• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

355 Firewall courses delivered Online

Red Hat System Administrator III - Data Center Services for RHEL7 (RH254)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for #NAME? Overview At the completion of this course, students already familiar with the RHCT/RHCSA administration skills will have exposure to all competencies tested by the RHCSA and RHCE exams. If you are an experienced Linux© system administrator and hold a Red Hat Certified System Administrator (RHCSA©) credential or possess equivalent skills and want to broaden your ability to administer Linux systems at an enterprise level, this is the perfect course.The course will empower you to deploy and manage network servers running caching domain name service (DNS), MariaDB, Apache HTTPD, Postfix SMTP null clients, network file sharing with network file system (NFS) and server message block (SMB), iSCSI initiators and targets, advanced networking and firewall configurations, and to use bash shell scripting to help automate, configure, and troubleshoot your system. Through lectures and hands-on labs, you will be exposed to all competencies covered by the Red Hat Certified Engineer (RHCE) exam (EX300), supplementing what you have already learned in earning your RHCSA credential.This course is based on Red Hat© Enterprise Linux 7. Getting Started with the Classroom Environment Given a virtualized environment, begin to administrate multiple systems using prerequisite skills Enhance User Security Configure system to use Kerberos to verify credentials and grant privileges via sudo Bash Scripting and Tools Automate system administration tasks utilizing Bash scripts and text-based tools File Security with GnuPG Secure files with GnuPG. Software Management Use yum plugins to manage packages and understand the design of packages to build a simple package Network Monitoring Profile running services then capture and analyze network traffic Route Network Traffic Configure system to route traffic and customize network parameters with sysctl Secure Network Traffic Secure network traffic through SSH port forwarding and iptables filtering/network address translation (NAT) NTP Server Configuration Configure an NTP server Filesystems and Logs Manage local file system integrity, monitor system over time, and system logging Centralized and Secure Storage Access centralized storage (iSCSI) and encrypt filesystems SSL-encapsulated Web Services Understand SSL certificates and deploy an SSL encapsulated web service Web Server Additional Configuration Configure web server with virtual hosts, dynamic content, and authenticated directories Basic SMTP Configuration Configure an SMTP server for basic operation (null client, receiving mail, smarthost relay) Caching-Only DNS Server Understand DNS resource records and configure a caching-only name server File Sharing with NFS Configure file sharing between hosts with NFS File Sharing with CIFS Configure file and print sharing between hosts with CIFS File Sharing with FTP Configure file sharing with anonymous FTP Troubleshooting Boot Process Understand the boot process and recover unbootable systems with rescue mode

Red Hat System Administrator III - Data Center Services for RHEL7 (RH254)
Delivered OnlineFlexible Dates
Price on Enquiry

Advanced Juniper Networks VPN Implementations

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for network engineers, network support personnel, and reseller support. Overview After successfully completing this course, you should be able to:Configure LAN-to-LAN IP Security (IPsec) VPNs in various configurations. Configure VPN redundancy. Configure dynamic routing using IPsec VPNs. Configure remote access IPsec connectivity including group Internet Key Exchange (IKE) and shared IKE. Configure generic routing encapsulation (GRE) tunnels. This intermediate-level course focuses on the wide range of options available when configuring virtual private networks (VPNs) using Juniper Networks firewall/VPN products. Students attending the course will learn these various deployments through detailed lectures and hands-on lab exercises. Chapter 1: Course IntroductionChapter 2: ScreenOS VPN Basics Review VPN Review Verifying Operations VPN Monitor Lab: VPN Review Chapter 3: VPN Variations Dynamic Peers Transparent Mode Overlapping Addresses Lab: VPN Variations Chapter 4: Hub-and-Spoke VPNs Concepts Policy-Based Hub-and-Spoke VPNs Route-Based Hub-and-Spoke VPNs with No Policy and NHTB Route-Based Hub-and_Spoke VPNS with Policy Centralized Control Hub-and-Spoke VPNs ACVPNs Lab: Hub-and-Spoke VPNs Chapter 5: Routing over VPNs Routing Overview Configuring RIP Configuring OSPF Case Studies Lab: Dynamic Routing Chapter 6: Using Certificates Concepts and Terminology Configuring Certificates and Certificate Support Configuring VPNs with Certificates Lab: Using Certificates Chapter 7: Redundant VPN Gateways (Optional) Redundant VPN Gateways Other Options Demonstration: Redundant VPN Gateways Chapter 8: Generic Routing Encapsulation (Optional) Configuring GRE Chapter 9: Dial-Up IPsec VPNs (Optional) Basic Dial-Up Configuration Group IKE ID XAUTH and Shared IKE ID Additional course details: Nexus Humans Advanced Juniper Networks VPN Implementations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced Juniper Networks VPN Implementations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Advanced Juniper Networks VPN Implementations
Delivered OnlineFlexible Dates
Price on Enquiry

