Duration 4 Days 24 CPD hours This course is intended for This is an intermediate -level programming course, designed for experienced Java developers who wish to get up and running on developing well defended software applications. Familiarity with Java and JEE is required and real world programming experience is highly recommended. Ideally students should have approximately 6 months to a year of Java and JEE working knowledge. Overview Students who attend Attacking and Securing Java Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a Java/JEE perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on Java / JEE security training that offers a unique look at Java application security. Beginning with penetration testing and hunting for bugs in Java web applications, you embrace best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, allowing you to experience the mechanics of how to secure JEE web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? Making Application Security Real
Duration 62.5 Days 375 CPD hours Cisco Learning Library: Data Center offers a subscription to Cisco online data center training, including certifications, products, and technologies.This comprehensive technical training library offers full-length, interactive certification courses, additional product and technology training with labs, and thousands of reference materials Data Center Library Certification Courses CCNP Data Center Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.0 Designing Cisco Data Center Infrastructure (DCID) v7.0 Troubleshooting Cisco Data Center Infrastructure (DCIT) v7.0 Implementing Cisco Application Centric Infrastructure (DCACI) v1.0 Configuring Cisco MDS 9000 Series Switches (DCMDS) Implementing Automation for Cisco Data Center Solutions (DCAUI) CCIE Data Center Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.0 Product and Technology Training Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.0 Understanding Cisco Data Center Foundations (DCFNDU) v1.0 Implementing Cisco Application Centric Infrastructure (DCACI) v1.0 Introducing Cisco NX-OS Switches and Fabrics in the Data Center (DCINX) v1.0 Configuring Cisco NX-OS Switches and Fabrics in the Data Center (DCCNX) v1.0 Designing Cisco Data Center Infrastructure (DCID) v7.0 Troubleshooting Cisco Data Center Infrastructure (DCIT) v7.0 Implementing Cisco Application Centric Infrastructure?Advanced (DCACIA) v1.0 Introducing Cisco Unified Computing System (DCIUCS) v1.0 Configuring Cisco Unified Computing System (DCCUCS) v1.0 Implementing Cisco Tetration Analytics (DCITET) v1.0 Cisco MDS 9000 Series Switches Overview (DCMDSO) v1.0 Configuring Cisco Nexus 9000 in NX-OS Mode (C9KNX) v1.2 Configuring Cisco Nexus 9000 Series Switches in ACI Mode (DCAC9K) v3.0 Introducing Cisco Nexus 9000 Switches in NX-OS Mode (DCINX9K) v2.1 Configuring VXLANs on Cisco Nexus 9000 Series Switches (DCVX9K) v1.0 Cisco Application Centric Infrastructure Operations and Troubleshooting (DCACIO) v4.1 Configuring Cisco MDS 9000 Series Switches (DCMDS) v3.1 Introducing Cisco MDS 9000 Series Switches (DCIMDS) v1.0 Implementing Automation for Cisco Data Center Solutions (DCAUI) v1.0 Introducing Automation for Cisco Solutions (CSAU) v1.0 Implementing Cisco HyperFlex (DCIHX) v1.2 Configuring the Cisco Nexus Data Center Transport (CCNDC-T) v2.0 Configuring the Cisco Nexus Data Center Virtual Machines (CCNDC-V) v2.0 Additional course details: Nexus Humans Cisco Digital Learning Data Center training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Digital Learning Data Center course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for Collaboration engineers and administration professionals in job roles such as: Network administrator Network architect Network designer Network engineer Network manager Overview After taking this course, you should be able to: Analyze and troubleshoot SIP, H.323, and media protocols Implement time-of-day routing, call park, call pickup, and meet-me conferences in Cisco Unified Communications Manager Implement call coverage in Cisco Unified Communications Manager Configure and troubleshoot Cisco Unified Communications Manager Device Mobility Configure and troubleshoot Cisco Unified Communications Manager Extension Mobility Configure and troubleshoot Cisco Unified Communications Manager Unified Mobility Implement Cisco Unified Communications Manager Express for SIP phones Implement globalized call routing within and between Cisco Unified Communications Manager clusters Implement Media Gateway Control Protocol (MGCP) fallback and Survivable Remote Site Telephony (SRST) in Cisco Unified Communications Manager and in Cisco IOS XE gateways Implement Call Admission Control and Automated Alternate Routing (AAR) in Cisco Unified Communications