Duration 3 Days 18 CPD hours This course is intended for Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks should attend this course. You should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course. Overview After completing this course, the successful student should be able to: Deploy the appropriate operation mode for your network Use the GUI and CLI for administration Control network access to configured networks using firewall policies Apply port forwarding, source NAT, and destination NAT Authenticate users using firewall policies Understand encryption functions and certificates Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports Fight hacking and denial of service (DoS) Collect and interpret log entries Identify the characteristics of the Fortinet Security Fabric In this three-day course, you will learn how to use the most common FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, the Fortinet Security Fabric, user authentication, and how to protect your network using security profiles, such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security. Product Version FortiOS 7.2 Course Outline 1. Introduction and Initial Configuration 2. Firewall Policies 3. Network Address Translation 4. Firewall Authentication 5. Logging and Monitoring 6. Certificate Operations 7. Web Filtering 8. Application Control 9. Antivirus 10. Intrusion Prevention and Denial of Service 11. Security Fabric
Duration 1 Days 6 CPD hours This course is intended for This course is intended for working professionals in various job roles, both native and non-native English speakers, who use formal and informal written communications in the course of business, and who seek to improve their grammar usage. Overview In this course, you will develop the skills to coach for results. You will: Define coaching and determine how you want to coach. Build a foundation for coaching. Establish a coaching process. Execute a coaching plan. Coach teams and coach remotely. As a leader in your organization, you're expected to help people meet or exceed expectations and to help ensure productivity and profitability for the organization. Coaching is a leadership tool that is effective in improving performance and contributing to the goals of the organization. In this course, you will build a foundation for coaching, establish a coaching process, execute a coaching plan, and explore strategies for coaching in different business scenarios. Many different factors can affect employee performance. When performance problems arise, people need to be supported to get back on track and do their jobs well. Coaching is an effective way of confirming an employee's value while improving performance. Coaching contributes to employee retention because it offers the opportunity to grow, provides motivation, and supports learning. Coaching also enhances the image and effectiveness of managers and supervisors. Defining Yourself as a Coach Define Coaching Determine a Coaching Approach Developing Core Coaching Skills Evaluate Performance Develop Essential Interpersonal Skills Establishing a Coaching Process Initiate the Coaching Relationship Agree on a Coaching Plan Executing the Coaching Plan Coach Adjust the Coaching Plan Verify That Goals Have Been Met Coaching in Different Business Scenarios Coach a Team Coach Remotely
Duration 3 Days 18 CPD hours This course is intended for Built for experienced IT Professionals who want to be familiar with Citrix ADC. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC. Overview Understand the functionality and capabilities of the Citrix ADC Complete the initial setup and configuration of the Citrix ADC appliance Understand Citrix ADC Load Balancing and High Availability configuration options and management Employ recommended tools and techniques to troubleshoot common ADC network and connectivity issues Learn the skills required to implement Citrix ADC Essential components includingsecure Load Balancing, High Availability, and Citrix ADC Management. At the endof the course, students will be able to configure their Citrix ADC environments toaddress traffic delivery and management requirements including Load Balancing,Availability, and ADC Operation Management. Getting Started Introduction to Citrix ADC Feature and Platform Overview Deployment Options Architectural Overview Setup and Management Basic Networking Networking Topology Citrix ADC Components Routing Access Control Lists ADC Platforms Citrix ADC MPX Citrix ADC VPX Citrix ADC CPX Citrix ADC SDX Citrix ADC BLX High Availability Citrix ADC High Availability High Availability Configuration Managing High Availability In Service Software Upgrade Troubleshooting High Availability Load balancing Load Balancing Overview Load Balancing Methods and Monitors Load Balancing Traffic Types Load Balancing Protection Priority Load Balancing Load Balancing Troubleshooting SSL Offloading SSL Overview SSL Configuration SSL Offload Troubleshooting SSL Offload SSL Vulnerabilities and Protections Security Authentication, Authorization, and Auditing Configuring External Authentication Admin Partitions Security Citrix ADC Logging Monitoring with SNMP Reporting and Diagnostics AppFlow Functions Citrix Application Delivery Management Troubleshooting
