• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

18215 Courses delivered Online

ISO 45001 Lead Implementer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Individuals responsible for maintaining and improving the workplace safety, Occupational health and safety officers, consultants, and advisors, Professionals wishing to acquaint themselves with PECB's IMS2 Methodology for implementing an OH&S MS, Individuals responsible for maintaining the conformity of OH&S MS to ISO 45001 requirements, Members of OH&S teams, Individuals aspiring to pursue a career as OH&S MS implementers, consultants, or officers Overview Explain the fundamental concepts and principles of an occupational health and safety management system (OH&S MS) based on ISO 45001 Interpret the ISO 45001 requirements for an OH&S MS from the perspective of an implementer Initiate and plan the implementation of an OH&S MS based on ISO 45001, by utilizing PECB's IMS2 Methodology and other best practices Support an organization in operating, maintaining, and continually improving an OH&S MS based on ISO 45001 Prepare an organization to undergo a third-party certification audit This course is designed to equip you with the competence to establish, implement, manage, and maintain an occupational health and safety management system (OH&S MS) in accordance with ISO 45001:2018 requirements and guidance. This training course aims to provide an in-depth understanding of ISO 45001 requirements, as well as the best practices and approaches used for the implementation and subsequent maintenance of an OH&S MS. The ultimate ambition of this training course is to enable you to create the conditions for a safer workplace. Introduction to ISO 45001 and initiation of an OH&S MS implementation Training course objectives and structure Standards and regulatory frameworks Fundamental concepts and principles of OH&S Initiation of the OH&S MS implementation The organization and its context Implementation plan of an OH&S MS Leadership and worker participation OH&S MS scope OH&S policy and objectives Hazard identification and assessment of risks and opportunities Implementation of an OH&S MS Resource management Awareness and communication Documented information management Operations management Emergency preparedness and response OH&S MS performance evaluation, continual improvement, and preparation for the certification audit Monitoring, measurement, analysis, and evaluation Internal audit Management review Treatment of nonconformities and incidents Continual improvement Preparation for the certification audit Closing of the training course

ISO 45001 Lead Implementer
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat Linux Diagnostics and Troubleshooting (RH342)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Senior system administrators who wish to learn more about troubleshooting. Have earned a Red Hat Certified System Administrator (RHCSA) or have similar experience. It is recommend that students have earned a Red Hat Certified Engineer (RHCE) or have similar experience. Overview As a result of attending this course, students should be able to leverage the software development life-cycle process to plan, create, test, and provision host systems within an organization. Students should be able to demonstrate the following skills: - Installation of Red Hat Satellite 6 - Software life-cycle management of software used to provision and maintain configured hosts within a controlled production environment This course enriches your skills by providing the tools and techniques that you need to successfully diagnose, and fix, a variety of potential issues. You will work through hands-on problems in various subsystems to diagnose and fix common issues. You will learn develop the skills to apply the scientific method to a structured form of troubleshooting. You will then apply this approach in troubleshooting various types of problems, including boot issues, hardware issues, storage issues, RPM issues, network issues, third-party application issues, security issues, and kernel issues. At the end of the course, you will be empowered to complete various comprehensive review labs to test your skills. 1 - INTRODUCTION TO TROUBLESHOOTING Describe a generalized strategy for troubleshooting. 2 - TAKE PROACTIVE STEPS TO PREVENT SMALL ISSUES Prevent small issues from becoming large problems by employing proactive system administration techniques. 3 - TROUBLESHOOT BOOT ISSUES Identify and resolve issues that can affect a system's ability to boot. 4 - IDENTIFY HARDWARE ISSUES Identify hardware problems that can affect a system?s ability to operate. 5 - TROUBLESHOOT STORAGE ISSUES Identify and fix issues related to storage. 6 - TROUBLESHOOT RPM ISSUES Identify and fix problems in, and using, the package management subsystem. 7 - TROUBLESHOOT NETWORK ISSUES Identify and resolve network connectivity issues. 8 - TROUBLESHOOT APPLICATION ISSUES Debug application issues. 9 - DEAL WITH SECURITY ISSUES Identify and fix issues related to security subsystems. 10 - TROUBLESHOOT KERNEL ISSUES Identify kernel issues and assist Red Hat Support in resolving kernel issues. 11 - RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING COMPREHENSIVE REVIEW Practice and demonstrate knowledge and skills learned in Red Hat Enterprise Linux Diagnostics and Troubleshooting.

