• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

651 Courses delivered Online

Cisco Securing the Web with Cisco Web Security Applicance v3.0 (SWSA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting This course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA). Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface

Cisco Securing the Web with Cisco Web Security Applicance v3.0 (SWSA)
Delivered OnlineFlexible Dates
Price on Enquiry

CNS-223: Implement Citrix ADC 13.x

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Built for experienced IT Professionals who want to be familiar with Citrix ADC. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC. Overview Understand the functionality and capabilities of the Citrix ADC Complete the initial setup and configuration of the Citrix ADC appliance Understand Citrix ADC Load Balancing and High Availability configuration options and management Employ recommended tools and techniques to troubleshoot common ADC network and connectivity issues Learn the skills required to implement Citrix ADC Essential components includingsecure Load Balancing, High Availability, and Citrix ADC Management. At the endof the course, students will be able to configure their Citrix ADC environments toaddress traffic delivery and management requirements including Load Balancing,Availability, and ADC Operation Management. Getting Started Introduction to Citrix ADC Feature and Platform Overview Deployment Options Architectural Overview Setup and Management Basic Networking Networking Topology Citrix ADC Components Routing Access Control Lists ADC Platforms Citrix ADC MPX Citrix ADC VPX Citrix ADC CPX Citrix ADC SDX Citrix ADC BLX High Availability Citrix ADC High Availability High Availability Configuration Managing High Availability In Service Software Upgrade Troubleshooting High Availability Load balancing Load Balancing Overview Load Balancing Methods and Monitors Load Balancing Traffic Types Load Balancing Protection Priority Load Balancing Load Balancing Troubleshooting SSL Offloading SSL Overview SSL Configuration SSL Offload Troubleshooting SSL Offload SSL Vulnerabilities and Protections Security Authentication, Authorization, and Auditing Configuring External Authentication Admin Partitions Security Citrix ADC Logging Monitoring with SNMP Reporting and Diagnostics AppFlow Functions Citrix Application Delivery Management Troubleshooting

CNS-223: Implement Citrix ADC 13.x
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat JBoss Application Administration I (AD248)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for System administrators who are either new to JBoss or have experience with JBoss Enterprise Application Platform 5. Base experience with system administration on Microsoft Windows, UNIX, or Linux© operating systems. Understanding of hardware and networking. Note: No prior knowledge of Java, scripting, or JBoss Developer Studio is required. Overview Upon successful completion of this course, students will be able to take the Red Hat Certified JBoss Administration (RHCJA) Exam. In this course, you'll discover the best practices for installing and configuring Red Hat© JBoss© Enterprise Application Platform (JBoss EAP) 7. Through hands-on labs, you'll learn the essential, real-world tasks that you need to know as a system administrator to effectively deploy and manage applications on JBoss EAP. This course will help prepare you to take the Red Hat Certified Specialist in Enterprise Application Server Administration exam. 1 - OVERVIEW OF JBOSS ENTERPRISE APPLICATION PLATFORM Learn the concepts and terminology of JBoss© Enterprise Application Platform 6, and install and run a JBoss Enterprise Application Platform instance. 2 - CONFIGURE JBOSS ENTERPRISE APPLICATION PLATFORM IN STANDALONE MODE Understand the directory structure of standalone mode and the standalone.xml configuration file, and deploy an application onto a standalone server. 3 - CONFIGURE JBOSS ENTERPRISE APPLICATION PLATFORM IN DOMAIN MODE Set up a domain, including a domain controller managing multiple host controllers. Also learn how to deploy an application onto a domain. 4 - CONFIGURE SERVERS Define a server group on a host, add servers to a server group, and deploy an application to a server group. 5 - USE THE CLI TOOL Learn how the command-line Interface tool can be used to script administrative tasks. 6 - THE DATASOURCE SUBSYSTEM Understand database connection pools in JBoss Enterprise Application Platform and how to configure the datasource subsystem. Learn how to deploy a Java? Database Connectivity (JDBC) driver and define a datasource. 7 - THE LOGGING SUBSYSTEM Configure the logging subsystem, including configuring the built-in handlers and loggers. 8 - THE MESSAGING SUBSYSTEM Understand JMS and HornetQ, including how to define and configure connection factories and destinations (topics and queues). 9 - THE SECURITY SUBSYSTEM Configure the security subsystem, including securing the management interfaces, securing an application, and securing a JMS destination. Also learn how to define an Lightweight Directory Access Protocol (LDAP) and database security realm. 10 - JVM CONFIGURATION Configure the JVM for both standalone and domain modes. 11 - MIGRATING APPLICATIONS TO JBOSS ENTERPRISE APPLICATION PLATFORM 6 Understand classpath and module dependencies, JPA issues, updating security settings, and other tips on how to migrate an application to JBoss Enterprise Application Platform 6. 12 - THE WEB SUBSYSTEM Configure the HTTP and HTTPS Connectors, set up an SSL connection, and configure an AJP Connector. 13 - INTRODUCTION TO CLUSTERING Set up JBoss Enterprise Application Platform 6 in a cluster in both standalone and domain mode.

