• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5349 Courses delivered Live Online

CCES Check Point Certified Endpoint Specialist

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to deploy and manage Endpoint Security within their security environment. Overview Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices. Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management. Identify and describe key elements of the SmartEndpoint Management console. Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console. Explain how to create and assign security policies for Endpoint clients using Endpoint Security. Understand deployment methods and server considerations for Endpoint Security Management installation. Identify the different ways to install and configure Endpoint clients. Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources. Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server. Describe additional server configurations that are available to help manage Endpoint clients. Recognize the different types of data security protections available to deploy on end user machines. Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers. Understand how to secure removable media devices. Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues. Recognize the types of threats that target Endpoint computers. Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment. Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources. Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events. Understand how to troubleshoot and debug issues. The goal of this course is to provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment. Course Topics Introduction to Endpoint Security Endpoint Security Management Deploying Endpoint Security Additional Endpoint Server Configurations Data Security Protection Advanced Threat Prevention Reporting and Troubleshooting LAB EXERCISES Installing the Endpoint Security Management Solution Deploying Endpoint Client Packages Deploying Endpoint Policy Servers Configuring High Availability for Endpoint Security Modifying Client Installations Working with Deployment Rules Working with SandBlast Agent Additional course details: Nexus Humans CCES Check Point Certified Endpoint Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCES Check Point Certified Endpoint Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCES Check Point Certified Endpoint Specialist
Delivered OnlineFlexible Dates
Price on Enquiry

Google WorkSpace

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for business users, educators, students, and knowledge workers in a variety of roles and fields who want to be able to use the apps included in Google Workspace to create and manage various types of files and communicate and collaborate with colleagues. Overview In this course, you will use the various apps included in Google Workspace to work productively as part of a team. You will: Navigate the Google Workspace environment and use Gmail to send and manage email correspondence. Manage schedules using Google Calendar™. Communicate with colleagues over text, voice, and video using Google Chat and Google Meet. Store and share files using Google Drive. Collaborate on documents using Google Docs, Google Slides™, and Google Keep™. Collaborate on data using Google Sheets and Google Forms™. Collaborate on websites using Google Sites™. The core productivity apps that make up the Google Workspace? suite enable users to work together on a variety of projects and tasks across many different industries and job roles. This course will teach you how to work efficiently and effectively in apps like Gmail?, Google Drive?, Google Docs?, Google Sheets?, Google Meet?, Google Chat?, and more?all while participating in a collaborative team environment. Lesson 1: Getting Started with Google Workspace Topic A: Navigate Google Workspace Topic B: Send and Manage Email Using Gmail Lesson 2: Managing Schedules Using Google Calendar Topic A: Create and Manage Events Topic B: Customize Calendars Topic C: Create and Share Calendars Topic D: Create and Manage Tasks Lesson 3: Communicating Using Google Chat and Google Meet Topic A: Chat Using Google Chat Topic B: Participate in Meetings Using Google Meet Lesson 4: Storing and Sharing Files Using Google Drive Topic A: Add Files and Folders Topic B: Manage Files and Folders Lesson 5: Collaborating on Documents Using Docs, Slides, and Keep Topic A: Create and Edit Documents Using Google Docs Topic B: Design Presentations Using Google Slides Topic C: Take Notes Using Google Keep Lesson 6: Collaborating on Data Using Sheets and Forms Topic A: Create and Manage Spreadsheets Using Google Sheets Topic B: Design Surveys Using Google Forms Lesson 7: Collaborating on Websites Using Sites Topic A: Create and Edit Sites Topic B: Share and Publish Sites Additional course details: Nexus Humans Google WorkSpace training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Google WorkSpace course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Google WorkSpace
Delivered OnlineFlexible Dates
Price on Enquiry

