Duration 5 Days 30 CPD hours This course is intended for Security engineer Network engineer Network designer Network administrator Systems engineer Consulting systems engineer Technical solutions architect Network manager Cisco integrators and partners Overview After taking this course, you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW) Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco© CCNP© Security and CCIE© Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower© Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch© Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. Describing Information Security Concepts* Information Security Overview Assets, Vulnerabilities, and Countermeasures Managing Risk Vulnerability Assessment Understanding Common Vulnerability Scoring System (CVSS) Describing Common TCP/IP Attacks* Legacy TCP/IP Vulnerabilities IP Vulnerabilities Internet Control Message Protocol (ICMP) Vulnerabilities TCP Vulnerabilities User Datagram Protocol (UDP) Vulnerabilities Attack Surface and Attack Vectors Reconnaissance Attacks Access Attacks Man-in-the-Middle Attacks Denial of Service and Distributed Denial of Service Attacks Reflection and Amplification Attacks Spoofing Attacks Dynamic Host Configuration Protocol (DHCP) Attacks Describing Common Network Application Attacks* Password Attacks Domain Name System (DNS)-Based Attacks DNS Tunneling Web-Based Attacks HTTP 302 Cushioning Command Injections SQL Injections Cross-Site Scripting and Request Forgery Email-Based Attacks Describing Common Endpoint Attacks* Buffer Overflow Malware Reconnaissance Attack Gaining Access and Control Gaining Access via Social Engineering Gaining Access via Web-Based Attacks Exploit Kits and Rootkits Privilege Escalation Post-Exploitation Phase Angler Exploit Kit Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Stateful Firewall Overview Security Intelligence Overview Threat Information Standardization Network-Based Malware Protection Overview Intrusion Prevention System (IPS) Overview Next Generation Firewall Overview Email Content Security Overview Web Content Security Overview Threat Analytic Systems Overview DNS Security Overview Authentication, Authorization, and Accounting Overview Identity and Access Management Overview Virtual Private Network Technology Overview Network Security Device Form Factors Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Network Address Translation Cisco ASA Interface Access Control Lists (ACLs) Cisco ASA Global ACLs Cisco ASA Advanced Access Policies Cisco ASA High Availability Overview Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Cisco Firepower NGFW Network Address Translation (NAT) Cisco Firepower NGFW Prefilter Policies Cisco Firepower NGFW Access Control Policies Cisco Firepower NGFW Security Intelligence Cisco Firepower NGFW Discovery Policies Cisco Firepower NGFW IPS Policies Cisco Firepower NGFW Malware and File Policies Deploying Email Content Security Cisco Email Content Security Overview Simple Mail Transfer Protocol (SMTP) Overview Email Pipeline Overview Public and Private Listeners Host Access Table Overview Recipient Access Table Overview Mail Policies Overview Protection Against Spam and Graymail Anti-virus and Anti-malware Protection Outbreak Filters Content Filters Data Loss Prevention Email Encryption Deploying Web Content Security Cisco Web Security Appliance (WSA) Overview Deployment Options Network Users Authentication Secure HTTP (HTTPS) Traffic Decryption Access Policies and Identification Profiles Acceptable Use Controls Settings Anti-Malware Protection Deploying Cisco Umbrella* Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Managing Cisco Umbrella Cisco Umbrella Investigate Overview and Concepts Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Keys in Cryptography Public Key Infrastructure Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps IPsec Static Virtual Tunnel Interface Dynamic Multipoint VPN Cisco IOS FlexVPN Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs Cisco IOS VTIs Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies Secure Sockets Layer (SSL) Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Cisco ASA Remote Access VPN Configuration Cisco Firepower NGFW Remote Access VPN Configuration Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Cisco Identity Services Engine Cisco TrustSec Describing 802.1X Authentication 802.1X and Extensible Authentication Protocol (EAP) EAP Methods Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications RADIUS Change of Authorization Configuring 802.1X Authentication Cisco Catalyst© Switch 802.1X Configuration Cisco Wireless LAN Controller (WLC) 802.1X Configuration Cisco Identity Services Engine (ISE) 802.1X Configuration Supplicant 802.1x Configuration Cisco Central Web Authentication Describing Endpoint Security Technologies* Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Application Whitelists and Blacklists Host-Based Malware Protection Sandboxing Overview File Integrity Checking Deploying Cisco Advanced Malware Protection (AMP) for Endpoints* Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Cisco AMP Device and File Trajectory Managing Cisco AMP for Endpoints Introducing Network Infrastructure Protection* Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Network Telemetry Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Deploying Control Plane Security Controls* Infrastructure ACLs Control Plane Policing Control Plane Protection Routing Protocol Security Deploying Layer 2 Data Plane Security Controls* Overview of Layer 2 Data Plane Security Controls Virtual LAN (VLAN)-Based Attacks Mitigation Sp
Calling all aspiring filmmakers and film enthusiasts! Join us for an engaging taster session on filmmaking, specially designed for students like you. Led by BA Practical Course Leader Devon Dickson, this session aims to explore the art of creating films that go beyond traditional performances and instead capture evocative and unforgettable cinematic truth. Discover how visual narrative can unlock your unique voice as a filmmaker. Devon Dickson, an accomplished writer, producer, and director with over 25 years of experience, will share his valuable insights gained from working on feature films, television shows, and over 300 commercials across 30 countries. His work has reached billions of viewers worldwide, making him a remarkable mentor for budding filmmakers. During this taster session, you'll delve into the philosophy and principles that form the foundations of our teaching here at Central Film School. Through practical examples and captivating case studies, you'll witness how this innovative approach to filmmaking can elevate your creativity and storytelling skills. Whether you're a film student, a passionate movie lover, or simply curious about the art of cinema, this taster session promises to be an inspiring and educational experience. No prior experience in filmmaking is required, so all students are welcome to attend. Don't miss out on this unique opportunity to learn from one of the industry's most experienced professionals. Reserve your spot now and embark on a journey to unlock your unique voice in filmmaking!
