FTP Troubleshooting Boot Process Understand the boot process and recover unbootable systems with rescue mode Additional course details: Nexus Humans Enterprise Linux System Admin 3 with Exam Prep training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Enterprise Linux System Admin 3 with Exam Prep course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Built for experienced IT Professionals familiar with Citrix Virtual Apps and Desktops 7 in an on-premises environment or Citrix Cloud looking to expand their Citrix Virtual Apps and Desktops skills to an advanced level. Potential students include administrators or engineers responsible for the Citrix Apps and Desktop 7 Site. Overview After completing this course you should be able to: Configure Workspace Environment Management to improve the end user environment and virtual resource consumption Implement App Layering skills, for example how to create and administer OS, platform, application, elastic and user layers Migrate to Workspace Environment Management Students will learn to build and combine App Layers to optimize management of your app and desktop images and to implement Workspace Environment Management to improve log-on times, centralize user settings management, and optimize the performance of machines. Students will leave this course with a good understanding of how to manage more complex solutions and features in their Citrix Virtual Apps and Desktop 7 site. Introduction to App Layering App Layering Introduction Architecture and How it Works The OS Layer Creating an OS Layer The Platform Layer Creating a Platform Layer The App Layers Creating App Layers Creating Elastic App and User Layers Elastic App Layering User Layers Deploying a Layered Image using Citrix Virtual Apps and Desktops Using Templates in App Layering Using Layered Images in a Citrix Virtual Apps and Desktops Site Exploring Layer Priority Layer Priority Maintaining an App Layering Environment Updating Layers Maintaining and Updating the App Layering Environment Common App Layering Considerations and Additional Resources Introduction to Workspace Environment Management (WEM) Workspace Environment Management (WEM) Introduction WEM Administration Using WEM to Centralize Environment Management Managing User Resources with WEM Managing Profiles with WEM Managing Endpoints with the WEM Transformer Feature Using WEM for Performance Optimizing Machine Performance with WEM Optimizing User Experience with WEM Using WEM to Secure Environments WEM Security Features Migrating and Upgrading WEM Migrating to WEM Upgrading a WEM Deployment WEM Multi-Location Considerations Additional course details: Nexus Humans CWS-314 Citrix App Layering and WEM Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-314 Citrix App Layering and WEM Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Systems Administrators and Engineers Technical Solutions Architects Systems Integrators Channel Partners Value-Added Resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Understand the B-Series and C-Series product line similarities and differences Describe the Intersight support for C-Series standalone and UCS managed architectures Describe Cisco Intersight and how it can be used to manage UCS and Hyperflex Understand the process for upgrading B-Series and C-Series Firmware with UCSM and Intersight Administering service profiles, pools, and policies with UCSM and Intersight Understanding RBAC with Active Directory integration Administering backup and restores in UCS Manager Learn and discuss the various management tools for Cisco UCS including Intersight Perform basic troubleshooting of B-Series and C-Series in normal operations with UCSM and Intersight Describe how to get started with Intersight programmability DCUCAI, Administering Cisco Data Center Unified Computing System with Intersight is a 3-day instructor-led course. In this Cisco UCS server training course, you will become experienced with the administration and troubleshooting of Cisco Unified Computing System (UCS) B-Series and C-Series servers including using Cisco Intersight for UCS management. This custom-built Cisco UCS training class was developed by NterOne using the best lessons from all available Cisco server courses to maximize the learning experience for individuals who want to focus on day-to-day administration using Cisco UCS Manager or Intersight as the primary interface. Using real-world scenarios and examples, this Cisco training course will explore all the components of the UCS B-Series and C-Series solutions from a day-to-day administrative point of view. Learn C-Series standalone, C-Series under UCS Manager, B-Series administration, troubleshooting, and management tools used to support basic UCS and multi-cluster support with UCS Central, as well as using Cisco Intersight for UCS and Hyperflex operations and management. Module 1: UCS Infrastructure Components with Intersight Cisco UCS Product Line, Use Cases, and Components Introducing Cisco Intersight Describing Cisco UCS C-Series Servers Module 2: Administering Cisco UCS with Intersight Managing Virtual Resources Configuring Compute Node LAN Connectivity