Computer Networks Security

5.0(10)

By Apex Learning

Overview This comprehensive course on Computer Networks Security will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Computer Networks Security comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Computer Networks Security. It is available to all students, of all academic backgrounds. Requirements Our Computer Networks Security is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 12 sections • 52 lectures • 08:08:00 total length •Introduction: 00:10:00 •1.1 Computer Network: 00:11:00 •1.2 Computer Network Topologies: 00:11:00 •1.3 Categories of Computer Network: 00:10:00 •1.4 Computer Network Devices: 00:11:00 •1.5 Transmission Media: 00:09:00 •2.1 ISO/OSI Model: 00:10:00 •2.2 Application, Presentation, and Session Layers: 00:12:00 •2.3 Transport and Network Layers: 00:11:00 •2.4 Data Link and Physical Layers: 00:09:00 •2.5 ISO/OSI Model in Action: 00:10:00 •3.1 Introduction to Computer Networks Protocols: 00:11:00 •3.2 IP Protocol: 00:13:00 •3.3 TCP and UDP Protocols: 00:12:00 •3.4 Application Protocols: 00:12:00 •3.5 TCP/IP Characteristics and Tools: 00:11:00 •4.1 Wireless Networks Benefits: 00:09:00 •4.2 Types of Wireless Networks: 00:12:00 •4.3 Wireless Networks Protocol (Wi-Fi): 00:07:00 •4.4 Wireless Networks Devices: 00:10:00 •4.5 Wireless Networks Drawbacks: 00:09:00 •5.1 Security Goals: 00:09:00 •5.2 Securing the Network Design: 00:10:00 •5.3 TCP/IP Security and Tools: 00:12:00 •5.4 Port Scanning and Tools: 00:11:00 •5.5 Sniffing and Tools: 00:10:00 •6.1 Reasons to Use Firewall: 00:13:00 •6.2 Firewalls Rules: 00:11:00 •6.3 Firewalls Filtering: 00:09:00 •6.4 Honeypots: 00:07:00 •6.5 Bypassing Firewalls: 00:08:00 •7.1 Intrusion Detection System: IDS: 00:11:00 •7.2 Network IDS: NIDS: 00:06:00 •7.3 NIDS Challenges: 00:09:00 •7.4 Snort as NIDS: 00:08:00 •7.5 Intrusion Prevention Systems: IPS: 00:07:00 •8.1 Wired Equivalent Privacy WEP Attacking: 00:11:00 •8.2 WPA and AES Protocols: 00:09:00 •8.3 Wireless Security Misconceptions: 00:09:00 •8.4 Wireless Attacks and Mitigation: 00:09:00 •8.5 Secure Network Design with Wireless: 00:09:00 •9.1 Physical Security Objectives: 00:11:00 •9.2 Physical Threats and Mitigation: 00:11:00 •9.3 Defense in Depth (DiD): 00:07:00 •9.4 Incident: 00:06:00 •9.5 Incident Handling: 00:14:00 •10.1 Confidentiality, Integrity, and Availability (CIA): 00:06:00 •10.2 Assets, Threats, and Vulnerabilities: 00:04:00 •10.3 Risks and Network Intrusion: 00:06:00 •10.4 Common Attacks: 00:09:00 •10.5 Security Recommendations: 00:06:00 •Assignment - Computer Networks Security: 00:00:00

