Git and GitHub course description This course covers version control using Git but also using GUI frontends such as GitHub. The course starts with a tour of using GitHub but then quickly moves onto using git from the command line. All elements of git version control are covered including creation of repositories, adding and editing files, branches and merging, rewriting history and handling merge conflicts. Hands on sessions are used throughout the course. What will you learn Install git. Add and edit files in a repository. Create branches and perform merges. Handle merge conflicts. Git and GitHub course details Who will benefit: Anyone requiring version control. Prerequisites: None. Duration 1 day Git and GitHub course contents Introduction Version control for software, configuration management. Other uses. Version control systems. What is git? What is GitHub? Distributed version control. Comparison of git to other systems. GitHub Getting started, creating an account, account types, repositories, access control, bug tracking, feature requests. Alternatives to GitHub. Hands on Using GitHub. Installing git Linux install, Windows install, git config, levels, user.name, user.email. Hands on Installing and configuring git. Creating repositories git clone, github, git remote, git init. Hands on Creating a repository. Adding and editing files Staging and adding, git add, git commit, git push, git pull, git status, git log. Two stage process. File states: Working, staging, history, untracked. git mv, git rm, .gitignore, git diff, git difftool. Undoing changes. Hands on Adding and editing files in git. Branching and merging What is a branch, HEAD label, master branch, git branch, git checkout. Feature branches, bux fix branches, integration branches, production branches, fast forward merges, 3 way merges, git merge, git status, git log, tags. Hands on Making branches, merging. Rewriting history git reset, git rebase, advantages. Hands on Reset commits, rebase a branch. Merge conflicts What is a conflict, conflict resolution process, resolving merges, rebasing, git log, merge tools, configuring merge tools, avoiding conflicts. Hands on Merge resolution.
Essential GEPON training course description Designed to benefit those requiring an in depth knowledge of the principles and applications of the IEEE Ten Gigabit Ethernet and Gigabit Ethernet Passive Optical Networking and Fibre to the X in NG network applications and their associated equipment, its flexibility and function within a modern transmission network. Using an effective mix of instruction and correlation to theory based learning the delegate will gain a complete understanding of the equipment and the tasks to be undertaken in a real life situation. What will you learn Compare FTTx networks. Compare PON variants. Recognise the GEPON architecture. Explain how GEPON works. Recognise GEPON issues. Essential GEPON training course details Who will benefit: Anyone requiring GEPON knowledge. Prerequisites: Introduction to data communications and networking. Duration 2 days Essential GEPON training course contents FTTN, FTTC, FTTH Single Mode Fibre (SMF) and various types, Multimode Fibre (MMF), Fibre Safety and properties (Dispersion/attenuation), Fibre Reel cables and types, Fibre installation and air blown fibre, Transmitters and receivers - power budget/laser classes, Fibre to the home (FTTH), FTTC (Fibre to the Cabinet), FTTN (Fibre to the node), FTTD (Fibre to the Desk), FFTH Topologies and wavelengths, Active or Passive Optical Network (PON). WDM equipment and GPON OSP design Wavelength considerations, WDM/DWDM/CWDM EDFA optical amplification, AWG (Arrayed Waveguide Grating) splitters, Couplers (splitters) and losses, Optical splitters 1x2, 1x4, 1x8, 1x16, 1x32, 1x64, 2x64. IEEE PON variants Gigabit Ethernet Passive Optical Network (GEPON), Time Division PON (TDM-PON), Wave Division Multiplexing PON (WDM-PON), 1Gbps, 10Gbps, 40Ggps, 100Gbps, Strategies for TDM-PON to WDM-PON migration, Architecture of NG-PON (hybrid WDM/TDM PON), Additional services than triple play. GEPON design GEPON OSP centralized design, GEPON OSP distributed design, GEPON PON splitters x4 x8 x32, Fibre splice trays / fibre cassette trays / fibre enclosures, GEPON field testing /GEPON field installation verification, GEPON physical layer testing, Optical Time Domain Reflectometer (OTDR), Optical power source /Optical power meter, Optical Return Loss (ORL), APON/BPON/GPON/EPON/GEPON/10-GEPON comparison. IEEE 802.3ah GEPON: Ethernet in the first mile IEEE 802.3 options, Optical Ethernet options, Ethernet in the first mile, 1000BASE-LX, 1000BASE-SX, IEEE 802.1Q VLANs, Q-in-Q and MAC-in-MAC. QofS Ethernet TOS and priority methods PCP and DiffServe, Reference model / terminology / architecture, Example of ONT functional blocks, Example of OLT functional blocks, FTTx scenarios, The four switching arrangements for external access network backup. IEEE 802.3av 10-GEPON Physical layer, 10GBASE-SR, 10GBASE-LX4, 10GBASE-ER, 10GBASE-LR, 10GBASESW, 10GBASE-LW, 10GBASE-EW, Enhancement band, Bit rate and wavelengths, Compatibility, Forward error correction. IEEE 802.3ca 25G, 50G and 100G NG-EPON MAC frame structure, Downstream multiplexing / Upstream multiplexing, Media access control and ONU registration, Alarm messages. IEEE 802.3bk extended EPON Laser Types PRX40 and PR40, Reference model. GEPON issues and standards GEPON components OLT / GEPON ONT and examples GEPON management, RG (Residential Gateway), HPNA (Home Phone Network Alliance), Power Line Carrier (PLC), GPON DLNI, G.hn or G.9960 MOCA, FTTH Council certification, Standard for network certification, Qualify for use of the fibre-connected home badge, GEPON frame synchronization to network timing, Direct clock synchronization interface (BITS), Multiservice Access Platform (MSAP), Software planning tool. Superconnected cities / voucher scheme. Ethernet OAM Link monitoring, remote failure indication, Remote loopback.
