• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

569 Courses delivered Live Online

Palo Alto Networks : Cortex XDR 3.2: Investigation and Response (EDU-262)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Cybersecurity analysts and engineers and security operations specialists, as well as administrators and product deployers. Overview Successful completion of this instructor-led course with hands-on lab activities should enable you to: Describe the architecture and components of the Cortex XDR family Use the Cortex XDR management console Create Cortex XDR agent installation packages, endpoint groups, and policies Deploy Cortex XDR agents on endpoints Create and manage exploit and malware prevention profiles Investigate alerts and prioritize them using starring and exclusion policies Tune Security profiles using Cortex XDR exceptions Perform and track response actions in the Action Center Perform basic troubleshooting related to Cortex XDR agents Deploy a Broker VM and activate the Local Agents Settings applet Understand Cortex XDR deployment concepts and activation requirements Work with the Customer Support Portal and Cortex XDR Gateway for authentication and authorization This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create Security profiles and policies. The training enables you to perform and track response actions, tune profiles, and work with Cortex XDR alerts. The training concludes with discussions about basic troubleshooting of the agent, the on-premises Broker VM component, and Cortex XDR deployment. Course Outline This class is comprised of the following modules: Module 1 - Cortex XDR Family Overview Module 2 - Cortex XDR Main Components Module 3 - Cortex XDR Mangement Components Module 4 - Profiles and Policy Rules Module 5 - Malware Protection Module 6 - Exploit Protection Module 7 - Cortex XDR Alerts Module 8 - Tuning Policies using Exceptions Module 9 - - Response Actions Module 10 - Basic Agent Troubleshooting Module 11 - Broker VM Overview Module 12 - Deployment Consideration

Palo Alto Networks : Cortex XDR 3.2: Investigation and Response (EDU-262)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Enterprise Learning Subscription (2-Year Term)

By Nexus Human

Duration 730 Days 4380 CPD hours The VMware Enterprise Learning Subscription delivers convenient and flexible training that lets your team train at their own pace ? when and where they want.This all-inclusive offering gives each licensed user 365 days of access to all content available through the Learning Zone, including all VMware On Demand courses. Subscribers also get a free VMware certification exam voucher. The mInimum ELS Subscription order is for 5 users. Content includes: 50+ Full On Demand courses with labs, equivalent to instructor led VMware course content 1,200+ videos 80+ eLearning short courses 500+ exam prep videos Certification exam voucher for each licensed subscriber Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Enterprise Learning Subscription (2-Year Term) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Enterprise Learning Subscription (2-Year Term) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Enterprise Learning Subscription (2-Year Term)
Delivered OnlineFlexible Dates
Price on Enquiry

B6255 IBM Cognos Analytics - Enterprise Administration (V11.1.x)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Administrators Overview Please refer to course overview This offering covers the fundamental concepts of installing and configuring IBM Cognos Analytics, and administering servers and content, in a distributed environment. In the course, participants will identify requirements for the installation and configuration of a distributed IBM Cognos Analytics software environment, implement security in the environment, and manage the server components. Students will also monitor and schedule tasks, create data sources, and manage and deploy content in the portal and IBM Cognos Administration. Introduction to IBM Cognos Analytics administration IBM Cognos Analytics components Administration workflow IBM Cognos Administration IBM Cognos Configuration Identify IBM Cognos Analytics architecture Features of the IBM Cognos Analytics architecture Examine the multi-tiered architecture, and identify logging types and files Examine IBM Cognos Analytics servlets Performance and installation planning Balance the request load Configure IBM Cognos Analytics Secure the IBM Cognos Analytics environment Identify the IBM Cognos Analytics security model Define authentication in IBM Cognos Analytics Define authorization in IBM Cognos Analytics Identify security policies Secure the IBM Cognos Analytics environment Administer the IBM Cognos Analytics server environment Administer IBM Cognos Analytics servers Monitor system performance Manage dispatchers and services Tune system performance, and troubleshoot the server Audit logging Dynamic cube data source administration workflow Manage run activities View current, past, and upcoming activities Manage schedules Manage content in IBM Cognos Administration Data sources and packages Manage visualizations in the library Deployment Other content management tasks Examine departmental administration capabilities Create and manage team members Manage activities Create and manage content and data Manage system settings Manage Themes, Extensions, and Views Share services with multiple tenants