Mac OS Support Essentials 10.15 (Catalina)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for individuals who want to learn how to update, upgrade, and reinstall macOS Catalina, then set up and configure the new macOS. Overview Upon successful completion of this course, students in this course will learn how to update, upgrade, and reinstall macOS Catalina, then set up and configure the new macOS. They will also be introduced to the command-line interface and macOS Recovery. Other course topics include: managing user accounts, system resources, Time Machine, user home folders managing file systems, storage, encryption, permissions, using hidden items, shortcuts, file archiving file sharing, metadata, Spotlight, network services, host sharing, and creating a personal firewall and much more. The students will also learn all about macOS security and password changes. In this course, students will be introduced to the command-line interface and mac OS Recovery. They will also manage user accounts and system resources. Installation and Configuration Update, Upgrade, or Reinstall macOS Set Up and Configure macOS Use the Command-Line Interface Use macOS Recovery Update macOS User Accounts Manage User Accounts Manage User Home Folders Manage Security and Privacy Manage Password Changes File Systems Manage File Systems and Storage Manage File Vault Manage Permissions and Sharing Use Hidden Items, Shortcuts, and File Archives Data Management Manage System Resources Use Metadata, Spotlight, and Siri Manage Time Machine Apps and Processes Install Apps Manage Files Manage and Troubleshoot Apps Network Configuration Manage Basic Network Settings Manage Advanced Network Settings Troubleshoot Network Issues Network Services Manage Network Services Manage Host Sharing and Personal Firewall System Management Troubleshoot Peripherals Manage Printers and Scanners Troubleshoot Startup and System Issues

Mac OS Support Essentials 10.15 (Catalina)
Delivered OnlineFlexible Dates
Price on Enquiry

BOHS (international) IP403 - Asbestos Fibre Counting (PCM)

By Airborne Environmental Consultants Ltd

The main subject areas of the course are: Setting up of microscopes. Filter preparation, fibre counting and outline of air sampling equipment. Calculation of results, quality control, reporting and communication.

BOHS (international) IP403 - Asbestos Fibre Counting (PCM)
Delivered in Manchester + 1 more or OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks : Panorama: Managing Firewalls at Scale EDU-220 (11.0)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security Administrators, Security Operations Specialists, Security Analysts, Security Engineers, and Security Architects Overview The Palo Alto Networks Panorama 11.0: Managing Firewalls at Scale (EDU-220) course is two days of instructor-led training that should help you: Learn how to configure and manage the next-generation Panorama management server Gain experience configuring templates (including template variables) and device groups Gain experience with administration, log collection, and logging and reporting Become familiar with planning and design considerations for Panorama deployment This course should help students to gain in-depth knowledge about how to configure and manage their Palo Alto Networks Panorama management server. Administrators that complete this course should become familiar with the Panorama management server?s role in managing and securing their overall network. Network professionals will be shown how to use Panorama aggregated reporting to provide them with a holistic view of a network of Palo Alto Networks next-generation firewalls.Learn how to configure and manage the next-generation Panorama? management server. Course Outline Module 1 - Initial Configuration Module 2 - Adding Firewalls Module 3 - Templates Module 4 - Device Groups Module 5 - Log Collection and Forwarding Module 6 - Using Panorama Logs Module 7 - Panorama Administrative Accounts Module 8 - Reporting Module 9 - Troubleshooting

Palo Alto Networks : Panorama: Managing Firewalls at Scale EDU-220 (11.0)
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec ProxySG 6.6 Diagnostics and Troubleshooting

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The ProxySG 6.6 Diagnostics and Troubleshooting course is intended for students who wish to gain familiarity with ProxySG troubleshooting techniques and tools. Overview By the completion of this course, you will be able to:Describe the troubleshooting methodology as recommended by Symantec.Diagnose and solve a variety of access and performance issues using tools such as sysinfo files, packet captures, and policy traces. The ProxySG 6.6 Diagnostics and Troubleshooting course provides a structured approach to diagnosing and solving common troubleshooting issues related to ProxySG deployments. The course will emphasize hands-on experience, with extensive opportunities to build competency in the use of the powerful diagnostic tools available on the ProxySG. ProxySG Secure Web Gateway? Overview of Typical Troubleshooting Issues Overview of common issues related to internal resources, external dependencies, SSL interception, and policy efficiency. Introduction to how to use sysinfo files to gain useful troubleshooting information. Troubleshooting Issues Related to External Dependencies Methods for diagnosing and solving authentication issues. Methods for diagnosing and solving DNS issues. Troubleshooting SSL Interception Issues Methods for diagnosing and solving issues related to SSL interception. Troubleshooting Performance Issues Related to Policy Efficiency Methods for optimizing performance through tips for creating more efficient policies.

