• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1866 Fire courses delivered Online

Risk Assessment Level 2

By Online Training Academy

In the modern world, the Risk Assessment Level 2 Course is essential since it provides a skill set that is needed in many different businesses. Gaining proficiency in risk assessment procedures is essential in a time marked by constantly changing hazards and dynamic difficulties. This course gives participants the skills and information they need to recognize, assess, and properly reduce potential risks. In the United Kingdom, where strict laws and safety requirements are in place, there is a constant need for experts in risk assessment. Employment prospects are abundant in industries like construction, healthcare, finance, and environmental management, with annual incomes typically ranging from £30,000 to £40,000. Completing this course not only improves employability but also encourages a proactive safety and compliance strategy, which lowers liability and boosts organizational resilience. Furthermore, developing a strong understanding of risk assessment promotes a culture of risk awareness, enhances resource allocation, and helps make well-informed decisions-all of which contribute to improved company outcomes and long-term growth. Key Features: This Risk Assessment Level 2 Course Includes: CPD Certified Risk Assessment Course Free Certificate CIQ Approved Risk Assessment Course Level 3 Risk Assessment Diploma Developed by Risk Assessment Specialist Lifetime Access Course Curriculum Risk Assessment Level 2 Course Module 01: Understanding Risk Assessment Module 02: Strategies for Risk Management Module 03: Tools in the Risk Assessment Toolkit Learning Outcomes: After completing this Risk Assessment Course, you will be able to: Identify risks in diverse scenarios for effective risk assessment. Apply risk management strategies to mitigate potential hazards. Utilise a comprehensive risk assessment toolkit proficiently. Analyse and prioritise Risk Assessment to enhance decision-making skills. Demonstrate competence in creating and implementing risk mitigation plans. Evaluate the effectiveness of risk assessment processes. Certification After completing this Risk Assessment Level 2course, you will get a free Certificate. Please note: The CPD approved course is owned by E-Learning Solutions Ltd and is distributed under license. CPD 10 CPD hours / points Accredited by The CPD Certification Service Risk Assessment Training - Level 3 CPD Certified 34:59 1: Module 01: Understanding Risk Assessment Preview 09:59 2: Module 02: Strategies for Risk Management 13:59 3: Module 03: Tools in the Risk Assessment Toolkit 09:01 4: CPD Certificate - Free 01:00 5: Leave A Review 01:00 Who is this course for? Risk Assessment Course Individuals in safety and compliance roles. Managers seeking advanced risk management skills. Professionals responsible for organisational risk assessment. Those pursuing continuous professional development in risk assessment. Team members involved in the risk management process. Requirements This Risk Assessment course requires no formal qualifications to start. Career path Risk Assessment Course Risk Analyst - £30K to 45K/year Compliance Officer - £25K to 40K/year Insurance Underwriter - £28K to 50K/year Health and Safety Advisor - £25K to 40K/year Project Manager - £35K to 55K/year Certificates Digital certificate Digital certificate - Included Reed Courses Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.

Risk Assessment Level 2
Delivered Online On Demand36 minutes
£12

British Cleaning Certification Award

4.5(3)

