https://www.patreon.com/moonhealinganddivination/membership
Duration 2 Days 12 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy a Cisco Integrated Threat Defense solution in their network environment. Cisco integrators and partners Systems and network engineers Technical architects Technical support personnel Overview After taking this course, you should be able to: Understand the network security landscape and the Cisco Integrated Threat Defense (ITD) solutions Describe the key components of the ITD solution and their use in the network Configure the Cisco Identity Services Engine (ISE) for a baseline of operation in the ITD solution Configure the integration between the Cisco Stealthwatch and Cisco ISE platforms Configure the integration between the Cisco Firepower and ISE platforms Configure the integration between Cisco Firepower and Cisco Advanced Malware Protection (AMP) for Endpoints The Implementing an Integrated Threat Defense Solution (SECUR201) v1.2 course provides an analysis of the cybersecurity landscape with an emphasis on the importance of an integrated threat defense architecture. Through a combination of lessons and hands-on practice, you will learn to deploy and integrate Cisco©?s Integrated Threat Defense solutions which include: Cisco Identity Services Engine (ISE), Cisco Stealthwatch, Cisco Firepower NGFW, and Cisco AMP for Endpoints. This course provides you with the knowledge and skills to implement and integrate solution components with existing network services, integrate solution components with the pxGrid (Platform Exchange Grid) framework, integrate network and endpoint-based malware protection, and observation of security dataflow after the introduction of malware. Course Outline Integrated Threat Defense Introduction ITD Products Identity Services Engine Setup Integration of Stealthwatch with Identity Services Engine Integration of Firepower with Identity Services Engine Integration of Firepower with AMP for Endpoints Lab outline Connecting to the Lab Environment Integrating ISE and Active Directory Integrating ISE and Cisco Adaptive Security Appliance (ASA) Configuring pxGrid and Client Certificates Integrating Stealthwatch with Identity Services Engine Integrating Network Visibility Module (NVM) with AnyConnect Integrating Firepower with Identity Services Engine Integrating AMP for Endpoints with Firepower
Our comprehensive online course offers a deep dive into Urban and Rural Driving, Working at Height. Whether you are a seasoned driver or just starting out, this training will equip you with essential knowledge and skills to navigate various road conditions safely and efficiently. Urban and Rural Driving, Working at Height Training Content: Urban Driving Techniques: Develop strategies for navigating busy city streets, including managing traffic congestion, negotiating junctions, and adhering to specific urban regulations. Rural Road Safety: Learn how to adapt your driving style for rural roads, including handling narrow lanes,unpredictable bends, and potential hazards like livestock and wildlife. Working at Height: Learn essential training on safe practices for working at height, covering risk assessments, equipment usage, and compliance with safety regulations. Learn to identify hazards, use fall protection systems, and ensure a safe working environment. Join us to enhance your vehicle safety knowledge, compliance with legal requirements, and improve your driving skills in diverse environments. Register today to be better prepared for a wide range of driving challenges. Please review our Terms and Conditions for more information.
At some point in your life you will have attended a training course or workshop, but what happens when you are asked to deliver one? Some people relish the opportunity while others are challenged by it. Whatever you feel about training others, it is a skill that is admired and can be studied and learned. With the trainer you will be learning the techniques, skills and understanding you need and you will have the chance to deliver a short training session to others, receive feedback and having the confidence to deliver it for real in your job. The training will comprise one day followed by a half day when all those able to attend will deliver and have feedback on a 20 minute training activity. To be able to create and maintain an environment conducive to learning and engagement To understand basic learning theory and practice and the difference between training, facilitating and learning To understand how adults learn and how to apply it as a trainer To be able to plan and deliver a training activity using the appropriate set of skills and behaviours To be able to review and evaluate learning and identify how outcomes are met To manage the learning process and the participant engagement in the training environment To be able to present effectively and appropriately to a variety of audiences To deliver and receive feedback on a short delivered training activity with peers To review and evaluate learning and have an action plan to take back and put into practice DAY ONE (full-day) 1 Welcome, housekeeping, how the day will be run Introductions (and making the most of them) Warm up - breaking the ice followed by review and feedback Creating an environment conducive to learning and engagement; managing expectations well as a trainer Group task with feedback and review in plenary 2 What is training and how do adults learn? Trainer input: David Kolb's Learning Cycle Group tasks 3 How to plan a session and what to include - trainer input Starting at the end and working backwards Linking outcomes to purposeful activities Practice task and planning time for day two using a template 4 The skills and behaviours of a brilliant trainer Modelling skills and behaviours Creative task and discussion 5 Mini reviewing task De-brief - using reviewing in training 6 How to manage the process Trainer input followed by practice Paying conscious attention to language (verbal and non verbal), feelings and responses in the room and managing yourself as a trainer 7 The trainer's toolkit #1 Key tools, materials and templates Choosing different tools and approaches with different audiences Know your audience 8 The trainer's toolkit #2 Key tools, materials and templates continued Addressing trainer good practice 9 Review, evaluation and action planning activities Why and what should we be evaluating and why it's important Action planning task Group review task DAY TWO (half-day) The day will comprise a series of 30 minute timed sessions where each delegate will present and deliver a training activity with the group. The training activity will be prepared and planned in advance and will take 20 minutes (+ or - 2 minutes) to deliver in real time. This will be followed by review and feedback from the trainer and peers to complete the total of 30 minutes as a time slot. Reiteration of the task and discussion can take place with the trainer if needed, and there is time included in Day One to support the training planning.
Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions
Study abroad is about stepping out of your comfort zone, embracing a new culture and way of life, and coming home with unforgettable memories
Duration 2 Days 12 CPD hours This course is intended for This course is designed for students with previous Citrix ADC experience, and best suited for individuals who will be deploying Citrix Application Delivery Management to administer a Citrix Networking environment or optimize Citrix ADC-managed application delivery traffic. Overview Manage multiple Citrix ADC platforms centrallyOrchestrate configuration changesReport on transactions passing through the Citrix ADC environmentVisualize infrastructure and plan expansion Master the deployment and usage of Citrix Application Delivery Management with this two-day management and optimization course. Students will gain the skills needed to automate and manage network services for scale out of application architectures, and to optimize Citrix ADC-managed application delivery traffic. The curriculum focuses on centrally managing multiple Citrix ADC platforms, orchestrating configuration changes, reporting on transactions, visualizing infrastructure and planning infrastructure expansion. Students will also learn how to implement Citrix ADC features, including caching, frontend optimization, Citrix ADC web logging and TCP/HTTP optimization, to optimize traffic managed by your Citrix networking environment. Citrix Application Delivery Management Introduction An introduction to Application Delivery Management Application Delivery Management Deployment and Configuration Deploying Application Delivery Management in High Availability Application Delivery Management Instance Management Managing and Monitoring Application Delivery Management An introduction to Application Delivery Management Application Delivery Management Deployment and Configuration Deploying Application Delivery Management in High Availability Application Delivery Management Instance Management Managing Citrix ADC Configuration Application Management StyleBooks Configuration Management Citrix ADC Web Logging Understanding Web Traffic Installing and configuring Citrix ADC Web Logging Troubleshooting Citrix ADC Web Logging Citrix ADC Integrated Caching Introduction to Integrated Caching Static and Dynamic Content Request and Response Process Flow Understanding Cache Policies Identifying Content Group Settings Front-End Optimization Improving Content Delivery Front-End Optimization Use Cases Understanding Minification CSS Optimizations Tuning and Optimizations Connections on the Citrix ADC Connection Profiles Queuing on the Citrix ADC Connection Tuning Practices
Duration 1 Days 6 CPD hours This course is intended for To ensure success, students should have completed Excel Essentials and Excel Functions Including Pivot Tables and Lookups or have the equivalent knowledge and experience. Overview Upon successful completion of this course, students will understand the programming environment of Visual Basic for applications and know how to create custom procedures and functions that can expand their ability to use Excel more effectively. This course is intended for the experienced Excel users that want to gain knowledge of visual basic for applications (VBA). Introduction to Macros Recording Macros Absolute and Relative How to Run a Macro Basics of Code Writing The VBA Environment (the ?VBE? window) Essential Tips, Tricks, Shortcuts Understanding VBA and Best Practice Crucial VBA Objects and Structures Variables and Data Types Conditionals (If, Select Case) Loops (For, Do) Interaction Interact with Data, Sheets, the Excel Application Interact with User (Message Box, Input Box) Errors Run Editing Debuging Handeling Errors Additional course details: Nexus Humans Excel - VBA Bootcamp training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Excel - VBA Bootcamp course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is designed for people who need to use Microsoft Teams to communicate, share files, and conduct online meetings with colleagues. No experience with Teams is required; however, a basic understanding of Office apps will be useful. Overview In this course, you will use Microsoft Teams to communicate and collaborate with your colleagues. You will: Send messages to colleagues using Teams. Call and meet with people in Teams. Lead a meeting. Configure your Teams environment. Share files and app content. Create and configure Teams. This course is designed to help you master Microsoft© Teams©, the key communications tool in the suite of Microsoft© 365© productivity apps. Microsoft Teams enables individuals and organizations to chat, share ideas, collaborate on files, and essentially, work together. You can use Teams to have a quick chat with a colleague, participate in a virtual meeting, make an online call, and share files and resources. The Microsoft Teams app is available in three versions: a desktop app, a web app, and a mobile app. Once you are familiar with the Teams desktop app, you can easily transfer that knowledge and work in the