Red Hat JBoss Application Administration I (AD248)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vRealize Automation: Install, Configure, Manage [v8.3]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and system integrators responsible for designing and implementing vRealize Automation Overview By the end of the course, you should be able to meet the following objectives: Describe the vRealize Automation architecture and use cases in cloud environments Manage vRealize Automation entities on VMware and third-party virtual and cloud infrastructures Configure and manage Cloud Accounts, Projects, Flavor Mappings, Image Mappings, Network Profiles, Storage Profiles, Volumes, Tags, and Services Create, modify, manage, and deploy Cloud Templates Connect to a Kubernetes Cluster and manage namespaces Customize services and virtual machines with cloudConfig Configure and manage the Service Broker Configure and manage ABX actions, custom properties, event broker subscriptions, and vRealize Orchestrator workflows Integrate with vRealize Orchestrator Install vRealize Automation with Lifecycle Configuration Manager Describe Cloud Automation Services (Cloud Assembly and Code Stream). Integrate Cloud Assembly with Terraform and SaltStack Use logs and CLI commands to monitor and troubleshoot vRealize Automation During this five-day course, you focus on installing, configuring, and managing VMware vRealize© Automation?. You learn about how vRealize Automation can be used to automate the delivery of virtual machines, applications, and personalized IT services across different data centers and hybrid cloud environments. The course covers how to manage both on-premise systems and cloud services. The course covers how vRealize Automation Service Broker can aggregate content in native formats from multiple clouds and platforms into a common catalog. This course also covers interfacing vRealize Automation with other systems using VMware vRealize© Orchestrator? and how to use vRealize Automation to manage Kubernetes systems and leverage other systems. The course also covers integrating with Terraform and using SaltStack as a configuration management tool. Course Introduction Introductions and course logistics Course objectives vRealize Automation Overview and Architecture Describe the purpose and functionality of vRealize Automation Describe the vRealize Automation architecture Describe the use of VMware Workspace ONE© AccessTM Describe the relationship between Kubernetes clusters, containers, and vRealize Automation services Describe CLI commands for vRealize Automation 8 cluster management Describe Cloud Assembly Describe Service Broker Describe Code Stream Installing vRealize Automation List the different vRealize Automation deployment types Describe the purpose of vRealize easy installer Describe the vRealize Automation installation process Authentication and Authorization Identity the steps involved in integrating Workspace One with Active Directory Describe features of Workspace One Describe the user roles available in vRealize Automation Identify the key tasks performed by each user role Define custom roles Configure branding and multitenancy Basic Initial Configuration Quickly create a basic configuration with a cloud account, cloud zone, project, flavor mapping, and image mapping. VMware Cloud Templates Configure and deploy a basic cloud template Create cloud templates that can run on any cloud Use cloudConfig to run commands, install software, and create users Use YAML for inputs, variables, and conditional deployments Tags and Storage Configuration Configure tags Describe different types of tags Manage tags Configure storage profiles Use tags and storage profiles Integrating NSX-T Data Center List the capabilities and use cases of NSX-T Data Center Describe the NSX-T Data Center architecture and components Integrate NSX-T Data Center with vRealize Automation List the supported network profiles in vRealize Automation Use NSX-T Data Center components to design a multitier application Cloud Template Identify the network and security options available in design canvas Create and manage on-demand networks and security groups Configure NSX-T day 2 actions Integrating with Public Clouds Configure and use VMware Cloud Foundation accounts Configure and use an AWS cloud account Configure and use an Azure cloud account Configure and use a Google Cloud Platform cloud account Using Service Broker for Catalog Management Release a VMware Cloud Template? Define content source and content sharing Define Service Broker policy enforcement Use custom forms for catalog items vRealize Automation Extensibility Describe Extensibility Use event topics Create a subscription Call a vRealize Orchestrator workflow Create ABX actions Using Code Stream Introduction to Code Stream The CI/CD process Integrate GitLab with Code Stream and Cloud Assembly Use Code Stream to install software Using Terraform Integrate Cloud Assembly with Terraform Use Terraform with a VMware Cloud Template Use Terraform with Code Stream Using Kubernetes Clusters Introduction to Kubernetes Connect to an existing Kubernetes Cluster Integrate VMware Tanzu? Grid Integrated Edition Create a Supervisor Namespace as a catalog item Using SaltStack for Configuration Management Introduction SaltStack with vRealize Automation Use SaltStack for software deployment Use SaltStack for configuration management Use SaltStack with event-driven orchestration vRealize Automation Troubleshooting and Integration Location of logs Using Activity Monitoring deployment history Basic troubleshooting CLI commands Collecting logs (VAMI console) Integration with VMware vRealize© Log Insight? Integration with vRealize Operations Migrating vRealize Automation 7.x to 8

