• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

51076 Courses delivered Online

Nodes and Links Project Insights and Managing Risk

By Underscore Group

Learn how to use this innovative tool to analyse and validate your schedule, to add and model uncertainty and risk and to work with updated plans to compare project progress. Course overview Duration: 1 day (6.5 hours) This course looks at the powerful features of Nodes and Links. It looks at analysing and validating your schedule, adding uncertainty and risk and working with updated plans to compare project progress. Hands on practice will be gained throughout the course to ensure you can confidentially put your new skills into practice back in the workplace. This course is designed for new users of Nodes and links, no previous experience is required. You should however be familiar with risk management processes and terminology. Objectives  By the end of the course you will be able to: Import and validate plans Analyse and review plans Add and model uncertainty Add and model risk Load updated schedules Re run analysis on updated schedules Content Validating your plan Importing a baseline plan Running a health check Analysing the results Reviewing the plan Analysing critical paths Reviewing activities Reviewing resources Adding Uncertainty Setting uncertainty templates Distributions Adding uncertainty Using Inherit Using AI Reviewing activity distributions Modelling Uncertainty Running the Analysis Reviewing the results Reviewing activity results Risk Drivers Filtering for activities Setting up the Risk Register Setting Risk Templates Adding Risks to the Risk Register Independent vs Dependant Events Setting Probability and Impact Modelling Uncertainty and Risk Mapping risks to activities Running the Analysis Reviewing the results Updated Plans Importing a new plan version Comparing plans Tracking progress Trend analysis Analysing Updated Plans Using updated plans Synchronising uncertainly and risk Rerunning analysis

Nodes and Links Project Insights and Managing Risk
Delivered in Horsham or OnlineFlexible Dates
Price on Enquiry