Symantec ProxySG 6.6 Diagnostics and Troubleshooting
Delivered OnlineFlexible Dates
Price on Enquiry

DP-070T00 Migrate Open Source Data Workloads to Azure

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The primary audience for this course is database developers who plan to migrate their MySQL or Postgres DB workloads to Azure SQL DB. The secondary audience for this course is MySQL/Postgres administrators to raise awareness of the features and benefits of Azure SQL DB. Overview At the end of this course, the students will have learned: Migrate on-premises MySQL to Azure SQL DB for MySQL Migrate on-premises PostgreSQL to Azure SQL DB for PostgreSQL This course will enable the students to understand Azure SQL Database, and educate the students on what is required to migrate MySQL and PostgreSQL workloads to Azure SQL Database. Migrate to Azure SQL DB for MySQL & PostgreSQL OSS databases overview Common OSS database workloads Customer challenges in migration Migrate on-premises MySQL to Azure SQL DB for MySQL Configure and Manage Azure SQL DB for MySQL Migrate on-premises MySQL to SQL DB for MySQL Application Migration Post-migration considerations Migrate on-premises PostgreSQL to Azure SQL DB for PostgreSQL Configure and Manage Azure SQL DB for PostgreSQL Migrate on-premises MySQL to SQL DB for PostgreSQL Application Migration Post-migration considerations

DP-070T00 Migrate Open Source Data Workloads to Azure
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks: Prisma SD-WAN 5.6: Design and Operation (EDU-238)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Engineers, Network Administrators, Network Security Engineers, and NOC Administrators Overview Successful completion of this five-day, instructor-led course will help enhance your understanding of how to design, implement, and effectively operate a Prisma SDWAN solution. You will get hands-on experience configuring Prisma SD-WAN with a branch and datacenter, configure policies, and use Prisma SD-WAN services. The Prisma SD-WAN Design and Operation (EDU-238) course describes the next generation Prisma SD-WAN solution, the capability and value it provides over legacy WAN and SD-WAN implementations, and how to configure, operate, and troubleshoot the solution.This course is intended for people who must configure, maintain, and use wide area networks, from data centers, to branches, to the cloud. This class is powered by Cloud Harmonics. Course Outline Module 1 - Solution Overview Module 2 - Branch Design Module 3 - Routing Module 4 - Policy Module #1 - Application Path and QoS Policy Module 5 - Policy Module #2 - NAT, ZBFW and Security Module 6 - Event Policy Management Services Module 7 - DNS and DHCP Services Module 8 - Operations and Troubleshooting Module 9 - CloudBlades Module 10 - Integrating Prisma SD-WAN and Prisma Access for SASE Implementation Module 11 - DevOps Module 12 - Next Steps