Duration 1 Days 6 CPD hours This course is intended for This course is intended for networking and security professionals involved in the day-to-day management of a FortiAnalyzer appliance and FortiGate security information.. Overview Describe key features and concepts of FortiAnalyzer Deploy an appropriate architecture Manage ADOMs on both FortiAnalyzer and the devices that log to it Configure RAID Register supported devices Encrypt log transmission (SSL / IPSec) View & analyze current and historical logs (FortiView) Monitor events Apply disk quotas to log data from devices Backup, restore, and forward log data Use content archiving (summary and full) Understand the different stages of data processing, from receiving logs to compiling reports Understand SQL queries and datasets used by FortiAnalyzer reports Design datasets, charts, and custom reports Generate reports by schedule or on demand. In this 1-day class, you will learn how to use FortiAnalyzer. You will explore setup, registering supported devices and securing communications, managing logs and archives, and configuring both predefined and customized reports. Introduction to FortiAnalyzer Key features Key concepts Different FortiAnalyzer models Configuration & Administration Deployment requirements Configuration tools Configuring network settings Backing up system configuration Configuring administrative users Configuring, enabling, and assigning ADOMs Configuring RAID Device Registration Registered and unregistered devices Device registration methods Modifying options of a registered device Methods available to secure communication Configuring SSL encryption and encryption levels Configuring an IPsec tunnel Logs & Archives Logging basics The FortiView tab Configuring log arrays and event handlers Reports Reports and functionality Relationship between reports, charts, and datasets Effect of ADOMs on report settings SQL SELECT queries and clauses SQL functions and operators FortiAnalyzer-specific functions and macros Building or customizing charts Report features--creating, cloning, configuring
Duration 2 Days 12 CPD hours This course is intended for Leaders & Managers Overview The practical emotional intelligence tools every manager needs to build performance, communication, trust and leadership skills. Management Essentials with applied Emotional Intelligence delivers crucial tools for professionals to learn more about the people side of the organization. Strengthening performance with a powerful framework to understand the job of managing people. Provides practical tools for effective management and leadership. This course blends engaging learning and powerful content with the perspective of emotional intelligence experts. It provides tools to help navigate through today?s challenges, foster innovation, and build organizations where people thrive. What is Emotional Intelligence? Learn about business EI - a practical, work based approach that helps individuals and teams. Discover 18 key brain talents essential to fuel performance. Essentials of Trust Where does Trust originate? Do we trust from the head or the heart? Explore the science of emotional intelligence with a practical approach. Use the EI tools to help you earn trust. The Challenge of Change Untangle and rewire to affect change. Understand the stages of change and the emotional transitions needed to support change. Recognize our own patterns; a key step to being more effective at change. Igniting Motivation The surprising truth about what motivates us. Find meaning in your work and help the people that work for you find meaning. Delve into Purpose, Skill and Autonomy, and find what motivates you and your team? Enhancing Teamwork What blocks us from utilizing Divergence in our Teams? What helps us? Learn to know the EI talents you have in your group. Understand working with differing personalities. Discover strengths and weaknesses and how can they be positive. Accelerating Execution Higher and lower talents and how they assist? Learn the impact of optimizing talent. Discover your EI talent to help you grow and optimize your execution.
Duration 3 Days 18 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and datacenter networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Platform layered architecture and deployment procedures Describe the VMware Telco Cloud Platform virtual infrastructure requirements List the use cases of VMware vSphere and VMware vCenter Server Describe the VMware Telco Cloud Platform networking and storage requirements Describe the architecture of VMware Tanzu⢠Standard for Telco Configure management and workload clusters for containers as a service functionality Instantiate network services and network functions Enumerate troubleshooting concepts and Day 2 operations for VMware Telco Cloud Platform This three-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Platform? environment. In this course, you are introduced to the VMware Telco Cloud Platform infrastructure, deployment options, and procedures. You also deploy Kubernetes clusters and understand the detailed configuration settings of management and workload clusters. You onboard and instantiate network functions and network services using hands-on lab exercises.In addition, you are presented with various types of technical problems in VMware Telco Cloud Platform, which you will identify, analyze, and solve through a systematic troubleshooting process. his three-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Platform⢠environment. In this course, you are introduced to the VMware Telco Cloud Platform infrastructure, deployment options, and procedures. You also deploy Kubernetes clusters and understand the detailed configuration settings of management and workload clusters. You onboard and instantiate network functions and network services using hands-on lab exercises. In addition, you are presented with various types of technical problems in VMware Telco Cloud Platform, which you will identify, analyze, and solve through a systematic troubleshooting process.
