Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options
Duration 3 Days 18 CPD hours This course is intended for This course is geared for experienced Scala developers who are new to the world of machine learning and are eager to expand their skillset. Professionals such as data engineers, data scientists, and software engineers who want to harness the power of machine learning in their Scala-based projects will greatly benefit from attending. Additionally, team leads and technical managers who oversee Scala development projects and want to integrate machine learning capabilities into their workflows can gain valuable insights from this course Overview Working in a hands-on learning environment led by our expert instructor you'll: Grasp the fundamentals of machine learning and its various categories, empowering you to make informed decisions about which techniques to apply in different situations. Master the use of Scala-specific tools and libraries, such as Breeze, Saddle, and DeepLearning.scala, allowing you to efficiently process, analyze, and visualize data for machine learning projects. Develop a strong understanding of supervised and unsupervised learning algorithms, enabling you to confidently choose the right approach for your data and effectively build predictive models Gain hands-on experience with neural networks and deep learning, equipping you with the know-how to create advanced applications in areas like natural language processing and image recognition. Explore the world of generative AI and learn how to utilize GPT-Scala for creative text generation tasks, broadening your skill set and making you a more versatile developer. Conquer the realm of scalable machine learning with Scala, learning the secrets to tackling large-scale data processing and analysis challenges with ease. Sharpen your skills in model evaluation, validation, and optimization, ensuring that your machine learning models perform reliably and effectively in any situation. Machine Learning Essentials for Scala Developers is a three-day course designed to provide a solid introduction to the world of machine learning using the Scala language. Throughout the hands-on course, you?ll explore a range of machine learning algorithms and techniques, from supervised and unsupervised learning to neural networks and deep learning, all specifically crafted for Scala developers. Our expert trainer will guide you through real-world, focused hands-on labs designed to help you apply the knowledge you gain in real-world scenarios, giving you the confidence to tackle machine learning challenges in your own projects. You'll dive into innovative tools and libraries such as Breeze, Saddle, DeepLearning.scala, GPT-Scala (and Generative AI with Scala), and TensorFlow-Scala. These cutting-edge resources will enable you to build and deploy machine learning models for a wide range of projects, including data analysis, natural language processing, image recognition and more. Upon completing this course, you'll have the skills required to tackle complex projects and confidently develop intelligent applications. You?ll be able to drive business outcomes, optimize processes, and contribute to innovative projects that leverage the power of data-driven insights and predictions. Introduction to Machine Learning and Scala Learning Outcome: Understand the fundamentals of machine learning and Scala's role in this domain. What is Machine Learning? Machine Learning with Scala: Advantages and Use Cases Supervised Learning in Scala Learn the basics of supervised learning and how to apply it using Scala. Supervised Learning: Regression and Classification Linear Regression in Scala Logistic Regression in Scala Unsupervised Learning in Scala Understand unsupervised learning and how to apply it using Scala. Unsupervised Learning:Clustering and Dimensionality Reduction K-means Clustering in Scala Principal Component Analysis in Scala Neural Networks and Deep Learning in Scala Learning Outcome: Learn the basics of neural networks and deep learning with a focus on implementing them in Scala. Introduction to Neural Networks Feedforward Neural Networks in Scala Deep Learning and Convolutional Neural Networks Introduction to Generative AI and GPT in Scala Gain a basic understanding of generative AI and GPT, and how to utilize GPT-Scala for natural language tasks. Generative AI: Overview and Use Cases Introduction to GPT (Generative Pre-trained Transformer) GPT-Scala: A Library for GPT in Scala Reinforcement Learning in Scala Understand the basics of reinforcement learning and its implementation in Scala. Introduction to Reinforcement Learning Q-learning and Value Iteration Reinforcement Learning with Scala Time Series Analysis using Scala Learn time series analysis techniques and how to apply them in Scala. Introduction to Time Series Analysis Autoregressive Integrated Moving Average (ARIMA) Models Time Series Analysis in Scala Natural Language Processing (NLP) with Scala Gain an understanding of natural language processing techniques and their application in Scala. Introduction to NLP: Techniques and Applications Text Processing and Feature Extraction NLP Libraries and Tools for Scala Image Processing and Computer Vision with Scala Learn image processing techniques and computer vision concepts with a focus on implementing them in Scala. Introduction to Image Processing and Computer Vision Feature Extraction and Image Classification Image Processing Libraries for Scala Model Evaluation and Validation Understand the importance of model evaluation and validation, and how to apply these concepts using Scala. Model Evaluation Metrics Cross-Validation Techniques Model Selection and Tuning in Scala Scalable Machine Learning with Scala Learn how to handle large-scale machine learning problems using Scala. Challenges of Large-Scale Machine Learning Data Partitioning and Parallelization Distributed Machine Learning with Scala Machine Learning Deployment and Production Understand the process of deploying machine learning models into production using Scala. Deployment Challenges and Best Practices Model Serialization and Deserialization Monitoring and Updating Models in Production Ensemble Learning Techniques in Scala Discover ensemble learning techniques and their implementation in Scala. Introduction to Ensemble Learning Bagging and Boosting Techniques Implementing Ensemble Models in Scala Feature Engineering for Machine Learning in Scala Learn advanced feature engineering techniques to improve machine learning model performance in Scala. Importance of Feature Engineering in Machine Learning Feature Scaling and Normalization Techniques Handling Missing Data and Categorical Features Advanced Optimization Techniques for Machine Learning Understand advanced optimization techniques for machine learning models and their application in Scala. Gradient Descent and Variants Regularization Techniques (L1 and L2) Hyperparameter Tuning Strategies