Duration 2 Days 12 CPD hours This course is intended for The audience for this course is anyone who wants to acquire foundation level knowledge on data centre infrastructure. This course is ideally suited for data centre new hires, internal data centre support staff, IT support staff who work in the data centre, helpdesk staff, vendors/suppliers who install/maintain data centre equipment, building maintenance staff including data centre cleaners and other supporting functions, and fresh graduates. This course is also well suited for individuals working in data centre business support functions such as sales/pre-sales, HR, Finance and business administration. Overview The DCFC course will prepare participants for entry into the exciting and high-growth data centre industry. It will ensure that participants acquire the required basic knowledge to take on a wide variety of jobs in the data centre industry. It will also provide the required knowledge and skill to further their training into specialised areas on data centre design/build, operations/governance or standards/compliance. The Data Centre Foundation Certificate (DCFC©) is a 2-day course designed to deliver foundation knowledge about data centre facilities infrastructure. It provides participants with global overview and knowledge on data centres which will be of advantage to the participants who are looking at joining the ranks of professionals working in the data centre, ICT, infrastructure or the mechanical and electrical (M&E) design industries. It will also form a solid foundation for participants who wish to pursue his/her studies either academically or to further his/her industry specialisation with professional certification courses on data centre design/build, operations/governance and/or standards/compliance. With the tremendous growth of data and the data centres to support it, the demand for data centre professionals will grow in tandem. Introduction to Data Centres History of data centres Definition of different type data centres Data Centre Standards List of standards Rating definitions Data Centre Facilities Areas Listing of all areas and their functions Topology Designs Definition of Ratings Components of the Power Infrastructure Utility power Transformers Generators Fuel systems ATS UPS systems Batteries Electric panels Cabling/busbar systems Power rails/strips Lights Lights Emergency lights Cooling Infrastructure Chillers DX Systems Evaporators CRAC/CRAU/HVAC Raised floor Non-raised floor Containment ICT/Network Infrastructure Equipment racks Network cabling (fibre, copper) Cable trays and pathways TIA-606 labelling Data Centre Security Perimeter security Physical protection CCTV Access control Security management Fire Suppression Detection systems Suppression systems Prevention systems Fire extinguishers Fire Safety Monitoring and reporting DCIM EMS/BMS
GPON and FTTx networks training course description Designed to benefit those requiring an in depth knowledge of the principles and applications of Ten Gigabit and Gigabit Passive Optical Networking and Fibre to the X in NG Networks applications and their associated equipment, its flexibility and function within a modern transmission network. Using an effective mix of 'hands on' equipment instruction and correlation to theory based learning the delegate will gain a complete understanding of the equipment and the tasks to be undertaken in a real life situation. What will you learn Compare PON/FTTx systems. Explain network elements and designs. Support applications and network interfaces. List circuit provisioning and bandwidth requirements. Understand upstream & downstream issues. Describe headend & network elements/OLT-ONT. Perform network testing with OTDR test sets. GPON and FTTx networks training course details Who will benefit: Anyone working with GPON and FTTx. Prerequisites: Introduction to data communications and networking. Duration 5 days GPON and FTTx training course contents FTTN, FTTC, FTTH SMF, MMF, Fibre safety and properties (dispersion/attenuation), Fibre reel cables and types, Fibre installation and air blown fibre, Transmitters