Duration 5 Days 30 CPD hours This course is intended for IS Security Officers IS Managers Virtualization Engineers and Managers Cloud Security Managers Overview Upon completion, the Certified Digital Forensics Examiner candidate will be able to competently take the CDFE exam. The Certified Digital Forensics Examiner, C)DFE certification is designed to train Cyber Crime and Fraud Investigators. Students are taught electronic discovery and advanced investigation techniques.ÿ This course is essential to anyone encountering digital evidence while conducting an investigation. Mile2?s Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-ðcustody, and write a findings report. Through the use of a risk-based approach, the C)DFE is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Course Outline Computer Forensic Incidents Investigative Theory Investigative Process Digital Acquisition and Analysis Disks and Storages Live Acquisitions Windows Forensics Linux Forensics Mac Forensics Examination Protocols Digital Evidence Protocols Digital Evidence Presentation Laboratory Protocols Specialized Artifact Recovery eDiscovery and ESI Mobile Forensics Incident Handling Reporting Additional course details: Nexus Humans C)DFE - Certified Digital Forensics Examiner Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)DFE - Certified Digital Forensics Examiner Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Built for IT Professionals working with Citrix ADC, with little or no previous ADC experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC traffic management. Overview Optimize the Citrix ADC system for traffic handling and management Customize the ADC system for traffic flow and content-specific requirements Employ recommended tools and techniques to troubleshoot common Citrix ADC network and connectivity issues Configure advanced load balancing and GSLB on the Citrix ADC system Learn the skills required to configure and manage Citrix ADC Traffic Management features, including Content Switching, Traffic Optimization, and Global Server Load Balancing. At the end of the course, students will be able to configure their ADC environments to address efficient traffic switching and resilience requirements including Content Switching, Traffic Optimization, and Disaster Recovery. Advanced Policies Default Policy Overview Default Expression Syntax Policy Bindings App Expert Additional Features Rewrite Responder URL Transformation Rewrite Policies Responder Policies DNS Rewrite and Responder URL Transformation Content Switching Content Switching Overview Content Switching Configuration Optimization Citrix ADC Optimization Overview HTTP Compression Integrated Caching Front-End Optimization Global Server Load Balancing GSLB Overview GSLB Architecture Content-Switching GSLB GSLB MEP and Monitoring Customizing GSLB Additional course details: Nexus Humans CNS-224: Implement Citrix ADC 13.x with Traffic Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNS-224: Implement Citrix ADC 13.x with Traffic Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This advanced course is for anyone responsible for implementing and managing virtualization features on a System p server including: AIX technical support individuals System administrators Systems engineers System Architects Overview Upon successful completion of this course, students will be able to: Describe the effect of the IBM PowerVM virtualization features on performance and monitoring, such as: Simultaneous multithreading (SMT), shared processors, multiple shared processor pools (MSPP), shared dedicated capacity, Active Memory Sharing (AMS), Active Memory Expansion (AME), Live Partition Mobility (LPM), and other virtualization features Interpret the outputs of AIX performance monitoring and tuning tools used to view the impact of features such as SMT, shared processors, additional shared processor pool activations, and device virtualization. Perform a Live Partition Mobility between two Power Systems servers Configure and monitor Active Memory Expansion Configure the Suspend and Resume and Active Memory Sharing features available with the Virtual I/O Server Implement the deduplication feature of Active Memory Sharing Students will learn how to implement advanced IBM PowerVM features, such as Active Memory Sharing, Active Memory Expansion, shared dedicated processors, multiple shared processor pools, and Live Partition Mobility. Students will learn how to implement advanced IBM PowerVM features, such as Active Memory Sharing, Active Memory Expansion, shared dedicated processors, multiple shared processor pools, and Live Partition Mobility. Additional course details: Nexus Humans AN31 IBM Power Systems for AIX - Virtualization II - Advanced PowerVM and Performance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AN31 IBM Power Systems for AIX - Virtualization II - Advanced PowerVM and Performance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for