VMware Telco Cloud Infrastructure: Install, Configure, Manage [V2.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Telco Cloud Infrastructure™ architecture Describe the VMware Cloud Director architecture List the infrastructure requirements of ETSI NFV Describe the VMware Cloud Director architecture as Virtualized Infrastructure Manager (VIM) Describe the options associated with VMware cloud providers Explain how organizations are supported in VMware Cloud Director Describe the security model in VMware Cloud Director Configure key networking elements of VMware Cloud Director Manage and monitor resources in VMware Cloud Director Enumerate troubleshooting concepts and Day 2 operations using VMware Cloud Director This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Infrastructure environment. In this course, you are introduced to VMware Cloud Director? as a virtualized infrastructure manager. You will examine ETSI NFV requirements, deployment options, and procedures. You will also deploy virtualized network functions and understand their detailed configuration settings. You will learn how to support organizations as well as set up networking and security using hands-on lab exercises.In addition, you are presented with various types of technical problems in VMware Cloud Director, which you will identify, analyze, and solve through a systematic troubleshooting process. Course Introduction Introductions and course logistics Course objectives Day 0 Operations: VMware Telco Cloud Infrastructure Installation Describe the challenges of the telco cloud Describe the key functions of the telco cloud List the benefits of the VMware Cloud Director based VMware Telco Cloud Infrastructure Describe the VMware Telco Cloud Infrastructure architecture Describe the role of VMware Cloud Director in the VMware Telco Cloud Infrastructure architecture List the VMware Telco Cloud Infrastructure deployment options Describe the VMware Cloud Director architecture List the key VMware components that are part of VMware Cloud Director Describe the key use cases for the VMware Cloud Director based VMware Telco Cloud Infrastructure Day 0 Operations: ETSI NFV Requirements for Cloud Platforms Compare physical and virtual infrastructures List the benefits and challenges of physical infrastructure Describe the types of virtual infrastructure Describe the advantages and components of the NFV infrastructure (NFVI) Explain the role of network virtualization in the NFVI List the requirements of NFVI for VMware Cloud Director Describe the networking options of VMware Cloud Director Describe the key networking use cases Describe requirements of VMware Telco Cloud Automation? for networking Describe the storage options of VMware Cloud Director Describe the key storage use cases Day 1 Operations: Virtualized Infrastructure Manager (VIM) Configuration Explain basic concepts related to VMware Cloud Director Describe the components of the VMware Cloud Director architecture Describe the basic configuration of the VMware Cloud Director architecture Describe virtual data centers or VDCs Explain the role of organization VDCs Describe the relationship between provider VDCs and organization VDCs Describe resources in VMware Cloud Director List the key resource organization Create resource pools Describe how vSAN integrates with VMware Cloud Director Day 1 Operations: Configuring VMware Cloud Director Providers Describe how compute resources are provided to VMware Cloud Director Describe how storage resources are provided to VMware Cloud Director Describe provider VDC requirements and best practices List the requirements of creating VDCs Describe the VNF on-boarding process Create provider VDCs Day 1 Operations: Configuring VMware Cloud Director Organizations Describe VMware Cloud Director organizations Create VMware Cloud Director organizations Navigate through the VMware Cloud Director HTML5 provider portal Describe the VMware Cloud Director organization VDC Navigate through the tenant portal List use cases for a VMware Cloud Director organization VDC List the organization VDC allocation models Describe the types of resources that can be allocated Describe how resources are allocated for an organization Examine the function and requirements of network pools Describe the network types available in VMware Cloud Director (external, organization, and vApp) Create and manage organization VDC networks Describe catalogs Manage an organization?s catalog Populate, share, and publish catalogs Describe vApps Manage access to vApps and catalogs Modify the configuration of vApps and their virtual machines (VMs) Manage organization VDC networking Create affinity and anti-affinity rules Day 1 Operations: Configuring VMware Cloud Director Security Describe role-based access Create custom security roles Describe the directory services in VMware Cloud Director Describe the role of LDAP, SAML, SSL, Kerberos, and OAuth2 with VMware Cloud Director Explain the use of VMware Cloud Director with SSO Day 1 Operations: Configuring VMware Cloud Director Networking List networking options in VMware Cloud Director Describe key networking use cases in VMware Cloud Director Describe the use and placement of VMware NSX© Edge? services gateways in relation to VMware Cloud Director Review routing with the distributed logical router and edge services gateways in combination with VMware Cloud Director Describe firewall management in VMware Cloud Director with edge services gateways and the distributed firewall Describe an overview of VMware NSX-T? Data Center Explain the architecture of NSX-T Data Center Describe VMware Cloud Director supported features of NSX-T Data Center Describe the benefits and challenges of multisite networking List the requirements for multisite networking Describe the benefits and challenges of networking between VDCs List the requirements for networking between VDCs Configure cross-VDC networking Day 2 Operations: VMware Cloud Director Resource Management and Monitoring Identify the key resources that need to be managed with VMware Cloud Director List monitoring options with VMware Cloud Director Explain the resource management and monitoring architecture in VMware Cloud Director Monitor objects from the VMware Cloud Director portal Identify features of VMware vRealize© Operations Manager? Integrate VMware Cloud Director with vRealize Operations Manager Configure VMware vRealize© Operations Management Pack for VMware Cloud Director? Outline the monitoring features of vRealize Operations Manager in VMware Cloud Director Describe the purpose of the vRealize Operations Tenant App for VMware Cloud Director Integrate VMware Cloud Director with the Tenant App Configure the Tenant App for VMware Cloud Director Monitor objects with the Tenant App List the steps to monitor VMware Cloud Director environments with vRealize Operations Manager List the steps to monitor VMware Cloud Director environments with VMware vRealize© Log Insight? List the steps to review historical virtual machine metrics in VMware Cloud Director Examine VMware Cloud Director logs Day 2 Operations: VMware Cloud Director Troubleshooting Identify the features of the VMware Telco Cloud Automation dashboards List the components of the VMware Telco Cloud Automation dashboards Explain the features of fault management in VMware Telco Cloud Director Describe the use of fault management in VMware Cloud Director Describe the use of performance management in VMware Cloud Director Describe the use of logs in VMware Cloud Director Troubleshoot using VMware Cloud Director