and receivers - power budget/laser classes. Fibre to the home (FTTH), FTTC (Fibre to the Cabinet), FTTN (Fibre to the node) , FTTD (Fibre to the desk), FFTH topologies and wavelengths, Active or passive optical network. WDM equipment and GPON OSP design Wavelength considerations, WDM/DWDM/CWDM, EDFA optical amplification, AWG (Arrayed Waveguide Grating) splitters , Couplers (splitters) and losses, Optical splitters 1x2, 1x4, 1x8, 1x16, 1x32, 1x64, 2x64. PON variants Gigabit passive optical network (GPON), Gigabit Ethernet passive optical network (GEPON), Time division PON (TDM-PON), Wave Division Multiplexing PON (WDM-PON), 1Gbps, 10Gbps, 40Ggps, 100Gbps FSAN (Full Service Access Network) NGA (Next Generation Access), Strategies for TDM-PON to WDM-PON migration, Architecture of NG-PON (hybrid WDM/TDM PON), Additional services than triple play. GEPON design GPON OSP centralized and distributed design, GPON PON splitters x4 x8 x32, Fibre splice trays /cassette trays & enclosures, GPON field testing and installation verification, GPON physical layer testing, Optical time domain reflectometer (OTDR), Optical power source & meter, Optical return loss (ORL), APON/BPON/GPON/EPON comparisons. GPON ITU-T G.984.1 Reference model, terminology & architecture, Access network system management functions. ONT & OLT functional block examples. FTTx scenarios, 4 switching arrangements for external access network backup. GPON ITU-T G.984.2 Physical layer, Enhancement band, Bit rate and wavelengths, FEC and RAMAN. GPON ITU-T G.984.3 Frame structure, GPON encapsulation method (GEM), GTC adaptation and framing sublayer protocol stack, Status reporting & traffic monitoring DBA (SR-DBA & TM-DBA), Transmission container (T-CONT) types, Downstream & upstream multiplexing, GEM port identifier, Media access control and ONU registration, Extended bandwidth assignment model scheduling architecture, PLOAM & alarm messages, Downstream & Upstream FEC, Process order in a GTC transmit flow. GPON ITU-T G.984.4 and G.988 ONT management and control interface (OMCI) Management interface, Reference model, Typical ONT with SCTE 55-1 or SCTE 55-2 compliancy. GPON ITU-T G.984.5 enhancement band Band options, GPON NGA, Wavelength allocation. GPON ITU-T G.984.6 optical reach extension (G.984.re) Reach extension (RE), OA-based and OEO-based reach extenders, Protection, Reach extender with OTDR blocking filters (BF) and bypass (BYP) filters. GPON ITU-T G.984.7 long reach Quiet Window. 10-GPON ITU-T G.987.1 (XG-PON) Scenarios, reference access network architecture, XG-PON with G-PON through WDM1r, G-PON and XG-PON wavelength allocation, G-PON and XG-PON co-existence with video overlay option, RE migration scenarios. G.989 40Gbps XG-PON2 Functional reference architecture, NG-PON2 system coexistence with legacy systems, Definitions of legacy compatibility terminology. GPON issues and standards GPON components GPON OLT / GPON ONT, GPON management, Operational support systems (OSS), Network management systems (NMS), OMCI (ONT Management control interface), RG (Residential gateway), Data and prioritised voice channel product, GPON broadband-forum standards, Broadband-forum , TR-069 and TR-156, HPNA (home phone network alliance), Powerline carrier (PLC), GPON DLNI G.hn or G.9960, MOCA, FTTH council certification standard for network certification. Fibre-connected home badge, Ethernet in the first mile (EFM), GPON frame synchronization to network timing, Direct clock synchronization interface (BITS), Multiservice access platform (MSAP), Software planning tool, Superconnected cities / voucher scheme. Hands on practical assignments Single and multimode fibre recognition, Fibre Cleaning methods, Checking cleaning with an optical microscope, Optical light source and optical power meter referencing, PON splitter and fibre drum testing with an optical power meter, 6km classroom passive optical network testing with an OTDR at 1310/1550nm, Using decibels (dB's) and decibel milliwats (dBm's), Designing networks up to 20km long using vendor specifications (power budget), Fault finding with a visible fault locator.