By Studyhub UK

Let's start an enlightening journey with the 'British Cleaning Certification Award', a course crafted to transform novices into adept cleaning professionals.  Imagine a career where each day brings a new challenge, a fresh setting, and the satisfaction of leaving spaces purely clean. This course is developed by following the guidelines of esteemed bodies such as the British Institute of Cleaning Science and the British Cleaning Council, it is not just a learning path; it's a gateway to mastering the art of cleanliness. Dive into the depths of various cleaning realms, from the comfort of household chores to the intricacies of commercial kitchen hygiene.  Learn about the diverse equipment, eco-friendly products, and appropriate clothing that redefine cleaning standards. With modules covering non-routine waste management, chemical safety, and keyholding, the course goes beyond the basics, preparing you for real-world scenarios. Learning Outcomes: Gain comprehensive knowledge of different cleaning environments and techniques. Master the use of various cleaning equipment and eco-friendly products. Understand the principles of chemical safety and effective waste management. Acquire skills in business management, customer satisfaction, and staff supervision. Learn effective marketing strategies for a successful cleaning business. Why buy this British Cleaning Certification Award? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Certification After studying the course materials of the British Cleaning Certification Award you will be able to take the MCQ test that will assess your knowledge. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? Individuals aspiring to enter the cleaning industry. Entrepreneurs planning to start their own cleaning business. Current cleaning professionals seeking formal certification. Managers overseeing cleaning staff and operations. Individuals interested in learning about diverse cleaning techniques. Prerequisites This British Cleaning Certification Award was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Domestic Cleaner: £15,000 - £20,000 per annum Commercial Cleaner: £17,000 - £22,000 per annum Cleaning Supervisor: £20,000 - £25,000 per annum Facility Manager: £30,000 - £40,000 per annum Cleaning Business Owner: Variable, depending on business size and success Health and Safety Officer (in cleaning sector): £25,000 - £35,000 per annum Course Curriculum Module 01: An Introduction to the Cleaning Job An Introduction to the Cleaning Job 00:19:00 Module 02: The Diversity of Cleaning Jobs The Diversity of Cleaning Jobs 00:26:00 Module 03: Cleaning Equipment, Products and Clothing Cleaning Equipment, Products and Clothing 00:24:00 Module 04: House Cleaning House Cleaning 00:22:00 Module 05: Food Kitchen and Commercial Kitchen Cleaning Food Kitchen and Commercial Kitchen Cleaning 00:23:00 Module 06: Bathrooms and Toilets Bathrooms and Toilets 00:22:00 Module 07: Office Cleaning Office Cleaning 00:19:00 Module 08: Cleaning External Surfaces and Areas Cleaning External Surfaces and Areas 00:18:00 Module 09: Dealing with Non-Routine Waste Dealing with Non-Routine Waste 00:21:00 Module 10: Chemical Safety, Keyholding and Alarm Codes for Cleaners Chemical Safety, Keyholding and Alarm Codes for Cleaners 00:21:00 Module 11: Starting a Cleaning Business and Planning for it Starting a Cleaning Business and Planning for it 00:14:00 Module 12: Running the Business with Quality Service Running the Business with Quality Service 00:22:00 Module 13: Customer Satisfaction Customer Satisfaction 00:23:00 Module 14: Management of Staff Management of Staff 00:22:00 Module 15 Marketing, Advertising and Sales Marketing, Advertising and Sales 00:24:00 Module 16: Expansion Management Expansion Management 00:17:00 Module 17: Business Insurance, Tax and Additional Equipment Business Insurance, Tax and Additional Equipment 00:24:00 Mock Exam Mock Exam - British Cleaning Certification Award 00:20:00 Final Exam Final Exam - British Cleaning Certification Award 00:20:00

British Cleaning Certification Award
Delivered Online On Demand6 hours 41 minutes
£10.99

Attack Prevention with Juniper Networks Firewalls

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for network engineers, support personnel, reseller support, and others responsible for implementing ScreenOS products. Overview After successfully completing this course, you should be able to: Configure attack prevention features, including: ?SCREEN options; Deep Inspection (DI); and Antivirus (AV) scanning. Configure URL filtering. Configure antispam filters. This course meets the business needs of customers who are deploying the attack prevention features of ScreenOS software. The course focuses specifically on the attack-related features and assumes familiarity with ScreenOS software. Upon completing this course, you should be able to return to work and successfully configure and verify the desired attack prevention features. Chapter 1: Course Introduction Chapter 2: ScreenOS Basics Review Concepts Review Configuration Review Lab: ScreenOS Basics Review Chapter 3: SCREEN Options Multilayer Network Protection Types of Attacks SCREEN Options Configuration SCREEN Best Practices Lab: SCREEN Options Configuration Chapter 4: Deep Inspection Deep Inspection Overview Attack Database Configuration Policy Configuration Logging and Monitoring Lab: Deep Inspection Configuration Chapter 5: Antivirus Antivirus Operations Antivirus Configuration?Kaspersky Antivirus Configuration?ICAP Verifying Operations Lab: Antivirus Configuration Chapter 6: Web Filtering Web-Filtering Options Web-Filtering Configuration Verifying Operations Lab: Configuring Web Filtering Chapter 7: Antispam Antispam Concepts Antispam Configuration Verifying Operations Lab: Antispam Configuration Additional course details: Nexus Humans Attack Prevention with Juniper Networks Firewalls training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Attack Prevention with Juniper Networks Firewalls course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Attack Prevention with Juniper Networks Firewalls
Delivered OnlineFlexible Dates
Price on Enquiry