Duration 2 Days 12 CPD hours This course is intended for Built for experienced IT Professionalsworking with Citrix Virtual Appsand Desktops who need to plan for,implement, or manage a ProvisioningServices environment. Potential studentsinclude administrators, engineers, andarchitects. Overview #NAME? In this course, students will learn to install and configure a highly available Citrix Provisioning farm according to leading practices. In this course, students will learn about the architecture, communication, and processes that make up Citrix Provisioning to be successful with deploying and managing a farm. Manage and integrate vDisks and target devices with Citrix Virtual Apps and Desktops for easy rollback, upgrades, and performance of Virtual Delivery Agent machines. At the end of this course students will be able to install, configure and manage the CitrixProvisioning 7 solution. Advanced Provisioning Learning Objectives Introduction to Citrix Provisioning (PVS) Getting Started with Citrix Provisioning Citrix Provisioning Architecture Citrix Provisioning Infrastructure Lab VM Power Management Learning Objectives The Citrix Provisioning Server The Farm Database The Store Streaming the vDisk Lab VM Power Management Learning Objectives vDisk Introduction Master Target Device Preparation Streaming Introduction Boot Methods Target Devices Lab VM Power Management Learning Objectives Target Devices Introduction Reads and Writes Machine and User Data Integrating Citrix Provisioning with Citrix Virtual Apps and Desktops Lab VM Power Management Learning Objectives The Complete Architecture Overview The Citrix Virtual Desktops Setup Wizard Manage the Target Devices through Creating Device Collections Using Provisioned Services with Citrix Virtual Apps and Desktops Managing Citrix Provisioning from Citrix Cloud Advanced Architecture Lab VM Power Management Learning Objectives Farm Component Scalability Store Redundancy Farm Database Redundancy Supporting Citrix Provisioning Lab VM Power Management Learning Objectives vDisk Updates Delegate Administration Audit and Support Alternative vDisk Update Methods
Duration 5 Days 30 CPD hours This course is intended for IT professionals who have attended Red Hat System Administration I and want the skills to be full-time enterprise Linux administrators and/or earn RHCSA certifications This course focuses on the key tasks needed to become a full time Linux administrator and goes deeper into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting. Automate installation with Kickstart Automate the installation of Red Hat Enterprise Linux systems with Kickstart Use regular expressions with grep Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files. Create and Edit text files with vim Introduce the vim text editor, with which you can open, edit, and save text files. Schedule future Linux tasks Schedule tasks to automatically execute in the future. Manage priority of Linux processes Influence the relative priorities at which Linux processes run. Control access to files with access control lists (ACL) Manage file security using POSIX access control lists. Manage SELinux security Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise. Connect to network-defined users and groups Configure systems to use central identity management services. Add disks, partitions, and file systems to a Linux system Manage simple partitions and file systems. Manage logical volume management (LVM) storage Manage logical volumes from the command line. Access networked attached storage with network file system (NFS) Access (secure) NFS shares. Access networked storage with SMB Use autofs and the command line to mount and unmount SMB file systems. Control and troubleshoot the Red Hat Enterprise Linux boot process Limit network communication with firewall, Configure a basic firewall. Comprehensive review Practice and demonstrate knowledge and skills learned in this course.
