The focus of this Windows 10 End User course is to introduce you to the Microsoft Windows 10 operating system and explain the basics of navigating the new Windows 10 operating system for becoming more productive and efficient. You'll know how to log in and learn essential functionality and review new functionality and features in Windows 10, following with review file management and customisation with File Explorer, customise and personalise desktop and other areas of the Windows 10 operating setting. You'll also learn to work with applications and programs including installing, updating, and troubleshooting, and get accustomed with Cortana, learn to use the new Maps, Mail, People, Calendar, and Weather features. Furthermore, you'll learn more about Microsoft Edge, its functionality and new features. What you'll learn Get started by logging in and navigating the Windows 10 environment. Personalize the interface and customize settings. Manage files and folders, and learn about OneDrive. Become familiar with Edge, Microsoft's newest browser, and explore the features. Learn to use Cortana, Maps, Photos, Mail, People, Calendar and Weather. Learn to install applications, set defaults, and manage updating and troubleshooting settings. Requirements Basic familiarity with computers and navigating the Internet. Who this course is for: Students who want to become familiar with the new Windows 10 environment. Introduction Intro- No Animation FREE 00:01:00 Getting Started in Windows 10 Logging In 00:02:00 The Startup Screen 00:04:00 Exploring the Desktop 00:02:00 General Navigation 00:04:00 Introducing the Action Center and Control Panel 00:02:00 Tablet Mode 00:03:00 Launching Applications 00:03:00 Interacting with Windows 00:06:00 Quitting Applications 00:04:00 Pinning Applications 00:03:00 Customizing the Start Menu 00:03:00 Customizing the Task Bar 00:02:00 Multitasking to Switch Between Multiple Applications 00:03:00 Managing several deskstops Using Task View 00:03:00 Using Cortana 00:03:00 Cortana Setup 00:03:00 File Management Overview of the drive and folder structure 00:04:00 Using Navigation Pane, Details Pane, Preview Pane 00:04:00 Menus and Ribbons 00:03:00 Viewing and Editing File Properties_Revised 00:04:00 Creating Files 00:06:00 Selecting, Moving, and Copying Files_Revised 00:06:00 Renaming Files and Folders 00:03:00 Deleting and Restoring from the Recycle Bin 00:05:00 Create and use shortcuts_Revised 00:05:00 Zip and Unzip 00:07:00 Changing the Sort and Group by 00:06:00 Add Columns to the Explorer View 00:04:00 Creating and Using a Library 00:07:00 Adding Files to a Library 00:09:00 Pin Frequent Places Customizing File Explorer 00:04:00 Configuring Files and Explore Options 00:03:00 Logging In or Setting Up OneDrive 00:02:00 Storing and acessing files on OneDrive 00:03:00 Sharing Files Through OneDrive 00:05:00 Syncing Files on OneDrive 00:03:00 Using Edge Browsing the Web 00:02:00 Customize Top Sites 00:02:00 Using Tabs 00:03:00 Organize Favorites with Folders 00:02:00 Using the Reading List and Reading View 00:03:00 Using Saving Sharing Web Notes 00:04:00 Downloading Files 00:02:00 Viewing and Clearing History 00:02:00 Using Windows Apps Maps- Search Get Directions Choose View 00:04:00 Maps- Search Tips and Favorites 00:04:00 Maps- More Search Tips and Map Settings 00:03:00 Photos - Browsing_REVISED 00:05:00 Photos - Using Editing Tools_REVISED 00:04:00 Mail- Add Accounts 00:05:00 Mail- Personalizing and Configuring 00:04:00 Mail Send a Message 00:04:00 People Search Link and Share Contacts 00:04:00 People Search Link and Share Contacts 00:04:00 Calendar Configuring and Viewing 00:04:00 Calendar Changing Views Creating and Editing Events 00:07:00 Weather Add Favorite Locations and Viewing the Weather 00:04:00 Weather- Viewing Historical Data nad Weather Maps 00:03:00 Customizing Windows 10 Managing Accounts and Sign In Options 00:03:00 Background Settings 00:04:00 Lock Screen 00:02:00 Change Windows Themes 00:02:00 Personalize Start 00:04:00 Change Screen Resolution 00:02:00 Adjust Audio Settings 00:02:00 Manage Sleep and Screen Saver 00:04:00 Change Default Storage Locations 00:02:00 Managing Devices 00:03:00 Change Type Settings 00:01:00 Adjust Mouse and Touchpad Settings 00:03:00 Adjust Autoplay Settings 00:02:00 Installing, Updating, and Troubleshooting Installing Applications from the Windows Store 00:03:00 Installing Applications From the Web 00:03:00 Setting Application Defaults 00:03:00 Setting App Privacy and Permissions 00:02:00 Uninstalling Applications 00:01:00 Configure Windows Defender and Windows Updates 00:02:00 Access Task Manage 00:02:00 Accessing the Action Center to View Messages 00:02:00 Backing Up and Restoring Files and Using Recover to Reset Your PC 00:07:00 Conclusion Course Recap 00:01:00