VMware vRealize Automation: Install, Configure, Manage [v8.3]
Delivered OnlineFlexible Dates
Price on Enquiry

Configuring Aruba Mobility Level 1, Rev 23.22

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Typical candidates for this course are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies. Overview After you successfully complete this course, expect to be able to: Explain how Aruba's wireless networking solutions meet customers' requirements Explain fundamental WLAN technologies, RF concepts, and 802.11 Standards Learn to configure the Mobility Conductor and Mobility Controller to control access to the Employee and Guest WLAN Control secure access to the WLAN using Aruba Firewall Policies and Roles Recognize and explain Radio Frequency Bands and channels, and the standards used to regulate them Describe the concept of radio frequency coverage and interference and successful implementation and diagnosis of WLAN systems Identify and differentiate antenna technology options to ensure optimal coverage in various deployment scenarios Describe RF power technology including, signal strength, how it is measured and why it is critical in designing wireless networks Learn to configure and optimize Aruba ARM and Client Match and Client Insight features Learn how to perform network monitoring functions and troubleshooting This course teaches the knowledge, skills and practical experience required to set up and configure a basic Aruba WLAN utilizing the AOS 8.X architecture and features. Using lecture and labs, this course provides the technical understanding and hands-on experience of configuring a single Mobility Conductor with one controller and AP Aruba WLAN. Participants will learn how to use Aruba hardware and AOS8 to install and build a complete, secure controller network with multiple SSIDs. WLAN Fundamentals Describes the fundamentals of 802.11, RF frequencies and channels Explain RF Patterns and coverage including SNR Roaming Standards and QOS requirements Mobile First Architecture An introduction to Aruba Products including controller types and modes OS 8.X Architecture and features License types and distribution Mobility Conductor Mobility Controller Configuration Understanding Groups and Subgroups Different methods to join Mobility Controller with Mobility Conductor Understanding Hierarchical Configuration Secure WLAN configuration Identifying WLAN requirements such as SSID name, encryption, authentication Explain AP groups structure and profiles Configuration of WLAN using the Mobility Conductor GUI AP Provisioning Describes the communication between AP and Mobility controller Explain the AP booting sequence and requirements Explores the APs controller discovery mechanisms Explains how to secure AP to controller communication using CPSec Describes AP provisioning and operations WLAN Security Describes the 802.11 discovery, authentication and association Explores the various authentication methods, 802.1x with WPA/WPA2, Mac auth Describes the authentication server communication Explains symmetric vs asymmetric Keys, encryption methods WIPS is described along with rogue discovery and protection Firewall Roles and Policies An introduction into Firewall Roles and policies Explains Aruba?s Identity based Firewall Configuration of Policies and Rules including aliases Explains how to assign Roles to users Dynamic RF Management Explain how ARM calibrates the network selecting channels and power settings Explores OS 8.X Airmatch to calibrate the network How Client Match and Client Insight match steers clients to better APs Guest Access Introduces Aruba?s solutions for Guest Access and the Captive portal process Configuration of secure guest access using the internal Captive portal The configuration of Captive portal using Clearpass and its benefits Creating a guest provisioning account Troubleshooting guest access Network Monitoring and Troubleshooting Using the Mobility Conductor dashboard to monitor and diagnose client, WLAN and AP issues Traffic analysis using APPrf with filtering capabilities A view of AirWave's capabilities for monitoring and diagnosing client, WLAN and AP issues

