Description Troubleshooting and Maintaining Cisco IP Switched Networks is a qualifying exam for the Cisco Certified Network Professional CCNP, certification. This Cisco CCNP Troubleshoot and Maintain Cisco IP Switched Networks (TSHOOT) v2.0 Training will help you to be certified successfully with all the important knowledge and skills necessary to (1) plan and perform regular maintenance on complex enterprise routed and switched networks and (2) use technology-based practices and a systematic ITIL-compliant approach to perform network troubleshooting. This Cisco CCNP Troubleshoot and Maintain Cisco IP Switched Networks (TSHOOT) v2.0 Training designed for you, if you are a network engineer with at least one year of professional work experience. You will learn to plan and perform regular maintenance on complex enterprise routed and switched networks and use technology-based practices and a systematic ITIL-compliant approach to perform network troubleshooting. At the end of the course, you will get increased skill level and developed as set of best practices based on your own. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our Cisco CCNP Troubleshoot and Maintain Cisco IP Switched Networks (TSHOOT) v2.0 Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Planning Maintenance for Complex Networks Planning Maintenance for Complex Networks FREE 00:14:00 Network Maintenance Tools, Applications, and Resources 00:32:00 Troubleshooting Processes for Complex Enterprise Networks Troubleshooting Processes for Complex Enterprise Networks 00:09:00 Implementing Troubleshooting Procedures 01:15:00 Using Maintenance and Troubleshooting Tools and Applications Using Maintenance and Troubleshooting Tools and Applications 00:12:00 Collecting Real-time Information Using Cisco IOS debug Commands 00:10:00 Gathering Information with SNMP 00:15:00 Maintaining and Troubleshooting Campus Switched Solutions Maintaining and Troubleshooting Campus Switched Solutions Troubleshooting Tools and Applications 00:12:00 Spanning Tree Failures 00:12:00 Troubleshooting Multi-layer Switches 00:43:00 Maintaining and Troubleshooting Routing Solutions Maintaining and Troubleshooting Routing Solutions 00:25:00 OSPF Review Network Areas and LSAs 00:27:00 OSPF to EIGRP Redistribution Troubleshooting Process 00:32:00 Troubleshooting Addressing Services Troubleshooting Addressing Services 00:24:00 DHCP Overview Client-Server Communication 00:23:00 IPv6 Troubleshooting - show Commands 00:40:00 Troubleshooting Network Performance Issues Troubleshooting Network Performance Issues 00:25:00 AutoQoS Troubleshooting Example 00:24:00 Spanning-Tree Issues 00:44:00 Troubleshooting Converged Networks Troubleshooting Converged Networks 00:16:00 Section 2 Overview 00:16:00 Section 3 Overview 00:26:00 Maintaining and Troubleshooting Network Security Implementations Maintaining and Troubleshooting Network Security Implementations 00:13:00 IOS SPI Example 00:14:00 BORW TSHOOT Example 2 Crypto Map ACL Error 00:10:00 Review and Preparation for Troubleshooting Complex Enterprise Network Review and Preparation for Troubleshooting Complex Enterprise Networks 00:09:00 Section 2 Overview 00:46:00 Mock Exam Mock Exam- Cisco CCNP Troubleshoot and Maintain Cisco IP Switched Networks (TSHOOT) v2.0 Training 00:20:00 Final Exam Final Exam- Cisco CCNP Troubleshoot and Maintain Cisco IP Switched Networks (TSHOOT) v2.0 Training 00:20:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Firewalls training course description A technical hands on training course covering firewall technologies. This focuses on the whys and hows of firewall technology rather than looking at manufacturer specific issues. What will you learn Design secure firewall protected networks. Test firewalls. Evaluate firewalls Configure firewalls Firewalls training course details Who will benefit: Technical staff wanting to learn about Filrewalls including: Technical network staff. Technical security staff. Prerequisites: IP security foundation for engineers Duration 2 days Firewalls training course contents Firewall introduction Security review, what is a firewall? What do firewalls do? Firewall benefits, concepts. Hands on Configuring the network to be used in later labs, launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls, blade based firewalls, personal firewalls, which firewall should you use? Firewall products. Hands on Configuring a simple firewall. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on Stateful packet inspection firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall advantages and disadvantages. Hands on Proxy firewalls. Personal firewalls The role of personal firewalls, Windows XP, Zonealarm. Hands on Configuring a personal firewall. Firewall architectures Home based, small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Securing communications VPNs, IPsec. Firewall configuration of VPNs, integration of dedicated VPN devices and firewalls. Hands on IPSec VPN configuration. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls.