Duration 2 Days 12 CPD hours This course is intended for Technical professionals who support, install, deploy, or administer Check Point products in Cloud Environments. Overview Explain the nature of the cloud environment. Describe the five pillars of cloud architecture. Explain the Basics of Cloud Infrastructure. Explain the Basics of Cloud Automation. Explain Check Point Security Management and How it Applies to CloudGuard. Describe CloudGuard Security Gateway offerings. Describe Cloud Load Balancers. Explain CloudGuard Licensing. Explain the different Deployment options and architectures for CloudGuard. Explain how and why CloudGuard is automated. Describe the functions of CloudGuard that can be automated. Describe the tools used to automate CloudGuard. Explain CloudGuard Automation Requirements. Explain basic troubleshooting techniques specific to Check Point Security Management Servers and Security Gateways. Describe the steps for Troubleshooting CloudGuard Network Installation. Explain the tools and techniques used to troubleshoot CloudGuard Network Automation. Explain the need for Cloud Security Posture Management. Describe the posture management tools available in CloudGuard. Explain methods for correcting Cloud Security Posture Management issues. Learn basic concepts and develop skills necessary to administer Check Point CloudGuard security solutions Course Outline Deploy a Security Management Server in the Cloud. Install a Security Gateway Image. Create Virtual Networks. Deploy Internal and External Load Balancers Deploy a Security Gateway Using Templates. Assign Public IP Addresses to Cloud Devices Create Web Servers in the Cloud. Configure North-South Traffic Policy. Configure East-West Traffic Policy and Routes. Troubleshoot North-South Traffic Issues. Troubleshoot East-West Traffic Issues.
Course Objectives The goal of this course is to provide you with the knowledge required to use more advanced functions and formulas and work with various tools to analyse and present data in spreadsheets, such as sorting, filtering, applying conditional formatting and charting the data. ' Customer Feedback Really useful and engaging course. Learnt a lot that will be very beneficial in my job. Trainer was great. Kelly Moreley - TACT Very happy with the course. Worked as a good refresher from what I knew already and enhanced my knowledge further in formulas + vlookup and shortcut keys. Jenny Price - Acer 1 year email support service Take a look at the consistent excellent feedback from our corporate clients visiting our site ms-officetraining co uk With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering classroom, one to one, tailored and bespoke courses. Tailored In company training: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Please visit our site (ms-officetraining co uk) to get a feel of the excellent feedback our courses have had and look at other courses you might be interested in. Recap on Excel formulas and calculations Overview of formulas in Excel Relative, Absolute and Mixed cell references Group editing worksheets Autofill and Flash Fill Changing Excel’s environment Options Changing the default number of sheets Creating an Autofill Custom List Adding tools to the Quick Access Toolbar Mastering Excel Tables Introducing Excel Tables Formatting a Table Creating Calculated Columns Using Slicers to filter your data Using Totals to get statistics out of your data Removing duplicates Converting Tables back to normal Ranges Using names Ranges In Excel formulas As a way of navigating through the workbook Advanced Formulas Simple IF examples Using IF to check if a cell is blank Nested IFs VLOOKUP HLOOKUP Text Functions Date Functions Conditional formatting Apply Conditional Formatting Customising Conditional Formatting Using Icons in Conditional Formatting Using Formulas to conditionally format cells Linking spreadsheets and workbooks Making a reference to another worksheet Making a reference to another workbook Editing links Troubleshooting links Analysing databases Quick analysis Sorting a database Apply filters to a database Advance filter Sorting and Filtering by Conditional Formats Charts Analyse trends in data using Sparklines Creating charts from start to finish Exploring the different Chart Types Apply Chart Styles Formatting Chart Elements Filtering Charts by Series or Categories Adding a Trendline to a Chart Create a Chart Template Attaching security to a spreadsheet and workbook Protect Cells Protect Structure of worksheets Protect a Workbook by adding passwords Introduction to Pivot Tables What are Pivot Tables? Using recommended pivot tables to analyse your data Who is this course for? Who is this course for? For those who want to explore in more detail formulas and functions, data analysis and data presentation. Requirements Requirements Preferably, delegates would have attended the Excel Introduction course. Career path Career path Excel know-how can instantly increase your job prospects as well as your salary. 80 percent of job openings require spreadsheet and word-processing software skills