Configuring Aruba Mobility Level 1, Rev 23.22
Delivered OnlineFlexible Dates
Price on Enquiry

Aruba ClearPass Essentials, Rev. 20.11

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Ideal candidates include network professionals who are looking to build their foundational knowledge of the ClearPass product portfolio. Overview After you successfully complete this course, expect to be able to: Ability to setup ClearPass as a AAA server Demonstrate Configuration Guest, OnGurad, Onboard and Profiling features Integrate with External AD Server Understand Monitoring and Reporting Demonstrate Scaling and deployment of best practices Configure AAA services for both wired and wireless networks Demonstrate the configuration of Aruba Downloadable User Roles. Demonstrate the configuration of Dynamic Segmentation with Aruba switches. This course prepares participants with foundational skills in Network Access Control using the ClearPass product portfolio. This 5-day classroom session includes both instructional modules and labs to teach participants about the major features of the ClearPass portfolio. Participants will learn how to setup ClearPass as an AAA server, and configure the Policy Manager, Guest, OnGuard and Onboard feature sets. In addition, this course covers integration with external Active Directory servers, Monitoring and Reporting, as well as deployment best practices. The student will gain insight into configuring authentication with ClearPass on both wired and wireless networks. Intro to ClearPass BYOD High Level Overview Posture and Profiling Guest and Onboard ClearPass for AAA Policy Service Rules Authentication Authorization and Roles Enforcement Policy and Profiles Authentication and Security Concepts Authentication Types Servers Radius COA Active Directory Certificates Intro to NAD NAD Devices Adding NAD to ClearPass Network Device Groups Network Device Attributes Aruba Controller as NAD Aruba Switch Aruba Instant Monitoring and Troubleshooting Monitoring Troubleshooting Logging Policy Simulation ClearPass Insight Insight Dashboard Insight Reports Insight Alerts Insight Search Insight Administration Insight Replication Active Directory Adding AD as Auth Source Joining AD domain Using AD services External Authentication Multiple AD domains LDAP Static Host Lists SQL Database External Radius Server Guest Guest Account creation Web Login pages Guest Service configuration Self-registration pages Configuring NADS for Guest Guest Manager Deep Dive Web Login Deep Dive Sponsor Approval MAC Caching Onboard Intro to Onboard Basic Onboard Setup Onboard Deepdive Single SSID Onboarding Dual SSID Onboarding Profiling Intro to Profiling Endpoint Analysis Deep Dive Posture Intro to Posture Posture Deployment Options OnGuard Agent Health Collection OnGuard workflow 802.1x with Posture using Persistent/dissolvable agent OnGuard web Login Monitoring and Updates Operation and Admin Users Operations Admin Users Clustering and Redundancy Clustering Redundancy LAB Licensing ClearPass Licensing Base License Applications ClearPass Exchange Intro Examples General HTTP Palo Alto Firewall Configuration Case Study Objectives Discussion Advanced Labs Overview Wired Port Authentication 802.1X for access layer switch ports Profiling on Wired Network Configuration of Dynamic Segmentation Aruba Downloadable User Roles Downloadable User Role Enforcement in ClearPass Aruba Controller/Gateway configuration Aruba Switch configuration Troubleshooting