network engineers, support personnel, reseller support, and others responsible for implementing ScreenOS products. Overview After successfully completing this course, you should be able to: Configure attack prevention features, including: ?SCREEN options; Deep Inspection (DI); and Antivirus (AV) scanning. Configure URL filtering. Configure antispam filters. This course meets the business needs of customers who are deploying the attack prevention features of ScreenOS software. The course focuses specifically on the attack-related features and assumes familiarity with ScreenOS software. Upon completing this course, you should be able to return to work and successfully configure and verify the desired attack prevention features. Chapter 1: Course Introduction Chapter 2: ScreenOS Basics Review Concepts Review Configuration Review Lab: ScreenOS Basics Review Chapter 3: SCREEN Options Multilayer Network Protection Types of Attacks SCREEN Options Configuration SCREEN Best Practices Lab: SCREEN Options Configuration Chapter 4: Deep Inspection Deep Inspection Overview Attack Database Configuration Policy Configuration Logging and Monitoring Lab: Deep Inspection Configuration Chapter 5: Antivirus Antivirus Operations Antivirus Configuration?Kaspersky Antivirus Configuration?ICAP Verifying Operations Lab: Antivirus Configuration Chapter 6: Web Filtering Web-Filtering Options Web-Filtering Configuration Verifying Operations Lab: Configuring Web Filtering Chapter 7: Antispam Antispam Concepts Antispam Configuration Verifying Operations Lab: Antispam Configuration Additional course details: Nexus Humans Attack Prevention with Juniper Networks Firewalls training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Attack Prevention with Juniper Networks Firewalls course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Channel Field Engineers Employees Overview After taking this course, you should be able to: Define Cisco Business TelePresence Solutions components and architectures Implement Cisco TelePresence Video Communication Server (Expressway) for basic and advanced video networks Implement Cisco TelePresence Management Suite (TMS) Configure Cisco Meeting Server Features Define integration of Cisco Collaboration Premise Solutions with Cisco Cloud, including Cisco Spark, Cisco Spark Hybrid, and WebEx Cisco Video Infrastructure Implementation (VII) v1.0 will provide you with the necessary knowledge and skills to implement a complete Cisco TelePresence solution, including TelePresence endpoints, integration of premise with cloud solutions, meeting solutions, and management software. It describes Cisco business TelePresence solutions and enables students to implement and troubleshoot basic and advanced TelePresence network solutions. Module 1: Advanced Cisco Expressway Features Lesson 1: Introducing Cisco Video Network Solutions Lesson 2: Exploring Cisco Expressway Basic Setup Lesson 3: Explaining Regular Expressions in a Cisco Expressway Environment Lesson 4: Deploying Components of Cisco Expressway Security Lesson 5: Exploring the Fundamentals of Subzones on a Cisco Expressway Lesson 6: Administering Call Control on a Cisco Expressway Lesson 7: Implementing Subzone Bandwidth Management on a Cisco Expressway Lesson 8: Implementing Zones on a Cisco Expressway Lesson 9: Exploring Clustering on the Cisco Expressway Lesson 10: Applying Troubleshooting on the Cisco Expressway Module 2: Advanced Cisco Meeting Server Features Lesson 1: Introducing the Cisco Meeting Server Lesson 2: Exploring Cisco Meeting Server API Configuration Lesson 3: Exploring Cisco Meeting Server Resilient and Scalable Deployments Lesson 4: Exploring Additional Features with Cisco Meeting Server Module 3: Cisco Collaboration Meetin gRoom Solutions wiht Cisco TelePresence Server Lesson 1: Introducing Cisco Collaboration Meeting Room Cloud, Premises, and Hybrid Products Lesson 2: Deploying the Cisco TelePresence Server and Cisco TelePresence Conductor Lesson 3: Applying Troubleshooting to Cisco CMR Premises Solutions Module 4: Cisco TelePresence Management Suite Solution Lesson 1: Explaining Cisco TMS Installation Lesson 2: Describing Cisco TMS Operation Lesson 3: Explaining Cisco TMS Conference Scheduling and Management Lesson 4: Configuring Permissions on Cisco TMS for Administration Lesson 5: Applying Troubleshooting to Cisco TMS Module 5: Cisco Cloud Solutions?WebEx and Spark Lesson 1: Introducing Cisco WebEx and Cisco Spark Cloud Solutions Lesson 2: Exploring Cisco Spark Administration Configuration Lesson 3: Deploying Cisco Spark Hybrid Services Lesson 4: Exploring Cisco Spark APIs and BOTs Configuration Module 6: Cisco TelePresence Content Server (Optional Module) Lesson 1: Examining Cisco TCS Operation and Configuration
Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. Fundamentals of information privacy Reviewing the modern history of privacy Foundational privacy concepts Data protection roles and fair information practices Exploring the impacts of privacy and data protection regulations on information management Privacy in the IT environment Compliance requirements IT risks Stakeholder privacy expectations Differentiating between privacy and security Core privacy concepts Foundational elements for embedding privacy in IT Common privacy principles Data protection by design and default Privacy considerations in the information life cycle Privacy considerations throughout the stages of the information life cycle Privacy in systems and applications Examining the risks inherent in the IT environment and options for addressing them Identity and access management Credit card information and processing Remote access BYOD and telecommuting Data encryption Additional privacy-enhancing technologies in the enterprise environment Privacy techniques Strengths and weaknesses of authentication techniques Using identifiers Privacy by design Online privacy issues Unique challenges that come from online privacy issues Laws and regulations Online threats Social media E-commerce Tracking technologies Web security protocols Technologies with privacy considerations Privacy considerations associated with a variety of technologies Cloud computing Wireless IDs Location-based services ?Smart? technologies Video/data/audio surveillance Biometric recognition
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Data platform engineers Solutions architects IT professionals Overview In this course, you will learn to: Apply data lake methodologies in planning and designing a data lake Articulate the components and services required for building an AWS data lake Secure a data lake with appropriate permission Ingest, store, and transform data in a data lake Query, analyze, and visualize data within a data lake In this course, you will learn how to build an operational data lake that supports analysis of both structured and unstructured data. You will learn the components and functionality of the services involved in creating a data lake. You will use AWS Lake Formation to build a data lake, AWS Glue to build a data catalog, and Amazon Athena to analyze data. The course lectures and labs further your learning with the exploration of several common data lake Introduction to data lakes Describe the value of data lakes Compare data lakes and data warehouses Describe the components of a data lake Recognize common architectures built on data lakes Data ingestion, cataloging, and preparation Describe the relationship between data lake storage and data ingestion Describe AWS Glue crawlers and how they are used to create a data catalog Identify data formatting, partitioning, and compression for efficient storage and query Lab 1: Set up a simple data lake Data processing and analytics Recognize how data processing applies to a data lake Use AWS Glue to process data within a data lake Describe how to use Amazon Athena to analyze data in a data lake Building a data lake with AWS Lake Formation Describe the features and benefits of AWS Lake Formation Use AWS Lake Formation to create a data lake Understand the AWS Lake Formation security model Lab 2: Build a data lake using AWS Lake Formation Additional Lake Formation configurations Automate AWS Lake Formation using blueprints and workflows Apply security and access controls to AWS Lake Formation Match records with AWS Lake Formation FindMatches Visualize data with Amazon QuickSight Lab 3: Automate data lake creation using AWS Lake Formation blueprints Lab 4: Data visualization using Amazon QuickSight Architecture and course review Post course knowledge check Architecture review Course review
Duration 2 Days 12 CPD hours This course is intended for - Every organization who has invested in the training of their development team in Scrum and/ or Agile - Process owners - Process managers - Employees and managers responsible for designing, reengineering or improving processes - Consultants guiding their clients through process improvement initiatives - Anyone responsible for: Managing process-related requirements Ensuring the efficiency and effectiveness of processes Maximizing the value of processes Overview -The learning objectives for CAPO include an understanding of: Basic Agile and Agile Service Management concepts Process owner role and responsibilities Managing and prioritizing a process backlog Creating and utilizing user stories Collaborating with process stake holders and other process owners Overseeing Agile process design and improvement activities Managing organizational change activities Monitoring and measuring process performance Conducting process reviews and identifying improvements This course provides guidance into the process Owner responsibilities so they can describe what they are doing as a process and provides the education needed to oversee the design, re-engineering and improvement of IT Service Management (ITSM) processes; particularly in the context