Manager Implement URI calling in Cisco Unified Communications Manager for calls within a cluster and between clusters Troubleshoot multisite Cisco Unified Communications Manager deployments Implement Intercluster Lookup Service (ILS) between Cisco Unified Communications Manager clusters and enable General Data Protection Regulation (GDPR) Configure and troubleshoot Cisco Unified Border Element In this course, you will learn how to use Cisco© Unified Communications Manager features to consolidate your communications infrastructure into a scalable, portable, and secure collaboration solution. This course prepares you for the 300-815 Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) concentration exam and CCNP-Collaboration certification. Course Outline Analyzing and Troubleshooting Signaling and Media Protocols Implementing Cisco Unified Communications Manager Supplemental Services Implementing Call Coverage in Cisco Unified Communications Manager Configuring and Troubleshooting Cisco Unified Communications Manager Device Mobility Configuring and Troubleshooting Cisco Unified Communications Manager Extension Mobility Configuring and Troubleshooting Cisco Unified CM Unified Mobility Implementing Cisco Unified Communications Manager Express Implementing Globalized Call Routing Implementing Remote Site Survivability Implementing Call Admission Control in Cisco Unified Communications Manager Implementing URI Calling in Cisco Unified Communications Manager Troubleshooting Multisite Cisco Unified Communications Manager Deployments Examining Global Dial Plan Replication Configuring and Troubleshooting Cisco Unified Border Element Lab outline Analyze SIP, H.323, and Media Protocols Troubleshoot SIP and Media Protocols Implement Cisco Unified Communications Manager Supplemental Services Implement Call Hunting and Call Queueing in Cisco Unified Communications Manager Configure Device Mobility Troubleshoot Cisco Unified Communications Manager Device Mobility Configure Cisco Unified Communications Manager Extension Mobility Troubleshoot Cisco Unified Communications Manager Extension Mobility Configure Cisco Unified Mobility Troubleshoot Cisco Unified Mobility Implement Endpoints in Cisco Unified Communications Manager Express Implement Endpoint Addressing and Call Routing in Cisco Unified Communications Manager Express Implement Calling Privileges in Cisco Unified Communications Manager Express Implement Hunt Groups, Call Park, and Paging in Cisco United Communications Manager Express Implement Globalized Call Routing Implement TEHO, PSTN Backup, and CoS in a Globalized Call-Routing Deployment Implement MGCP Fallback and Survivable Remote Site Telephony Implement Call Admission Control Implement a URI-Based Dial Plan for Multisite Deployments Troubleshoot Globalized Call Routing Troubleshoot Call Admission Control Implement Global Dial Plan Replication Implement Cisco Unified Border Element Troubleshoot Cisco Unified Border Element
Duration 1 Days 6 CPD hours This course is intended for This course is intended for individuals who want to recognize and manage their emotions, behaviors and impulses and apply these skills to the world around them. Overview Upon successful completion of the Developing Emotional Intelligence course, participants will have the tools to gain control over emotions, navigate challenging situations, and communicate empathetically. In this course, students will develop the skill of emotional intelligence to help maximize personal and professional success. Module One: Getting Started Getting Started Module Two: Introduction to Emotional Intelligence Defining Emotional Intelligence The Importance of EI Who Needs It? What Are Emotions? EQ vs. IQ Practical Illustration Module Three: The Components of EI Self-Management Self-Awareness Social Skills Internal Motivation Empathy Practical Illustration Module Four: Tools to Gain Control Journaling Meditation and Mindfulness Identifying Emotional Triggers Breathing Techniques Taking a Break Practical Illustration Module Five: Verbal Communication Skills Active Listening Asking Questions Consider Your Audience Choosing Your Words Be Authentic Practical Illustration Module Six: Nonverbal Communication Skills Body Language Tone Matters Facial Expressions Eye Contact Distance and Personal Space Practical Illustration Module Seven: Managing Relationships With Others Building Rapport Respond, Don?t React Show Gratitude Finding Common Ground Setting Boundaries Practical Illustration Module Eight: Overcoming Obstacles Recognizing and Admitting Failure Disagreeing Constructively Staying Cool Under Pressure Be Open to Perspectives The Power of Forgiveness Practical Illustration Module Nine: Application to Business Practices Working as a Team