• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

19384 Courses delivered Online

Cisco Multicloud Cost Optimization with Cisco CloudCenter Suite (CLDCO)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The primary audience for this course is as follows: Cloud solution architects Cloud administrators Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview After you complete this course the learner will be able to meet these overall objectives: Describe what clouds are supported and how to configure clouds for Cost Optimizer Examine the Cost Optimizer snapshots of costs incurred by the various clouds installed for an organization CLDCO, Mulitcloud Cost Optimization with Cisco CloudCenter Suite is a 1-day course that teaches you how the reporting and analysis of consumption the cost optimizer provides, functions within a Cisco© CloudCenter Suite. The cost optimizer works together with two other primary mechanisms: a workload manager that helps users deploy applications and manage governance policies, and an action orchestrator that provides seamless integration and workflow automation. Through lessons and hands-on experiences, you will learn the functionality of the CloudCenter cost optimizer.This course will help you:Acquire the advanced skills and techniques using the CloudCenter Suite for a consistent experience across all environments, whether you plan to deploy in the cloud or on-premisesLearn how to use the tools of cost management and workload optimization by leveraging the functionality of the entire CloudCenter suite Implementing Cisco CloudCenter Suite Cost Optimizer Cisco CloudCenter Suite Cost Optimizer Examining Cost Optimizer Inventory, Reports, Rightsizing, and Troubleshooting Configure Cost and Inventory Reports in the User Interface Additional course details: Nexus Humans Cisco Multicloud Cost Optimization with Cisco CloudCenter Suite (CLDCO) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Multicloud Cost Optimization with Cisco CloudCenter Suite (CLDCO) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Multicloud Cost Optimization with Cisco CloudCenter Suite (CLDCO)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Service Provider 5G Technologies Foundations v1.0 (SPMBL100)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is designed for network and software engineers and hold job roles such as: Network administrator Network engineer Network manager System engineer Project manager Network designer Overview After taking this course, you should be able to: Describe mobile network architecture basics List enabling technologies for 5G and describe 5G key use cases Perform basic operations on a Cisco 5G NSA mobile packet core Describe the Cisco 5G Converged SDN Transport Architecture Describe Cisco NFVI and perform basic operations using Cisco ESC and Cisco Virtualized Infrastructure Manager (VIM) Describe Cisco service provider automation and orchestration solutions to deploy and manage 5G network functions Describe the Cisco Ultra Cloud Core architecture and deploy the Cisco SMI Explain the 5G ready distributed Telco DC with Cisco ACI solution Describe the Cisco 5G security architecture The Cisco Service Provider 5G Technologies Foundations (SPMBL100) v1.0 course introduces mobile network components, basic 5G concepts, and features of 5G technology including faster data speeds, higher device capacity, and improved user experience. You will examine the mobile packet core solutions, 5G transport architecture, and Cisco© automation and orchestration tools used in 5G networks. You will also learn about the Cisco 5G Non-standalone (NSA) and the Cisco Ultra Cloud Core 5G standalone (SA) platform solutions, the Cisco 5G converged Software-Defined Networking (SDN) transport architecture, and Cisco edge computing solutions. You will study the Cisco Network Function Virtualization (NFVI) architecture, Cisco Network Services Orchestrator (NSO), and Cisco Elastic Services Controller (ESC). You will learn how 5G is distributed with Telco Data Center (DC) with Cisco Application Centric Infrastructure (Cisco ACI©). And finally, Zero-Touch Provisioning (ZTP), Cisco Crosswork?, and the Cisco 5G security architecture will also be presented. Mobile Network Fundamentals 5G Key Use Cases Examining Mobile Network Components Enabling Technologies for 5G Introduction to 5G NR Characteristics Cloud Radio Access network (RAN) Cisco 5G NSA Solution 5G NSA Basics 5G NSA StarOS Configurations Cisco 5G Converged SDN Transport Architecture Cisco 5G Transport Ready Devices Application Awareness and Network Slicing with Segment Routing Cisco NFV Infrastructure, Cisco Virtualized Network Functions (VNFs), Cisco VIM, and Cisco ESC NFVI and SDN Architecture Overview Cisco VIM Pod Configurations Cisco Service Provider Automation and Orchestration Telemetry Basics ZTP Fundamentals Cisco Ultra Cloud Core Cisco Ultra Cloud Core Basics Kubernetes and Docker Fundamentals 5G Ready Distributed DC with Cisco ACI Cisco ACI in Telco Data Centers 5GC Deployment Mitigating Threats in 5G Introduction to 5G Cybersecurity Risks Mitigating 5G Cybersecurity Risks

