Duration 1 Days 6 CPD hours This course is intended for Security operations personnel, including analysts and incident responders Overview By the end of the course, you should be able to meet the following objectives: Utilize Carbon Black EDR throughout an incident Implement a baseline configuration for Carbon Black EDR Determine if an alert is a true or false positive Fully scope out an attack from moment of compromise Describe Carbon Black EDR capabilities available to respond to an incident Create addition detection controls to increase security This course teaches you how to use the VMware Carbon Black© EDR? product during incident response. Using the SANS PICERL framework, you will configure the server and perform an investigation on a possible incident. This course provides guidance on using Carbon Black EDR capabilities throughout an incident with an in-depth, hands-on, scenariobased lab. Course Introduction Introductions and course logistics Course objectives VMware Carbon Black EDR & Incident Response Framework identification and process Preparation Implement the Carbon Black EDR instance according to organizational requirements Identification Use initial detection mechanisms Process alerts Proactive threat hunting Incident determination Containment Incident scoping Artifact collection Investigation Eradication Hash banning Removing artifacts Continuous monitoring Recovery Rebuilding endpoints Getting to a more secure state Lessons Learned Tuning Carbon Black EDR Incident close out
Duration 3 Days 18 CPD hours This course is intended for This advanced course is for Infrastructure Specialist, Senior Technical Specialist,Technical Specialist, Support Engineers, and System Architects. Overview Understand the MDM Architecture and how the Physical, Virtual and Hybrid MDM handles a service request Understand the core Workbench features available for the InfoSphere MDM Understand how MDM using OSGi for deploying customizations to the product Create a new Physical MDM Entity using the Workbench Wizard Extend an existing Physical MDM Entity using the Workbench Wizard Extend an existing Physical MDM Service using the Workbench Wizard Create a new Composite Service using a transiant object containing other existing business objects Customize and deploy a Virtual configuration Create a new Virtual Callout Handler Create a new Virtual Composite View Generate new Services based on the Virtual configuration (eSOA) Customize a Hybrid MDM implementation Understand the Adaptive Service Interface (ASI) This course is designed for anyone who wants to get an understanding of how to use and customize the InfoSphere Master Data Management using the InfoSphere MDM Workbench InfoSphere MDM Architecture . OSGi and MDM . Data Additions . Physical Data Extensions . MDM Physical Behavior Extensions . Composite Services . Adaptive Services Interface (ASI) . Virtual Data Model . Virtual Handlers . eSOA Toolkit . Hybrid MDM .
Duration 1 Days 6 CPD hours This course is intended for Account and project managers Business liaisons Deployment engineers Managers overseeing CCE deployments Technical sales Overview After taking this course, you should be able to: Provide a high-level overview of the Cisco Contact Center portfolio List the key components within the Packaged Contact Center Enterprise (PCCE) architecture and their functions Describe how calls flow through PCCE using appropriate terms and naming conventions Introduce the tools used in the configuration, scripting, reporting and support of a PCCE deployment Identify advanced features available within the PCCE solution The Reporting Cisco Contact Center Enterprise (CCER) v1.0 course provides an architectural overview of the Contact Center Enterprise (CCE) Solution components and deployment models. You will learn the end-to-end reporting solutions of CCE designed to assist customers and partners in the task of creating reports and managing disparate data sources. Introduction to CCE Cisco Contact Center Basics Cisco Contact Center Fundamentals Functionality of PCCE Components Public Switched Telephone Network (PSTN) and Voice Gateways Cisco Unified Border Element (CUBE) Terms and Naming Conventions Used in CCE CCE Access Environment CCE Routing Configuration Access Tools Available in CCE Single Pane of Glass (SPOG) Cisco Intelligent Contact Management (ICM) Configuration Manager Discovering CCE Features Beyond Default Agent Management Agent Efficiency