MySQL server admins training course description This MySQL Server administration course is designed for MySQL Server administrators who have a basic understanding of a MySQL database and a good working knowledge of SQL commands. The course provides an understanding of MySQL Architecture and practical experience in setting up, configuring and maintaining a MySQL server, backing up and recovering data and optimising query performance. This MySQL Server administration course also covers MySQL replication and its role in high availability and scalability. What will you learn Use MySQL Workbench. Install and configure a MySQL Server . Administer and tune a MySQL server. Configure log files and interpret error messages.. Secure the Server. Administer a replication topology. MySQL server admin training course details Who will benefit: Database administrators, Database developers and Technical consultants. Prerequisites: Introduction to MySQL Duration 5 days MySQL server admin training course contents Introduction to Oracle Application Express APEX concepts APEX main components Workspaces, database applications and websheet applications Creating a workspace The Workspace Administrator Upgrading APEX Logging into APEX Running an application SWL Workshop Use APEX to browse, create and modify objects Process ad hoc SQL statements Manage scripts in APEX Create, run and save SQL queries Build a database application Application components Create an application Create an application from a spreadsheet Create reports Create reports using wizards Edit report attributes Add links to reports Create a link to a printer-friendly version of a report Save and print reports in different formats Using files Uploading images Creating cascading stylesheet files Uploading static files Adding an Image as an application logo Adding a reference to a Javascript file Pages and regions Web form behaviour in APEX Create a form based on a table Create a form based on a procedure Create a form with a report Create a tabular form Format a form Locking in APEX forms Creating lists of values Overview of application express shared Components Dynamic and static lists of values Create a dynamic list of values Create a static list of values Use a list of values to control data in a report Create a cascading list of values Items and buttons Understand the different Types of items Create items Understand and edit item attributes Use Javascript with item Manipulate items in tabular forms Add dynamic items to a report Create and edit buttons Page Processing Page rendering and page processing Create computations Validate input data Process Data Understand application branching Create conditional branches Shared components Overview of application express navigation components Manage parent and standard tabs Create navigation bar entries Create and use lists and list items Manage breadcrumbs Create shortcuts Shared component subscription User interface defaults Display dynamic content Filter reports with dynamic queries Create charts with a wizard Format charts Create calendars Add links to calendars Create hierarchical trees State and debugging Understand session state Set a session state value Clear the session state Review the session state Review the messages in debug mode Enabling feedback Managing feedback and team development Themes and templates Switch to a different theme View existing templates Understand and manage templates Create a new template Add references to cascading stylesheet and Javascript files Dynamic actions and plug-in components Identify plug-in components and their types Plug In a component Create dynamic actions Use a plug-in in a dynamic action Building website applications Websheet applications and their components Create a websheet application Enable SQL and PL/SQL in a websheet application Add sections and pages to a websheet application Add links on a websheet page Add a data grid to a websheet application Create SQL reports ion websheet applications Add annotations to a websheet application Implementing security Authentication and authorization Provide an authentication scheme Create an authorization scheme using access control Enable and configure session state protection Deploy an appliction Define supporting objects Package an application Export an application Import an application Install supporting objects Administer Apex workspaces Manage workspaces and users Request a schema or storage Purge session state Monitor developer activity log Monitor workspace activity View activity reports Import a workspace Utility programs Import and export data Generate DDL statements View objects reports