Cisco Service Provider 5G Technologies Foundations v1.0 (SPMBL100)
Delivered OnlineFlexible Dates
Price on Enquiry

0G51BG IBM Statistical Analysis Using IBM SPSS Statistics (V26)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for IBM SPSS Statistics users who want to familiarize themselves with the statistical capabilities of IBM SPSS StatisticsBase. Anyone who wants to refresh their knowledge and statistical experience. Overview Introduction to statistical analysis Describing individual variables Testing hypotheses Testing hypotheses on individual variables Testing on the relationship between categorical variables Testing on the difference between two group means Testing on differences between more than two group means Testing on the relationship between scale variables Predicting a scale variable: Regression Introduction to Bayesian statistics Overview of multivariate procedures This course provides an application-oriented introduction to the statistical component of IBM SPSS Statistics. Students will review several statistical techniques and discuss situations in which they would use each technique, how to set up the analysis, and how to interpret the results. This includes a broad range of techniques for exploring and summarizing data, as well as investigating and testing relationships. Students will gain an understanding of when and why to use these various techniques and how to apply them with confidence, interpret their output, and graphically display the results. Introduction to statistical analysis Identify the steps in the research process Identify measurement levels Describing individual variables Chart individual variables Summarize individual variables Identify the normal distributionIdentify standardized scores Testing hypotheses Principles of statistical testing One-sided versus two-sided testingType I, type II errors and power Testing hypotheses on individual variables Identify population parameters and sample statistics Examine the distribution of the sample mean Test a hypothesis on the population mean Construct confidence intervals Tests on a single variable Testing on the relationship between categorical variables Chart the relationship Describe the relationship Test the hypothesis of independence Assumptions Identify differences between the groups Measure the strength of the association Testing on the difference between two group meansChart the relationship Describe the relationship Test the hypothesis of two equal group means Assumptions Testing on differences between more than two group means Chart the relationship Describe the relationship Test the hypothesis of all group means being equal Assumptions Identify differences between the group means Testing on the relationship between scale variables Chart the relationship Describe the relationship Test the hypothesis of independence Assumptions Treatment of missing values Predicting a scale variable: Regression Explain linear regression Identify unstandardized and standardized coefficients Assess the fit Examine residuals Include 0-1 independent variables Include categorical independent variables Introduction to Bayesian statistics Bayesian statistics and classical test theory The Bayesian approach Evaluate a null hypothesis Overview of Bayesian procedures in IBM SPSS Statistics Overview of multivariate procedures Overview of supervised models Overview of models to create natural groupings

0G51BG IBM Statistical Analysis Using IBM SPSS Statistics (V26)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere: Troubleshooting [v7.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators System integrators Overview By the end of the course, you should be able to meet the following objectives: Introduce troubleshooting principles and procedures Practice Linux commands that aid in the troubleshooting process Use command-line interfaces, log files, and the vSphere Client to diagnose and resolve problems in the vSphere environment Explain the purpose of key vSphere log files Identify networking problems based on reported symptoms, validate and troubleshoot the reported problem, identify the root cause and implement the appropriate resolution Analyze storage failure scenarios using a logical troubleshooting methodology, identify the root cause, and apply the appropriate resolution to resolve the problem Troubleshoot vSphere cluster failure scenarios and analyze possible causes Diagnose common VMware vSphere High Availability problems and provide solutions Identify and validate VMware ESXi™ host and VMware vCenter Server problems, analyze failure scenarios, and select the correct resolution Troubleshoot virtual machine problems, including migration problems, snapshot problems, and connection problems Troubleshoot performance problems with vSphere components This five-day, hands-on training course provides you with the advanced knowledge, skills, and abilities to achieve competence in troubleshooting the VMware vSphere© 7.x environment. This workshop increases your skill and competence in using the command-line interface, VMware vSphere© Client?, log files, and other tools to analyze and solve problems Course Introduction Introductions and course logistics Course objectives Introduction to Troubleshooting Define the scope of troubleshooting Use a structured approach to solve configuration and operational problems Apply a troubleshooting methodology to logically diagnose faults and improve troubleshooting efficiency Troubleshooting Tools Use command-line tools (such as Linux commands, vSphere CLI, ESXCLI) to identify and troubleshoot vSphere problems Identify important vSphere log files and interpret the log file contents Troubleshooting Virtual Networking Analyze and resolve standard switch and distributed switch problems Analyze virtual machine connectivity problems and fix them Examine common management network connectivity problems and restore configurations Troubleshooting Storage Troubleshoot and resolve storage (iSCSI, NFS, and VMware vSphere© VMFS) connectivity and configuration problems Analyze and resolve common VM snapshot problems Identify multipathing-related problems, including common causes of permanent device loss (PDL) and all paths down (APD) events and resolve these problems Troubleshooting vSphere Clusters Identify and recover from problems related to vSphere HA Analyze and resolve VMware vSphere© vMotion© configuration and operational problems Analyze and resolve common VMware vSphere© Distributed Resource Scheduler? problems Troubleshooting Virtual Machines Identify possible causes and resolve virtual machine power-on problems Troubleshoot virtual machine connection state problems Resolve problems seen during VMware Tools? installations Troubleshooting vCenter Server and ESXi Analyze and fix problems with vCenter Server services Analyze and fix vCenter Server database problems Examine ESXi host and vCenter Server failure scenarios and resolve the problems