Duration 1 Days 6 CPD hours This course is intended for Report authors wanting to develop interactive report content, or content disconnected from IBM Cognos servers. In this course, participants increase their IBM Cognos Analytics experience by building interactive reports using Active Report controls, which can be distributed to and consumed by users in a disconnected environment, including mobile devices. Introduction to IBM Cognos Active Reports Examine IBM Cognos Active Reports Convert an existing report into an Active Report Add interactions in Active Reports using Active Report connections Create a basic Active Report Examine interactive behavior of Active Report controls Save a report in the IBM Cognos Analytics portal Save an Active Report to an MHT file Save an Active Report as a report template Use an Active Report as a prompt page Understand Active Report security Use Active Report Connections Examine Active Report connections Filter and select in controls using Active Report connections Examine variables Use a single variable to control multiple controls Use multiple variables to show different data in different controls Use Active Report controls to support mobile device usage Active Report Charts & Decks Add charts to active reports Understand and optimize chart behavior Examine decks and data decks Optimize use of decks Review Master Detail relationships Examine RAVE visualizations
Duration 3 Days 18 CPD hours This course is intended for Salesforce consultants and administrators Overview When you complete this course, you will be able to:Enable Field Service Lightning.Describe the capabilities and components of Field Service Lightning.Know the right questions to ask prior to implementing Field Service Lightning.Understand the steps to successfully implement Field Service Lightning In this hands-on course, you will learn about Field Service Lightning components and even have the opportunity to implement Field Service Lightning for AW Computing, our fictitious company. What is Field Service Lightning? Define Field Service Lightning Identify the challenges of field service management and how FSL can overcome those challenges Describe what connected field service looks like Explain the main components and capabilities of FSL Meet AW Computing Learn about AW Computing Understand the business reason why AW Computing has purchased FSL Plan for Field Service Lightning Learn the essential questions to ask before setting up FSL Consider FSL limitations Set Up Field Service Lightning (Long Module) Set up FSL Components and Managed Package Walk Through the FSL Process by Role View and perform FSL actions as a Service Agent View and perform FSL actions as a Dispatcher View and perform FSL actions as a Field Resource View and run FSL reports as a Supervisor / Manager
Duration 5 Days 30 CPD hours This course is intended for Channel Partner/Reseller Customer Employee Overview Course Objectives Identify the basic components and operations of the Unified CCE solution. Configure and script a basic UCCE CVP deployment. Perform the ICM configuration tasks required to support basic agent functionality. Build and test a basic ICM script utilizing microapps. Configure and script UCCE to support reporting requirements, precision queuing and RONA. Identify how to successfully deploy the CVP VXML component in a Unified CCE solution. Generate basic reports using Cisco Unified IC. The Administering Cisco Unified Contact Center Enterprise Part 1 (AUCCE1) v2.0 is a 5 day instructor-led course presented by training partners to system engineers and customers who will be involved with Day 2 support of a UCCE solution deployed in a CVP comprehensive environment. This course describes the requirements, resources and tools needed to perform routine adds, moves and changes in the inbound/outbound UCCE environment. This course is intended for those administering the solution, or who may be responsible for Level 1-2 support of the solution. Course Outline Module 1: Cisco Unified Contact Center Enterprise v10 Foundations Module 2: UCCE Configuration and Scripting Module 3: Unified CCE Inbound Agent Considerations Module 4: Unified CCE IVR/VRU Functionality Module 5: Additional UCCE Considerations Module 6: VXML Implementation Module 7: Cisco Unified Intelligence Center Reporting
Duration 4 Days 24 CPD hours This course is intended for This advanced course is the third in a series of three classes designed for RPG IV programmers. Programming experience using RPG IV is mandatory when enrolling in this course. You should have attended RPG IV Programming Fundamentals Workshop for IBM i (AS060) and RPG IV Programming Intermediate Workshop for IBM i (AS070). This course is not designed for RPG III programmers who want RPG IV. RPG III programmers should review the agenda carefully before they make a decision to attend this class. Overview Use address pointers and user spaces in RPG IV programs Write database triggers in RPG IV Develop ILE modular objects and package them in service programs Explain the purpose of ILE activation groups Explain the behavior of error handling and percolation in ILE Code an ILE error handling program Call application program interfaces (APIs) from RPG IV program Programmers who can write comprehensive RPG IV programs using the IBM i RPG IV compiler (v7), learn additional skills & techniques. Comprehensive exposure to advanced features of the Integrated Language Environment (ILE) RPG compiler and the IBM i. Programmers who can write comprehensive RPG IV programs using the IBM i RPG IV compiler (v7), learn additional skills & techniques. Comprehensive exposure to advanced features of the Integrated Language Environment (ILE) RPG compiler and the IBM i.