The Diploma in Risk Assessment & Management (CPD Accredited) course is vital in today's complex and interconnected world. Understanding and mastering Risk Assessment and Risk Management is crucial for both personal and professional growth. This course covers essential topics like Risk Analysis, Workplace Risk Assessment, and Enterprise Risk Management, ensuring a comprehensive grasp of managing diverse risks. By learning these skills, individuals enhance their ability to foresee, evaluate, and mitigate potential risks, which is invaluable in any career. In the UK, proficiency in Risk Management significantly boosts job prospects, with roles in this sector offering competitive salaries, typically ranging from £35,000 to £60,000 annually. The demand for Risk Management professionals is growing, with the sector projected to increase by approximately 7% annually. The ability to manage financial, technological, and enterprise risks is highly sought after, making this course a strategic investment. The advantages of this diploma are numerous, including improved decision-making skills, enhanced job security, and greater career advancement opportunities, reflecting the increasing importance of Risk Assessment and Risk Management in the modern workplace. Key Features: CPD Certified Risk Assessment & Management Course Free Certificate from Reed CIQ Approved Risk Assessment & Management Course Developed by Specialist Lifetime Access Course Curriculum Module 01: Risk and Types of Risk Module 02: The Risk Evaluation Process Module 03: Risk Analysis & Assessment Module 04: Risk Assessment at Workplace Module 05: Introduction to Risk Management Module 06: Risk Management Process Module 07: Benefits of Risk Management Module 08: Enterprise Risk Management Module 09: Managing Financial Risks Module 10: Managing Technology Risks Learning Outcomes: Understand various types of risk, enhancing risk identification skills. Master the risk evaluation process for informed decision-making strategies. Conduct comprehensive risk analysis and assessments with precision and expertise. Apply risk assessment techniques effectively within the workplace environment. Develop a robust foundation in risk management processes and methodologies. Explore enterprise and financial risk management, including technology risk nuances. CPD 10 CPD hours / points Accredited by CPD Quality Standards Diploma on Risk Assessment & Management (CPD Accredited) 2:15:45 1: Module 01: Risk and Types of Risk Preview 11:47 2: Module 02: The Risk Evaluation Process 20:15 3: Module 03: Risk Analysis & Assessment 15:03 4: Module 04: Risk Assessment at Workplace 07:59 5: Module 05: Introduction to Risk Management 13:20 6: Module 06: Risk Management Process 07:33 7: Module 07: Benefits of Risk Management 08:46 8: Module 08: Enterprise Risk Management 15:38 9: Module 09: Managing Financial Risks 20:20 10: Module 10: Managing Technology Risks 14:04 11: CPD Certificate - Free 01:00 Who is this course for? This Risk Assessment & Management course is accessible to anyone eager to learn more about this topic. Through this course, you'll gain a solid understanding of Risk Assessment & Management. Moreover, this course is ideal for: Professionals seeking advanced risk assessment and management skills. Executives aiming to enhance strategic decision-making through risk proficiency. Analysts and managers involved in risk evaluation across diverse sectors. Risk consultants aspiring to sharpen their expertise in risk analysis. Individuals pursuing a comprehensive understanding of enterprise and financial risk. Requirements There are no requirements needed to enrol into this Risk Assessment & Management course. We welcome individuals from all backgrounds and levels of experience to enrol into this Anatomy and Physiology course. Career path After finishing this Risk Assessment & Management course you will have multiple job opportunities waiting for you. Some of the following Job sectors of Risk Assessment & Management are: Risk Manager - £45K to £70K/year Health and Safety Officer - £28K to £45K/year Financial Risk Analyst - £35K to £60K/year Technology Risk Consultant - £40K to £75K/year Enterprise Risk Manager - £50K to £85K/year Certificates Digital certificate Digital certificate - Included Reed Courses Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.
