Duration 2 Days 12 CPD hours This course is intended for This course is designed for security administrators and Check Point resellers who need to manage and monitor issues that may occur within their Security Management environment. Overview Understand how to use Check Point resources for support. Understand how to perform packet captures using tcmdump and FW Monitor command tools. Understand the basic process of kernel debugging, and how debug commands are structured. Recognize how to use various Linux commands for troubleshooting system issues. Recognize communication issues that may occur between SmartConsole and the SMS and how to resolve them. Understand how to troubleshoot SmartConsole login and authentication issues. Understand how to prevent and resolve licensing and contract issues. Understand how to troubleshoot issues that may occur during policy installation. Understand communication issues that may occur when collecting logs and how to resolve them. Recall various tools to use when analyzing issues with logs. Understand how to restore interrupted communications during heavy logging. Understand how NAT works and how to troubleshoot issues. Understand Client Side and Server Side NAT. Understand how the Access Control Policy functions and how the access control applications work together. Understand how to troubleshoot issues that may occur with Application Control and URL Filtering. Understand how the HTTPS Inspection process works and how to resolve issues that may occur during the process. Understand how to troubleshoot Content Awareness issues. Recognize how to troubleshoot VPN-related issues. Understand how to monitor cluster status and work with critical devices. Recognize how to troubleshoot State Synchronization. Understand how to troubleshoot communication issues between Identity Sources and Security Gateways. Understand how to troubleshoot and debug issues with internal Identity Awareness processes. The goal of this course is to provide an understanding of the concepts and skills necessary to troubleshoot issues which may occur when managing the Check Point Security Management architecture and Security Gateways. Course Outline An Introduction to Troubleshooting SmartConsole and Policy Management Troubleshooting Monitoring Logging Activity Troubleshooting Issues with NAT Understanding the Unified Access Control Policy Basic VPN Troubleshooting Monitoring ClusterXL Connections Understanding Identity Awareness Additional course details: Nexus Humans CCTA Check Point Troubleshooting Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCTA Check Point Troubleshooting Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Technical professionals who support, install, deploy, or administer Check Point products in Cloud Environments. Overview Explain the nature of the cloud environment. Describe the five pillars of cloud architecture. Explain the Basics of Cloud Infrastructure. Explain the Basics of Cloud Automation. Explain Check Point Security Management and How it Applies to CloudGuard. Describe CloudGuard Security Gateway offerings. Describe Cloud Load Balancers. Explain CloudGuard Licensing. Explain the different Deployment options and architectures for CloudGuard. Explain how and why CloudGuard is automated. Describe the functions of CloudGuard that can be automated. Describe the tools used to automate CloudGuard. Explain CloudGuard Automation Requirements. Explain basic troubleshooting techniques specific to Check Point Security Management Servers and Security Gateways. Describe the steps for Troubleshooting CloudGuard Network Installation. Explain the tools and techniques used to troubleshoot CloudGuard Network Automation. Explain the need for Cloud Security Posture Management. Describe the posture management tools available in CloudGuard. Explain methods for correcting Cloud Security Posture Management issues. Learn basic concepts and develop skills necessary to administer Check Point CloudGuard security solutions Course Outline Deploy a Security Management Server in the Cloud. Install a Security Gateway Image. Create Virtual Networks. Deploy Internal and External Load Balancers Deploy a Security Gateway Using Templates. Assign Public IP Addresses to Cloud Devices Create Web Servers in the Cloud. Configure North-South Traffic Policy. Configure East-West Traffic Policy and Routes. Troubleshoot North-South Traffic Issues. Troubleshoot East-West Traffic Issues.