Network design training course description This course provides you with the knowledge needed to perform the design of a network infrastructure that supports desired network solutions to achieve effective performance, scalability, and availability. We recognise that the role of design does not normally require hands on skills but hands on sessions are used to reinforce the theory not to teach configuration or troubleshooting. What will you learn Create HA enterprise network designs. Develop optimum Layer 3 designs. Design effective modern WAN and data center networks. Develop effective migration approaches to IPv6. Create effective network security designs. Network design training course details Who will benefit: Anyone involved with network design. Prerequisites: TCP/IP Foundation for engineers Duration 5 days Network design training course contents Part I Reliable, resilient enterprise L2/3 network designOptimal Enterprise Campus Design:Enterprise campus design principles, hierarchy, modularity, flexibility, resiliency.EIGRP design:EIGRP Design, Should you use EIGRP?OSPF design: OSPF scalability designs, OSPF area design, OSPF Full-Mesh Design, OSPF Hub-and-Spoke Design, OSPF convergence design and optimization techniques. IS-IS Design:The protocol, IS-IS hierarchical architecture, IS-IS vs OSPF, IS-IS Deep Dive, IS-IS Design Considerations. BGP design:BGP overview, Designing Scalable iBGP Networks, BGP Route Reflector Design, Enhancing the Design of BGP Policies with BGP Communities, Case Study: Designing Enterprise wide BGP Policies Using BGP Communities, BGP Load-Sharing Design.Part II Enterprise IPv6 Design ConsiderationsIPv6 Design Considerations in the Enterprise: IPv6 Deployment and Design Considerations, Considerations for Migration to IPv6 Design, IPv6 Transition Mechanisms, Final Thoughts on IPv6 Transition Mechanisms. Challenges of the Transition to IPv6: IPv6 Services, Link Layer Security Considerations. Part III Modern Enterprise Wide-Area Networks DesignService Provider-Managed VPNs:Choosing Your WAN Connection, Layer 3 MPLS VPNs, Case Study: MPLS VPN Routing Propagation, Layer 2 MPLS VPN Services. Enterprise-Managed WANs: Enterprise-Managed VPNs, GRE, Multipoint GRE, Point-to-Point and Multipoint GRE, IPsec, IPsec and dynamic VTI, DMVPN, Case Study: EIGRP DMVPN, DMVPN and Redundancy, Case Study: MPLS/VPN over GRE/DMVPN, SSL VPN. Enterprise WAN Resiliency Design: WAN Remote-Site Overview, MPLS L3 WAN Design Models, Common L2 WAN Design Models, Common VPN WAN Design Models, 3G/4G VPN Design Models, Remote Site Using Local Internet, Remote-Site LAN, Case Study: Redundancy and Connectivity, NGWAN, SDWAN, and IWAN Solution Overview, IWAN Design Overview, Enterprise WAN and Access Management. Part IV Enterprise Data Center DesignsMultitier Data Center Designs: Case Study: Small Data Centers (Connecting Servers to an Enterprise LAN), Case Study: Two-Tier Data Center Network Architecture, Case Study: Three-Tier Data Center Network Architecture.Trends and Techniques to Design Modern Data Centers: The Need for a New Network Architecture, Limitations of Current Networking Technology, Modern Data Center Design Techniques and Architectures, Multitenant Data Center. SDN:SDN characteristics, How SDN addresses current Networking Limitations, SDN Architecture Components, SDN Network Virtualization overlays. Data Center Connections:Data Center Traffic Flows, The Need for DCI, IP Address Mobility, Case Study: Dark Fiber DCI, Pseudowire DCI. Part V Design QoS for Optimized User ExperienceQoS Overview:QoS Overview, IntServ versus DiffServ, Classification and Marking, Policers and Shapers, Policing Tools: Single-Rate Three-Color Marker, Policing Tools: TwoRate Three-Color Marker, Queuing Tools, Dropping Tools. QoS design principles and best practices: QoS overview, classification and marking design principles, policing and remarking design principles, queuing design principles, dropping design principles, Per-Hop behavior queue design principles, RFC 4594 QoS Recommendation, QoS Strategy Models. Campus QoS, WAN QoS, Data Center QoS.MPLS VPN QoS Design: The Need for QoS in MPLS VPN, Layer 2 Private WAN QoS Administration, Fully Meshed MPLS VPN QoS Administration, MPLS DiffServ Tunneling Modes, Sample MPLS VPN QoS Roles. IPsec VPN QoS Design: The Need for QoS in IPsec VPN, VPN Use Cases and Their QoS Models, IPsec Refresher, Encryption and Classification: Order of Operations, MTU Considerations, DMVPN QoS Considerations. Part VI IP Multicast DesignEnterprise IP Multicast Design: How Does IP Multicast Work? Multicast Protocols, Multicast Forwarding and RPF Check, Multicast Protocol Basics, PIM-SM Overview, Multicast Routing Table, Basic SSM Concepts, Bidirectional PIM. RP discovery, Anycast RP Features, MSDP. Part VII Designing Optimum Enterprise Network SecurityDesigning Security Services and Infrastructure Protection Network Security Zoning, Designing Infrastructure Protection.Designing firewall & IPS solutions: Firewall architectures, virtualized firewalls. Case Study: Application Tier separation, Case Study: Firewalls in a Data Center, Case Study: Firewall High Availability, IPS Architectures, Case Study: Secure Campus Edge Design (Internet and Extranet Connectivity). IP Multicast Security: Multicast Security Challenges, Multicast Network Security Considerations. Designing Network Access Control Solutions:IEEE 802.1X, EAP, 802.1X supplicants, 802.1X phased deployment, Case Study: Authorization Options. Part VIII Design scenariosDesign Case Studies: 1: Enterprise Connectivity, 2: Enterprise BGP with Internet Connectivity, 3: IPv6, 4: Data Center Connectivity, 5: Resilient Enterprise WAN, 6: Secure Enterprise Network, 7: QoS in the Enterprise Network.