Aruba ClearPass Essentials, Rev. 20.11
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Kubernetes Administrator (CKA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Professionals who need to maintain or set up a Kubernetes cluster Container Orchestration Engineers DevOps Professionals Overview Cluster architecture, installation, and configuration Rolling out and rolling back applications in production Scaling clusters and applications to best use How to create robust, self-healing deployments Networking configuration on cluster nodes, services, and CoreDNS Persistent and intelligent storage for applications Troubleshooting cluster, application, and user errors Vendor-agnostic cloud provider-based Kubernetes Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stability while maximizing resource utilization for applications and services. By the conclusion of this hands-on, vendor agnostic training you will go back to work with the knowledge, skills, and abilities to design, implement, and maintain a production-grade Kubernetes cluster. We prioritize covering all objectives and concepts necessary for passing the Certified Kubernetes Administrator (CKA) exam. You will be provided the components necessary to assemble your own high availability Kubernetes environment and configure, expand, and control it to meet the demands made of cluster administrators. Your week of intensive, hands-on training will conclude with a mock CKA exam that simulates the real exam. Cluster Architecture, Installation & Configuration Each student will be given an environment that allows them to build a Kubernetes cluster from scratch. After a detailed discussion on key architectural components and primitives, students will install and compare two production grade Kubernetes clusters. Review: Kubernetes Fundamentals After successfully instantiating their own Kubernetes Cluster, students will be guided through foundational concepts of deploying and managing applications in a production environment. Workloads & Scheduling After establishing a solid Kubernetes command line foundation, students will be led through discussion and hands-on labs which focus on effectively creating applications that are easy to configure, simple to manage, quick to scale, and able to heal themselves. Services & Networking Thoroughly understanding the underlying physical and network infrastructure of a Kubernetes cluster is an essential skill for a Certified Kubernetes Administrator. After an in-depth discussion of the Kubernetes Networking Model, students explore the networking of their cluster?s Control Plane, Workers, Pods, and Services. Storage Certified Kubernetes Administrators are often in charge of designing and implementing the storage architecture for their clusters. After discussing many common cluster storage solutions and how to best use each, students practice incorporating stateful storage into their applications. Troubleshooting A Certified Kubernetes Administrator is expected to be an effective troubleshooter for their cluster. The lecture covers a variety of ways to evaluate and optimize available log information for efficient troubleshooting, and the labs have students practice diagnosing and resolving several typical issues within their Kubernetes Cluster. Certified Kubernetes Administrator Practice Exam Just like the Cloud Native Computing Foundation CKA Exam, the students will be given two hours to complete hands-on tasks in their own Kubernetes environment. Unlike the certification exam, students taking the Alta3 CKA Practice Exam will have scoring and documented answers available immediately after the exam is complete, and will have built-in class time to re-examine topics that they wish to discuss in greater depth.