VMware vSphere: Troubleshooting [v7.0]
Delivered OnlineFlexible Dates
Price on Enquiry

Data Science Projects with Python

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for If you are a data analyst, data scientist, or a business analyst who wants to get started with using Python and machine learning techniques to analyze data and predict outcomes, this book is for you. Basic knowledge of computer programming and data analytics is a must. Familiarity with mathematical concepts such as algebra and basic statistics will be useful. Overview By the end of this course, you will have the skills you need to confidently use various machine learning algorithms to perform detailed data analysis and extract meaningful insights from data. This course is designed to give you practical guidance on industry-standard data analysis and machine learning tools in Python, with the help of realistic data. The course will help you understand how you can use pandas and Matplotlib to critically examine a dataset with summary statistics and graphs, and extract the insights you seek to derive. You will continue to build on your knowledge as you learn how to prepare data and feed it to machine learning algorithms, such as regularized logistic regression and random forest, using the scikit-learn package. You?ll discover how to tune the algorithms to provide the best predictions on new and unseen data. As you delve into later sections, you?ll be able to understand the working and output of these algorithms and gain insight into not only the predictive capabilities of the models but also their reasons for making these predictions. Data Exploration and Cleaning Python and the Anaconda Package Management System Different Types of Data Science Problems Loading the Case Study Data with Jupyter and pandas Data Quality Assurance and Exploration Exploring the Financial History Features in the Dataset Activity 1: Exploring Remaining Financial Features in the Dataset Introduction to Scikit-Learn and Model Evaluation Introduction Model Performance Metrics for Binary Classification Activity 2: Performing Logistic Regression with a New Feature and Creating a Precision-Recall Curve Details of Logistic Regression and Feature Exploration Introduction Examining the Relationships between Features and the Response Univariate Feature Selection: What It Does and Doesn't Do Building Cloud-Native Applications Activity 3: Fitting a Logistic Regression Model and Directly Using the Coefficients The Bias-Variance Trade-off Introduction Estimating the Coefficients and Intercepts of Logistic Regression Cross Validation: Choosing the Regularization Parameter and Other Hyperparameters Activity 4: Cross-Validation and Feature Engineering with the Case Study Data Decision Trees and Random Forests Introduction Decision trees Random Forests: Ensembles of Decision Trees Activity 5: Cross-Validation Grid Search with Random Forest Imputation of Missing Data, Financial Analysis, and Delivery to Client Introduction Review of Modeling Results Dealing with Missing Data: Imputation Strategies Activity 6: Deriving Financial Insights Final Thoughts on Delivering the Predictive Model to the Client

Data Science Projects with Python
Delivered OnlineFlexible Dates
Price on Enquiry