Duration 2 Days 12 CPD hours This course is intended for Security professionals, System engineers, channel partners, service partners, and end users with at least one year of experience in implementing IT security technologies (Network, Applications, and Systems). Overview This course will enable students to configure, monitor, manage, and optimize the SonicWall Network Security firewall appliances running the new SonicOS 7 to effectively defend against limitless network and cyberthreats and implement SonicWall Boundless Cybersecurity safeguards for seamless protection. Upon completion of the course, students will be able to configure the SonicWall firewall for Secure and Remote Connectivity, Network Optimization, and Advanced Threat Protection. The SonicWall Network Security Administrator (SNSA) for SonicOS 7.0curriculum provides students the required background, knowledge, and hands-on experience to begin designing, implementing, and troubleshooting SonicWall Network Security products. SonicOS 7 is SonicWall?s brand new and most advanced security operating system and is at the core of its latest physical and virtual firewalls, including models from the TZ, NSv, NSa and NSsp Series. SonicOS 7.0 features advanced security, simplified policy management, and critical networking and management capabilities for distributed enterprises and small- to medium-sized businesses with SD-branch support. Course Outline Setting up Basic Firewall Components Unified Threat Management Secure Access Deep Packet Inspection for SSL (DPI-SSL) Content Filtering Services Application Control Scalability and Reliability SD-WAN High Availability Troubleshooting Tools
Duration 3 Days 18 CPD hours This course is intended for Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers, and Support Staff Overview The Palo Alto Networks Firewall 11.0: Troubleshooting course is three days of instructor-led training that will help you: Investigate networking issues using firewall tools including the CLI Follow proven troubleshooting methodologies specific to individual features Analyze advanced logs to resolve various real-life scenarios Solve advanced, scenario-based challenges Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud. Course Outline Module 1 - Tools and Resources Module 2 - CLI Primer Module 3 - Flow Logic Module 4 - Packet Captures Module 5 - Packet-Diagnostics Logs Module 6 - Host-Inbound Traffic Module 7 - Transit Traffic Module 8 - System Services Module 9 - Certificate Management and SSL Decryption Module 10 - User-ID Module 11 - GlobalProtect Module 12 - Support Escalation and RMAs Module 13 - Next Steps
Duration 2 Days 12 CPD hours This course is intended for This is an advanced course for DBAs and technical individuals who plan, implement, and maintain Db2 11.1 databases Overview Please refer to course overview This course is designed to teach you how to:Perform advanced monitoring using the Db2 administrative views and routines in SQL queries.Manage the disk space assigned in Database Managed Storage (DMS) and Automatic Storage table spaces, including the activities of the rebalancer.Use SQL queries and Db2 commands to check the high water mark on table spaces and to monitor the rebalance operation.Utilize the REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces using database or tablespace backup images.Plan and execute the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases.Create incremental database or tablespace level backups to reduce backup processing and backup image storage requirements.Implement automatic storage management for table spaces and storage groups or enable automatic resize options for DMS managed table spaces to reduce administration requirements and complexity.Describe the various types of database memory including buffer pools, sort memory, lock memory and utility processing memory.Adjust database or Db2 instance configuration options to improve application performance or processing efficiency.Implement Db2 Self Tuning Memory management for specific database memory areas. Advanced MonitoringDb2 Table Space ManagementDb2 Database Memory ManagementDatabase rebuild supportDb2 database and tablespace relocationDb2 Incremental Backup