Certified Kubernetes Administrator (CKA)
Delivered OnlineFlexible Dates
Price on Enquiry

Aruba ClearPass Configuration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Ideal candidates include network professionals who are looking to build their foundational knowledge of the ClearPass product portfolio. Overview After you successfully complete this course, expect to be able to: Implement a ClearPass network access solution Design and apply effective services and enforcement in ClearPass Troubleshoot a ClearPass solution This course provides participants the foundational skills in Network Access Con-trol using the Aruba ClearPass product portfolio. This 5-day course includes both instructional modules and labs to teach participants about the major fea-tures in the ClearPass portfolio. Participants will learn how to setup ClearPass as an AAA server, and configure the Policy Manager, Guest, OnGuard and Onboard feature sets. In addition, this course covers integration with external Active Directory servers, Monitoring and Reporting, as well as deployment best practices. The student will gain insight into configuring authentication with ClearPass on both wired and wireless networks. Introduction to ClearPass BYOD High Level Overview Posture and Profiling Guest and Onboard AAA Policy Service Rules Authentication Authorization and Roles Enforcement Policy and Profiles External Devices Network Access Devices Messaging Services External Context Servers Endpoint Profiling Introduction to profiling Profiling collectors External collectors and profilers Roles and Enforcement Services Enforcement ClearPass roles Configuring Services Service selection rules Creating services Configuring Web Services Content Manager Skins Web page editor Guest Authentication Captive portal process Web logins Guest accounts Guest access with MAC authentication Guest Access Self-Registration Self-registration experience Configuring self-registration Self-registration process Wired Authentication Wired access Wired enforcement Profiling on wired ports Downloadable User Roles Requirements for DUR DUR enforcement profiles Dynamic Segmentation What is Dynamic Segmentation? How it works Configuring Dynamic Segmentation OnGuard Configuration Postures Posture policies OnGuard Agent Monitoring OnGuard OnGuard in Enforcement OnGuard workflow OnGuard enforcement Onboard Provisioning Configuring certificate authorities Portal setup Configuring services Onboard Administration Managing certificates Managing users and devices Certificate revocation and OCSP Administrative Operations Licenses Certificates Updates and upgrades Gathering logs ClearPass Cluster Cluster structure Policy Manager zones High availability Administrative Access Admin access to NADs Admin access to Policy Manager Guest operator logins Insight Reports Alerts Reports Administration Additional course details: Nexus Humans Aruba ClearPass Configuration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Aruba ClearPass Configuration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Aruba ClearPass Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus Certified Artificial Intelligence Practitioner CAIP (AIP-210)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The skills covered in this course converge on four areas-software development, IT operations, applied math and statistics, and business analysis. Target students for this course should be looking to build upon their knowledge of the data science process so that they can apply AI systems, particularly machine learning models, to business problems. So, the target student is likely a data science practitioner, software developer, or business analyst looking to expand their knowledge of machine learning algorithms and how they can help create intelligent decisionmaking products that bring value to the business. A typical student in this course should have several years of experience with computing technology, including some aptitude in computer programming. This course is also designed to assist students in preparing for the CertNexus Certified Artificial Intelligence (AI) Practitioner (Exam AIP-210) certification Overview In this course, you will develop AI solutions for business problems. You will: Solve a given business problem using AI and ML. Prepare data for use in machine learning. Train, evaluate, and tune a machine learning model. Build linear regression models. Build forecasting models. Build classification models using logistic regression and k -nearest neighbor. Build clustering models. Build classification and regression models using decision trees and random forests. Build classification and regression models using support-vector machines (SVMs). Build artificial neural networks for deep learning. Put machine learning models into operation using automated processes. Maintain machine learning pipelines and models while they are in production Artificial intelligence (AI) and machine learning (ML) have become essential parts of the toolset for many organizations. When used effectively, these tools provide actionable insights that drive critical decisions and enable organizations to create exciting, new, and innovative products and services. This course shows you how to apply various approaches and algorithms to solve business problems through AI and ML, all while following a methodical workflow for developing data-driven solutions. Solving Business Problems Using AI and ML Topic A: Identify AI and ML Solutions for Business Problems Topic B: Formulate a Machine Learning Problem Topic C: Select Approaches to Machine Learning Preparing Data Topic A: Collect Data Topic B: Transform Data Topic C: Engineer Features Topic D: Work with Unstructured Data Training, Evaluating, and Tuning a Machine Learning Model Topic A: Train a Machine Learning Model Topic B: Evaluate and Tune a Machine Learning Model Building Linear Regression Models Topic A: Build Regression Models Using Linear Algebra Topic B: Build Regularized Linear Regression Models Topic C: Build Iterative Linear Regression Models Building Forecasting Models Topic A: Build Univariate Time Series Models Topic B: Build Multivariate Time Series Models Building Classification Models Using Logistic Regression and k-Nearest Neighbor Topic A: Train Binary Classification Models Using Logistic Regression Topic B: Train Binary Classification Models Using k-Nearest Neighbor Topic C: Train Multi-Class Classification Models Topic D: Evaluate Classification Models Topic E: Tune Classification Models Building Clustering Models Topic A: Build k-Means Clustering Models Topic B: Build Hierarchical Clustering Models Building Decision Trees and Random Forests Topic A: Build Decision Tree Models Topic B: Build Random Forest Models Building Support-Vector Machines Topic A: Build SVM Models for Classification Topic B: Build SVM Models for Regression Building Artificial Neural Networks Topic A: Build Multi-Layer Perceptrons (MLP) Topic B: Build Convolutional Neural Networks (CNN) Topic C: Build Recurrent Neural Networks (RNN) Operationalizing Machine Learning Models Topic A: Deploy Machine Learning Models Topic B: Automate the Machine Learning Process with MLOps Topic C: Integrate Models into Machine Learning Systems Maintaining Machine Learning Operations Topic A: Secure Machine Learning Pipelines Topic B: Maintain Models in Production