Level - 5 British Cleaning Certificate

By Training Tale

Level - 5 British Cleaning Certificate
Delivered Online On Demand3 hours 42 minutes
£12

Winter Safety Training Fundamentals

By Online Training Academy

Hey there! Considering the modern world's unpredictable winters, mastering Winter Safety is crucial for your well-being and those around you. This course covers Winter Safety Fundamentals, emphasizing safe snow management, injury prevention, and awareness of carbon monoxide risks. You'll learn essential skills like emergency readiness and safe winter activity practices, along with mastering the art of winter driving. The benefits are immense: not only will you stay safe during harsh conditions, but you'll also gain confidence in handling winter-related emergencies. These skills aren't just for your own safety-they can be life-saving for others too. Enroll in this course today to equip yourself with invaluable knowledge in Winter Safety and ensure a safer winter for everyone. Key Features: CPD Certified Winter Safety Training Course Free Certificate from Reed CIQ Approved Winter Safety Training Course Developed by Specialist Lifetime Access Course Curriculum Module 01: Winter Safety Fundamentals Module 02: Well-being in Winter Module 03: Safe Snow Management Techniques Module 04: Injury Prevention in Winter Module 05: Carbon Monoxide Awareness Module 06: Safety in Winter Activities Module 07: Winter Driving Mastery Module 08: Emergency Readiness for Winter Learning Outcomes: Grasp essential winter safety principles for a secure seasonal experience. Understand winter health practices, fostering personal well-being in colder climates. Master safe shovelling and snow-blowing techniques to prevent injuries effectively. Acquire skills to avoid slips, falls, and manage cold-related injuries confidently. Implement preventive measures against carbon monoxide poisoning during winter months. Navigate winter sports, driving challenges, and emergencies with enhanced safety awareness. CPD 10 CPD hours / points Accredited by CPD Quality Standards Winter Safety Training Fundamentals 2:36:29 1: Module 1: Winter Safety Fundamentals Preview 13:42 2: Module 2: Well-being in Winter 23:24 3: Module 3: Safe Snow Management Techniques 15:56 4: Module 4: Injury Prevention in Winter 21:28 5: Module 5: Carbon Monoxide Awareness 17:37 6: Module 6: Safety in Winter Activities 25:38 7: Module 7: Winter Driving Mastery 18:48 8: Module 8: Emergency Readiness for Winter 18:56 9: CPD Certificate - Free 01:00 Who is this course for? This Winter Safety Training course is accessible to anyone eager to learn more about this topic. Through this course, you'll gain a solid understanding of Winter Safety Training. Moreover, this course is ideal for: Individuals seeking comprehensive winter safety knowledge for personal well-being. Outdoor enthusiasts and sports enthusiasts preparing for winter activities. Homeowners, ensuring safe practices during snow removal and icy conditions. Drivers wanting to master safe driving skills in winter weather. Emergency response personnel enhancing winter-specific emergency preparedness. Requirements There are no requirements needed to enrol into this Winter Safety Training course. We welcome individuals from all backgrounds and levels of experience to enrol into this Winter Safety Training course. Career path After finishing this Winter Safety Training course you will have multiple job opportunities waiting for you. Some of the following Job sectors of Winter Safety Training are: Snow Clearing Operative - £18K to 25K/year. Winter Maintenance Technician - £22K to 28K/year. Emergency Response Coordinator - £28K to 35K/year. Winter Sports Instructor - £20K to 30K/year. Fleet Manager - £30K to 40K/year. Certificates Digital certificate Digital certificate - Included Reed Courses Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.