web and mobile apps to take advantage of connecting through Teams wherever your work takes you. Messaging Colleagues Using Teams Topic A: Navigate in Teams Topic B: Chat with Contacts Topic C: Post in Team Channels Calling and Meeting in Teams Topic A: Call People in Teams Topic B: Meet in Teams Leading Meetings in Teams Topic A: Conduct Presentations Topic B: Manage Meetings Configuring Your Teams Environment Topic A: Configure General Application Settings Topic B: Configure Notifications and Privacy Settings Topic C: Configure Call and Device Settings Sharing Files and App Content in Teams Topic A: Share Files Topic B: Add Apps and Connectors Creating and Configuring Teams Topic A: Create and Manage a Team Topic B: Create and Configure Channels Topic C: Add and Configure Channel Tabs
Join the Scrum.org accredited Live Virtual Class - Professional Scrum Product Owner Advanced™ training (PSPO Advanced) to master the role of a Product Owner. Learn how to advance your training of Product Ownership and apply it to deliver even more value. Course Description Agile techniques and the Scrum framework revolutionise project and product delivery, enabling teams to work faster and align closely with business needs. A product owner's role within this delivery is critical. Unlike traditional team managers, Product Owners focus on maximising product value rather than individual elements of project delivery. To excel in this role, product owners must combine business strategy with product vision and delivery roadmaps. The ability to operate within complex environments highlights the need for specific training and qualifications. Product Owner Advanced training is specifically designed to empower experienced Product Owners to deliver greater value. An exceptional Product Owner requires skillsets beyond core Agility and Scrum. These include clear decision-making, vision, communication, and influence. Practical experience is highly valued, and the PSPO 2 course emphasises interactive workshops, discussions, and exercises to provide a comprehensive understanding of the multifaceted Product Owner role. This course elevates existing Product Owners' capabilities, providing a clear path for your professional growth and delivering increased value to product stakeholders. Through collaborative and exploratory training, Product Owners' knowledge and experience will reach new heights, improving various aspects of your role. Key areas covered include: Deepening understanding of the Product Owner role, including product understanding, customer identification, and effective communication of product vision and strategy. Leveraging product vision and strategy to gain a competitive edge. Embracing diverse roles and stances essential for Product Owners. Enhancing stakeholder communication and management skills with a focus on different stakeholder groups. Navigating Agile governance, budgeting, and contracting within the Scrum framework. Scaling the Product Owner role for larger projects and products. By the end of this product owner advanced training, participants will be equipped to excel as Product Owners, driving success and value across their product journey. Why Train With Us? Develop advanced product owner skillsets that build on your existing knowledge of the Scrum framework and product owner accountabilities with our immersive two-day online PSPO Advanced course. Led by experienced industry professionals and support Professional Scrum Trainers & Product Owners, the course values team-based exercises and a hands-on learning experience. We help you grow within your Product Owner role through this advanced training, enabling you to better communicate product vision and strategy to teams, ultimately delivering higher value through projects and products with larger scopes. Who Should Attend This Course? The Professional Product Owner – Advanced course is designed for: Experienced Product Owners, ideally with at least one year of experience in the role Scrum Masters and stakeholders collaborating with Product Owners Your Professional Scrum Trainer Meet Jay, founder of Fractal Systems and a dedicated Professional Scrum Trainer. With over 20 years of experience in team and leadership roles, Jay is well-versed in delivering continuous value. His unique teaching approach involves zero PowerPoint and instead relies on engaging, experience-based sessions using techniques from Liberating Structures and Neuro Linguistic Programming. Jay's expertise lies in business transformations, offering training, mentoring, coaching, and consulting to foster success through collaborative efforts. Rapid learning and practical application are the hallmarks of his approach. Jay & the entire Fractal team are invested in your learning journey and are here to support you from start to end, including offering additional valuable support: Free practice assessments for certification success Free resource bundle to master Scrum Free exam revision sheets Free access to an exam simulator Free exam coaching sessions for first-time success Free 1:1 coaching to excel at work Our Clients Our Testimonials