Duration 3 Days 18 CPD hours This course is intended for This course is designed for: System installers System integrators System administrators Network administrators Solutions designers Overview After taking this course, you should be able to: Explain WAE basics, the purpose of WAE, and its capabilities Understand the Cisco WAE solution implementation Describe the network module configuration process Describe WAE Design software tools, demands creation, BGP modeling, and Failure and Simulation analysis Describe Cisco WAE Design traffic engineering and QoS modeling Explain how to use API with WAE Design and WAE Server Describe the function, components, and processes of Cisco WAE Live The Operating and Implementing Cisco WAN Automation Engine (SPWAE) v1.0 course teaches you, through a combination of lectures and labs, how to install the Cisco© WAN Automation Engine (WAE), builds your confidence with Cisco WAE configuration and basic troubleshooting, and enables you to practice designing and managing bandwidth and traffic engineering.Additionally, you?ll learn the basic knowledge necessary to plan, deploy, configure, and maintain the Cisco WAN Automation Engine solutions. Course Outline WAE Solution and Architecture Overview Implementing a Cisco WAE Solution Network Model Configuration WAE Design Fundamentals Cisco WAE Design Traffic Engineering and Optimization Introducing Cisco WAE API Cisco WAE Live Deployment Additional course details: Nexus Humans Cisco Operating and Implementing Cisco WAN Automation Engine v1.0 (SPWAE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Operating and Implementing Cisco WAN Automation Engine v1.0 (SPWAE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is primarily for Application Consultants, Business Analysts, Business Process Owners/Team Leaders/Power Users, and Developer Consultants. Overview At course completion students will know- The basic functions and navigation options of BusinessObjects Analysis for Microsoft Office- The special functions and layout design options of BusinessObjects Analysis for Microsoft Office In this course, students learn the basic functions and navigation options of the Analysis edition for Microsoft Office. Students will also learn the special functions and layout design options of Analysis. Components and Data Sources for Analysis Using Analysis Components and Data Sources Customization for Workbook Data Analysis Using the Basic Components of Analysis Sorting and Filtering Workbook Members Filtering Selected Workbook Members by Measure for Enhanced Analysis Using Hierarchies for Data Analysis in Workbooks Using Inserted Components to Add Workbook Functionality Configuring Filter Components Using Formulas to Enhance the Workbook Layout Defining Conditional Formatting Options for Workbooks Using a Prompting Dialog in Workbook Queries Extending Workbook Display Options with Functions and Microsoft Excel VBA Using Styles to Customize Workbook Appearance Setting Preferences to Control Workbook Behavior Publishing Analysis Documents to the BI Platform Server Presentation of Workbook Analysis Data Presenting Analysis Data for Business Users Additional course details: Nexus Humans BOAN10 SAP BusinessObjects Analysis for Microsoft Office training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BOAN10 SAP BusinessObjects Analysis for Microsoft Office course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers IS Systems Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Information Systems Security Auditor students will be able to establish industry acceptable Cyber Security & IS management standards with current best practices and be prepared to competently take the C)ISSA exam. The Certified Information Systems Security Auditor, C)ISSA , course covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. Many organizations require an Information System Auditor?s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. Through the use of a risk-based approach, the C)ISSA is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Course Outline The Process of Auditing Information Systems Risk-Based Auditing Audit Planning and Performance IS Systems Auditor reports IT Governance and Management Systems Acquisition, Development and Implementation Systems Development Models Types of Specialized Business Applications Application Controls Information Systems Operations, Maintenance, and Support System and Communications Hardware Additional course details: Nexus Humans C)ISSA Certified Information Systems Security Auditor Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSA Certified Information Systems Security Auditor Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Channel Partner/Reseller Customer Employee Overview Upon completing this course, the learner should be able to meet these overall objectives: Provide a comprehensive overview of Cisco Unified Intelligence Center. Demonstrate how to install, administer, and provide security for the Cisco Unified Intelligence Center solution. Describe reporting concepts and capabilities and features of Cisco Unified Intelligence Center reports. Provide a detailed description of how custom reports from normal data sources (Cisco Unified CCE and Cisco Unified CVP) and new data sources can be created to meet specific customer requirements. Deploying Cisco Unified Intelligence Center (DUIC) 1.0 is a three-day ILT course. Cisco Unified Intelligence Center 8.0.4 is a comprehensive, end-to-end reporting solution, designed to make the task of creating reports and managing disparate data sources easier on the customer and, at the same time, present a consistent user interface and a common tool to access the varied data across multiple Cisco product families. Course Outline Module 1: Cisco Unified Intelligence