Duration 4 Days 24 CPD hours This course is intended for Technical decision makers Network architects Data center systems engineers Field engineers Overview After taking this course, you should be able to: Discover and describe the Cisco Multilayer Director Switch (MDS) platform of multilayer switches and directors Provision Cisco MDS Switches Describe key product features of the MDS platform Describe and implement automation an Cisco MDS Switches Configure and implement the Cisco MDS switches and platform features Resolve issues and troubleshoot FC domains, zones and zone merges, and switch boot and firmware upgrades The Configuring Cisco MDS 9000 Series Switches (DCMDS) v3.6 course teaches you to implement, manage, and troubleshoot Cisco© MDS 9000 Series Switches to build highly available, scalable storage networks. Through expert instruction and extensive hands-on practice, you will learn how to deploy and utilize capabilities such as Virtual Storage Area Networks (VSANs), Role-Based Access Control (RBAC), N-Port Virtualization (NPV) fabric security, zoning, automation with NX-API, Slow Drain Analysis, SAN analytics, Fibre Channel over TCP/IP (FCIP) tunnels, and more. You will learn how to configure and implement platform features and learn troubleshooting techniques pertaining to Fibre Channel (FC) domains, firmware upgrades, zones, and zone mergers.This course helps you prepare to take the 300-625 Implementing Cisco Storage Area Networking (DCSAN) exam, which leads to CCNP Data Center and the Certified Specialist - Data Center SAN Implementation certifications. Course Outline Describing Cisco MDS Platform Provisioning Cisco MDS Switches Building the Fibre Channel Fabric with Cisco MDS Switches Automating Cisco MDS Fabric Monitoring and Reporting Cisco MDS Features Troubleshooting Common Cisco MDS Issues
Duration 5 Days 30 CPD hours This course is intended for This course is designed for EDI End Users, Connect: End Users, Web Developers, as well as System Administrators. Overview After completing this course, students should be able to: Run a business process. Create a business process using the Graphical Process Modeler. Explain how to create a service configuration. Explain how to track an executable business process. Discuss the basics of Sterling B2B Integrator. This course provides students with a detailed examination of Sterling B2B Integrator, which provides end-to-end enterprise integration server for dynamic real-time and near-real time business collaboration and commerce automation.This course teaches students techniques, tools and recommended practices that can be used to run a business process, create a business process using the Graphical Process Modeler, explain how to create a service configuration, explain how to track an executable business process, and discuss the basics of Sterling B2B Integrator through a combination of lecture and hands-on labs. About IBM Sterling B2B Integrator Exercise. About Sterling B2B Integrator Basic BPML Concepts Exercise. Basic BPML Concepts XPath Basics Exercise. XPath Basics Graphical Process Modeler (GPM) Exercise. Graphical Process Modeler (GPM) Using the GPM Exercise. Using the GPM Troubleshooting a Business Process Exercise. Troubleshooting a Business Process Introduction to Service Management Exercise. Introduction to Service Management Case Study Sterling B2B Integrator Mapping Exercise. Sterling B2B Integrator Mapping Typing Map Exercise. Typing Map Tracking System Health Exercise. Tracking System Health Best Practices Exercise. Best Practices Case Study Course Wrap Up
Immerse yourself in the ultimate guide on Youtube and Instagram Video Production Training. This course empowers you to navigate the complexities of video production, starting with preparation: from selecting a compelling topic to choosing the right equipment. Delve into detailed filming techniques, ensuring you're adept in varied camera setups, filming in segments, and even troubleshooting when things don't go as planned. Navigate the intricacies of video importing, ensuring your content remains secure with robust storage and backup solutions. Discover the world of editing, exploring dynamic software options and accessing rich content libraries for a polished final product. Conclude your learning journey with expertise in rendering, exporting, and effectively uploading your masterpiece to digital platforms. Become the video content creator the digital world awaits! Career Path Content Creator: Craft unique content for YouTube and Instagram, driving engagement and revenue. Video Editor: Perfect videos in post-production for creators or studios. Production Adviser: Guide on equipment and shooting strategy for budding creators. Digital Marketing: Integrate video strategies in marketing campaigns to boost brand presence. Video Archivist: Manage video storage and cataloguing, ensuring content longevity for productions.