Setting Business Goals Interviewing for Successful Hires Giving and Receiving Feedback Customer Experience and Rapport Practical Illustration Module Ten: Benefits of Being Emotionally Aware Strong Interpersonal Relationships Able to Manage Change Reduced Stress and Anxiety Improved Decision Making Boosts Employee Morale Practical Illustration Module Eleven: Making an Impact Creating a Powerful First Impression Maintaining Your Composure Inspiring Leadership Gaining Self-Confidence Patience and Practice Practical Illustration Module Twelve: Wrapping Up Words from the Wise Additional course details: Nexus Humans Developing Emotional Intelligence training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Developing Emotional Intelligence course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course does not have any technical knowledge prerequisites for the learners, besides being proficient in using a computer and the Internet. IT and/or AI knowledge is a benefit but not a hard requirement. Given the rapid development of AI and the broad range of its applications in everyday life, it is crucial for anyone to attend this course to update their digital skills in an ever-changing world. It is expected that all learners have registered for a free account of OpenAI ChatGPT at https://chat.openai.com. Overview Discover how AI relates to other 4th industrial revolution technologies Learn about AI, ML, and associated cognitive services Overview of AI development frameworks, tools and services Evaluate the OpenAI ChatGPT4 / ChatGPT3.5 model features in more detail The core aim of this ?AI for beginners? course is to introduce its audience to Artificial Intelligence (AI) and Machine Learning (ML) technologies and allow them to understand the practical applications of AI in their everyday personal and professional life. Moreover, the course aims to provide a handful of demos and hands-on exercises to allow the learners to familiarize themselves with usage scenarios of OpenAI ChatGPT and other Generative AI (GenAI) models. The content of this course has been created primarily by using the OpenAI ChatGPT model. AI theoretical concepts. Introduction to AI, ML, and associated cognitive services (Computer vision, Natural language processing, Speech analysis, Decision making). How AI relates to other 4th industrial revolution technologies (cloud computing, edge computing, internet of things, blockchain, metaverse, robotics, quantum computing). AI model classification by utilizing mind maps and the distinctive role of Gen AI models. Introduction to the OpenAI ChatGPT model and alternative generative AI models. Familiarization with the basics of the ChatGPT interface (https://chat.openai.com). Talking about Responsible AI: Security, privacy, compliance, copyright, legal challenges, and ethical implications. AI practical applications Overview of AI development frameworks, tools and services. AI aggregators review. Hand-picked AI tool demos: a.Workplace productivity and the case of Microsoft 365 Copilot. b.The content creation industry. Create text, code, images, audio and video with Gen AI. c.Redefining the education sector with AI-powered learning. Evaluate the OpenAI ChatGPT4 / ChatGPT3.5 model features in more detail: a.Prompting and plugin demos. b.Code interpreter demos. Closing words. Discussion with an AI model on the future of AI. Additional course details: Nexus Humans AI for beginners training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AI for beginners course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to deploy and manage Endpoint Security within their security environment. Overview Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices. Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management. Identify and describe key elements of the SmartEndpoint Management console. Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console. Explain how to create and assign security policies for Endpoint clients using Endpoint Security. Understand deployment methods and server considerations for Endpoint Security Management installation. Identify the different ways to install and configure Endpoint clients. Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources. Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server. Describe additional server configurations that are available to help manage Endpoint clients. Recognize the different types of data security protections available to deploy on end user machines. Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers. Understand how to secure removable media devices. Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues. Recognize the types of threats that target Endpoint computers. Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment. Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources. Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events. Understand how to troubleshoot and debug issues. The goal of this course is to provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment. Course Topics Introduction to Endpoint Security Endpoint Security Management Deploying Endpoint Security Additional Endpoint Server Configurations Data Security Protection Advanced Threat Prevention Reporting and Troubleshooting LAB EXERCISES Installing the Endpoint Security Management Solution Deploying Endpoint Client Packages Deploying Endpoint Policy Servers Configuring High Availability for Endpoint Security Modifying Client Installations Working with Deployment Rules Working with SandBlast Agent Additional course details: Nexus Humans CCES Check Point Certified Endpoint Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCES Check Point Certified Endpoint Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This is an Intermediate and beyond-level Tableau course geared for experienced Tableau users who wish to leverage Tableau's more advanced capabilities. Overview This skills-focused course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert facilitator, students will learn how to: Understand what data works best with Tableau Desktop and how to shape and clean it appropriately to get Learn how to maximize flexibility from Tableau Desktop. Learn how Tableau Prep folds into the analytic cycle, and when to prep data in Tableau Prep vs. Tableau Desktop. Understand the terminology used in Tableau Prep. Know how Tableau Prep approaches data sampling. Create and understand data prep flows that address common scenarios encountered in data preparation, as applied to common data use cases Know how to view data prepared in Tableau Prep using Tableau Desktop. Understand data exploration and validation in Tableau Prep and Tableau Desktop. Geared for experienced Tableau Users, Tableau Prep Building (Tableau Data Prep) for Experienced Users is a two-day hands-on course designed to provide you with the tools and knowledge of how to prepare and shape data in Tableau Prep. It?s best suited for people who have 3-6 months experience in Tableau Desktop and are somewhat familiar with writing calculations. Throughout the course, our instructors will take you from conceptual data preparation material to creating useful Tableau Prep flows that can be output to Tableau Desktop for analysisNOTE: The Tableau Training Series is independent-format training that can be tuned and adjusted to best meet your needs. Our materials are flexible, comprehensive, and are always instructed by a senior instructor with a deep understanding of Tableau and its most current features, benefits and functionality in a wide array of uses. This is not Official Tableau Training. Course Outline Introduction to the workspace Introduction to the workflow Data literacy concepts Connecting to and configuring data Exploring data Cleaning data Preferred data structures in Tableau Shaping data Combining data Opening a data sample and creating an output file Best practices for data preparation Complex flows Starting with a question Hands-on data preparation Additional course details: Nexus Humans Tableau Prep Building (Tableau Data Prep) for Experienced Users (TTDTAB010) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Tableau Prep Building (Tableau Data Prep) for Experienced Users (TTDTAB010) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Experienced vSphere administrators who want to use available tools to automate day-to-day tasks. Overview By the end of the course, you should be able to meet the following objectives:Describe the features and benefits of automation in a vSphere environmentUnderstand the role of the vSphere Web services API in automationUse the Managed Object Browser to view the structure of the vSphere Web services API and theVMware vCenter Server? inventoryUse vSphere PowerCLI to deploy and manage virtual machines and virtual infrastructureRun and manage vRealize Orchestrator workflows from the libraryDesign, develop, and run custom, reusable vRealize Orchestrator workflowsIncorporate JavaScript into vRealize Orchestrator workflowsSelect the appropriate tool for automating tasks in vCenter Server This course equips experienced administrators with the knowledge to use the automation tools that all vSphere customers have access to. Students learn how to automate administration tasks with VMware vSphere© PowerCLI? and VMware vRealize© Orchestrator?. Course Introduction Introductions and course logistics Course objectives Automation in vSphere Identify the features and the advantages of automation List the tools used to automate vCenter Server tasks vSphere