B6255 IBM Cognos Analytics - Enterprise Administration (V11.1.x)
Delivered OnlineFlexible Dates
Price on Enquiry

B6155 IBM Cognos Analytics - Enterprise Administration (v11.0.x)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Administrators Overview Please refer to course overview This offering covers the fundamental concepts of installing and configuring IBM Cognos Analytics, and administering servers and content, in a distributed environment. In the course, participants will identify requirements for the installation and configuration of a distributed IBM Cognos Analytics software environment, implement security in the environment, and manage the server components. Students will also monitor and schedule tasks, create data sources, and manage and deploy content in the portal and IBM Cognos Administration. Introduction to IBM Cognos Analytics administration IBM Cognos Analytics components Administration workflow IBM Cognos Administration IBM Cognos Configuration Identify IBM Cognos Analytics architecture Features of the IBM Cognos Analytics architecture Examine the multi-tiered architecture, and identify logging types and files Examine IBM Cognos Analytics servlets Performance and installation planning Balance the request load Configure IBM Cognos Analytics Secure the IBM Cognos Analytics environment Identify the IBM Cognos Analytics security model Define authentication in IBM Cognos Analytics Define authorization in IBM Cognos Analytics Identify security policies Secure the IBM Cognos Analytics environment Administer the IBM Cognos Analytics server environment Administer IBM Cognos Analytics servers Monitor system performance Manage dispatchers and services Tune system performance, and troubleshoot the server Audit logging Dynamic cube data source administration workflow Manage run activities View current, past, and upcoming activities Manage schedules Manage content in IBM Cognos Administration Data sources and packages Manage visualizations in the library Deployment Other content management tasks Examine departmental administration capabilities Create and manage team members Manage activities Create and manage content and data Manage system settings Manage Themes, Extensions, and Views Share services with multiple tenants

B6155 IBM Cognos Analytics - Enterprise Administration (v11.0.x)
Delivered OnlineFlexible Dates
Price on Enquiry

CNS-223: Implement Citrix ADC 13.x

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Built for experienced IT Professionals who want to be familiar with Citrix ADC. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC. Overview Understand the functionality and capabilities of the Citrix ADC Complete the initial setup and configuration of the Citrix ADC appliance Understand Citrix ADC Load Balancing and High Availability configuration options and management Employ recommended tools and techniques to troubleshoot common ADC network and connectivity issues Learn the skills required to implement Citrix ADC Essential components includingsecure Load Balancing, High Availability, and Citrix ADC Management. At the endof the course, students will be able to configure their Citrix ADC environments toaddress traffic delivery and management requirements including Load Balancing,Availability, and ADC Operation Management. Getting Started Introduction to Citrix ADC Feature and Platform Overview Deployment Options Architectural Overview Setup and Management Basic Networking Networking Topology Citrix ADC Components Routing Access Control Lists ADC Platforms Citrix ADC MPX Citrix ADC VPX Citrix ADC CPX Citrix ADC SDX Citrix ADC BLX High Availability Citrix ADC High Availability High Availability Configuration Managing High Availability In Service Software Upgrade Troubleshooting High Availability Load balancing Load Balancing Overview Load Balancing Methods and Monitors Load Balancing Traffic Types Load Balancing Protection Priority Load Balancing Load Balancing Troubleshooting SSL Offloading SSL Overview SSL Configuration SSL Offload Troubleshooting SSL Offload SSL Vulnerabilities and Protections Security Authentication, Authorization, and Auditing Configuring External Authentication Admin Partitions Security Citrix ADC Logging Monitoring with SNMP Reporting and Diagnostics AppFlow Functions Citrix Application Delivery Management Troubleshooting