Duration 4 Days 24 CPD hours This course is intended for Penetration Testers Microsoft Administrators Security Administrators Active Directory Administrators Anyone looking to learn more about security Overview Upon completion, Certified IS Security Manager students will have a strong foundation in Cyber Security & IS management standards with current best practices and will be prepared to competently take the C)ISSM exam. Companies will lean on a Certified IS Security Manager, C)ISSM to create solutions for tomorrow?s problems, today. When it comes to identifying critical issues and providing effective IS management solutions.ÿ ÿThe knowledge and course content provided in the Certified Information Systems Security Manager ? C)ISSM will not only cover ISACA©?s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance. Course Outline Introduction Information Security Governance Information Risk Management and Compliance Information Security Program Development and Management Information Security Incident Management Additional course details: Nexus Humans C)ISSM - Certified Information Systems Security Manager Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSM - Certified Information Systems Security Manager Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Security Professionals Incident Handling Professionals Anyone in a Security Operations Center Forensics Experts Cybersecurity Analysts Overview Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time. Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today's needs. When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today's exploits. This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time.Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today?s needs.When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today?s exploits.This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Blue Team?Principles Network Architecture?and how it lays the groundwork Defensive Network Security Data Locations?and how they tie together Security?Operations?Center The People, Processes, and Technology Triage and Analysis Digital Forensics Incident Handling Vulnerability Management Automation, Improvement, and Tuning Digital?Forensics Investigative Theory and?Processes Digital Acquisition Evidence Protocols Evidence Presentation Computer Forensics?Laboratory Protocols Processing Techniques Specialized?Artifacts Advanced Forensics for Today?s?Exploitations Malware Analysis Creating the Safe Environment Static Analysis Dynamic Analysis Behavior Based Analysis What is different about?Ransomware? Manual Code Reversing Traffic Analysis Manual Analysis Principles Automated?Analysis Principles Signatures?compared to?Behaviors Application Protocols Analysis Principles Networking Forensics Assessing the Current State of Defense with the?Organization Network Architecture and Monitoring Endpoint Architecture and Monitoring Automation, Improvement, and continuous?monitoring Leveraging SIEM for Advanced Analytics Architectural Benefits Profiling and?Baselining Advanced Analytics Defeating the Red Team with Purple Team tactics Penetration Testing?with full knowledge Reconnaissance Scanning Enumeration Exploitation Lateral Movement Additional course details: Nexus Humans C)CSA: Cybersecurity Analyst Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)CSA: Cybersecurity Analyst Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The course is designed for individuals who want to gain in-depth knowledge and practice in the discipline of managing requirements (Business Analysts, Requirements Engineers, Product manager, Product Owner, Chief Product Owner, Service Manager, Service Owner, Project manager, Consultants) Overview Students should be able to demonstrate knowledge and understanding and application of Requirements Engineering principles and techniques. Key areas are: Requirements Engineering framework The hierarchy of requirements Key stakeholders in the framework Requirements elicitation Requirements modelling Requirements documentation Requirements analysis Requirements validation Requirements management The Business Analyst role analyzes, understands and manages the requirements in a customer-supplier relationship and ensures that the right products are delivered.The practical course provides in-depth knowledge and practice in Requirements Engineering. Course Introduction Let?s Get to Know Each Other Course Overview Course Learning Objectives Course Structure Course Agenda Introduction to Business Analysis Structure and Benefits of Business Analysis Foundation Exam Details Business Analysis Certification Scheme What is Business Analysis? Intent and Context Origins of business analysis The development of business analysis The scope of business analysis work Taking a holistic approach The role and responsibilities of the business analyst The competencies of a Business Analyst Personal qualities Business knowledge Professional techniques The development of competencies Strategy Analysis The context for strategy The definition of strategy Strategy development External environmental analysis Internal environmental analysis SWOT analysis Executing strategy Business Analysis Process Model An approach to problem solving Stages of the business analysis process model Objectives of the process model stages Procedures for each process model stage Techniques used within each process model stage Investigation Techniques Interviews Observation Workshops Scenarios Prototyping Quantitative approaches Documenting the current situation Stakeholder Analysis and Management Stakeholder categories and identification Analysing stakeholders Stakeholder management strategies Managing stakeholders Understanding stakeholder perspectives Business activity models Modelling Business Processes Organizational context An altrnative view of an organization The organizational view of business processes Value propositions Process models Analysing the as-is process model Improving business processes (to-be business process) Defining the Solution Gab analysis Introduction to Business Architecture Definition to Business Architecture Business Architecture techniques Business and Financial Case The