Red Hat Linux Diagnostics and Troubleshooting (RH342)
Delivered OnlineFlexible Dates
Price on Enquiry

Office365 Teams, SharePoint and One Drive

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for business users and knowledge workers in a variety of roles and fields who have competence in a desktop-based Microsoft Office productivity suite, and who are now extending Microsoft Office to a collaborative cloud-based Office 365 environment. Overview In this course, you will build upon your knowledge of the Microsoft Office desktop application suite to work productively in the cloud-based Microsoft Office 365 environment. You will: Sign in, navigate, and identify components of the Office 365 environment. Create, edit, and share documents with team members using the Office Online apps, SharePoint, OneDrive for Business, and Teams Collaborate using Teams. Configure Teams. This course introduces several productivity apps including SharePoint, OneDrive and Teams that can be used in combination by teams for communication and collaboration. Outline for Teams About What is Microsoft Teams? Overview How to Access Microsoft Teams Etiquette for using teams Integration Capabilities SharePoint OneDrive Interface Storage ? OneDrive & SharePoint Permissions & Access Owner, Member & Guest Communication and Collaboration Team Conversations Private conversations Mentions Inviting people Search Settings and Customization Use the search tool to find specific messages, files or people Working with Files Create new files Upload files Attaching or sharing Files Edit and Collaborate on files Open files in SharePoint OneDrive for personal files Administration (Champions) Add members to a Team Access administrator settings Meetings and calls Initiate a meeting on demand Schedule a meeting and invite attendees Meetings and Outlook Introduction to SharePoint What is SharePoint Understanding your permissions Logging into SharePoint Working with SharePoint sites Working with SharePoint sites Navigate, browse and search in a site Follow a site Working with documents Navigate a library Open and edit a document Upload or create a document in a library Share a file Set alerts for files Use checkout and check-in Team collaboration Versioning Getting Started (OneDrive Outline) Sign in, access and navigate Working with files and folders Upload files Organize files and folders Rename. Copy and download files Delete and recover files Search Use OneDrive with Office Save an office file online to OneDrive Use OneDrive with desktop office Versioning Share files Co-authoring

Office365 Teams, SharePoint and One Drive
Delivered OnlineFlexible Dates
Price on Enquiry

Cloudera Training for Apache HBase

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is appropriate for developers and administrators who intend to use HBase. Overview Skills learned on the course include:The use cases and usage occasions for HBase, Hadoop, and RDBMSUsing the HBase shell to directly manipulate HBase tablesDesigning optimal HBase schemas for efficient data storage and recoveryHow to connect to HBase using the Java API, configure the HBase cluster, and administer an HBase clusterBest practices for identifying and resolving performance bottlenecks Cloudera University?s four-day training course for Apache HBase enables participants to store and access massive quantities of multi-structured data and perform hundreds of thousands of operations per second. Introduction to Hadoop & HBase What Is Big Data? Introducing Hadoop Hadoop Components What Is HBase? Why Use HBase? Strengths of HBase HBase in Production Weaknesses of HBase HBase Tables HBase Concepts HBase Table Fundamentals Thinking About Table Design The HBase Shell Creating Tables with the HBase Shell Working with Tables Working with Table Data HBase Architecture Fundamentals HBase Regions HBase Cluster Architecture HBase and HDFS Data Locality HBase Schema Design General Design Considerations Application-Centric Design Designing HBase Row Keys Other HBase Table Features Basic Data Access with the HBase API Options to Access HBase Data Creating and Deleting HBase Tables Retrieving Data with Get Retrieving Data with Scan Inserting and Updating Data Deleting Data More Advanced HBase API Features Filtering Scans Best Practices HBase Coprocessors HBase on the Cluster How HBase Uses HDFS Compactions and Splits HBase Reads & Writes How HBase Writes Data How HBase Reads Data Block Caches for Reading HBase Performance Tuning Column Family Considerations Schema Design Considerations Configuring for Caching Dealing with Time Series and Sequential Data Pre-Splitting Regions HBase Administration and Cluster Management HBase Daemons ZooKeeper Considerations HBase High Availability Using the HBase Balancer Fixing Tables with hbck HBase Security HBase Replication & Backup HBase Replication HBase Backup MapReduce and HBase Clusters Using Hive & Impala with HBase Using Hive and Impala with HBase Appendix A: Accessing Data with Python and Thrift Thrift Usage Working with Tables Getting and Putting Data Scanning Data Deleting Data Counters Filters Appendix B: OpenTSDB

Cloudera Training for Apache HBase
Delivered OnlineFlexible Dates
Price on Enquiry