of Agile Service Management. Students learn how to apply Scrum practices to Process Owner responsibilities and use Agile and Lean principles and practices to put in place ?just enough? process and how to continually align process performance with overall business goals. This course prepares you for the Certified Agile Process Owner (CAPO)© certification. Please contact the center for outline details Additional course details: Nexus Humans Certified Agile Process Owner (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Agile Process Owner (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Security administrators Security consultants Network administrators System engineers Technical support personnel Channel partners and resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Define the use and placement IDS/IPS components. Identify Snort features and requirements. Compile and install Snort. Define and use different modes of Snort. Install and utilize Snort supporting software. Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 is a 4-day course that shows you how to deploy Snort© in small to enterprise-scale implementations. You will learn how to install, configure, and operate Snort in Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) modes. You?ll practice installing and configuring Snort, utilize additional software tools and define rules to configure and improve the Snort environment, and more. The course qualifies for 32 Cisco Continuing Education credits (CE) towards recertification.This course will help you:Learning how to implement Snort, an open-source, rule-based, intrusion detection and prevention system. Gain leading-edge skills for high-demand responsibilities focused on security. Module 1: Detecting Intrusions with Snort 3.0 History of Snort IDS IPS IDS vs. IPS Examining Attack Vectors Application vs. Service Recognition Module 2: Sniffing the Network Protocol Analyzers Configuring Global Preferences Capture and Display Filters Capturing Packets Decrypting Secure Sockets Layer (SSL) Encrypted Packets Module 3: Architecting Nextgen Detection Snort 3.0 Design Modular Design Support Plug Holes with Plugins Process Packets Detect Interesting Traffic with Rules Output Data Module 4: Choosing a Snort Platform Provisioning and Placing Snort Installing Snort on Linux Module 5: Operating Snort 3.0 Start Snort Monitor the System for Intrusion Attempts Define Traffic to Monitor Log Intrusion Attempts Actions to Take When Snort Detects an Intrusion Attempt License Snort and Subscriptions Module 6: Examining Snort 3.0 Configuration Introducing Key Features Configure Sensors Lua Configuration Wizard Module 7: Managing Snort Pulled Pork Barnyard2 Elasticsearch, Logstash, and Kibana (ELK) Module 8: Analyzing Rule Syntax and Usage Anatomy of Snort Rules Understand Rule Headers Apply Rule Options Shared Object Rules Optimize Rules Analyze Statistics Module 9: Use Distributed Snort 3.0 Design a Distributed Snort System Sensor Placement Sensor Hardware Requirements Necessary Software Snort Configuration Monitor with Snort Module 10: Examining Lua Introduction to Lua Get Started with Lua
Duration 3 Days 18 CPD hours This course is intended for Data platform engineers Database administrators Solutions architects IT professionals Overview Apply database concepts, database management, and data modeling techniques Evaluate hosting databases on Amazon EC2 instances Evaluate relational database services (Amazon RDS, Amazon Aurora, and Amazon Redshift) and their features Evaluate nonrelational database services (Amazon DocumentDB, Amazon DynamoDB, Amazon ElastiCache, Amazon Neptune, and Amazon QLDB) and their features Examine how the design criteria apply to each service Apply management principles based on the unique features of each service This course will teach you the process of planning and designing both relational and nonrelational database and the planning and design requirements of all 8 of the AWS databases services, their pros and cons, and how to know which AWS databases service is right for your workloads. Day 1 Module 0: Planning and Designing Databases on AWS Module 1: Database Concepts and General Guidelines Module 2: Database Planning and Design Module 3: Databases on Amazon EC2 Module 4: Purpose-Built Databases Module 5: Databases on Amazon RDS Databases in Amazon Aurora Day 2 Module 6: Databases in Amazon Aurora (continued) Module 7: Databases in Amazon DocumentDB (with MongoDB compatibility) Module 8: Amazon DynamoDB Tables Day 3 Module 9: Databases in Amazon Neptune Module 10: Databases in Amazon Quantum Ledger Database (Amazon QLDB) Module 11: Databases in Amazon ElastiCache Module 12: Data Warehousing in Amazon Redshift Module 13: Course Review Additional course details: Nexus Humans Planning and Designing Databases on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Planning and Designing Databases on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.