ð Security Guard Online Course - Empowering Protectors of Safety! Welcome to the Security Guard Online Course, your gateway to a fulfilling and impactful career in the field of security. Designed to equip you with the essential skills and knowledge needed in today's dynamic security landscape, this comprehensive course covers five crucial modules, ensuring you emerge as a proficient and confident security professional. ð Module 1: Introduction to Security Guard Training Embark on your security journey with a solid foundation. Module 1 introduces you to the fundamental principles of security guard training. Gain insights into the role, responsibilities, and ethical considerations of a security guard. Understand the importance of maintaining a professional demeanor and establishing a positive presence. ðï¸ Module 2: Communication Skills for Security Guards Effective communication is the cornerstone of successful security operations. Module 2 hones your verbal and written communication skills, empowering you to interact confidently with both colleagues and the public. Learn to de-escalate situations, gather information efficiently, and document incidents accurately. ð¨ Module 3: Access Control and Patrolling Master the art of access control and patrolling in Module 3. Explore techniques for securing premises, monitoring access points, and conducting thorough patrols. Acquire the skills to detect and respond to potential security threats, ensuring a safe and secure environment for all. ð Module 4: Emergency Response Procedures Preparedness is key in the security field. Module 4 delves into emergency response procedures, equipping you with the knowledge to handle various crises effectively. From medical emergencies to security breaches, learn the protocols to safeguard lives and property with composure and efficiency. ð Module 5: Security Technology Stay ahead of the curve with Module 5, where you'll explore the latest advancements in security technology. From CCTV systems to access control tools, understand how technology enhances security measures. Gain hands-on experience with cutting-edge tools and platforms to elevate your capabilities as a security professional. ð Why Choose Our Course? Flexible Learning: Access modules at your convenience, allowing you to balance your training with other commitments. Expert Instructors: Learn from industry experts with years of practical experience in security operations. Interactive Content: Engaging videos, simulations, and real-world scenarios make learning both enjoyable and effective. Career Advancement: Position yourself for career growth with a recognized certification in security guard training. ð¡ï¸ Enroll Now and Step into a Secure Future! Invest in your future as a guardian of safety. Enroll in the Security Guard Online Course today and embark on a journey towards a rewarding and impactful career. Secure your spot now, and let's build a safer world together! Course Curriculum Module 1_ Introduction to Security Guard Training Introduction to Security Guard Training 00:00 Module 2_ Communication Skills for Security Guards Communication Skills for Security Guards 00:00 Module 3_ Access Control and Patrolling Access Control and Patrolling 00:00 Module 4_ Emergency Response Procedures Emergency Response Procedures 00:00 Module 5_ Security Technology Security Technology 00:00
Master the art of effective data management with our 'Data Documentation and Record Keeping Essentials' course. Explore key topics including data collection, storage, and security, while developing strategies for comprehensive documentation. Gain the skills needed for compliance, access control, and successful record-keeping. Elevate your professional profile with essential data skills and contribute to organizational success. Enroll now for a transformative learning experience in the world of data management.