Attacking and Securing .Net Web Applications (TT8320-N)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate-level programming course, designed for experienced .Net developers who wish to get up and running on developing well defended software applications. Real world programming experience with .Net is required. Overview Students who attend Attacking and Securing .Net Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a .Net perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on .Net security training that offers a unique look at .Net application security. Beginning with penetration testing and hunting for bugs in .Net web applications, you thoroughly examine best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, driving home the mechanics of how to secure .Net web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Injection Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? .NET Issues and Best Practices Making Application Security Real Time Permitting Topics Cryptography Overview .NET Cryptographic Services

Attacking and Securing .Net Web Applications (TT8320-N)
Delivered OnlineFlexible Dates
Price on Enquiry

The Definitive Guide to Cloud Asset Management

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The course is designed for anyone desiring or requiring an understanding of how to manage cloud technologies as a business asset. This includes: IT Asset Managers Hardware Asset Managers Software Asset Managers Cloud Asset Managers Cloud Project Managers IT Managers IT Cloud Managers and Developers Cloud Vendor Managers IT Procurement IT Security Professionals Overview The student will learn the nuances of cloud assets and manage them from a financial, risk, compliance, and efficiency perspective. Upon completion of the course, the student will be able to: Understand the attributes of and requirements for managing cloud assets Define and develop cloud asset management processes Create cloud asset policies Develop and implement a communication plan for managing cloud assets Identify tool requirements to support the cloud asset type Develop cloud vendor contract requirements Understand and articulate individual and department responsibilities for the cloud asset management program Define requirements for managing cloud vendors Assess the organization's cloud asset management readiness This course takes an in-depth look at cloud assets. It defines how to manage these assets using best practical practices for the primary cloud architectures Software-as-a-Service, Platform-as-a-Service, and Infrastructure as-a-Service. What is Information Technology Asset Management? Why Cloud Solutions Need ITAM Introducing Cloud Services Vendor's Tools Cloud Vendor Management Communication Managing SaaS Acquire Phase Receive Phase Deploy Phase In-Use Phase Recover Phase Dispose Phase Example Vendor Reports Terms and Conditions Vendor Scorecard Managing IaaS and PaaS ITAM Data Center Challenges, Before Virtualization ITAM Data Center Challenges, with Virtualization The Data Center Transformation The End-User ITAM Supporting Processes Acquire Phase Receive Phase Deploy Phase In-Use Phase Recover Phase Dispose Phase Software Asset Management Example Vendor Reports Terms and Conditions Vendor Scorecard Disaster Recovery PlanDisposal of Replaced IT AssetsCAM and the ITAM Hierarchy Additional course details: Nexus Humans The Definitive Guide to Cloud Asset Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the The Definitive Guide to Cloud Asset Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

The Definitive Guide to Cloud Asset Management
Delivered OnlineFlexible Dates
Price on Enquiry

B6252 IBM Cognos Framework Manager: Design Metadata Models v11.1.x

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Data Modelers Overview Please refer to course overview This offering provides participants with introductory to advanced knowledge of metadata modeling concepts, and how to model metadata for predictable reporting and analysis results using IBM Cognos Framework Manager. Participants will learn the full scope of the metadata modeling process, from initial project creation, to publishing of metadata to the web, enabling end users to easily author reports and analyze data. Introduction to IBM Cognos Framework Manager Model data and identifying related data Define requirements and modeling strategies Overview of IBM Cognos Framework Manager Create a baseline project Extend a model Prepare reusable metadata Model for predictable results in IBM Cognos Framework Manager Identify query issues Identify reporting traps Model virtual star schemas Use query subjects, modify relationships, and consolidate metadata using virtual objects Create calculations, filter data, and customize metadata for runtime Implement a time dimension and specify determinants Model for presentation in IBM Cognos Framework Manager Create a presentation view Examine data source query subject types and stored procedure query subject types Specify data security and package security Specify object security and dynamic data security Create analysis objects Manage OLAP data sources Advanced capabilities in IBM Cognos Framework Manager Explore SQL generation and the use of governors Examine the use of IBM Cognos SQL and generated SQL for DMR data Other query considerations Use session parameters, prompt macros, and security macro functions Use materialized views, minimize SQL, and enable Dynamic Query Mode (DQM) DQM, CQM, caching metadata, query processing, aggregate calculation, and other ways to improve performance Extended capabilities in IBM Cognos Framework Manager Perform basic maintenance and management on a model Remap metadata to another source and import and link additional data sources Run scripts to automate or update a model and report on a model Segment a project, link a project, and branch a model Nest packages and specify package languages and functions Explore additional modeling techniques and customize metadata for a multilingual audience Additional course details: Nexus Humans B6252 IBM Cognos Framework Manager: Design Metadata Models v11.1.x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the B6252 IBM Cognos Framework Manager: Design Metadata Models v11.1.x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