VMware Telco Cloud Infrastructure: Install, Configure, Manage [V2.0]
Delivered OnlineFlexible Dates
Price on Enquiry

LLM International Business Law Top-Up - Inclusive of Level 7 Pathway Diploma

By School of Business and Technology London

Getting Started The LLM International Business Law programme delves into the intricate legal aspects of the global business environment, offering a profound understanding of international trade, contracts, and corporate governance. It equips individuals, including legal professionals, with the expertise needed to navigate the complex legal terrain of international business. Anglia Ruskin University provides the LLM International Business Law programme, a comprehensive and specialised postgraduate qualification tailored to meet the needs of legal professionals and graduates seeking advanced knowledge in international business law. This programme builds upon existing legal knowledge and qualifications, enabling students to grasp the intricate legal intricacies of international business transactions, trade, and commerce. With a strong emphasis on practical application, the program equips students with the essential skills to handle the complexities of global business law, covering areas such as international contracts, trade regulations, dispute resolution, and corporate governance. The curriculum is meticulously designed to remain highly relevant to the ever-evolving demands of the international business landscape, ensuring that graduates are well-prepared to tackle global marketplace challenges. Taught by experienced faculty and supported by cutting-edge resources, the LLM International Business Law (Top-Up) program at Anglia Ruskin University presents an exceptional opportunity for legal professionals and aspiring lawyers to enhance their expertise and advance their careers in the dynamic field of international business law. The programme comprises two phases; the first is the Qualifi Level 7 Diploma in International Business Law, awarded by Qualifi and delivered by the School of Business and Technology London. The second phase is the LLM International Business Law Top-Up, awarded and delivered 100% online by Anglia Ruskin University. At Anglia Ruskin University, you will study through Canvas, a world-class online Learning Management System (LMS), accessed from your phone, pc or tablet at home or on the move. Canvas provides instant access to study materials, forums, and support from tutors and classmates, as well as enabling easy submission of your assignments. After successfully completing your studies, you'll be invited to attend a graduation ceremony on campus at Anglia Ruskin University. If attending the ceremony in person is not possible, we'll arrange to send your certificate to you. School of Business and Technology London partners with Chestnut Education Group to promote this programme. About Awarding Body Anglia Ruskin University began in 1858 as the Cambridge School of Art founded by William Beaumont. It was then merged with the Cambridge shire College of Arts and Technology and the Essex Institute of Higher Education and was renamed Anglia Polytechnic. It was then given university status in 1992 and renamed Anglia Ruskin University in 2005. The university has campuses in the UK (Cambridge, Chelmsford, London and Peterborough), as well as they are partnered with institutions around the world including Berlin, Budapest, Trinidad, Singapore and Kuala Lumpur. Assessment Assignments and Major Project No examinations Entry Requirements A bachelor's degree Applicant without a bachelor's degree but holding significant managerial experience will be considered for Advanced Entry on a case-by-case basis. Further, candidates are also required to demonstrate their English language proficiency. Learners must request before enrolment to interchange unit(s) other than the preselected units shown in the SBTL website because we need to make sure the availability of learning materials for the requested unit(s). SBTL will reject an application if the learning materials for the requested interchange unit(s) are unavailable. Learners are not allowed to make any request to interchange unit(s) once enrolment is complete. Structure Phase 1 - QUALIFI Level 7 Diploma in International Business Law Programme Structure The QUALIFI Level 7 Diploma in International Business Law is made up of 120 credits, which equates to 1200 hours of TQT. Mandatory Units International Trade Law Unit Reference K/617/4822 TQT : 200 Credits : 20 In this unit, learners will be able to understand international sales transactions, environmental analysis while doing international trade, legal issues and financial forecasting processes. Commercial Trust Law Unit Reference M/617/4823 TQT : 200 Credits : 20 This unit explores the law of trusts internationally, comparing doctrine in different jurisdictions and exploring the theoretical implications of such differences. Industrial and Intellectual Property Law Unit Reference T/617/4824 TQT : 200 Credits : 20 This unit aims to introduce learners to knowledge, ability and critical understanding of regulatory and legislative requirements relating to industrial and Intellectual property laws. Law of Financial Crimes Unit Reference T/617/4824 TQT : 200 Credits : 20 Learners will be introduced to current debates, theories and legal practices in the law of financial crimes, such as statutory framework in the financial services regulations and capital market, fraud and theft act, and criminal law regulations. Company Law Unit Reference F/617/4826 