business case in the project lifecycle Identifying options Assessing project feasibility Structure of a business case Investment appraisal Establishing the Requirements A framework for requirements engineering Actors in requirements engineering Requirements elicitation Requirements analysis Requirements validation Documenting and Managing the Requirements The requirements document The requirements catalogue Managing requirements Modelling the Requirements Modelling system functions Modelling system data Delivering the Requirements Delivering the solution Context Lifecycles Delivering the Business Solution BA role in the business change lifecycle Design stage Implementation stage Realization stage Additional course details: Nexus Humans Business Analysis - Requirements Engineering training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Analysis - Requirements Engineering course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Storage and system administrators using HP Data Protector software, System Engineers, Consultants, Project Managers, Professional Services, and Sales. Overview Upon successful completion of this course, you should be able to:Install and distribute HP Data Protector software in your environmentConfigure the HP Data Protector software productConfigure your tape and disk-based backup solutions for use with HP Data Protector softwareUse HP Data Protector software to run backups and restores, and monitor these sessions from both the Data Protector GUI and command lineManage the HP Data Protector software Internal Database (IDB)Create custom reports and notification proceduresSecure your installation by configuring user access and adding security to the Cell Manager and DP client systemsPrepare your client to recover from a disaster situationUnderstand the Data Protector processes and perform basic troubleshooting of your installation The hands-on lab exercises reinforce the theory sessions to ensure a thorough understanding of backup and recovery concepts, the functionality of the software and its application to typical storage implementations. The hands-on lab exercises reinforce the theory sessions to ensure a thorough understanding of backup and recovery concepts, the functionality of the software and its application to typical storage implementations. Additional course details: Nexus Humans DP120 Data Protector 9.x Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP120 Data Protector 9.x Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is suited to marketeers, business analysts, and researchers who are interested in increasing their statistical knowledge. Overview After attending this course, delegates will understand how statistics can be used to provide valuable insight into their business, and be able to apply statistical methods to solve business problems. On returning to work delegates will immediately be able to make a difference to the way that their organisations make decisions. This course covers the statistical methods that analysts need to move from simple reporting on business problems to extracting insight to solve business problems. Course Outline The course will explore the following topics through a series of lectures and workshops: Summary statistics for both continuous data and categorical data Using and reporting confidence intervals Using hypothesis tests to answer business questions Using correlations to explore data relationships Simple prediction models Analysing categorical data Additional course details: Nexus Humans Data-driven Business Using Statistical Analysis training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Data-driven Business Using Statistical Analysis course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Built for experienced IT Professionalsworking with Citrix Virtual Appsand Desktops who need to plan for,implement, or manage a ProvisioningServices environment. Potential studentsinclude administrators, engineers, andarchitects. Overview #NAME? In this course, students will learn to install and configure a highly available Citrix Provisioning farm according to leading practices. In this course, students will learn about the architecture, communication, and processes that make up Citrix Provisioning to be successful with deploying and managing a farm. Manage and integrate vDisks and target devices with Citrix Virtual Apps and Desktops for easy rollback, upgrades, and performance of Virtual Delivery Agent machines. At the end of this course students will be able to install, configure and manage the CitrixProvisioning 7 solution. Advanced Provisioning Learning Objectives Introduction to Citrix Provisioning (PVS) Getting Started with Citrix Provisioning Citrix Provisioning Architecture Citrix Provisioning Infrastructure Lab VM Power Management Learning Objectives The Citrix Provisioning Server The Farm Database The Store Streaming the vDisk Lab VM Power Management Learning Objectives vDisk Introduction Master Target Device Preparation Streaming Introduction Boot Methods Target Devices Lab VM Power Management Learning Objectives Target Devices Introduction Reads and Writes Machine and User Data Integrating Citrix Provisioning with Citrix Virtual Apps and Desktops Lab VM Power Management Learning Objectives The Complete Architecture Overview The Citrix Virtual Desktops Setup Wizard Manage the Target Devices through Creating Device Collections Using Provisioned Services with Citrix Virtual Apps and Desktops Managing Citrix Provisioning from Citrix Cloud Advanced Architecture Lab VM Power Management Learning Objectives Farm Component Scalability Store Redundancy Farm Database Redundancy Supporting Citrix Provisioning Lab VM Power Management Learning Objectives vDisk Updates Delegate Administration Audit and Support Alternative vDisk Update Methods