Duration 2 Days 12 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy a Cisco Integrated Threat Defense solution in their network environment. Cisco integrators and partners Systems and network engineers Technical architects Technical support personnel Overview After taking this course, you should be able to: Understand the network security landscape and the Cisco Integrated Threat Defense (ITD) solutions Describe the key components of the ITD solution and their use in the network Configure the Cisco Identity Services Engine (ISE) for a baseline of operation in the ITD solution Configure the integration between the Cisco Stealthwatch and Cisco ISE platforms Configure the integration between the Cisco Firepower and ISE platforms Configure the integration between Cisco Firepower and Cisco Advanced Malware Protection (AMP) for Endpoints The Implementing an Integrated Threat Defense Solution (SECUR201) v1.2 course provides an analysis of the cybersecurity landscape with an emphasis on the importance of an integrated threat defense architecture. Through a combination of lessons and hands-on practice, you will learn to deploy and integrate Cisco©?s Integrated Threat Defense solutions which include: Cisco Identity Services Engine (ISE), Cisco Stealthwatch, Cisco Firepower NGFW, and Cisco AMP for Endpoints. This course provides you with the knowledge and skills to implement and integrate solution components with existing network services, integrate solution components with the pxGrid (Platform Exchange Grid) framework, integrate network and endpoint-based malware protection, and observation of security dataflow after the introduction of malware. Course Outline Integrated Threat Defense Introduction ITD Products Identity Services Engine Setup Integration of Stealthwatch with Identity Services Engine Integration of Firepower with Identity Services Engine Integration of Firepower with AMP for Endpoints Lab outline Connecting to the Lab Environment Integrating ISE and Active Directory Integrating ISE and Cisco Adaptive Security Appliance (ASA) Configuring pxGrid and Client Certificates Integrating Stealthwatch with Identity Services Engine Integrating Network Visibility Module (NVM) with AnyConnect Integrating Firepower with Identity Services Engine Integrating AMP for Endpoints with Firepower
Duration 2 Days 12 CPD hours This course is intended for Die Zertifizierung EXIN Information Security Foundation based on ISO/IEC 27001 richtet sich an alle in der Datenverarbeitung tätigen Mitarbeiter. Das Modul eignet sich auch für kleine und mittelständische Unternehmer, die ein bestimmtes Grundwissen im Bereich der Informationssicherheit benötigen. Für Fachkräfte, die neu auf dem Gebiet der Informationssicherheit sind, ist dieses Modul ein guter Anfang. Overview Anwendungsbereich Mit einer Zertifizierung EXIN Information Security Foundation based on ISO/IEC 27001 können Professionals ihr Wissen in folgenden Bereichen nachweisen: Information und Sicherheit: der Begriff, der Wert, die Bedeutung und die Informationssicherheit Bedrohungen und Risiken: die Begriffe Bedrohung und Risiko und wie diese mit der Zuverlässigkeit von Informationen in Beziehung stehen Verfahren und Organisation: Sicherheitsrichtlinie und Sicherheitsorganisation einschlieÃlich der Bestandteile der Sicherheitsorganisation sowie der Umgang mit (Sicherheits)vorfällen MaÃnahmen: die Bedeutung von SicherheitsmaÃnahmen wie zum Beispiel physischen, technischen und organisatorischen MaÃnahmen Gesetze und Vorschriften: die Bedeutung und Auswirkung von Gesetzen und Vorschriften ie EXIN-Module zum Thema Informationssicherheitsmanagement definieren Informationssicherheit wie folgt: Bei dem Informationssicherheitsmanagement geht es um die Definition, Umsetzung, Aufrechterhaltung, Einhaltung und Bewertung von kohârenten Kontrollen (Maánahmen), die die VerfÂgbarkeit, Integritât, und Vertraulichkeit der (manuellen und automatisierten) Informationsverarbeitung sichern. Das Modul EXIN Information Security Foundation based on ISO/IEC 27001 prÂft die Grundbegriffe der Informationssicherheit und ihre Beziehungen zueinander. Eine der Zielsetzungen des Moduls ist das Bewusstsein fÂr den Wert von Informationen zu wecken und ein Verstândnis fÂr die Schwachstellen der Informationsverarbeitung zu vermitteln, um zu verstehen, welche Maánahmen zum Schutz von Informationen notwendig sind. Information und Sicherheit Der Begriff Information Der Wert von Informationen Aspekte der Zuverlâssigkeit Bedrohungen und Risiken Bedrohungen und Risiken Verfahren und Organisation Sicherheitsrichtlinie und Sicherheitsorganisation Bestandteile Incident Management Maánahmen Bedeutung von Maánahmen Physische Maánahmen Technische Maánahmen Organisatorische Maánahmen Gesetzgbeung und Vorschriften Gesetzgebung und Vorschriften