CNS-223: Implement Citrix ADC 13.x
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Secure Solutions with Virtual Private Networks v1.0 (SVPN)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for professionals in the following job roles: Network security engineer CCNP Security candidate Channel Partner Overview After taking this course, you should be able to: Introduce site-to-site VPN options available on Cisco router and firewalls Introduce remote access VPN options available on Cisco router and firewalls Review site-to-site and remote access VPN design options Review troubleshooting processes for various VPN options available on Cisco router and firewalls The Implementing Secure Solutions with Virtual Private Networks (SVPN) v1.0 course teaches you how to implement, configure, monitor, and support enterprise Virtual Private Network (VPN) solutions. Through a combination of lessons and hands-on experiences you will acquire the knowledge and skills to deploy and troubleshoot traditional Internet Protocol Security (IPsec), Dynamic Multipoint Virtual Private Network (DMVPN), FlexVPN, and remote access VPN to create secure and encrypted data, remote accessibility, and increased privacy. Course Outline Introducing VPN Technology Fundamentals Implementing Site-to-Site VPN Solutions Implementing Cisco Internetwork Operating System (Cisco IOS©) Site-to-Site FlexVPN Solutions Implement Cisco IOS Group Encrypted Transport (GET) VPN Solutions Implementing Cisco AnyConnect VPNs Implementing Clientless VPNs Lab Outline Explore IPsec Technologies Implement and Verify Cisco IOS Point-to-Point VPN Implement and Verify Cisco Adaptive Security Appliance (ASA) Point-to-Point VPN Implement and Verify Cisco IOS Virtual Tunnel Interface (VTI) VPN Implement and Verify Dynamic Multipoint VPN (DMVPN) Troubleshoot DMVPN Implement and Verify FlexVPN with Smart Defaults Implement and Verify Point-to-Point FlexVPN Implement and Verify Hub and Spoke FlexVPN Implement and Verify Spoke-to-Spoke FlexVPN Troubleshoot Cisco IOS FlexVPN Implement and Verify AnyConnect Transport Layer Security (TLS) VPN on ASA Implement and Verify Advanced Authentication, Authorization, and Accounting (AAA) on Cisco AnyConnect VPN Implement and Verify Clientless VPN on ASA

Cisco Implementing Secure Solutions with Virtual Private Networks v1.0 (SVPN)
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle Database Security - Preventive Controls

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for Administrator, Database Administrator, Network Administrator, Systems Administrator. Overview Upon successful completion of this course, students will be able to Configure and use Transparent Data Encryption, Understand and use Oracle Key Vault, Understand Oracle Data Redaction, Understand and use Oracle Data Masking and Subsetting, Understand security risks and identify appropriate Oracle solutions, Configure general authentication and authorization, Understand and implement Global Users, Set up and maintain a simple wallet, Install and use Oracle Database Vault, and Configure and use Transparent Sensitive Data Protection. In the Oracle Database Security: Preventive Controls course, students learn how they can use Oracle Database Security products and technologies to meet the security, privacy and compliance requirements of their organization. In the Oracle Database Security: Preventive Controls course, students learn how they can use Oracle Database Security products and technologies to meet the security, privacy and compliance requirements of their organization. Additional course details: Nexus Humans Oracle Database Security - Preventive Controls training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database Security - Preventive Controls course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle Database Security - Preventive Controls
Delivered OnlineFlexible Dates
Price on Enquiry