TQT : 200 Credits : 20 This unit aims to inform learners about the English Law of registered companies, including private and public limited companies. Legal Research and Research Methods Unit Reference J/617/4827 TQT :100 Credits :10 Learners can cover key topics relating to research problems, conducting literature reviews, referencing, data collection and analysis techniques, and drawing conclusions from the analysed data. Optional Units Corporate Governance - Principles and Practices Unit Reference L/617/4828 TQT :100 Credits :10 This unit aims to develop learners' understanding, knowledge, and skills relating to the governing body's role, principles of corporate governance, various models and theories affecting corporate governance development, management functions, and development of governance codes, regulations and benefits of good governance. International Commercial Arbitration Unit Reference L/650/7069 TQT : 100 Credits :10 This unit aims for learners to explore the regulatory role of arbitration as a method of supra-national dispute resolution using comparative perspectives to explain contrasting regulation methods.   Phase 2- LLM International Business Law Top-Up Programme Structure Major Research Project Delivery Methods The programme comprises two phases; the first is the Qualifi Level 7 Diploma in International Business Law, awarded by Qualifi and delivered by the School of Business and Technology London. The School of Business and Technology London offers flexible learning methods, including online and blended learning, allowing students to choose the mode of study that suits their preferences and schedules. The program is self-paced and facilitated through an advanced Learning Management System. Students can easily interact with tutors through the SBTL Support Desk Portal System for course material discussions, guidance, assistance, and assessment feedback on assignments. School of Business and Technology London provides exceptional support and infrastructure for online and blended learning. Students benefit from dedicated tutors who guide and support them throughout their learning journey, ensuring a high level of assistance. The second phase is the LLM International Business Law Top-Up, awarded and delivered 100% online by Anglia Ruskin University. At Anglia Ruskin University, you will study through Canvas, a world-class online Learning Management System (LMS), accessed from your phone, pc or tablet at home or on the move. Canvas provides instant access to study materials, forums, and support from tutors and classmates, as well as enabling easy submission of your assignments. After successfully completing your studies, you'll be invited to attend a graduation ceremony on campus at Anglia Ruskin University. If attending the ceremony in person is not possible, we'll arrange to send your certificate to you. School of Business and Technology London partners with Chestnut Education Group to promote this programme. Resources and Support School of Business & Technology London is dedicated to offering excellent support on every step of your learning journey. School of Business & Technology London occupies a centralised tutor support desk portal. Our support team liaises with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receives a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and streamline all the support processes efficiently. Quality learning materials made by industry experts is a significant competitive edge of the School of Business & Technology London. Quality learning materials comprised of structured lecture notes, study guides, practical applications which includes real-world examples, and case studies that will enable you to apply your knowledge. Learning materials are provided in one of the three formats, such as PDF, PowerPoint, or Interactive Text Content on the learning portal. How does the Online Learning work at SBTL? We at SBTL follow a unique approach which differentiates us from other institutions. Indeed, we have taken distance education to a new phase where the support level is incredibly high.Now a days, convenience, flexibility and user-friendliness outweigh demands. Today, the transition from traditional classroom-based learning to online platforms is a significant result of these specifications. In this context, a crucial role played by online learning by leveraging the opportunities for convenience and easier access. It benefits the people who want to enhance their career, life and education in parallel streams. SBTL's simplified online learning facilitates an individual to progress towards the accomplishment of higher career growth without stress and dilemmas. How will you study online? With the School of Business & Technology London, you can study wherever you are. You finish your program with the utmost flexibility. You will be provided with comprehensive tutor support online through SBTL Support Desk portal. How will I get tutor support online? School of Business & Technology London occupies a centralised tutor support desk portal, through which our support team liaise with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receive a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and to streamline all the support process efficiently. Learners should expect to receive a response on queries like guidance and assistance within 1 - 2 working days. However, if the support request is for assessment feedback, learners will receive the reply with feedback as per the time frame outlined in the Assessment Feedback Policy.