Aruba Networks - Aruba Switching Fundamentals For Mobility, Rev. 16.41 (ASFM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for IT Professionals who deploy small-to- medium scale enterprise network solutions based on Aruba products and technologies Overview Upon completion of this course, you will be able to:Explain how Aruba networking solutions meet customers? requirementsExplain how Aruba AirWave provides unified wireless and wired network managementDescribe in-band management and out-of-band managementComplete the initial setup on ArubaOS switchesControl access to switches for both in-band and out-of-band managementManage software and configuration files on ArubaOS switchesExplain use cases for VLANs and configure port-based VLANs on ArubaOS switchesUnderstand and configure Rapid Spanning Tree Protocol (RSTP)Understand and configure Multiple Spanning Tree Protocol (MSTP)Differentiate between different types of link aggregation and understand the benefits of Link Aggregation Control Protocol (LACP)Configure and troubleshoot link aggregation on ArubaOS switchesConfigure static routes on ArubaOS switches and interpret IP routing tablesConfigure a basic Open Shortest Path First (OSPF) solutionDescribe how Virtual Switching Framework (VSF) works and the advantages that it providesConfigure and verify a simple VSF fabricDescribe the basics of wireless communications and 802.11 standardsDefine a wireless LAN (WLAN) and differentiate between wireless security optionsConfigure basic settings on Aruba Instant APsConfigure AirWave management settings on an IAP clusterConfigure SNMP v2c settings on ArubaOS switchesDiscover ArubaOS switches in AirWave and bring switches and IAPs under monitoring and managementImplement zero touch provisioning (ZTP) for Aruba IAPs and ArubaOS switches This course teaches you the fundamental skills necessary to configure and manage modern, open standards-based networking solutions. This course consists of approximately 20% lecture and 80% hands-on lab exercises to help you learn how to implement and validate small to medium enterprise network solutions. This 3-day course prepares network professionals for the HPE ATP - Aruba Mobile First Solutions V1 certification exam.In this course, participants learn about ArubaOS switch technologies including: VLANs, securing access, redundancy technologies such as MSTP, link aggregation techniques including LACP, and switch virtualization with Aruba?s Virtual Switching Framework (VSF). You also learn about IP Routing including static and dynamic IP routing with OSPF. This course teaches you how to deploy Aruba wireless Access Points and configure Aruba Clustering technology. It also teaches you how to configure, manage and monitor the network with the Aruba AirWave management solution. Introduction to Aruba, a Hewlett Packard Enterprise companySwitch CLI (Command Line Interface) NavigationProtecting Management AccessManagement of Software and ConfigurationsVLANSSpanning Tree Protocol (STP)Link AggregationIP RoutingVirtual Switching Framework (VSF)Wireless for Small-to-Medium Businesses (SMBs)Aruba AirWave

Aruba Networks - Aruba Switching Fundamentals For Mobility, Rev. 16.41 (ASFM)
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Building Data Lakes on AWS

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Data platform engineers Solutions architects IT professionals Overview In this course, you will learn to: Apply data lake methodologies in planning and designing a data lake Articulate the components and services required for building an AWS data lake Secure a data lake with appropriate permission Ingest, store, and transform data in a data lake Query, analyze, and visualize data within a data lake In this course, you will learn how to build an operational data lake that supports analysis of both structured and unstructured data. You will learn the components and functionality of the services involved in creating a data lake. You will use AWS Lake Formation to build a data lake, AWS Glue to build a data catalog, and Amazon Athena to analyze data. The course lectures and labs further your learning with the exploration of several common data lake Introduction to data lakes Describe the value of data lakes Compare data lakes and data warehouses Describe the components of a data lake Recognize common architectures built on data lakes Data ingestion, cataloging, and preparation Describe the relationship between data lake storage and data ingestion Describe AWS Glue crawlers and how they are used to create a data catalog Identify data formatting, partitioning, and compression for efficient storage and query Lab 1: Set up a simple data lake Data processing and analytics Recognize how data processing applies to a data lake Use AWS Glue to process data within a data lake Describe how to use Amazon Athena to analyze data in a data lake Building a data lake with AWS Lake Formation Describe the features and benefits of AWS Lake Formation Use AWS Lake Formation to create a data lake Understand the AWS Lake Formation security model Lab 2: Build a data lake using AWS Lake Formation Additional Lake Formation configurations Automate AWS Lake Formation using blueprints and workflows Apply security and access controls to AWS Lake Formation Match records with AWS Lake Formation FindMatches Visualize data with Amazon QuickSight Lab 3: Automate data lake creation using AWS Lake Formation blueprints Lab 4: Data visualization using Amazon QuickSight Architecture and course review Post course knowledge check Architecture review Course review