Configuring Compute Node SAN Connectivity Creating Identity and Resource Pools Creating Service Profiles Creating Service Profile Templates and Cloning Service Profiles Managing Service Profiles Troubleshooting Cisco UCS B-Series Configuration Troubleshooting Cisco UCS B-Series Operation Backing Up & Restoring the Cisco UCS Manager Database Managing and Upgrading Cisco UCS B-Series Firmware Module 3: Administering UCS Management Tools with Intersight Describing Cisco UCS User Interfaces Exploring Intersight User Interfaces Describing Cisco UCS Management Framework & Features Describing Cisco UCS Hyperflex Getting Started with Intersight Programmability Lab Outline: Labs are designed to assure learners a whole practical experience, through the following practical activities: Connecting to the Lab Environment Explore the Cisco UCS GUI and CLI Environment Explore the Cisco Intersight Dashboard and claim devices Create Users, Groups, Roles and Organizations in Intersight Provision Identity and Resource Pools in UCSM Provision Mobile Service Profiles from Updating Templates Backup and Restore Cisco UCS Manager Database Objects Configure Logging in Cisco Intersight Create LAN and SAN Network Policies in Intersight Build a Server Profile and deploy to a UCS blade from Intersight Using Intersight to upgrade Firmware Install an OS from Intersight Using Rest API to Query UCSM Objects in Intersight
Duration 5 Days 30 CPD hours This course is intended for Security administrators Security consultants Network administrators System engineers Technical support personnel Cisco integrators and partners Overview After taking this course, you should be able to: Describe key concepts of NGIPS and NGFW technology and the Cisco Firepower Threat Defense system, and identify deployment scenarios Perform initial Cisco Firepower Threat Defense device configuration and setup tasks Describe how to manage traffic and implement Quality of Service (QoS) using Cisco Firepower Threat Defense Describe how to implement NAT by using Cisco Firepower Threat Defense Perform an initial network discovery, using Cisco Firepower to identify hosts, applications, and services Describe the behavior, usage, and implementation procedure for access control policies Describe the concepts and procedures for implementing security intelligence features This course gives you knowledge and skills to use and configure Cisco© Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and Secure Sockets Layer (SSL) decryption before moving on to detailed analysis, system administration, and troubleshooting. Cisco Firepower Threat Defense Overview Examining Firewall and IPS Technology Firepower Threat Defense Features and Components Examining Firepower Platforms Examining Firepower Threat Defense Licensing Cisco Firepower Implementation Use Cases Cisco Firepower NGFW Device Configuration Firepower Threat Defense Device Registration FXOS and Firepower Device Manager Initial Device Setup Managing NGFW Devices Examining Firepower Management Center Policies Examining Objects Examining System Configuration and Health Monitoring Device Management Examining Firepower High Availability Configuring High Availability Cisco ASA to Firepower Migration Migrating from Cisco ASA to Firepower Threat Defense Cisco Firepower NGFW Traffic Control Firepower Threat Defense Packet Processing Implementing QoS Bypassing Traffic Cisco Firepower NGFW Address Translation NAT Basics Implementing NAT NAT Rule Examples Implementing NAT Cisco Firepower Discovery Examining Network Discovery Configuring Network Discovery Implementing Access Control Policies Examining Access Control Policies Examining Access Control Policy Rules and Default Action Implementing Further Inspection Examining Connection Events Access Control Policy Advanced Settings Access Control Policy Considerations Implementing an Access Control Policy Security Intelligence Examining Security Intelligence Examining Security Intelligence Objects Security Intelligence Deployment and Logging Implementing Security Intelligence File Control and Advanced Malware Protection Examining Malware and File Policy Examining Advanced Malware Protection Next-Generation Intrusion Prevention Systems Examining Intrusion Prevention and Snort Rules Examining Variables and Variable Sets Examining Intrusion Policies Site-to-Site VPN Examining IPsec Site-to-Site VPN Configuration Site-to-Site VPN Troubleshooting Implementing Site-to-Site VPN Remote-Access VPN Examining Remote-Access VPN Examining Public-Key Cryptography and Certificates Examining Certificate Enrollment Remote-Access VPN Configuration Implementing Remote-Access VPN SSL Decryption Examining SSL Decryption Configuring SSL Policies SSL Decryption Best Practices and Monitoring Detailed Analysis Techniques Examining Event Analysis Examining Event Types Examining Contextual Data Examining Analysis Tools Threat Analysis System Administration Managing Updates Examining User Account Management Features Configuring User Accounts System Administration Cisco Firepower Troubleshooting Examining Common Misconfigurations Examining Troubleshooting Commands Firepower Troubleshooting