Duration 5 Days 30 CPD hours This course is intended for Network Video Operator and Administrator Voice / UC / Collaboration / Communications Engineer Collaboration Tools Engineer Collaboration Sales / Systems Engineer Overview Upon completing this course, the learner will be able to meet these overall objectives: Install, configure, maintain, and troubleshoot Cisco visual collaboration solutions. This course assists the student in preparing for the Cisco TelePresence Video Specialist Certification. Upon completing this course, the learner will be able to meet these overall objectives Module 1: Advanced Cisco Expressway Features Introducing Cisco video network solutions Exploring Cisco Expressway basic setup Explaining regular expressions in a Cisco Expressway environment Deploying components of Cisco Expressway Security Exploring the fundamentals of subzonesÿ Administering call control Implementing subzone bandwidth management Implementing zones Exploring clustering Applying troubleshooting Module 2: Advanced Cisco Meeting Server Features Introducing the Cisco meeting server Exploring API configuration Exploring resilient and scalable deployments Additional features Module 3: Cisco Collaboration Meeting Room Solutions with Cisco TelePresence Server Introducing Collaboration Meeting Room cloud, premises, and hybrid products Deploying the TelePresence Server and TelePresence conductor Applying troubleshooting to Cisco CMR Premises Solutions Module 4: Cisco TelePresence Management Suite (TMS) Solution Explaining Cisco TMS Installation Describing TMS operation Explaining TMS conference scheduling and management Configuring permissions Applying troubleshooting Module 5: Cisco Cloud Solutions - WebEx and Spark Introducing WebEx and Spark cloud solutions Exploring Spark administration configuration Deploying Spark hybrid services Exploring Spark APIs and BOTs configuration Module 6: Cisco TelePresence Content Server (Optional Module) Examining Cisco TCS operation and configuration
Duration 2 Days 12 CPD hours This course is intended for This course is aimed at anyone currently working with data who is interested in using data visualisation to more effectively communicate their results. Overview At completion, delegates will understand how data visualisations can be best used to communicate actionable insights from data and be competent with the tools required to do it. Visualising data, and analytics results, is one of the most effective ways to achieve this. This course will cover the theory of data visualisation along with practical skills for creating compelling visualisations from data. Course Outline The use of analytics, statistics and data science in business has grown massively in recent years. Harnessing the power of data is opening actionable insights in diverse industries from banking to horse breeding. The companies doing this most successfully understand that using sophisticated analytics approaches to unlock insights from data is only half the job. Communicating these insights to all of the different parts of an organisation is just as important as doing the actual analysis. Visualising data, and analytics results, is one of the most effective ways to achieve this. This course will cover the theory of data visualisation along with practical skills for creating compelling visualisations from data. To attend this course delegates should be competent in the use of data analysis tools such as reporting tools, spreadsheet software or business intelligence tools. The course will explore the following topics through a series of interactive workshop sessions: Fundamentals of data visualisation Data characteristics & dimensions Mapping visual encodings to data dimensions Colour theory Graphical perception & communication Interaction design Visualisation different characteristics of data: trends, comparisons, correlations, maps, networks, hierarchies, text Designing effective dashboards
Duration 5 Days 30 CPD hours The Implementing Cisco Application Centric Infrastructure (DCACI) v1.1 course shows you how to deploy and manage the Cisco© Nexus© 9000 Series Switches in Cisco Application Centric Infrastructure (Cisco ACI©) mode. You will learn how to configure and manage Cisco Nexus 9000 Series Switches in ACI mode, how to connect the Cisco ACI fabric to external networks and services, and the fundamentals of Virtual Machine Manager (VMM) integration. You will gain hands-on practice implementing key capabilities such as fabric discovery, policies, connectivity, VMM integration, and more. This course earns you 40 Continuing Education (CE) credits towards recertification. Additional course details: Nexus Humans Cisco Implementing Cisco Application Centric Infrastructure - Advanced v1.2 (DCACIA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Application Centric Infrastructure - Advanced v1.2 (DCACIA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is for consultants, project team members, and administrators who want to learn how to implement data provisioning and data transformation for their SAP HANA project. In this course, students will learn the essential techniques and tools of data provisioning and data transformation for SAP HANA. This course will help students identify the most effective data provisioning solutions for their SAP HANA project. Course Outline Trigger-based replication with SAP Landscape Transformation ETL based data provisioning using SAP Data Services Connecting SAP HANA to data sources using SAP HANA Smart Data Access Real-time data loading using Smart Data Streaming ETL based loading using Smart Data Integration and Smart Data Quality SAP HANA Direct Extractor Connection Fundamentals of SAP Replication Server