Center Overview. Module 2: Cisco Unified Intelligence Center Installation, Administration, and Security. Module 3: Cisco Unified Intelligence Center Reports. Module 4: Cisco Unified Intelligence Center Custom Reporting Additional course details: Nexus Humans Cisco Deploying Cisco Unified Intelligence Center v1.1 (DUIC) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Deploying Cisco Unified Intelligence Center v1.1 (DUIC) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is targeted towards developers looking to build a career as a Node.js developer. This course offers you a deep but gentle dive into Node.js. You will start off by discovering the basic building blocks of the modern JavaScript language, which are necessary for you to have a good grasp of Node.js, before delving into the fundamentals of Node.js.Most courses quickly dive into Node.js forgetting that, at the end of the day, Node.js is still JavaScript. This can be challenging for JavaScript newbies who are then trying to build a solid house on a shaky foundation.This course overcomes that obstacle by beginning with a quick introduction to the modern JavaScript language (ES6+). You will then discover Node's asynchronous programming model and examine Node's module system, including built-in modules and application modularization, as well as the NPM third-party module registry. We will finish off by working on a simple web application API using the Hapi.js and Knex.js frameworks. Introduction to Node.js The Basics of Node.js The Module System Asynchronous Programming with Node.js Building the API: Part 1 Building a Basic HTTP Server Setting up Hapi.js Understanding Requests Building the API: Part 2 Working with the DB Using Knex.js Authenticating Your API with JWT Testing Your API with Lab Additional course details: Nexus Humans Beginning API Development with Node.js training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Beginning API Development with Node.js course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for network engineers, network support personnel, reseller support personnel and anyone else needing a working knowledge of Network and Security Manager. Overview After successfully completing this course, you should be able to: Explain Network and Security Manager concepts and terminology. Set up and administer Network and Security Manager servers. Configure domains and administrators. Add devices using modeling and importing. Work with objects and templates. Configure policies. Perform routine device management tasks Work with logs and reports Configure VPNs with the VPN Manager tool This course discusses the basic operations of Network and Security Manager. Key topics include server and domain administration, device configuration, template creation and management, policy creation and management, logging, and report generation. Through demonstrations and hands-on labs, students gain experience in configuring, testing, and troubleshooting features of Network and Security Manager. Labs will be done on a ScreenOS platform Chapter 1: Course IntroductionChapter 2: Network and Security Manager Concepts Chapter 3: Server Administration Chapter 4: Domains and Administrators Chapter 5: Adding Devices Chapter 6: Abstraction Objects and TemplatesChapter 7: Abstraction Policies Chapter 8: Managing Devices Chapter 9: Logging, Reporting and Monitoring Chapter 10: Central ManagerChapter 11: Virtual Private Networks Additional course details: Nexus Humans Network and Security Manager Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Network and Security Manager Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Penetration Testers Microsoft Administrators Security Administrators Active Directory Administrators Anyone looking to learn more about security Overview Upon completion, Certified IS Security Manager students will have a strong foundation in Cyber Security & IS management standards with current best practices and will be prepared to competently take the C)ISSM exam. Companies will lean on a Certified IS Security Manager, C)ISSM to create solutions for tomorrow?s problems, today. When it comes to identifying critical issues and providing effective IS management solutions.ÿ ÿThe knowledge and course content provided in the Certified Information Systems Security Manager ? C)ISSM will not only cover ISACA©?s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance. Course Outline Introduction Information Security Governance Information Risk Management and Compliance Information Security Program Development and Management Information Security Incident Management Additional course details: Nexus Humans C)ISSM - Certified Information Systems Security Manager Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSM - Certified Information Systems Security Manager Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for IT professionals interested in understanding the capabilities of the MDS 9000 Series using Cisco DCNM. IT professionals seeking a deeper knowledge of SAN operations using both CLI and DCNM may take the alternative 4-day course, Configuring Cisco MDS 9000 Series Switches (DCMDS). Much of the hands-on work in DCNMS is also covered in DCMDS. This course is also designed for professionals in the following roles including: Consulting systems engineer Data center engineers Data center operators Data center network management engineers Storage network administrator Network administrator Network engineer Sales engineer Technical solutions architect Overview After taking this course, you should be able to: Describe Cisco DCNM SAN components, licensing, high availability, and security features Describe Cisco DCNM SAN reports, alerts, event forwarding, and troubleshooting tools, including Cisco DCNM SAN Insights and SAN