AWS Building Data Lakes on AWS
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Segment Routing on Cisco IOS XR (SEGRTE201)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Systems engineers Network engineers Field engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe the key concepts of segment routing Implement and verify IGP segment routing Migrate an existing Multiprotocol Label Switching (MPLS) LDP-based network to segment routing Implement and verify TI-LFA segment routing Instantiate segment routing policies Instantiate multidomain segment routing policies Configure and verify BGP prefix segments and SR-based services The Implementing Segment Routing on Cisco IOS XR (SEGRTE201) v2.0 course covers the fundamental concepts of Segment Routing (SR), how to configure and verify segment routing within an Interior Gateway Protocol (IGP), and the interworking of Label Distribution Protocol (LDP) with segment routing. You will learn how to implement Topology-Independent Loop-Free Alternate (TI-LFA) using segment routing, and how to instantiate and verify segment routing traffic engineering policies. You will also learn how to implement segment routing within Border Gateway Protocol (BGP). Introduction to Segment Routing Examining Unified Fabric Routing Exploring Segment Routing Concepts Examining Segment Types Examining the Segment Routing Global Block (SRGB) IGP Segment Routing Implementation and Verification Examining the IGP Control Plane Examining SRGB and IGP Interactions Examining Prefix and Adjacency SIDs Intermediate System to Intermediate System (IS-IS) Multilevel and Open Shortest Path First (OSPF) Multi-Area Configuring and Verifying IS-IS SR Operation Configuring and Verifying OSPF SR Operation Segment Routing and LDP Interworking SR and LDP Interworking Data Plane Mapping Server Function and Configuration Interworking Deployment Models Topology Independent ? Loop Free Alternate Examining Classic LFA Examining TI-LFA Fundamentals Implementing and Verifying TI-LFA for SR Traffic Implementing and Verifying SR TI-LFA for LDP Traffic TI-LFA and SR LDP Interworking Segment Routing Policies ? Traffic Engineering (SR-TE) Exploring SR Policies Introducing the Anycast and Binding SIDs Enabling and Verifying SR Policies Instantiating SR Policies Instantiating SR Policies using BGP Dynamic Multidomain SR Policies Configuring and Verifying a Path Computation Element (PCE) Configuring and Verifying BGP Link-State (LS) Configuring Multidomain SR Policies with a PCE Configuring Multidomain SR Policies with On Demand Next-Hop (ODN) Segment Routing?Based Services Examining the BGP Prefix-SID Operation Configuring and Verifying the BGP Prefix SID Examining Egress Peer Engineering Examining the BGP Prefix-SID Operation SR Flexible Algorithm and Performance Measurement (PM) Delay SR-Enabled VPNs

Cisco Implementing Segment Routing on Cisco IOS XR (SEGRTE201)
Delivered OnlineFlexible Dates
Price on Enquiry

ES54 IBM Basic z/OS Tuning Using the Workload Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This is an intermediate course for z/OS system programmers, z/OS performance analysts, and z/OS performance administrators new to performance management for their z/OS system.Note: ES54 is intended for individuals new to WLM and the z/OS performance area Overview The objectives for this course are as follows:Describe a performance and tuning methodologyDevelop a systematic z/OS performance and tuning planDescribe the factors which could affect the performance of an z/OS systemUse the WLM ISPF applicationDescribe the components of a service definitionDefine workloads and service levels and classification rulesState which z/OS commands affect WLM operationIdentify the major WLM services for z/OS, including enclaves and application environments, and how they are used by DB2, WebSphere, and CICSAnalyze CPU performance when running in a shared LPAR environmentUtilize and monitor zIIP and zAAP specialty enginesMeasure and tune z/OS DASD, processor storage, and coupling facility configurationsExplain the functions and facilities of RMF and SMFAnalyze performance bottlenecks using RMFUse Workload License Charges (WLC), defined capacity and soft capping to manage software costsDescribe advanced z/OS environments that utilize Intelligent Resource Director (IRD), HiperDispatch, z/OSMF Workload Management, and I/O Priority ManagerUse the z/OSMF Workload Management (WLM) taskUse Performance Monitoring with z/OSMFModify a WLM service definition to meet the requirements for monitoring a specific system workloadCreate and customize Monitoring DesktopsReview any issues by using the Monitoring Desktops options displaysAssess the performance of the workloads running on the z/OS This course is designed for new performance analysts to learn to work with the Workload Manager (WLM) in goal mode. Learn concepts of WLM and performance management in the z/OS system using the WLM. Day 1 Welcome Unit 1 - Tuning methodology Unit 2 - Using SMF and RMF to monitor performance Lab 1 - Introduction to your system Lab 2 - Using RMF Monitor I and Monitor II Day 2 Unit 3 - Performance impacts when running in a shared LPAR environment Unit 4 - Basic system workload management (part 1) Lab 3 - Implementing a WLM environment on z/OS (part 1) Day 3 Unit 4 - Basic system workload management (part 2) Lab 3 - Implementing a WLM environment on z/OS (part 2) Day 4 Unit 5 - WLM commands, internals, and service Lab 4 - Using RMF Monitor III to solve performance problems Day 5 Unit 6 - z/OS DASD performance topics Unit 7 - Tuning processor storage Unit 8 - Miscellaneous performance topics Lab 5 - z/OSMF and performance management