The Jamf 200 course offers a core understanding of Jamf Pro. It also provides enterprise-level knowledge of macOS and iOS platforms. Rely on our expert trainers to help you pass the Jamf 200 certification first time. Topics: Introduction to the Jamf Pro server. Building and managing content (.pkg, .mpkg, and .dmg packages) for deployment to macOS devices. Enrolling macOS and iOS devices using automated MDM enrollment. Setup and configuration of macOS and iOS devices. Configuring the user environment (Configuration Profiles, .plist). Security for macOS and iOS devices. Purchasing and distributing App Store apps using Apple Business Manager or Apple School Manager. Scripting overview (Bash). Initial setup and refreshing/reimaging macOS and iOS devices. Ownership and permissions (POSIX, ACE/ACL) on macOS devices. Prerequisites: Abundant hands-on experience with macOS and iOS. What’s Included: Four days (9am-5pm each day) of lab-style interaction. Proctored certification exam during the afternoon of the fourth day. All hardware and software required for the course. Printed course materials. Jamf Certified Tech badge on your Jamf Nation profile (upon successfully completing the exam with a passing score). Free £100 Apple technical training credit
Duration 5 Days 30 CPD hours This course is intended for The CCSP is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration. Overview Upon completing this course, the participants will gain valuable knowledge and skills including the ability to: - Successfully pass the CCSP exam. - Understand the fundamentals of the cloud computing architecture framework. - Understand security challenges associated with different types of cloud services. - Identify and evaluate security risks for their organization?s cloud environments. - Select and implement appropriate controls to ensure secure implementation of cloud services. - Thoroughly understand the 6 essential core domains of the CCSP common body of knowledge: 1. Architectural Concepts & Design Requirements 2. Cloud Data Security 3. Cloud Platform & Infrastructure Security 4. Cloud Application Security 5. Operations 6. Legal & Compliance The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge. 1 - Architectural Concepts and Design Requirements Cloud Computing Concepts Cloud Reference Architecture Cloud Computing Security Concepts Design Principles of Secure Cloud Computing Trusted Cloud Services 2 - Cloud Data Security CSA (Cloud Security Alliance) Cloud Data Lifecycle Cloud Data Storage Architectures Data Security Strategies Data Discovery and Classification Technologies Protecting Privacy and PII (Personally Identifiable Information) Data Rights Management Data Retention, Deletion, and Archiving Policies Auditability, Traceability, and Accountability of Data Events 3 - Cloud Platform and Infrastructure Security Cloud Infrastructure Components Cloud Infrastructure Risks Designing and Planning Security Controls Disaster Recovery and Business Continuity Management 4 - Cloud Application Security The Need for Security Awareness and Training in application Security Cloud Software Assurance and Validation Verified Secure Software SDLC (Software Development Life Cycle) Process Secure SDLC Specifics of Cloud Application Architecture Secure IAM (Identity and Access Management) Solutions 5 - Operations Planning Process for the Data Center Design Installation and Configuration of Physical Infrastructure for Cloud Environment Running Physical Infrastructure for Cloud Environment Managing Physical Infrastructure for Cloud Environment Installation and Configuration of Logical Infrastructure for Cloud Environment Running Logical Infrastructure for Cloud Environment Managing Logical Infrastructure for Cloud Environment Compliance with Regulations and Controls Risk Assessment for Logical and Physical Infrastructure Collection, Acquisition, and Preservation of Digital Evidence Managing Communication with Stakeholders 6 - Legal and Compliance Legal Requirements and Unique Risks within the Cloud Environment Relevant Privacy and PII Laws and Regulations Audit Process, Methodologies, and Required Adaptions for a Cloud Environment Implications of Cloud to Enterprise Risk Management Outsourcing and Cloud Contract Design Vendor Management
Definitive Puppet training course description Puppet is a framework and toolset for configuration management. This course covers Puppet to enable delegates to manage configurations. Hands on sessions follow all the major sections. What will you learn Deploy Puppet. Manage configurations with Puppet. Build hosts with Puppet. Produce reports with Puppet. Definitive Puppet training course details Who will benefit: Anyone working with Puppet. Prerequisites: Linux fundamentals. Duration 2 days Definitive Puppet training course contents Getting started with Puppet What is Puppet, Selecting the right version of Puppet, Installing Puppet, Configuring Puppet. Developing and deploying Puppet The puppet apply command and modes of operation, Foreground Puppet master, Developing Puppet with Vagrant, Environments, Making changes to the development environment, Testing the new environments with the Puppet agent, Environment branching and merging, Dynamic Puppet environments with Git branches, Summary, Resources. Scaling Puppet Identifying the challenges, Running the Puppet master with Apache and Passenger, Testing the Puppet master in Apache, Load balancing multiple Puppet masters, Scaling further, Load balancing alternatives. Measuring performance, Splay time, Summary, Going further, Resources. Externalizing Puppet configuration External node classification, Storing node configuration in LDAP, Summary, Resources. Exporting and storing configuration Virtual resources, Getting started with exported and stored configurations, Using exported resources, Expiring state resources, Summary, Resources. Puppet consoles The foreman, Puppet enterprise console, Puppetboard, Summary, Resources. Tools and integration Puppet forge and the module tool, Searching and installing a module from the forge, Generating a module, Managing module dependencies, Testing the modules, Developing Puppet modules with Geppetto, Summary, Resources. Reporting with Puppet Getting started, Configuring reporting, Report processors, Custom reporting, Other Puppet reporters, Summary, Resources. Extending Facter and Puppet Writing and distributing custom facts, Developing custom types, providers and functions, Summary, Resources, Complex data structures, Additional backends, Hiera functions in depth, Module data bindings, Hiera examples. Jiera-2, Summary, Resources. Mcollective Installing and configuring Mcollective, testing, Mcollective plugins, accessing hosts with Metadata. Hiera Lists, initial Hiera configuration, Hiera command line utility, complex data structures, additional backends, Hiera functions in depth, module data bindings. Hiera-2.