Date: Thursday 24th August Time: 5pm Location: Online Event Details:This Thursday we'll be showcasing some of the amazing work our talented MA students have created for their graduate films! This is a great way for you to get a glimpse into what's to come as you embark on your own journey. Whether your passion lies in Screenwriting, Acting or Filmmaking, each contributes significantly to the final creation.Films that will be screened: Colin Hydra Price for a Princess So get ready to be inspired this Thursday, August 24th at 5pm.
Calling all aspiring screenwriters and creative minds! Join us for an exciting script pitching workshop led by tutor Gemma Mushington. This taster session is designed to unleash your imagination and guide you through the process of coming up with and pitching an original script idea. Gemma Mushington, a talented screenwriter with a BA in Film, Television, and Digital Production, brings her wealth of industry knowledge and experience to this workshop. She is signed with Casarotto Ramsay and was the proud winner of the Neal Street Productions Screenwriting Bursary in 2021. Gemma's impressive credentials also include writing an episode of CBBC's The Dumping Ground, which aired in May 2023. With her current role as our Module Leader for the Major Feature Film module on the BA Screenwriting course, Gemma is the perfect guide to help you develop your script ideas. During this engaging taster session, Gemma will lead you through an exercise focused on generating and refining your own original script idea. Learn the techniques and strategies used by professional screenwriters to create compelling narratives that captivate audiences. Gain valuable insights into the art of pitching as Gemma shares her expertise on how to effectively communicate your ideas and grab the attention of industry professionals. Whether you are a screenwriting student, a budding storyteller, or simply someone with a passion for creative writing, this workshop is a fantastic opportunity to explore the exciting world of script development. No prior experience is necessary, as Gemma will provide guidance and support throughout the session. Don't miss out on this chance to refine your scriptwriting skills and pitch your ideas with confidence. Reserve your spot now and prepare to unleash your creative potential with the guidance of tutor Gemma Mushington!
Date: Thursday 17th August Time: 5pm Location: Online Get a feel for all that's to come with our BA Graduate Films Screening! Event Details:This Thursday we'll be showcasing some of the amazing work our talented BA students have created for their graduate films! This is a great way for you to get a glimpse into what's to come as you embark on your own journey. Whether your passion lies in Screenwriting, Acting or Filmmaking each contributes significantly to the final creation.Films that will be screened: Beyond Your Wildest Dreams Guess Who's Coming To Town Red Flash This Is Panic So get ready to be inspired this Thursday, August 17th at 5pm.