Duration 4 Days 24 CPD hours This course is intended for The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. Prerequisites Basic understanding of Microsoft 365 Fundamental understanding of Microsoft security, compliance, and identity products Intermediate understanding of Windows 10 Familiarity with Azure services, specifically Azure SQL Database and Azure Storage Familiarity with Azure virtual machines and virtual networking Basic understanding of scripting concepts. 1 - Introduction to Microsoft 365 threat protection Explore Extended Detection & Response (XDR) response use cases Understand Microsoft Defender XDR in a Security Operations Center (SOC) Explore Microsoft Security Graph Investigate security incidents in Microsoft Defender XDR 2 - Mitigate incidents using Microsoft 365 Defender Use the Microsoft Defender portal Manage incidents Investigate incidents Manage and investigate alerts Manage automated investigations Use the action center Explore advanced hunting Investigate Microsoft Entra sign-in logs Understand Microsoft Secure Score Analyze threat analytics Analyze reports Configure the Microsoft Defender portal 3 - Protect your identities with Microsoft Entra ID Protection Microsoft Entra ID Protection overview Detect risks with Microsoft Entra ID Protection policies Investigate and remediate risks detected by Microsoft Entra ID Protection 4 - Remediate risks with Microsoft Defender for Office 365 Automate, investigate, and remediate Configure, protect, and detect Simulate attacks 5 - Safeguard your environment with Microsoft Defender for Identity Configure Microsoft Defender for Identity sensors Review compromised accounts or data Integrate with other Microsoft tools 6 - Secure your cloud apps and services with Microsoft Defender for Cloud Apps Understand the Defender for Cloud Apps Framework Explore your cloud apps with Cloud Discovery Protect your data and apps with Conditional Access App Control Walk through discovery and access control with Microsoft Defender for Cloud Apps Classify and protect sensitive information Detect Threats 7 - Respond to data loss prevention alerts using Microsoft 365 Describe data loss prevention alerts Investigate data loss prevention alerts in Microsoft Purview Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps 8 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 9 - Investigate threats by using audit features in Microsoft Defender XDR and Microsoft Purview Standard Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Start recording activity in the Unified Audit Log Search the Unified Audit Log (UAL) Export, configure, and view audit log records Use audit log searching to investigate common support issues 10 - Investigate threats using audit in Microsoft Defender XDR and Microsoft Purview (Premium) Explore Microsoft Purview Audit (Premium) Implement Microsoft Purview Audit (Premium) Manage audit log retention policies Investigate compromised email accounts using Purview Audit (Premium) 11 - Investigate threats with Content search in Microsoft Purview Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 12 - Protect against threats with Microsoft Defender for Endpoint Practice security administration Hunt threats within your network 13 - Deploy the Microsoft Defender for Endpoint environment Create your environment Understand operating systems compatibility and features Onboard devices Manage access Create and manage roles for role-based access control Configure device groups Configure environment advanced features 14 - Implement Windows security enhancements with Microsoft Defender for Endpoint Understand attack surface reduction Enable attack surface reduction rules 15 - Perform device investigations in Microsoft Defender for Endpoint Use the device inventory list Investigate the device Use behavioral blocking Detect devices with device discovery 16 - Perform actions on a device using Microsoft Defender for Endpoint Explain device actions Run Microsoft Defender antivirus scan on devices Collect investigation package from devices Initiate live response session 17 - Perform evidence and entities investigations using Microsoft Defender for Endpoint Investigate a file Investigate a user account Investigate an IP address Investigate a domain 18 - Configure and manage automation using Microsoft Defender for Endpoint Configure advanced features Manage automation upload and folder settings Configure automated investigation and remediation capabilities Block at risk devices 19 - Configure for alerts and detections in Microsoft Defender for Endpoint Configure advanced features Configure alert notifications Manage alert suppression Manage indicators 20 - Utilize Vulnerability Management in Microsoft Defender for Endpoint Understand vulnerability management Explore vulnerabilities on your devices Manage remediation 21 - Plan for cloud workload protections using Microsoft Defender for Cloud Explain Microsoft Defender for Cloud Describe Microsoft Defender for Cloud workload protections Enable Microsoft Defender for Cloud 22 - Connect Azure assets to Microsoft Defender for Cloud Explore and manage your resources with asset inventory Configure auto provisioning Manual log analytics agent provisioning 23 - Connect non-Azure resources to Microsoft Defender for Cloud Protect non-Azure resources Connect non-Azure machines Connect your AWS accounts Connect your GCP accounts 24 - Manage your cloud security posture management? Explore Secure Score Explore Recommendations Measure and enforce regulatory compliance Understand Workbooks 25 - Explain cloud workload protections in Microsoft Defender for Cloud Understand Microsoft Defender for servers Understand Microsoft Defender for App Service Understand Microsoft Defender for Storage Understand Microsoft Defender