API Identify the function of an API Recognize the components of VMware vSphere© API Understand how an API is consumed View objects and invoke methods with the Managed Object Browser vSphere PowerCLI Basics Connect vSphere PowerCLI to vCenter Server systems and VMware ESXi? hosts Understand vSphere PowerCLI concepts Use vSphere PowerCLI cmdlets Deploy and manage virtual infrastructure Advanced vSphere PowerCLI and the vSphere API Explore the vSphere object model Capture code with Onyx Use vSphere API documentation to analyze vCenter Server actions View objects with the Get-View cmdlet vSphere PowerCLI Use Cases Manage host networking Create a distributed switch Migrate hosts Create reports vRealize Orchestrator Basics Identify workflow components Run and manage library workflows Edit a workflow Build and schedule a simple workflow Debug a workflow vRealize Orchestrator Advanced Identify and use advanced vRealize Orchestrator workflow elements Implement vRealize Orchestrator workflow nesting Use variable types in a workflow Use JavaScript to create complex workflows Incorporate an Oynx script in a workflow vRealize Orchestrator Use Cases Create automation workflows that map to real-world scenarios Create reporting workflows that map to real-world scenarios Create migration workflows that map to real-world scenarios Create provisioning workflows that map to real-world scenarios vRealize Orchestrator PowerCLI Plug-In Invoke external scripts and pass workflow parameters as script inputs Generate new vRealize Orchestrator actions from Windows PowerShell and vSphere PowerCLI scripts and cmdlets Browse snap-ins and their associated cmdlets in the vRealize Orchestrator workflow editor vRealize Orchestrator Integration Understand the connectivity options for vRealize Orchestrator Differentiate between north-facing and south facing APIs List the APIs and their use cases Run a workflow through a REST call Guest Operations with vRealize Orchestrator and vSphere PowerCLI Use the most appropriate tools to perform guest operations Software Development Process & Tools Understand the software development lifecycle Understand version control system tools Map the correct tools to vRealize Orchestrator and vSphere PowerCLI
Duration 1 Days 6 CPD hours This course is intended for The content is appropriate for test automation engineering roles, test manager roles, test lead roles, test architect roles, as well as developer roles. This course assumes you have a foundational understanding of testing and the purpose of automation. This course will be beneficial to anyone who is accountable for assessing, planning, designing, and implementing an integrated set of technology (testing infrastructure) that supports development, testing, and deployment. Overview Working in an interactive learning environment, led by our expert facilitator, attendees will learn to: Document the current state of test automation in your organization Define a custom test automation plan and architecture to fit their situation Create an initial implementation plan Identify initial key measures Develop a metrics dashboard for tracking the value of test automation Lay out a future strategy and roadmap to get there Introduction to Test Automation is a one-day, hands-on event designed to provide participants with the skills required to develop a custom test automation plan and architecture for their organization. Throughout the course, students will examine and work through various practical examples, learning how to create an integrated test automation plan and develop a test automation architecture. Participants will also learn about the possible real-world challenges they may face while trying to accomplish their goals, exploring the practical positive aspects of engaging their technical team, along with the possible frustrations of experiencing too much isolation between test automators and test designers. Getting Started Automation beginnings Software as a series of imperfect translations The Compelling Business Needs for Automation Automation the next opportunity Islands of Automation Getting products to market more quickly, at the right costs and quality Automation Challenges and Requirements Automation Challenges Test Automation Key Requirements Foundational material for your automation plan Templates Questions Examples Virtual Consulting included with this course Automation plan vision and strategy Vision, Strategy, Approach Example Defining your end in mind Deciding where to start Engaging Others Conducting a current state tools inventory Assessing your current state - tools and processes Tools inventory example and template Radar Chart as a means of presenting current state information Consider the best automation approach Waterfall