B6252 IBM Cognos Framework Manager: Design Metadata Models v11.1.x
Delivered OnlineFlexible Dates
Price on Enquiry

B6152 IBM Cognos Framework Manager - Design Metadata Models v11.0.x

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Data Modelers Overview Please refer to course overview This offering provides participants with introductory to advanced knowledge of metadata modeling concepts, and how to model metadata for predictable reporting and analysis results using Framework Manager. Participants will learn the full scope of the metadata modeling process, from initial project creation, to publishing of metadata to the web, enabling end users to easily author reports and analyze data. Introduction to IBM Cognos Framework Manager Model data and identifying related data Define requirements and modeling strategies Overview of IBM Cognos Framework Manager Create a baseline project Extend a model Prepare reusable metadata Model for predictable results in IBM Cognos Framework Manager Identify query issues Identify reporting traps Model virtual star schemas Use query subjects, modify relationships, and consolidate metadata using virtual objects Create calculations, filter data, and customize metadata for runtime Implement a time dimension and specify determinants Model for presentation in IBM Cognos Framework Manager Create a presentation view Examine data source query subject types and stored procedure query subject types Specify data security and package security Specify object security and dynamic data security Create analysis objects Manage OLAP data sources Advanced capabilities in IBM Cognos Framework Manager Explore SQL generation and the use of governors Examine the use of IBM Cognos SQL and generated SQL for DMR data Other query considerations Use session parameters, prompt macros, and security macro functions Use materialized views, minimize SQL, and enable Dynamic Query Mode (DQM) DQM, CQM, caching metadata, query processing, aggregate calculation, and other ways to improve performance Extended capabilities in IBM Cognos Framework Manager (Optional) Perform basic maintenance and management on a model Remap metadata to another source and import and link additional data sources Run scripts to automate or update a model and report on a model Segment a project, link a project, and branch a model Nest packages and specify package languages and functions Explore additional modeling techniques and customize metadata for a multilingual audience Additional course details: Nexus Humans B6152 IBM Cognos Framework Manager - Design Metadata Models v11.0.x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the B6152 IBM Cognos Framework Manager - Design Metadata Models v11.0.x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

B6152 IBM Cognos Framework Manager - Design Metadata Models v11.0.x
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Although there are no mandatory prerequisites, the course is particularly suited for the following audiences: Cybersecurity engineer Cybersecurity investigator Incident manager Incident responder Network engineer SOC analysts currently functioning at entry level with 2+ years of experience Overview After taking this course, you should be able to: Describe the types of service coverage within a SOC and operational responsibilities associated with each. Compare security operations considerations of cloud platforms. Describe the general methodologies of SOC platforms development, management, and automation. Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections. Describe Zero Trust and associated approaches, as part of asset controls and protections. Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC. Use different types of core security technology platforms for security monitoring, investigation, and response. Describe the DevOps and SecDevOps processes. Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, CommaSeparated Values (CSV). Describe API authentication mechanisms. Analyze the approach and strategies of threat detection, during monitoring, investigation, and response. Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs). Interpret the sequence of events during an attack based on analysis of traffic patterns. Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools). Analyze anomalous user and entity behavior (UEBA). Perform proactive threat hunting following best practices. The Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity fundamentals and prepares you for the role of Information Security Analyst on a Security Operations Center team. You?ll learn to automate for security using cloud platforms and how to apply your knowledge to real-world scenarios Course Outline Understanding Risk Management and SOC Operations Understanding Analytical Processes and Playbooks Investigating Packet Captures, Logs, and Traffic Analysis Investigating Endpoint and Appliance Logs Understanding Cloud Service Model Security Responsibilities Understanding Enterprise Environment Assets Threat Tuning Threat Researching and Threat Intelligence Practices Understanding APIs Understanding SOC Development and Deployment Models Performing Security Analytics and Reports in a SOC Malware Forensics Basics Threat Hunting Basics Additional course details: Nexus Humans Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0
Delivered OnlineFlexible Dates
Price on Enquiry