Winter Safety Training Fundamentals
Delivered Online On Demand2 hours 36 minutes
£12

Creative Problem Solving

By Centre for Competitiveness

Firefighting or solving the same problems week after week? Create a problem-solving culture in your business with this proven methodology.

Creative Problem Solving
Delivered in Belfast or UK Wide or OnlineFlexible Dates
Price on Enquiry

Risk Assessment at Work

5.0(1)

By LearnDrive UK

Empower yourself with crucial risk management skills in the workplace through our Risk Assessment course. Learn to identify, measure, and mitigate risks effectively, ensuring a safer and more resilient work environment. Ideal for professionals seeking to enhance workplace safety and decision-making.

Risk Assessment at Work
Delivered Online On Demand1 hour
£5

Cisco Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security engineer Network engineer Network designer Network administrator Systems engineer Consulting systems engineer Technical solutions architect Network manager Cisco integrators and partners Overview After taking this course, you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW) Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco© CCNP© Security and CCIE© Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower© Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch© Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. Describing Information Security Concepts* Information Security Overview Assets, Vulnerabilities, and Countermeasures Managing Risk Vulnerability Assessment Understanding Common Vulnerability Scoring System (CVSS) Describing Common TCP/IP Attacks* Legacy TCP/IP Vulnerabilities IP Vulnerabilities Internet Control Message Protocol (ICMP) Vulnerabilities TCP Vulnerabilities User Datagram Protocol (UDP) Vulnerabilities Attack Surface and Attack Vectors Reconnaissance Attacks Access Attacks Man-in-the-Middle Attacks Denial of Service and Distributed Denial of Service Attacks Reflection and Amplification Attacks Spoofing Attacks Dynamic Host Configuration Protocol (DHCP) Attacks Describing Common Network Application Attacks* Password Attacks Domain Name System (DNS)-Based Attacks DNS Tunneling Web-Based Attacks HTTP 302 Cushioning Command Injections SQL Injections Cross-Site Scripting and Request Forgery Email-Based Attacks Describing Common Endpoint Attacks* Buffer Overflow Malware Reconnaissance Attack Gaining Access and Control Gaining Access via Social Engineering Gaining Access via Web-Based Attacks Exploit Kits and Rootkits Privilege Escalation Post-Exploitation Phase Angler Exploit Kit Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Stateful Firewall Overview Security Intelligence Overview Threat Information Standardization Network-Based Malware Protection Overview Intrusion Prevention System (IPS) Overview Next Generation Firewall Overview Email Content Security Overview Web Content Security Overview Threat Analytic Systems Overview DNS Security Overview Authentication, Authorization, and Accounting Overview Identity and Access Management Overview Virtual Private Network Technology Overview Network Security Device Form Factors Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Network Address Translation Cisco ASA Interface Access Control Lists (ACLs) Cisco ASA Global ACLs Cisco ASA Advanced Access Policies Cisco ASA High Availability Overview Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Cisco Firepower NGFW Network Address Translation (NAT) Cisco Firepower NGFW Prefilter Policies Cisco Firepower NGFW Access Control Policies Cisco Firepower NGFW Security Intelligence Cisco Firepower NGFW Discovery Policies Cisco Firepower NGFW IPS Policies Cisco Firepower NGFW Malware and File Policies Deploying Email Content Security Cisco Email Content Security Overview Simple Mail Transfer Protocol (SMTP) Overview Email Pipeline Overview Public and Private Listeners Host Access Table Overview Recipient Access Table Overview Mail Policies Overview Protection Against Spam and Graymail Anti-virus and Anti-malware Protection Outbreak Filters Content Filters Data Loss Prevention Email Encryption Deploying Web Content Security Cisco Web Security Appliance (WSA) Overview Deployment Options Network Users Authentication Secure HTTP (HTTPS) Traffic Decryption Access Policies and Identification Profiles Acceptable Use Controls Settings Anti-Malware Protection Deploying Cisco Umbrella* Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Managing Cisco Umbrella Cisco Umbrella Investigate Overview and Concepts Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Keys in Cryptography Public Key Infrastructure Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps IPsec Static Virtual Tunnel Interface Dynamic Multipoint VPN Cisco IOS FlexVPN Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs Cisco IOS VTIs Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies Secure Sockets Layer (SSL) Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Cisco ASA Remote Access VPN Configuration Cisco Firepower NGFW Remote Access VPN Configuration Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Cisco Identity Services Engine Cisco TrustSec Describing 802.1X Authentication 802.1X and Extensible Authentication Protocol (EAP) EAP Methods Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications RADIUS Change of Authorization Configuring 802.1X Authentication Cisco Catalyst© Switch 802.1X Configuration Cisco Wireless LAN Controller (WLC) 802.1X Configuration Cisco Identity Services Engine (ISE) 802.1X Configuration Supplicant 802.1x Configuration Cisco Central Web Authentication Describing Endpoint Security Technologies* Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Application Whitelists and Blacklists Host-Based Malware Protection Sandboxing Overview File Integrity Checking Deploying Cisco Advanced Malware Protection (AMP) for Endpoints* Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Cisco AMP Device and File Trajectory Managing Cisco AMP for Endpoints Introducing Network Infrastructure Protection* Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Network Telemetry Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Deploying Control Plane Security Controls* Infrastructure ACLs Control Plane Policing Control Plane Protection Routing Protocol Security Deploying Layer 2 Data Plane Security Controls* Overview of Layer 2 Data Plane Security Controls Virtual LAN (VLAN)-Based Attacks Mitigation Sp