An introduction to Ultrasound scanning common lower limb pathologies Speaker: Mike Grice a renowned Clinical Musculoskeletal Specialist, Shockwave Expert, Sonographer and Clinical Anatomist with over two decades of expertise in the Health and Fitness sector. Are you interested in learning more about using diagnostic ultrasound for lower limb pathologies? This expert led webinar is the perfect introduction to this fascinating topic. Over 90 minutes you will learn more about: How ultrasound works How to optimise images depending on structure depth The importance of anatomy Scanning an Achilles Tendon, Patellar Tendon and Medial Knee More on the speaker: With a passion for education and therapy, Mike Grice founded Movement Therapy Education in 2003, a leading institution dedicated to health, fitness, and therapy training. His academic contributions are notable. Mike has been an esteemed lecturer for both the FdSc and BSc Sports Therapy programs at University College Birmingham. Moreover, he has shared his insights as a guest lecturer across prestigious institutions in the UK, USA, and Europe. Serving as a lead tutor and advisor, Mike's expertise extends to affiliations with renowned institutions such as Movement Therapy Education, Elite Therapy Education, RockTape, and NAQI. His extensive knowledge is sought after by Premier League and Championship football clubs where he conducts specialised training sessions particularly in the delivery of Shockwave and Sonography. In the corporate sector, Mike has provided valuable consultancy to industry leaders like Boots, Pera Products, Startrite, and MicroScooter via Brytespark. His innovative approach was instrumental in advancing patient education systems in collaboration with Convatec. A regular on the conference circuit, Mike has been a featured speaker at events like Therapy Expo, FitPro, International Fitness Showcase, and Good Health Show. His notable presentation at the 2014 IOC World Conference for Injury Prevention in Monaco underscores his global influence. A testament to his dedication to education, Mike authored "Anatomy for Shockwave Users", a specialised course for Kinas Medical. He also serves as a trusted sonography educator for the Shockwave Academy based in Atlanta, Georgia.
This very practical workshop is designed to enable participants to improve the impact, clarity and accuracy of their business documents - both internal and external.: This workshop will help participants: Identify the purpose of writing their documents - to themselves and to their readers Recognise and meet the needs of their readers Plan documents systematically and improve the layout, flow and structure Express the content more clearly, concisely and correctly Adapt the tone and style of writing to the circumstances Proof-read and edit work effectively, using formal marks and techniques Improve visual layout, format and appearance 1 Course objectives Welcome and Introductions The problems now - group discussion 2 Writing better business documents What points to highlight / exclude Starting off Introductions Conclusions Executive summaries 3 Rules and standards George Orwell's famous maxim Why write? - clarifying your aims and objectives A seven-step method for better preparation The three-stage process for writing well Grouping information for your reader 4 Proof-reading and editing The difference between proof-reading and editing Proof-reading methods and strategies Proof-reading marks and techniques Training your eye for detail Knowing what to look for 5 Effective editing Grammar and English standards Words - usage and spelling Sentences - units of thought Paragraphs - themes Punctuation - spotting and correcting common errors Say what you mean - active v passive language 6 How's your English? Grammar quizzes and punctuation test Spotting spelling errors Rephrasing jargons and clicheÌs Common error's and mistakes 7 Document layout House style Use of white space Fonts and effects 8 One-to-one workshops These are practical sessions with one-to-one consultation with colleagues and the trainer They are held at key points to consolidate the learning from different sessions 9 Course summary Summary of key points Action plans
The often-used phrase, 'just the receptionist', completely misrepresents the role. An excellent receptionist is a most valuable resource for any organisation. This programme has been designed specifically to deal with the essential skills necessary to represent the organisation to the best possible effect. It will also help you get the most out of your working day. There are six key reasons to take part in this workshop. It will help you: See your role in a new light Develop your communication skills Deal with different types of customer and situation Boost your confidence Cope in a pressurised environment Get more satisfaction from your working day 1 Introduction Workshop objectives and personal objectives The challenges of 21st century communication What makes an excellent point of Reception? And why is it so important? Who and where are our customers? As a customer, how do you like to be treated? What makes people feel valued? Objective and subjective aspects of customer service 'Micro moments' that shape the relationship 2 Communication on reception Definition of communication Barriers to good communication The 'recipe' of verbal, vocal and visual aspects of communication Differences between communicating face-to-face and on the telephone Communication 'leaks' The primitive human response The impact of visual communication - body language, gesture and facial expression Voice - tone, speed, volume, pitch, clarity, inflection, pacing Words - positive words and phrases compared with negative terminology Professional greetings face-to-face Steering the conversation with effective questioning 3 Telephone excellence How we use the telephone Qualities of the telephone Non-verbal communication on the telephone - what aspects can be 'seen' by the other person? Professional telephone etiquette Taking and leaving messages - key points that can help customers, colleagues and the organisation Clarifying information 4 Listening skills for accuracy and relationship building How accurate are your listening skills? What are the challenges for accurate listening? Active / empathetic listening 5 Creating a rapport by 'style flexing' Understanding how different people communicate Shaping our message to the other person so that they feel understood How changing situations can alter communication needs 6 Confidence and assertiveness Recognising different styles of behaviour - aggressive, passive and assertive Qualities of assertive communication - verbal, vocal and visual Assertive techniques - basic, persistence, negotiation / empathetic Demonstrating confidence 7 Coping in a pressurised environment Words - the most useful ones to use with stressed people and identifying the 'red rag' words Challenging situations - what do you find difficult and how do you respond? Dealing with outbursts of anger Bringing non-stop talkers back from their tangent Constructive ways to say 'no' 8 Pulling it all together Action plans Summary of key learning points