Duration 5 Days 30 CPD hours This course is intended for Developed for experienced IT Professionals working with Citrix Virtual Apps and Desktops 7.1x. Potential students include administrators, engineers, and architects responsible for the end user workspace, provisioning services environment, and overall health and performance of the solution. Overview How to configure Workspace Environment Management to improve the end user environment and virtual resource consumption Understand Zones in Citrix Virtual Apps and Desktops 7.1x and how to account for user and desktop locations and optimal connection and registration How to build and manage App Layers to minimize image sprawl with Citrix Virtual Apps and Desktops 7.1x Understand and configure HDX channels and protocols for improved performance delivering multimedia and data over network connections Get more value out of your Citrix Virtual Apps and Desktops 7.1x investment through the use of Workspace Environment Management, Provisioning Services, Application Layering, and advanced features. Students leave this course with a good understanding of how to manage more complex solutions such as multizone environments spanning multiple locations with configurations around StoreFront, the Delivery Controllers, and HDX. Students will gain the skills to improve logon times, user personalization, and resource performance through Workspace Environment Management. Also, learn to optimize management of your app and desktop images by building and combining App Layers. End the course by learning to install, configure, and manage Provisioning Services in accordance with leading practices.This course includes a voucher to take the related exam (1Y0-311 Citrix XenApp and XenDesktop 7.15 Advanced Administration) and earn your Citrix Certified Professional - Virtualization (CCP-V) certification. Implementing Redundancy and Scalability StoreFront and Citrix Gateway Site Infrastructure Machines Running the Virtual Delivery Agent Managing a Virtual Apps and Desktops Environment with Multiple Locations Zones VDA Registration in a Multi-Zone Environment Zone Preference Optimal Gateway Routing and Zones Managing StoreFront Store Subscriptions in a Multi- Location Environment StoreFront and Citrix ADC Branding Implementing Backups and Disaster Recovery Backups Disaster Recovery Considerations Disaster Recovery Process Implementing Advanced Authentication Methods Multi-factor Authentication - RADIUS & OTP Multi-factor Authentication - Smart Card Authentication Federated Authentication - ADFS, SAML, and FAS Improving App and Data Security Introduction to Application Security Preventing Jailbreak Attacks Minimizing the Impact of Attacks Securing Machines Running the Virtual Delivery Agent TLS to VDA Encryption GPOs and Citrix Policies Image Management Introduction to Troubleshooting Troubleshooting Methodology Process (Standard Slide) Resource Tools and Utilities Introduction to PowerShell Troubleshooting Access Issues Troubleshooting StoreFront Troubleshooting Citrix Gateway Troubleshooting Delivery Controller Issues Validating FMA Services Troubleshooting VDA Registration Issues Troubleshooting VDA Registration Troubleshooting HDX Connection Issues Troubleshooting HDX Connections Introduction to App Layering App Layering Introduction Architecture and How it Works Creating an OS Layer The OS Layer Creating a Platform Layer The Platform Layer Creating App Layers The App Layers Creating Elastic App and User Layers Elastic App Layering User Layers Deploying a Layered Image using Citrix Virtual Apps and Desktops Using Templates in App Layering Using Layered Images in a Citrix Virtual Apps and Desktops Site Exploring Layer Priority Layer Priority Maintaining an App Layering Environment Updating Layers Maintaining and Updating the App Layering Environment Common App Layering Considerations and Additional Resources Introduction to Workspace Environment Management (WEM) Workspace Environment Management (WEM) Introduction WEM Administration Using WEM to Centralize Managing User Resources with WEM Managing Profiles with WEM Managing Endpoints with the WEM Transformer Feature Using WEM for Performance Optimization Optimizing Machine Performance with WEM Optimizing User Experience with WEM Using WEM to Secure Environments WEM Environments Migrating and Upgrading WEM Migrating to WEM Upgrading a WEM Deployment WEM Multi-Location Considerations
Duration 2 Days 12 CPD hours This course is intended for Built for those supporting a Citrix Virtual Apps and Desktops solution in a help desk or service desk capacity. An ideal candidate for this course interacts with end users to troubleshoot and resolve issues. Overview How to support end-users connecting to Citrix Virtual Apps and Desktops through Citrix Workspace App. How to use Citrix Director to gather information and interact with user sessions. A methodology to approach user related issues to minimize time to resolution. An understanding of the Citrix Virtual Apps and Desktops solution and the role of the components Learn to support end-users accessing virtual apps and desktops as part of a Citrix solution. In this course, you will learn to use Citrix Director to interact with user sessions and to capture information for solving issues or escalating to the administration team. Gain foundational knowledge about the Citrix Virtual Apps and Desktops technology and an understanding of how components interact. You will learn about each component focusing on common user related issues that may arise, and how to apply a methodical approach to solve them using real world scenarios. By the end of the course, you will be able to solve or escalate end-user issues appropriately Fundamental Architecture for the Help Desk Role Citrix Site Infrastructure and Deployment Models The Help Desk Role in the Fundamental Architecture Problem Resolution Methodology Citrix Director and its role in Help Desk Support Citrix Director Role and Purpose Access to Director for Help Desk Administrators Common Director Monitoring Tasks Common Help Desk AdministratorTroubleshooting Tasks Providing and Troubleshooting End User Access End User Access Overview Components between end users and published resources on VDAs User Experience Support End User Access Citrix Workspace App Workspace App Types Deploying Citrix Workspace app Pass though Authentication Supporting Citrix Workspace App User Sessions FlexCast Architecture User Sessions App and Desktop Launch Process User Profiles HDX Technologies Printing Introduction to Printing Printing Components Overview Supporting Printing