LLM International Business Law Top-Up - Inclusive of Level 7 Pathway Diploma
Delivered OnlineFlexible Dates
Price on Enquiry

Video Marketing For Charities (FREE Webinar)

5.0(1)

By Clockwork Eye Video Training

Learn how to create effective videos that boost visibility and drive donations for your charity in our free webinar. Discover strategies to maximize ROI using video marketing.

Video Marketing For Charities (FREE Webinar)
Delivered OnlineFlexible Dates
FREE

Team Training Program

4.5(3)

By Studyhub UK

Invest in your team’s future today! With Studyhub’s Training Program, you’re not just choosing courses; you’re choosing a pathway to success.

Team Training Program
Delivered OnlineFlexible Dates
Price on Enquiry

Developing Effective Working Relationships

By Underscore Group

Understand and explore what you and others do that develops and destroys working relationships. Course overview Duration: 2 days (13 hours) This is an exciting opportunity to dive into the very heart of human behaviour as we encourage you to explore what you and others do that develops and destroys working relationships.  We start by getting you to determine where in your working life you need to develop effective relationships before guiding you through a process of analysing personalities and behaviours and then giving you the skills to create and maintain great relationships.  Objectives  By the end of the course you will be able to: Create a stakeholder map and analyse which relationships need to be developed Describe different personality types and how these can cause connection and conflict Develop behaviours that help build relationships Bring more assertiveness to your relationships Have courageous conversations and handle conflict should it occur Content Getting started The benefits of great working relationships Determining what you want specifically from your relationships at work Developing a stakeholder map to enable you to analyse who you need to build relationships with and how you might do this Defining your personal brand How your personal brand could impact relationships Understanding others Exploring different personality types Understanding how others are both similar and different to you Identifying when personality differences might cause conflict Better Behaviour Exploring the concept of transactional analysis How transactional analysis can help to build or break relationships Understanding life positions How life positions impact your behaviour and that of others How to use transactional analysis in creating better relationships Developing Relationships Understanding the common ways poor communication can cause problems in relationships Developing assertive communication Making human connections at work in order to build better relationships and create trust Maintaining Relationships Recognition and Tiny Noticeable Things How to have courageous conversations e.g. giving feedback A model for handling conflict when it occurs

Developing Effective Working Relationships
Delivered in Horsham or OnlineFlexible Dates
Price on Enquiry

Understanding Blockchain Technology: WEB3 Universe - From TradFi to DeFi

5.0(5)

By Finex Learning

Overview The objective of this course is to equip professionals with comprehensive knowledge and practical skills in WEB 3 technologies and crypto assets. Participants will gain a deep understanding of the underlying principles of blockchain, the operational mechanics of cryptocurrencies, the potential impact of these technologies on the banking sector and the latest trends. Who the course is for Consultants Analysts Managers C-Level executives People in need of knowledge to develop a blockchain strategy People working with blockchain projects Regulators Course Content To learn more about the day by day course content please request a brochure To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now

Understanding Blockchain Technology: WEB3 Universe - From TradFi to DeFi
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

Managing Logistics

5.0(6)

By Supply Chain Academy

This intensive course equips senior management with the knowledge and skills to develop a logistics strategy that will consistently support business objectives. PARTICIPANTS WILL LEARN HOW TO: Understand the concept of integrated logistics. Critically analyse and evaluate logistics operations. Apply solutions to problems in line with global best practices. Devise and operate effective performance measures. Learn how to create performance improvement plans. Understand how to support inbound and outbound logistic activities. COURSE TOPICS INCLUDE: Mission, strategy and policies for logistics Costs of non-performance and poor performance Logistics planning Land, air and marine transport services Materials storage, preservation and handling Waste management services HSSE policies Sustainable logistics and transport Risk management in logistics Management controls Performance measurement Sustainability