Palo Alto Networks: Prisma SD-WAN 5.6: Design and Operation (EDU-238)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Networks with Cisco Firepower Next-Generation IPS v4.0 (SSFIPS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy and manage a Cisco Firepower NGIPS in their network environment. Security administrators Security consultants Network administrators System engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe the components of Cisco Firepower Threat Defense and the managed device registration process Detail Next-Generation Firewalls (NGFW) traffic control and configure the Cisco Firepower system for network discovery Implement access control policies and describe access control policy advanced features Configure security intelligences features and the Advanced Malware Protection (AMP) for Networks implementation procedure for file control and advanced malware protection Implement and manage intrusion and network analysis policies for NGIPS inspection Describe and demonstrate the detailed analysis techniques and reporting features provided by the Cisco Firepower Management Center Integrate the Cisco Firepower Management Center with an external logging destination Describe and demonstrate the external alerting options available to Cisco Firepower Management Center and configure a correlation policy Describe key Cisco Firepower Management Center software update and user account management features Identify commonly misconfigured settings within the Cisco Firepower Management Center and use basic commands to troubleshoot a Cisco Firepower Threat Defense device This course shows you how to deploy and use Cisco Firepower© Next-Generation Intrusion Prevention System (NGIPS). This hands-on course gives you the knowledge and skills to use the platform features and includes firewall security concepts, platform architecture and key features; in-depth event analysis including detection of network-based malware and file type, NGIPS tuning and configuration including application control, security intelligence, firewall, and network-based malware and file controls; Snort© rules language; file and malware inspection, security intelligence, and network analysis policy configuration designed to detect traffic patterns; configuration and deployment of correlation policies to take action based on events detected; troubleshooting; system and user administration tasks, and more. This course helps you prepare to take the exam, Securing Networks with Cisco Firepower (300-710 SNCF), which leads to CCNP Security and Cisco Certified Specialist ? Network Security Firepower certifications. The 300-710 SNCF exam has a second preparation course as well, Cisco© Securing Networks with Cisco© Firepower Next Generation Firewall (SSNGFW). You can take these courses in any order. Course Outline Cisco Firepower Threat Defense Overview Cisco Firepower NGFW Device Configuration Cisco Firepower NGFW Traffic Control Cisco Firepower Discovery Implementing Access Control Policies Security Intelligence File Control and Advanced Malware Protection Next-Generation Intrusion Prevention Systems Network Analysis Policies Detailed Analysis Techniques Cisco Firepower Platform Integration Alerting and Correlation Policies Performing System Administration Troubleshooting Cisco Firepower

Cisco Securing Networks with Cisco Firepower Next-Generation IPS v4.0 (SSFIPS)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vRealize Suite Lifecycle Manager: Install, Configure, Manage [v8.0]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for System administrators System engineers Overview By the end of the course, you should be able to meet the following objectives: List the use cases for vRealize Suite Lifecycle Manager Describe the architecture of vRealize Suite Lifecycle Manager Deploy and configure vRealize Suite Lifecycle Manager Create, manage, and scale vRealize Suite Lifecycle Manager environments Add VMware vRealize Suite products to vRealize Suite Lifecycle Manager Manage vRealize Suite products with vRealize Suite Lifecycle Manager Use vRealize Suite Lifecycle Manager to perform content lifecycle management Troubleshoot day-to-day operations of vRealize Suite Lifecycle Manager This two-day course features hands-on training that focuses on installing, configuring, and managing VMware vRealize© Suite Lifecycle Manager?, which includes products such as VMware vRealize© Operations?, VMware vRealize© Log Insight?, and VMware vRealize© Automation?. This course prepares you to administer a vRealize infrastructure for an organization. Course Introduction Introductions and course logistics Course objectives Introduction to Lifecycle Manager Describe the use cases for Lifecycle Manager List the features of Lifecycle Manager List system requirements for Lifecycle Manager Use vRealize Easy Installer to deploy Lifecycle Manager Verify that a Lifecycle Manager deployment is successful Lifecycle Manager Configuration Create SSL certificates for vRealize Suite product instances Import custom SSL certificates Add Lifecycle Manager infrastructure elements Create a Lifecycle Manager private cloud environment Add vRealize Suite product Installation media Adding vRealize Suite Applications Deploy a new vRealize Suite product Manage a vRealize Suite product using Lifecycle Manager Add an existing vRealize Suite product to an environment Day 2 Operations Perform On-going Management Tasks Monitor environment health Ensure product configuration compliance Scale-out VMware Identity Manager? Replace an existing certificate with a new one Manage SDDC content Perform source control Describe content pipelines Describe check-in and multi check-in feature Use content from Marketplace Lifecycle Manager Migration List the migration options available for Lifecycle Manager Migrate Lifecycle Manager using vRealize Easy Installer Troubleshooting Lifecycle Manager Access log files in Lifecycle Manager Configure the vRealize Log Insight Agent Use tools and log data to troubleshoot common problems

VMware vRealize Suite Lifecycle Manager: Install, Configure, Manage [v8.0]
Delivered OnlineFlexible Dates
Price on Enquiry