Addigy ACE course, Addigy certificate, Addigy Training
This video course teaches you how to secure Java framework applications with Spring Security. With the help of interesting activities and examples, you'll learn about using the capabilities of Spring Boot for securing web applications and you'll also delve into the Test-Driven Development approach to understand the features of Spring Security.
Ten Essential Scaling Patterns We Can (Probably) All Agree On It seems like everyone is scaling Agile these days. And why not? What enterprise wouldn't want to enjoy the business and personal benefits of self-organization, higher quality and productivity, and the intrinsic motivation of effective Agile teams? It is the how that is the question, and on that there are many opinions. In this interactive tutorial, Dean Leffingwell describes the ten essential patterns for effectively implementing Lean-Agile development at enterprise scale. As part of the tutorial, attendees will be invited to rate the importance of each pattern, and privately rate how effectively your enterprise applies them. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.
Duration 5 Days 30 CPD hours This course is intended for Audience for this course This course is designed for system administrators responsible for creating OpenShift Enterprise instances, deploying applications, creating process customizations, managing instances and projects. Prerequisites for this course Have taken Red Hat Enterprise Linux Administration I and II (RH124 and RH134), or equivalent Red Hat Enterprise Linux© system administration experience Be certified as a Red Hat Certified System Administrator (RHCSA), or equivalent Red Hat Enterprise Linux system administration experience Be certified as a Red Hat Certified Engineer (RHCE©) Overview Learn to install, configure, and manage OpenShift Enterprise by Red Hat instances - OpenShift Enterprise Administration (DO280) prepares the system administrator to install, configure, and manage OpenShift Enterprise by Red Hat© instances. OpenShift Enterprise, Red Hat's platform-as-a-service (PaaS) offering, provides pre-defined deployment environments for applications of all types through its use of container technology. This creates an environment that supports DevOps principles such as reduced time to market and continuous delivery. - In this course, students will learn how to install and configure an instance of OpenShift Enterprise, test the instance by deploying a real world application, and manage projects/applications through hands-on labs. - Course content summary - Container concepts - Configuring resources with the command line interface - Building a pod - Enabling services for a pod - Creating routes - Downloading and configuring images - Rolling back and activating deployments - Creating custom S2I images This course will empower you to install and administer the Red Hat© OpenShift© Container Platform, with hands-on, lab-based materials that show you how to install, configure, and manage OpenShift clusters and deploy sample applications to further understand how developers will use the platform. This course is based on Red Hat© Enterprise Linux© 7.5 and Openshift Container Platform 3.9. OpenShift is a containerized application platform that allows your enterprise to manage container deployments and scale your applications using Kubernetes. OpenShift provides predefined application environments and builds upon Kubernetes to provide support for DevOps principles such as reduced time to market, infrastructure-as-code, continuous integration (CI), and continuous delivery (CD). 1 - INTRODUCTION TO RED HAT OPENSHIFT ENTERPRISE Review features and architecture of OpenShift Enterprise. 2 - INSTALL OPENSHIFT ENTERPRISE Install OpenShift Enterprise and configure a master and node. 3 - EXECUTE COMMANDS Execute commands using the command line interface. 4 - BUILD APPLICATIONS Create, build, and deploy applications to an OpenShift Enterprise instance. 5 - PERSISTENT STORAGE Provision persistent storage and use it for the internal registry. 6 - BUILD APPLICATIONS WITH SOURCE-TO-IMAGE (S2I) Create and build applications with S2I and templates. 7 - MANAGE THE SYSTEM Use OpenShift Enterprise components to manage deployed applications. 8 - CUSTOMIZE OPENSHIFT ENTERPRISE Customize resources and processes used by OpenShift Enterprise. 9 - COMPREHENSIVE REVIEW Practice and demonstrate knowledge and skills learned in the course. 10 - NOTE: Course outline is subject to change with technology advances and as the nature of the underlying job evolves. For questions or confirmation on a specific objective or topic, please contact us. Additional course details: Nexus Humans Red Hat OpenShift Administration II: Operating a Production Kubernetes Cluster (DO280) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat OpenShift Administration II: Operating a Production Kubernetes Cluster (DO280) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.