vs. agile cycles of work Aligning tools with your methodologies Strategies for Automating The Test Automation Pyramid Developing your test automation architecture Blocks of automation capabilities Islands of Automation Integrated Tools Architecture Template Integrated Tools Architecture Examples Test automation architecture examples Examples of different test automation architectures and frameworks Selenium Key Test Automation Architecture Characteristics Acceptance test-driven and behavior-driven testing overview Test automation approaches FitNesse Cucumber Gherkin script overview Tool workflow Considerations for what to automate and when Categories of tests that might be automated We have many tool choices Key points in Test Tool Architecture Planning Piloting and Implementing automation Selecting and evaluating tools and rolling them out Selling Automation - qualitative questions Selling Automation - quantitative questions Measuring automation benefits Measures in technical terms Measures in business terms Measures of testing vs. measures of test automation Next Steps A few keys to success
Duration 5 Days 30 CPD hours This course is intended for Security Professionals working with Kubernetes Clusters Container Orchestration Engineers DevOps Professionals Overview In this course, students will learn and practice essential Kubernetes concepts and tasks in the following sections: Cloud Security Fundamentals Cluster Hardening System Hardening Minimize Microservice Vulnerabilities Supply Chain Security Disaster Recovery Secure Back-up and Restore This class prepares students for the Certified Kubernetes Security Specialist (CKS) exam. Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stabilitywhile maximizing resource utilization for applications and services. By the conclusion of this hands-on, vendor agnostic training you will be equipped with a thorough understanding ofcloud security fundamentals, along with the knowledge, skills and abilities to secure a Kubernetes cluster, detect threats, and properly resolve a security catastrophe. This courseincludes hands-on instruction which develops skills and knowledge for securing container-based applications and Kubernetes platforms, during build, deployment, and runtime. We prioritizecovering all objectives and concepts necessary for passing the Certified Kubernetes Security Specialist (CKS) exam. You will be provided the components necessary to assemble your ownhigh availability Kubernetes environment and harden it for your security needs. Learning Your Environment Underlying Infrastructure Using Vim Tmux Cloud Security Primer Basic Principles Threat Analysis Approach CIS Benchmarks Securing your Kubernetes Cluster Kubernetes Architecture Pods and the Control Plane Kubernetes Security Concepts Install Kubernetes using kubeadm Configure Network Plugin Requirements Kubeadm Basic Cluster Installing Kubeadm Join Node to Cluster Kubeadm Token Manage Kubeadm Tokens Kubeadm Cluster Upgrade Securing the kube-apiserver Configuring the kube-apiserver Enable Audit Logging Falco Deploy Falco to Monitor System Calls Enable Pod Security Policies Encrypt Data at Rest Encryption Configuration Benchmark Cluster with Kube-Bench Kube-Bench Securing ETCD ETCD Isolation ETCD Disaster Recovery ETCD Snapshot and Restore Purge Kubernetes Purge Kubeadm 3Purge Kubeadm Image Scanning Container Essentials Secure Containers Creating a Docker Image Scanning with Trivy Trivy Snyk Security Manually Installing Kubernetes Kubernetes the Alta3 Way Deploy Kubernetes the Alta3 Way Validate your Kubernetes Installation Sonobuoy K8s Validation Test Kubectl (Optional) Kubectl get and sorting kubectl get kubectl describe Labels (Optional) Labels Labels and Selectors Annotations Insert an Annotation Securing your Application Scan a Running Container Tracee Security Contexts for Pods Understanding Security Contexts AppArmor Profiles AppArmor Isolate Container Kernels gVisor Pod Security Pod Security Policies Deploy a PSP Pod Security Standards Enable PSS Open Policy Agent (OPA) Admission Controller Create a LimitRange Open Policy Agent Policy as Code Deploy Gatekeeper User Administration Contexts Contexts Authentication and Authorization Role Based Access Control Role Based Access Control RBAC Distributing Access Service Accounts Limit Pod Service Accounts Securing Secrets Secrets Create and Consume Secrets Hashicorp Vault Deploy Vault Securing the Network Networking Plugins NetworkPolicy Deploy a NetworkPolicy mTLS Linkerd mTLS with istio istio Threat Detection Active Threat Analysis Host Intrusion Detection Deploy OSSEC Network Intrusion Detection Deploy Suricata Physical Intrusion Detection Disaster Recovery Harsh Reality of Security Deploy a Response Plan Kasten K10 Backups Deploy K10