SM100 SAP Solution Manager Configuration for Operations

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators, system architects, and technology consultants In this course, students learn how to manage the SAP Solutions Manager Configuration suite and discover how it can be integrated into their day-to-day operations. Course Outline SAP Solution Manager Overview: available Scenarios, Enhancements, Work Center Technical Overview: Installation, Architecture, Sizing SAP Solution Manager Configuration: SOLMAN_SETUP, SMSY, LMDB, Landscape Verification (LV), System Landscape Directory (SLD), Solution Manager Diagnostics Managing Authorizations in SAP Solution Manager Maintenance Optimizer, Maintenance Certificates, System Recommendations, Issue and Task Management Early Watch Alert Reporting: ABAP & Java, EarlyWatch Alert for Solutions Managing Solutions: Work Mode Management and additional administrative Tasks Monitoring and Alerting Infrastructure (MAI), Solution Monitoring and System Monitoring Service Level Reporting, Technical Reporting, Management Reporting SAP Mobile Apps for SAP Solution Manager Job Management: Job Request Management, Job Documentation, Job Monitoring, Job Scheduling Management Health Checks and more Additional course details: Nexus Humans SM100 SAP Solution Manager Configuration for Operations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SM100 SAP Solution Manager Configuration for Operations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SM100 SAP Solution Manager Configuration for Operations
Delivered OnlineFlexible Dates
Price on Enquiry

CV832 IBM DB2 11 for z/OS Database Administration Workshop Part 1

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This intermediate course is for future DB2 for z/OS database administrators who need to acquire the basic skills required to administer a DB2 database. Overview Implement a DB2 database designUse database utilities to load and reorganize dataDefine and implement a DB2 database recovery strategyControl access to database using DB2 authorization facilities This course provides students with instruction on how to physically implement a logical database design in DB2. The course includes instruction on DB2 data management, DB2 catalog tables, the bind process, database utilities, & security considerations. Course Outline Setting up a DB2 database Referential integrity Getting data into and out of DB2 Keeping your DB2 data in good shape Application data recovery basics Program preparation and Bind Security Serialization Additional course details: Nexus Humans CV832 IBM DB2 11 for z/OS Database Administration Workshop Part 1 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CV832 IBM DB2 11 for z/OS Database Administration Workshop Part 1 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CV832 IBM DB2 11 for z/OS Database Administration Workshop Part 1
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus Certified Internet of Things Security Practitioner (CIoTSP) v1.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy. This course is also designed for students who are seeking the CertNexus Certified Internet of Things Security Practitioner (CIoTSP) certification and who want to prepare for Exam ITS-110. Overview This program will validate that the candidate has the knowledge, skills, and abilities to secure network environments for IoT devices, analyze vulnerabilities and determine reasonable controls against threats, and effectively monitor IoT devices and respond to incidents. This course is designed for practitioners who are seeking to demonstrate a vendor-neutral, cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem. Managing IoT Risks Map the IoT Attack Surface Build in Security by Design Securing Web and Cloud Interfaces Identify Threats to IoT Web and Cloud Interfaces Prevent Injection Flaws Prevent Session Management Flaws Prevent Cross-Site Scripting Flaws Prevent Cross-Site Request Forgery Flaws Prevent Unvalidated Redirects and Forwards Securing Data Use Cryptography Appropriately Protect Data in Motion Protect Data at Rest Protect Data in Use Controlling Access to IoT Resources Identify the Need to Protect IoT Implement Secure Authentication Implement Secure Authorization Implement Security Monitoring on IoT Systems Securing IoT Networks Ensure the Security of IP Networks Ensure the Security of Wireless Networks Ensure the Security of Mobile Networks Ensure the Security of IoT Edge Networks Ensuring Privacy Improve Data Collection to Reduce Privacy Concerns Protect Sensitive Data Dispose of Sensitive Data Managing Software and Firmware Risks Manage General Software Risks Manage Risks Related to Software Installation and Configuration Manage Risks Related to Software Patches and Updates Manage Risks Related to IoT Device Operating Systems and Firmware Promoting Physical Security Protect Local Memory and Storage Prevent Physical Port Access

CertNexus Certified Internet of Things Security Practitioner (CIoTSP) v1.0
Delivered OnlineFlexible Dates
Price on Enquiry