CertNexus Certified Artificial Intelligence Practitioner CAIP (AIP-210)
Delivered OnlineFlexible Dates
Price on Enquiry

AZ-010T00 Azure Administration for AWS SysOps

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The audience for this course is an AWS Sysops Administrator Associate or equivalent. This person has one to two years of experience in AWS deployment, management, and operations. Students taking this course are interested in learning how Azure is different from AWS, and how Azure is administered. Students may also be interested in taking the AZ-103 Microsoft Azure Administrator certification exam, or the AZ-900 Azure Fundamentals exam. This two-day course is designed for AWS Sysops administrators interested in learning how Azure is administered. In this workshop which combines lecture with hands-on practical exercises and discussion/review, you will be introduced to Azure Administration, Azure Networking, Azure Compute, Azure Storage, and Azure Governance. During the workshop, you will apply this knowledge - building end-to-end architecture that demonstrates the main features discussed. Azure Administration In this module, you?ll learn about the tools and principle concepts needed to administer Azure. Topics include: Resource Manager, Resource Groups, Azure Portal, Azure CLI, Azure Templates, Cloud Shell, Azure Marketplace, and Azure PowerShell. Azure Networking In this module, you?ll learn about Azure networking features. Topics include: Azure Regions, Virtual Networks and Subnets, IP Addressing, Network Security Groups, Virtual Network Peering, VNet-to-VNet Connections, ExpressRoute, Load Balancers, and Network Watcher. Azure Compute In this module, you?ll learn about configuring and monitoring Azure virtual machines. Topics include: Azure Virtual Machines, Creating Virtual Machines, Virtual Machine Sizes, Virtual Machine Disks, Availability Zones, Availability Sets, Windows VM Connections, Linux VM Connections, Azure Monitor, and Azure Alerts. Azure Storage In this module, you?ll learn about Azure storage features and implementation. Topics include: Storage Accounts, Blob Storage, Blob Performance Tiers, File Shares, File Sync, Data Box, Content Delivery Network, Shared Access Signatures, and Service Endpoints. Azure Identity In this module, you?ll learn about Azure identity solutions. Topics include: Azure Domains, Role-based Access Control, Azure Active Directory, Multi-Factor Authentication, Azure AD Identity Protection, and Azure Policy. Additional course details: Nexus Humans AZ-010T00 Azure Administration for AWS SysOps training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-010T00 Azure Administration for AWS SysOps course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-010T00 Azure Administration for AWS SysOps
Delivered OnlineFlexible Dates
Price on Enquiry