Additional course details: Nexus Humans HA350 SAP HANA - Data Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the HA350 SAP HANA - Data Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Network professionals, including systems engineers Channel Partners Customers Overview After taking this course, you should be able to: Describe IP multicast services Identify IP multicast issues on a data link layer Explain why Protocol Independent Multicast Sparse Mode (PIM-SM) is the most current scalable IP multicast routing protocol Describe Rendezvous Point (RP) distribution solutions Recognize the drawbacks of the PIM-SM and describe two extensions to provide possible solutions Explain basic concepts of Multiprotocol BGP (MP-BGP) and its use in the IP multicast environment Configure and deploy Multicast Source Discovery Protocol (MSDP) in the interdomain environment Describe solutions to mitigate security issues in the IP multicast network Describe the process of monitoring and maintaining multicast high-availability operations Design multicast-related application and network solutions in customer and service provider networks The Implementing Cisco Multicast (MCAST) v2.0 course teaches you the fundamentals of IP multicasting, including multicast applications, sources, receivers, group management, and IP multicast routing protocols such as Protocol Independent Multicast (PIM) used within a single administrative domain. You will learn about issues in switched LAN environments and reliable IP multicasting, and technical solutions for simple deployments of IP multicast within a provider or customer network. The course reviews the configuration and troubleshooting guidelines for implementation of IP multicast on Cisco© routers. Labs offer hands-on experience to help you prepare to deploy IP multicast successfully. Course Outline Module 1: IP Multicast Concepts and Technologies Module 2: Multicast on the LAN Module 3: PIM Sparse Mode Module 4: Rendezvous Point Engineering Module 5: PIM Sparse Mode Protocol Extensions Module 6: Multiprotocol Extensions for BGP Module 7: Interdomain IP Multicast Module 8: IP Multicast Security Module 9: Multicast Optimization and High-Availability Features Module 10: Applications of Multicast
Duration 1.625 Days 9.75 CPD hours This course is intended for This course is designed for any business professional that leads or works on teams that identify and develop business solutions. Overview Upon successful completion of this course, students will understand the fundamentals of design thinking and be able to apply principles, methodologies and frameworks and apply them to projects. In this course, students are introduced to design thinking and its application to developing new products, services and the organization of businesses. Design thinking is a human-centric, interdisciplinary approach towards innovation. Understand Design ThinkingWhat is Process Awareness and why is it Key?How to Develop a Good Problem StatementHow to Discover User Needs How to Build Empathy with the User How to Generate IdeasHow to Select Ideas How to Create a Good PrototypeLearn from Failure Additional course details: Nexus Humans Design Thinking for Innovative Problem Solving training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Design Thinking for Innovative Problem Solving course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Security administrators Security consultants Network administrators Systems engineers Technical support personnel Cisco integrators, resellers, and partners Overview Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection· Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations This course shows you how to deploy and use Cisco AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. Course Outline Introducing Cisco AMP Technologies Introducing AMP for Endpoints Overview and Architecture Navigating the Console Interface Using Cisco AMP for Endpoints Identifying Attacks Analyzing Malware Managing Outbreak Control Creating Endpoint Policies Working with AMP for Endpoint Groups Using Orbital for Endpoint Visibility Introducing AMP REST API Navigating Accounts
Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course are Technology Consultants, System Administrators, System Architects, Database Administrators, Help Desk/COE Support, and Program/Project Managers. Overview Presentation in detail of the architecture of SAP NetWeaver Application Server (SAP NetWeaver AS).Learn effective techniques for navigating.Receive an overview of the development process in an SAP system landscape In this course, students gain knowledge about the fundamentals of SAP NetWeaver Application Server. SAP Systems Explaining the Key Capabilities of SAP NetWeaver Explaining the Architecture of an SAP System, Application Server (AS) ABAP and Application Server (AS) Java Navigation Basics Navigating with SAP Graphical User Interface (GUI) for Windows in AS ABAP Systems Navigating with a Browser in AS Java Systems System Core Explaining AS ABAP and AS Java System Architecture Identifying the Processes of an AS ABAP System Processing User Requests in AS ABAP Using Additional Processes of an AS ABAP System Explaining the Processes of an AS Java System Software Development in SAP Systems Outlining the Data Structure of an AS ABAP System Managing Transports in the ABAP Environment Explaining ABAP Workbench Tools Developing and Transporting an ABAP Repository Object Developing Applications in AS Java Developing Applications in Eclipse for ABAP Communication and Integration Technologies Describing Communication with Remote Function Call-Based (RFC) Technology Describing the Basics of Web Services Describing OData in SAP Gateway Application Lifecycle Management (ALM) Explaining Application Lifecycle Management (ALM) Describing the Installation of an SAP System Describing the Maintenance of an SAP System SAP Portfolio Overview Identifying the Platform, Database, and User Experience in the SAP Technology Portfolio Outlining Additional Components of the SAP Technology Portfolio Identifying the Components of the SAP Applications Portfolio SAP User Interfaces Accessing AS ABAP Systems with SAP GUI Accessing SAP Systems Using Other User Interfaces Additional Information Sources Accessing the SAP Service Marketplace (SMP) Accessing the SAP Community Network (SCN)