for SQL Understand Microsoft Defender for open-source databases Understand Microsoft Defender for Key Vault Understand Microsoft Defender for Resource Manager Understand Microsoft Defender for DNS Understand Microsoft Defender for Containers Understand Microsoft Defender additional protections 26 - Remediate security alerts using Microsoft Defender for Cloud Understand security alerts Remediate alerts and automate responses Suppress alerts from Defender for Cloud Generate threat intelligence reports Respond to alerts from Azure resources 27 - Construct KQL statements for Microsoft Sentinel Understand the Kusto Query Language statement structure Use the search operator Use the where operator Use the let statement Use the extend operator Use the order by operator Use the project operators 28 - Analyze query results using KQL Use the summarize operator Use the summarize operator to filter results Use the summarize operator to prepare data Use the render operator to create visualizations 29 - Build multi-table statements using KQL Use the union operator Use the join operator 30 - Work with data in Microsoft Sentinel using Kusto Query Language Extract data from unstructured string fields Extract data from structured string data Integrate external data Create parsers with functions 31 - Introduction to Microsoft Sentinel What is Microsoft Sentinel? How Microsoft Sentinel works When to use Microsoft Sentinel 32 - Create and manage Microsoft Sentinel workspaces Plan for the Microsoft Sentinel workspace Create a Microsoft Sentinel workspace Manage workspaces across tenants using Azure Lighthouse Understand Microsoft Sentinel permissions and roles Manage Microsoft Sentinel settings Configure logs 33 - Query logs in Microsoft Sentinel Query logs in the logs page Understand Microsoft Sentinel tables Understand common tables Understand Microsoft Defender XDR tables 34 - Use watchlists in Microsoft Sentinel Plan for watchlists Create a watchlist Manage watchlists 35 - Utilize threat intelligence in Microsoft Sentinel Define threat intelligence Manage your threat indicators View your threat indicators with KQL 36 - Connect data to Microsoft Sentinel using data connectors Ingest log data with data connectors Understand data connector providers View connected hosts 37 - Connect Microsoft services to Microsoft Sentinel Plan for Microsoft services connectors Connect the Microsoft Office 365 connector Connect the Microsoft Entra connector Connect the Microsoft Entra ID Protection connector Connect the Azure Activity connector 38 - Connect Microsoft Defender XDR to Microsoft Sentinel Plan for Microsoft Defender XDR connectors Connect the Microsoft Defender XDR connector Connect Microsoft Defender for Cloud connector Connect Microsoft Defender for IoT Connect Microsoft Defender legacy connectors 39 - Connect Windows hosts to Microsoft Sentinel Plan for Windows hosts security events connector Connect using the Windows Security Events via AMA Connector Connect using the Security Events via Legacy Agent Connector Collect Sysmon event logs 40 - Connect Common Event Format logs to Microsoft Sentinel Plan for Common Event Format connector Connect your external solution using the Common Event Format connector 41 - Connect syslog data sources to Microsoft Sentinel Plan for syslog data collection Collect data from Linux-based sources using syslog Configure the Data Collection Rule for Syslog Data Sources Parse syslog data with KQL 42 - Connect threat indicators to Microsoft Sentinel Plan for threat intelligence connectors Connect the threat intelligence TAXII connector Connect the threat intelligence platforms connector View your threat indicators with KQL 43 - Threat detection with Microsoft Sentinel analytics What is Microsoft Sentinel Analytics? Types of analytics rules Create an analytics rule from templates Create an analytics rule from wizard Manage analytics rules 44 - Automation in Microsoft Sentinel Understand automation options Create automation rules 45 - Threat response with Microsoft Sentinel playbooks What are Microsoft Sentinel playbooks? Trigger a playbook in real-time Run playbooks on demand 46 - Security incident management in Microsoft Sentinel Understand incidents Incident evidence and entities Incident management 47 - Identify threats with Behavioral Analytics Understand behavioral analytics Explore entities Display entity behavior information Use Anomaly detection analytical rule templates 48 - Data normalization in Microsoft Sentinel Understand data normalization Use ASIM Parsers Understand parameterized KQL functions Create an ASIM Parser Configure Azure Monitor Data Collection Rules 49 - Query, visualize, and monitor data in Microsoft Sentinel Monitor and visualize data Query data using Kusto Query Language Use default Microsoft Sentinel Workbooks Create a new Microsoft Sentinel Workbook 50 - Manage content in Microsoft Sentinel Use solutions from the content hub Use repositories for deployment 51 - Explain threat hunting concepts in Microsoft Sentinel Understand cybersecurity threat hunts Develop a hypothesis Explore MITRE ATT&CK 52 - Threat hunting with Microsoft Sentinel Explore creation and management of threat-hunting queries Save key findings with bookmarks Observe threats over time with livestream 53 - Use Search jobs in Microsoft Sentinel Hunt with a Search Job Restore historical data 54 - Hunt for threats using notebooks in Microsoft Sentinel Access Azure Sentinel data with external tools Hunt with notebooks Create a notebook Explore notebook code
Welcome to a comprehensive introduction to ServiceNow Administration for total beginners. In this course, we will study the fundamentals of ServiceNow and how it works. In addition, you will learn how to construct and administer an application.