Analytics features The Managing SAN Infrastructure with Cisco© Data Center Network Manager (DCNMS) v1.0 course provides product training that that teaches you to deploy, operate, and maintain the Cisco Data Center Network Manager (DCNM) SAN solutions. You will learn to configure, monitor, and troubleshoot Cisco storage networking infrastructure using Cisco DCNM. Cisco DCNM provides management, automation, visualization, and troubleshooting across Cisco Nexus© and Cisco Multilayer Distributed Switching (MDS) solutions.You will learn how the DCNM serves as a Storage Area Network (SAN) solution for managing and troubleshooting Cisco storage architecture. Implementing Cisco DCNM SAN Cisco DCNM Solution Overview Implement Cisco DCNM SAN Integrate Cisco DCNM SAN with VMware vCenter Cisco DCNM SAN Licensing Monitoring and Troubleshooting SAN Infrastructure Using Cisco DCNM SAN Cisco DCNM SAN Alerts and Reports Dashboards in Cisco DCNM SAN SAN Troubleshooting with the Cisco DCNM SAN Analytics and Telemetry Streaming Additional course details: Nexus Humans Cisco Managing SAN Infrastructure with Cisco Data Center Network Manager v1.0 (DCNMS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Managing SAN Infrastructure with Cisco Data Center Network Manager v1.0 (DCNMS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to deploy and manage Endpoint Security within their security environment. Overview Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices. Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management. Identify and describe key elements of the SmartEndpoint Management console. Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console. Explain how to create and assign security policies for Endpoint clients using Endpoint Security. Understand deployment methods and server considerations for Endpoint Security Management installation. Identify the different ways to install and configure Endpoint clients. Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources. Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server. Describe additional server configurations that are available to help manage Endpoint clients. Recognize the different types of data security protections available to deploy on end user machines. Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers. Understand how to secure removable media devices. Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues. Recognize the types of threats that target Endpoint computers. Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment. Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources. Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events. Understand how to troubleshoot and debug issues. The goal of this course is to provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment. Course Topics Introduction to Endpoint Security Endpoint Security Management Deploying Endpoint Security Additional Endpoint Server Configurations Data Security Protection Advanced Threat Prevention Reporting and Troubleshooting LAB EXERCISES Installing the Endpoint Security Management Solution Deploying Endpoint Client Packages Deploying Endpoint Policy Servers Configuring High Availability for Endpoint Security Modifying Client Installations Working with Deployment Rules Working with SandBlast Agent Additional course details: Nexus Humans CCES Check Point Certified Endpoint Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCES Check Point Certified Endpoint Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: System engineers Technical support personnel Channel partners and resellers Overview Upon completion of this course, the learner should be able to meet the following objectives: Installing a Cisco Meeting Server in a single combined deployment Installing a Cisco Meeting Server in a single split deployment Troubleshooting tools Integrating Cisco Meeting Server with Cisco TelePresence Video Communication Server (VCS), Cisco Unified Communications Manager and Microsoft Skype for Business In this course, you will learn how to install, troubleshoot, and maintain a single server and single server split deployment of Cisco Meeting Servers This course is designed to establish a minimum level of knowledge and competency among Cisco Meeting Server resale and installation partners. The recently purchased Acano collaboration hardware and software includes video and audio-bridging technology that allows customers to connect video systems from multiple vendors across both cloud and hybrid environments. Cisco has incorporated Acano collaboration technologies into the new Meeting Server tool. Module 1: Cisco Meeting Server Single Server Solution Cisco Meeting Server Solution Reviewing Authentication and Encryption Single Server Solution Preparing for Cisco Meeting Server Installation Installing Cisco Meeting Servers Configuring the Web Admin Configuring the Call Bridge Configuring the Web Bridge Module 2: Troubleshooting Tools Seven call detail record (CDR) record types and the information contained in each Capture server configuration files (.json), crash log files, media and application .dmp files. Cisco Meeting App crash files, and Cisco Meeting App diagnostic logs Employ the built-in commands to identify Cisco Meeting Server solution issues including PKI, DNS Lookup, Ping, and Service Status Common issues for end users using the Cisco Meeting Server solution Module 3: Firewall Traversal and Unified Communications Application Integration Deploying a TURN Server Deploying Firewall and NAT Traversal Integrating with UC Platforms Additional course details: Nexus Humans Cisco Meeting Server Intermediate (COLLAB250) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Meeting Server Intermediate (COLLAB250) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.