Managing Logistics
Delivered in Upminster or UK Wide or OnlineFlexible Dates
Price on Enquiry

VMware NSX Advanced Load Balancer: Install, Configure, Manage [V21.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Deploy and configure the NSX Advanced Load Balancer infrastructure within private or public clouds using Write and No-Access Cloud Connectors Explain, deploy, and configure Service Engines Explain and configure local load balancing constructs such as virtual services, pools, health monitors, and related components Explain and configure advanced virtual services and related concepts such as Subject Name Indication, Enhanced Virtual Hosting, and authentication of virtual services Explain and modify application behavior through profiles, policies, and DataScripts Describe Central licensing management using VMware NSX Advanced Load Balancer Enterprise with Cloud services (formerly Avi Pulse) Explain how to configure Role-Based Access Control (RBAC) in NSX Advanced Load Balancer Configure advanced services such as global server load balancing Describe how to use NSX Advanced Load Balancer REST API interfaces and related automation capabilities Describe and configure NSX Advanced Load Balancer application and infrastructure monitoring Gather relevant information and perform basic troubleshooting of applications that use built-in NSX Advanced Load Balancer tooling Identify the key features of VMware NSX Network Detection and Response This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX Advanced Load Balancer (Avi Networks) solution. This course covers key NSX Advanced Load Balancer (Avi Networks) features and functionality offered in the NSX Advanced Load Balancer 21.x release. Features include the overall infrastructure, virtual services, application components, global server load balancing, various cloud connectors, application troubleshooting, and solution monitoring. Hands-on labs provide access to a software-defined data center environment to reinforce the skills and concepts presented in the course. Course Introduction Introduction and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Virtual Services Configuration Concepts Explain virtual service components Explain virtual service types Explain and configure basic virtual service components such as application profiles and network profiles Virtual Services Configuration Advanced Concepts Explain the virtual service advanced components such as Wildcard VIP, Server Name Identification (SNI), and Enhanced Virtual Hosting (EVH) Explain the concept of virtual service VIP Sharing Explain different authentication mechanisms used for a virtual service such as LDAP, SAML, JSON Web Token, and OAUTH Profiles and Policies Explain application profiles and types such as L4, DNS, Syslog, HTTP, and VMware Horizon VDI Explain and configure advanced application HTTP profile options Describe network profiles and types Explain and configure SSL profiles and certificates Explain and configure HTTP, network, and DNS policies Pools Configuration Concepts Explain pools configuration options Describe the available load balancing algorithms Explain multiple health monitor types Explain multiple Persistence profiles Explain and configure pool groups Modifying Application Behavior Design and apply application solutions by using application profiles Design and apply application solutions by using network, HTTP policies, and DataScripts Explain DataScript fundamentals Explain and use NSX Advanced Load Balancer analytics to understand application behavior Describe and configure client SSL certificate validation Describe and configure virtual service DDoS, Rate limiting, and Throttling capabilities Modify network profile properties such as TCP connection properties Design and apply application solutions by using Persistence profiles NSX Advanced Load Balancer Infrastructure Architecture Explain management, control, data, and consumption planes and functions Describe control plane clustering and high availability Describe controller sizing and process sharing Describe Service Engine CPU and NIC architecture Explain tenants Configure properties of Service Engine groups Explain Service Engine group high availability modes Describe and configure active-standby high availability