Dive into the intricate world of networking with the 'CompTIA Network' course. Embrace foundational theories and immerse yourself in practical application, ensuring you're well-equipped for a modern networking environment. Covering everything from TCP/IP addressing to Cloud technologies, this course promises an exhaustive grasp over networking. Furthermore, delve deep into network security, understanding not just how to prevent breaches but also how to effectively respond. By the course's conclusion, learners will possess the confidence and knowledge to plan and execute a seamless SOHO Network. Learning Outcomes Gain an in-depth understanding of network theory and implementations. Master the intricacies of TCP/IP addressing, routing, and associated services. Acquire knowledge on WAN infrastructure, Cloud, and Virtualization technologies. Understand and implement effective network security measures, breach prevention, and incident response strategies. Develop expertise in remote networking, network management, and troubleshooting network issues. Why choose this CompTIA Network course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the CompTIA Network Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this CompTIA Network course for? Aspiring network professionals seeking foundational knowledge. IT enthusiasts aiming to expand their networking expertise. Professionals in related IT fields aiming to diversify their skills. Businesses looking to train their IT staff in network best practices. Individuals aiming for CompTIA Network+ certification. Career path Network Administrator: £25,000 - £40,000 Network Engineer: £30,000 - £50,000 Network Analyst: £28,000 - £45,000 IT Support Specialist: £20,000 - £35,000 Network Security Specialist: £35,000 - £55,000 Systems Administrator: £25,000 - £45,000 Prerequisites This CompTIA Network does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA Network was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Network Theory OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Bounded Network Media Cables 00:41:00 Fiber Optics 00:17:00 Converters and Connectors 00:27:00 Unbounded Network Media 802.11 Standard 00:20:00 Wireless 00:11:00 Wireless Options 00:19:00 Network Implementations Topologies 00:39:00 Ethernet 00:50:00 Switches 01:48:00 VLANs 00:52:00 TCP/IP Addressing and Data Delivery Network Communication Protocols 00:37:00 IPv4 00:26:00 Special Addresses 00:13:00 CIDR 00:11:00 IPv6 00:31:00 Routing Routes 00:59:00 Routing Types 00:18:00 TCP/IP Services TCP and IP 00:40:00 FQDN and DNS 00:28:00 Transport-layer Protocols 00:05:00 UDP 00:06:00 WAN Infrastructure Wide Area Networks 00:18:00 QoS 00:39:00 Voice-over-Data Systems 00:06:00 Cloud and Virtualization Technologies Types of Server Virtualization 00:27:00 Fibre Channel 00:05:00 Cloud Concepts.prproj 00:24:00 Network Security Basics Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 Preventing Security Breaches Potent Points to Clear Channel Pain - Part 6 00:01:00 Vulnerabilities 00:16:00 Attacks 00:58:00 Authentication 00:25:00 Benefits of Acupressure 3 00:02:00 Education and Awareness 00:03:00 Responding to Security Incidents Response Policy 00:04:00 Remote Networking RADIUS 00:07:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Network Management Acceptable Use 01:00:00 Troubleshooting Network Issues Common Problems 00:32:00 Troubleshooting 00:28:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Planning and Implementing a SOHO Network SOHO Network 00:15:00 Mock Exam Mock Exam - CompTIA Network 00:20:00 Final Exam Final Exam - CompTIA Network 00:20:00
https://www.abtschool.co.uk/product/facial/
Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone responsible for conf iguring, maintaining, and troubleshooting Symantec Data Loss Prevention. Additionally, this course is intended for technical users responsible for creating and maintaining Symantec Data Loss Prevention policies and the incident response structure. Overview At the completion of the course, you will be able to: Enforce server, detection servers, and DLP Agents as well as reporting, workflow, incident response management, policy management and detection, response management, user and role administration, directory integration, and filtering. This course is designed to provide you with the fundamental know ledge to configure and administer the Symantec Data Loss Prevention Enforce platform. Introduction to Symantec Data Loss Prevention Symantec Data Loss Prevention overview Symantec Data Loss Prevention architecture Navigation and Reporting Navigating the user interface Reporting and analysis Report navigation, preferences, and features Report filters Report commands Incident snapshot Incident Data Access Hands-on labs: Become familiar with navigation and tools in the user interface. Create, filter, summarize, customize, and distribute reports. Create users, roles, and attributes. Incident Remediation and Workflow Incident remediation and w orkf low Managing users and attributes Custom attribute lookup User Risk Summary Hands-on labs: Remediate incidents and configure a user?s reporting preferences Policy Management Policy overview Creating policy groups Using policy templates Building policies Policy development best practices Hands-on labs: Use policy templates and policy builder to configure and apply new policies Response Rule Management Response rule overview Configuring Automated Response rules Configuring Smart Response rules Response rule best practices Hands-On Labs: Create and use Automated and Smart Response rules Described Content Matching DCM detection methods Hands-on labs: Create policies that include DCM and then use those policies to capture incidents Exact Data Matching and Directory Group Matching Exact data matching (EDM) Advanced EDM Directory group matching (DGM) Hands-on labs: Create policies that include EDM and DGM, and then use those policies to capture incident Indexed Document Matching Indexed document matching (IDM) Hands-on labs: Create policies that include IDM rules and then use those policies to capture incidents Vector Machine Learning Vector Machine Learning (VML) Hands-on labs: Create a VML profile, import document sets, and create a VML policy Network Monitor Review of Network Monitor Protocols Traffic filtering Network Monitor best practices Hands-On Labs: Apply IP and L7 filters Network Prevent Network Prevent overview Introduction to Network Prevent (Email) Introduction to Network Prevent (Web) Hands-On Labs: Configure Network Prevent (E-mail) response rules, incorporate them into policies, and use the policies to capture incidents Mobile Email Monitor and Mobile Prevent Introduction to Mobile Email Monitor Mobile Prevent overview Configuration VPN configuration Policy and Response Rule Creation Reporting and Remediation Troubleshooting Network Discover and Network Protect Network Discover and Network Protect overview Configuring Discover targets Configuring Box cloud targets Protecting data Auto-discovery of servers and shares Running and managing scans Reports and remediation Network Discover and Network Protect best practices Hands-on labs: Create and run a filesystem target using various response rules, including quarantining Endpoint Prevent Endpoint Prevent overview Detection capabilities at the Endpoint Configuring Endpoint Prevent Creating Endpoint response rules Viewing Endpoint Prevent incidents Endpoint Prevent best practices Managing DLP Agents Hands-on labs: Create Agent Groups and Endpoint response rules, monitor and block Endpoint actions, view Endpoint incidents, and use the Enforce console to manage DLP Agents Endpoint Discover Endpoint Discover overview Creating and running Endpoint Discover targets Using Endpoint Discover reports and reporting features Hands-on labs: Create Endpoint Discover targets, run Endpoint Discover targets, and view Endpoint Discover incidents Enterprise Enablement Preparing for risk reduction Risk reduction DLP Maturity model System Administration Server administration Language support Incident Delete Credential management Troubleshooting Diagnostic tools Troubleshooting scenario Getting support Hands-on labs: Interpret event reports and traffic reports, configure alerts, and use the Log Collection and Configuration tool Additional course details: Nexus Humans Symantec Data Loss Prevention 14.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Data Loss Prevention 14.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.