Cisco Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX for Intrinsic Security [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Use NSX segmentation to implement Zero-Trust Security Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware Aria Operations™ for Logs and VMware Aria Operations™ for Networks to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX NDR This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX© for intrinsic security. This course introduces all the security features in NSX, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© NDR?. In addition, this course presents common configuration issues and gives a methodology to resolve them. Course Introduction Introduction and course logistics Course objectives Security Basics Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX and VMware Identity Manager? Integrate NSX and LDAP Describe the native users and roles in NSX Create and assign custom user roles Explain object-based RBAC in a multitenancy environment Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Configure the distributed firewall to block malicious IPs Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use VMware Aria Operations for Logs and VMware Aria Operations for Networks to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX NDR Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX NDR and its use cases Explain the architecture of NSX NDR in NSX Describe the visualization capabilities of NSX NDR Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX for Intrinsic Security [V4.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX for Intrinsic Security [V4.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX for Intrinsic Security [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX-T Data Center for Intrinsic Security [V3.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Implement Zero-Trust Security using VMware NSX segmentation Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware vRealize Log Insight™ for NSX™ and VMware vRealize Network Insight™ to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX Network Detection and Response This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX-T? Data Center for intrinsic security. In this course, you are introduced to all the security features in NSX-T Data Center, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© Network Detection and Response?.In addition, you are presented with common configuration issues and given a methodology to resolve them. Course Introduction Introductions and course logistics Course objectives Security Basics Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX-T Data Center aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust Architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX-T Data Center and VMware Identity Manager? Integrate NSX-T Data Center and LDAP Describe the native users and roles in NSX-T Data Center Create and assign custom user roles Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use vRealize Log Insight for NSX and vRealize Network Insight to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX Network Detection and Response Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX Network Detection and Response and its use cases Explain the architecture of NSX Network Detection and Response in NSX-T Data Center Describe the visualization capabilities of NSX Network Detection and Response

VMware NSX-T Data Center for Intrinsic Security [V3.2]
Delivered OnlineFlexible Dates
Price on Enquiry