mode Explain Service Engine placement in multiple availability zones for public clouds Describe and configure elastic HA high availability mode (Active-Active, N+M) Explain Service Engine failure detection and self-healing Describe Service Engine as a router Explain virtual service scale-out options such as Layer 2 (Native), Layer 3 (BGP), and DNS-based Describe how to upgrade NSX Advanced Load Balancer Introduction to Cloud Connector Explain cloud connectors Review cloud connector integration modes List cloud connector types Review the different Service Engine image types in different ecosystems Installing, Configuring, and Managing NSX Advanced Load Balancer in No-Orchestrator Cloud Explain No-Access cloud concepts Configure No-Access cloud integration on bare metal Explain and configure Linux Server Cloud Explain and configure VMware No Orchestrator Describe the advanced configuration options available in bare metal (Linux Server Cloud) Installing, Configuring, and Managing NSX Advanced Load Balancer in VMware Environment: Cloud Configuration Introduce VMware integration options Explain and configure VMware Write Access Cloud Connector Explain NSX Advanced Load Balancer integration options in a VMware NSX environment Explain and configure NSX Cloud Connector for Overlay and VLAN-backed segments AWS Cloud Configuration Describe NSX Advanced Load Balancer public cloud integrations Explain different AWS components Explain and demonstrate AWS public cloud integration Deploy VMware NSX Advanced Load Balancer Controller, SEs, and virtual services in AWS Cloud Review Multi-AZ Support for virtual services in AWS cloud GCP Cloud Configuration Explain different GCP components Explain and demonstrate GCP public cloud integration Deploy NSX Advanced Load Balancer Controller, SEs, and virtual services in GCP cloud Azure Cloud Configuration Describe NSX Advanced Load Balancer public cloud integrations Explain different Microsoft Azure components Explain and demonstrate Azure public cloud integration Deploy NSX Advanced Load Balancer Controller, SEs, and virtual services in Azure Cloud NSX Advanced Load Balancer Enterprise with Cloud Services (Avi Pulse) Describe NSX Advanced Load Balancer public cloud services Explain different features of NSX Advanced Load Balancer Cloud Services Register the controller with Cloud Services DNS Foundations Review, discuss, and explain DNS fundamentals Describe NSX Advanced Load Balancer DNS and IPAM providers Global Server Load Balancing (GSLB) Introduce Global Server load balancing concepts and benefits Explain and configure the NSX Advanced Load Balancer infrastructure Explain and configure the DNS Virtual Service components Explain and configure GSLB Service Engine Group Describe and configure GSLB sites Explain and configure basic GSLB services to include pools and health monitors Describe GSLB Server Load Balancing algorithms Explain and configure health monitors based on data plane and control plane Describe GSLB Health Monitor Proxy Explain GSLB Site-Cookie Persistence Explain the different GSLB replication methods Role-Based Access Control (RBAC) Introduce local authentication in NSX Advanced Load Balancer Introduce remote authentication in NSX Advanced Load Balancer Review the different types of remote authentication Explain granular RBAC using labels NSX Advanced Load Balancer: Troubleshooting Introduce infrastructure and application troubleshooting concepts Describe troubleshooting based on control plane and data plane Explain application analytics and logs Describe client logs analysis Explain headers troubleshooting and packet capture mechanism Describe how to use CLI for detailed data plane troubleshooting Explain Service Engine logs Explain health monitors troubleshooting Explain BGP session troubleshooting Describe control plane troubleshooting, clustering, and cloud connector issues Events and Alerts Describe NSX Advanced Load Balancer events Describe and configure NSX Advanced Load Balancer alerts Describe NSX Advanced Load Balancer monitoring capabilities with SNMP, Syslog, and Email Introduction to NSX Advanced Load Balancer Rest API Introduce the NSX Advanced Load Balancer REST API interface Describe REST API Object Schema Explain and interact with REST API interface with