When managers have too many decisions to make, it can have a serious impact on the speed and efficiency of the organisation. When those decisions are commercial ones, the results can wreak havoc with the bottom line. Often the problem arises when those below them or in operational areas of the organisation aren't equipped or allowed to make a decision for themselves. Issues get passed back up and that wastes time. This programme provides a solution, giving your entire team the skills to: And most importantly, they'll be able to do this in line with the broader aims and commercial objectives of the business. By the end of the programme participants will be able to: Fully appreciate the importance of effective decision-making in business Use the five-step 'Stop, Think, Act!' decision-making process Stop leaping to conclusions Really understand the situations and decisions they are dealing with Identify good options Evaluate those options Make decisions and then put them into action Apply these tools and techniques to all their decisions in future 1 Understanding the business we work in What are the critical factors in our business? What is the SWOT analysis for our business? 2 Understanding what decision-making is 3 Background Culture of 'having to be doing' To change things we have to think about it! We are paid to make decisions! 4 Recognise the opportunity to make a decision 5 The 'Stop, Think, Act!' technique 6 STOP! Recognise the opportunity to make a decision Don't leap to conclusions Get ready to think Initial questions:Is this my decision? (Do I have the authority?)Who is this going to affect? (Do they need to be included?)When do I need to make the decision? (What's the timeline?) 7 THINK! The 3 Cs - making sure we understand the decisions we have to make What is the context of this decision?What is the overall situation?Why is this decision important?What do we need to achieve?What will success look like? Do I have clarity about the decision I need to make?Can I write it down?Can I express it clearly in two sentences? What are the criteria?What are the critical commercial factors that we will use to select our options?What will we use to measure the business success? 8 ACT! Identifying options What data do I need to collect?Issues with today's overloadIdentifying what will help you Select optionsHow many options?Must match your criteriaMust achieve success'Decision compass' exercise Analyse optionsTabular methodRisk analysis (likelihood v effect)Head, heart and gut (is there any organisational history/bias that we are up against?) Making your decision Taking it to actionFirst actionsPlanning how to make it happen
Today's administrative professional needs flexibility and a broad portfolio of skills including self-motivation, assertiveness, and the ability to deal with difficult people. You will benefit from this course if you are an administrator, medical/legal secretary or PA, who wants to enhance your administrative support skills, as well as evaluating your existing techniques. This course will help you identify: your areas of strength and your areas for improvement in the work environment ways to accept new challenges and responsibilities with confidence what motivates you at work techniques to improve your planning and time management ways of improving your influencing and assertiveness skills your preferred working style (and relate it to your interaction with others) ways of using your initiative how to deal with challenging people, using recognised communication methods The course will help you develop a flexible set of skills that will allow you to succeed at work, no matter what the day throws at you. It will help you communicate effectively with a diverse range of colleagues and others with tact and diplomacy. And, finally, it will help you provide the administrative support that is essential for the smooth running of your area and of the organisation as a whole. 1 Introduction Overview Introductions Individual objectives 2 What exactly is your role? Before looking at new skills and techniques, where are you now? Do you have the skills, knowledge and attitude required to be an exceptional administrator? Understand your job criteria Identifying your strengths and areas for development Activity - skills analysis Activity - action plan 3 Building trust How can you build trust? Understanding the links between reliability, consistency and trust What is required to deliver efficient service? Activity: efficient service requirements of the professional administrator 4 Working styles Identifying your working style preference Understanding the importance of a flexible approach Identifying areas of improvement to become a more effective team member Activity: Questionnaire (completing, scoring and charting) Activity: drawbacks of my style Developing your working style 5 Assertiveness Understand the differences between behaviours Activity: Definition and characteristics of assertive / aggressive / passive behaviour Activity: Identifying different behaviours Understanding how to be more assertive How to use assertiveness techniques How to ask for feedback Activity: Making requests assertively Activity: Refusing requests assertively 6 Time management The importance of planning for success The importance of managing interruptions The importance of having clear purpose Time management best practices Activity: How do you plan your time? What prevents you improving your time management? How will you recognise success? 7 Prioritisation How to prioritise work to meet deadlines The prioritisation matrix Activity: Post it! 8 Dealing with interruptions The impact interruptions have on productivity How to manage interruptions Activity: What interruptions do you experience? What tactics can be employed to reduce these interruptions? 9 Close Open forum Summary Action planning