ES54 IBM Basic z/OS Tuning Using the Workload Manager
Delivered OnlineFlexible Dates
Price on Enquiry

Check Point Cyber Security Administrator (CCSA R80.10)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Technical professionals who support, install, deploy or administer Check Point Software Blades. Overview Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.Describe the key elements of Check Point?s unified Security Management Architecture.Recognize SmartConsole features, functions and tools.Understand Check Point deployment options.Describe the basic functions of Gaia.Describe the essential elements of a Security Policy.Understand how traffic inspection takes place in a unified Security Policy.Summarize how administration roles and permissions assist in managing policy.Recall how to implement backup techniques.Understand the Check Point policy layer concept.Recognize Check Point security solutions and products and how they work to protect your network.Understand licensing and contract requirements for Check Point security products.Identify tools designed to monitor data, determine threats and recognize performance improvements.Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.Understand Site-to-Site and Remote Access VPN deployments and communities.Understand how to analyze and interpret VPN traffic.Recognize how to define users and user groups.Understand how to manage user access for internal and external users.Understand the basic concepts of ClusterXL technology and its advantages.Understand how to perform periodic administrator tasks as specified in administrator job descriptions. Provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades. Introduction to Check Point Technology Security Policy Management Policy Layers Check Point Security Solutions and Licensing Traffic Visibility Basic Concepts of VPNManaging User Access Working with ClusterXLAdministrator Task Implementation Additional course details: Nexus Humans Check Point Cyber Security Administrator (CCSA R80.10) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Check Point Cyber Security Administrator (CCSA R80.10) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Check Point Cyber Security Administrator (CCSA R80.10)
Delivered OnlineFlexible Dates
Price on Enquiry

Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Security administrators Security consultants Network administrators System engineers Technical support personnel Channel partners and resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Define the use and placement IDS/IPS components. Identify Snort features and requirements. Compile and install Snort. Define and use different modes of Snort. Install and utilize Snort supporting software. Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 is a 4-day course that shows you how to deploy Snort© in small to enterprise-scale implementations. You will learn how to install, configure, and operate Snort in Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) modes. You?ll practice installing and configuring Snort, utilize additional software tools and define rules to configure and improve the Snort environment, and more. The course qualifies for 32 Cisco Continuing Education credits (CE) towards recertification.This course will help you:Learning how to implement Snort, an open-source, rule-based, intrusion detection and prevention system. Gain leading-edge skills for high-demand responsibilities focused on security. Module 1: Detecting Intrusions with Snort 3.0 History of Snort IDS IPS IDS vs. IPS Examining Attack Vectors Application vs. Service Recognition Module 2: Sniffing the Network Protocol Analyzers Configuring Global Preferences Capture and Display Filters Capturing Packets Decrypting Secure Sockets Layer (SSL) Encrypted Packets Module 3: Architecting Nextgen Detection Snort 3.0 Design Modular Design Support Plug Holes with Plugins Process Packets Detect Interesting Traffic with Rules Output Data Module 4: Choosing a Snort Platform Provisioning and Placing Snort Installing Snort on Linux Module 5: Operating Snort 3.0 Start Snort Monitor the System for Intrusion Attempts Define Traffic to Monitor Log Intrusion Attempts Actions to Take When Snort Detects an Intrusion Attempt License Snort and Subscriptions Module 6: Examining Snort 3.0 Configuration Introducing Key Features Configure Sensors Lua Configuration Wizard Module 7: Managing Snort Pulled Pork Barnyard2 Elasticsearch, Logstash, and Kibana (ELK) Module 8: Analyzing Rule Syntax and Usage Anatomy of Snort Rules Understand Rule Headers Apply Rule Options Shared Object Rules Optimize Rules Analyze Statistics Module 9: Use Distributed Snort 3.0 Design a Distributed Snort System Sensor Placement Sensor Hardware Requirements Necessary Software Snort Configuration Monitor with Snort Module 10: Examining Lua Introduction to Lua Get Started with Lua

Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1
Delivered OnlineFlexible Dates
Price on Enquiry