VMware NSX Advanced Load Balancer: Install, Configure, Manage [V21.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security engineer Network engineer Network designer Network administrator Systems engineer Consulting systems engineer Technical solutions architect Network manager Cisco integrators and partners Overview After taking this course, you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW) Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco© CCNP© Security and CCIE© Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower© Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch© Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. Describing Information Security Concepts* Information Security Overview Assets, Vulnerabilities, and Countermeasures Managing Risk Vulnerability Assessment Understanding Common Vulnerability Scoring System (CVSS) Describing Common TCP/IP Attacks* Legacy TCP/IP Vulnerabilities IP Vulnerabilities Internet Control Message Protocol (ICMP) Vulnerabilities TCP Vulnerabilities User Datagram Protocol (UDP) Vulnerabilities Attack Surface and Attack Vectors Reconnaissance Attacks Access Attacks Man-in-the-Middle Attacks Denial of Service and Distributed Denial of Service Attacks Reflection and Amplification Attacks Spoofing Attacks Dynamic Host Configuration Protocol (DHCP) Attacks Describing Common Network Application Attacks* Password Attacks Domain Name System (DNS)-Based Attacks DNS Tunneling Web-Based Attacks HTTP 302 Cushioning Command Injections SQL Injections Cross-Site Scripting and Request Forgery Email-Based Attacks Describing Common Endpoint Attacks* Buffer Overflow Malware Reconnaissance Attack Gaining Access and Control Gaining Access via Social Engineering Gaining Access via Web-Based Attacks Exploit Kits and Rootkits Privilege Escalation Post-Exploitation Phase Angler Exploit Kit Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Stateful Firewall Overview Security Intelligence Overview Threat Information Standardization Network-Based Malware Protection Overview Intrusion Prevention System (IPS) Overview Next Generation Firewall Overview Email Content Security Overview Web Content Security Overview Threat Analytic Systems Overview DNS Security Overview Authentication, Authorization, and Accounting Overview Identity and Access Management Overview Virtual Private Network Technology Overview Network Security Device Form Factors Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Network Address Translation Cisco ASA Interface Access Control Lists (ACLs) Cisco ASA Global ACLs Cisco ASA Advanced Access Policies Cisco ASA High Availability Overview Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Cisco Firepower NGFW Network Address Translation (NAT) Cisco Firepower NGFW Prefilter Policies Cisco Firepower NGFW Access Control Policies Cisco Firepower NGFW Security Intelligence Cisco Firepower NGFW Discovery Policies Cisco Firepower NGFW IPS Policies Cisco Firepower NGFW Malware and File Policies Deploying Email Content Security Cisco Email Content Security Overview Simple Mail Transfer Protocol (SMTP) Overview Email Pipeline Overview Public and Private Listeners Host Access Table Overview Recipient Access Table Overview Mail Policies Overview Protection Against Spam and Graymail Anti-virus and Anti-malware Protection Outbreak Filters Content Filters Data Loss Prevention Email Encryption Deploying Web Content Security Cisco Web Security Appliance (WSA) Overview Deployment Options Network Users Authentication Secure HTTP (HTTPS) Traffic Decryption Access Policies and Identification Profiles Acceptable Use Controls Settings Anti-Malware Protection Deploying Cisco Umbrella* Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Managing Cisco Umbrella Cisco Umbrella Investigate Overview and Concepts Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Keys in Cryptography Public Key Infrastructure Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps IPsec Static Virtual Tunnel Interface Dynamic Multipoint VPN Cisco IOS FlexVPN Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs Cisco IOS VTIs Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies Secure Sockets Layer (SSL) Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Cisco ASA Remote Access VPN Configuration Cisco Firepower NGFW Remote Access VPN Configuration Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Cisco Identity Services Engine Cisco TrustSec Describing 802.1X Authentication 802.1X and Extensible Authentication Protocol (EAP) EAP Methods Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications RADIUS Change of Authorization Configuring 802.1X Authentication Cisco Catalyst© Switch 802.1X Configuration Cisco Wireless LAN Controller (WLC) 802.1X Configuration Cisco Identity Services Engine (ISE) 802.1X Configuration Supplicant 802.1x Configuration Cisco Central Web Authentication Describing Endpoint Security Technologies* Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Application Whitelists and Blacklists Host-Based Malware Protection Sandboxing Overview File Integrity Checking Deploying Cisco Advanced Malware Protection (AMP) for Endpoints* Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Cisco AMP Device and File Trajectory Managing Cisco AMP for Endpoints Introducing Network Infrastructure Protection* Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Network Telemetry Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Deploying Control Plane Security Controls* Infrastructure ACLs Control Plane Policing Control Plane Protection Routing Protocol Security Deploying Layer 2 Data Plane Security Controls* Overview of Layer 2 Data Plane Security Controls Virtual LAN (VLAN)-Based Attacks Mitigation Sp

Cisco Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR)
Delivered OnlineFlexible Dates
Price on Enquiry