Computer Networks Security
Delivered Online On Demand8 hours 8 minutes
£12

Red Hat System Administration I (RH124)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is geared toward Windows system administrators, network administrators, and other system administrators who are interested in supplementing current skills or backstopping other team members, in addition to Linux system administrators who are responsible for these tasks: Configuring, installing, upgrading, and maintaining Linux systems using established standards and procedures, Providing operational support, Managing systems for monitoring system performance and availability, Writing and deploying scripts for task automation and system administration. Overview #NAME? Red Hat System Administration I (RH124) equips you with Linux© administration "survival skills" by focusing on foundational Linux concepts and core tasks. You will learn how to apply command-line concepts and enterprise-level tools, starting you on your journey toward becoming a full-time Linux system administrator. This path continues with the follow-on course, Red Hat System Administration II (RH134). 1 - Getting Started with the GNOME Graphical Desktop Get started with GNOME and edit text files with gedit 2 - Manage Files Graphically with Nautilus Manage files graphically and access remote systems with Nautilus 3 - Get Help in a Graphical Environment Access documentation, both locally and online 4 - Configure Local Services Configure the date and time and configure a printer 5 - Manage Physical Storage Understand basic disk concepts and manage system disks 6 - Manage Logical Volumes Understand logical volume concepts and manage logical volumes 7 - Monitor System Resources Manage memory and CPU utilization 8 - Manage System Software Manage system software locally and using Red Hat Network (RHN) 9 - Get Started with Bash Understand basic shell concepts, execute simple commands, and use basic job control techniques 10 - Get Help in a Textual Environment Use man and info pages and find documentation in /usr/share/doc 11 - Establish Network Connectivity Understand basic network concepts; configure, manage, and test network settings 12 - Administer Users and Groups Manage users and groups 13 - Manage Files from the Command Line Understand Linux filesystem hierarchy; manage files from the command line 14 - Secure Linux File Access Understand Linux file access mechanisms; manage file access from the GUI and the command line 15 - Administer Remote Systems Share and connect to a desktop; use SSH and rsync 16 - Configure General Services Manage services; configure SSH and remote desktops 17 - Manage Physical Storage II Manage filesystem attributes and swap space 18 - Install Linux Graphically Install Red Hat Enterprise Linux and configure the system with firstboot 19 - Manage Virtual Machines Understand basic virtualization concepts; install and manage virtual machines 20 - Control the Boot Process Understand runlevels and manage GRUB 21 - Deploy File Sharing Services Deploy an FTP server and a web server 22 - Secure Network Services Manage a firewall; understand SELinux concepts and manage SELinux 23 - Comprehensive Review Get a hands-on review of the concepts covered throughout the course

Red Hat System Administration I (RH124)
Delivered OnlineFlexible Dates
Price on Enquiry

IT Administration, Networking, Cyber Security Awareness Training & GDPR - 20 Courses Bundle

By NextGen Learning

Get ready for an exceptional online learning experience with the IT Administration, Networking, Cyber Security Awareness Training & GDPR bundle! This carefully curated collection of 20 premium courses is designed to cater to a variety of interests and disciplines. Dive into a sea of knowledge and skills, tailoring your learning journey to suit your unique aspirations. The IT Administration, Networking, Cyber Security Awareness Training & GDPR is a dynamic package, blending the expertise of industry professionals with the flexibility of digital learning. It offers the perfect balance of foundational understanding and advanced insights. Whether you're looking to break into a new field or deepen your existing knowledge, the IT Administration package has something for everyone. As part of the IT Administration, Networking, Cyber Security Awareness Training & GDPR package, you will receive complimentary PDF certificates for all courses in this bundle at no extra cost. Equip yourself with the IT Administration bundle to confidently navigate your career path or personal development journey. This Bundle Comprises the Following CPD Accredited Courses: IT Administration and Networking Encryption Advance Windows 10 Troubleshooting for IT HelpDesk Building Your Own Computer Cyber Security Awareness Training Secure Programming of Web Applications Cloud Computing / CompTIA Cloud+ (CV0-002) CompTIA A+ (220-1001) Data Center Training Essentials: General Introduction Information Management Bash Scripting, Linux and Shell Programming Learn Ethical Hacking From A-Z: Beginner To Expert Computer Networks Security from Scratch to Advanced GDPR UK Training Cisco ASA Firewall Training Course Career Development Plan Fundamentals CV Writing and Job Searching Learn to Level Up Your Leadership Networking Skills for Personal Success Ace Your Presentations: Public Speaking Masterclass Learning Outcome: By completing the IT Administration, Networking, Cyber Security Awareness Training & GDPR bundle , you will be able to: Gain comprehensive insights into multiple fields. Foster critical thinking and problem-solving skills across various disciplines. Understand industry trends and best practices through the IT Administration Bundle. Develop practical skills applicable to real-world situations. Enhance personal and professional growth with the IT Administration. Build a strong knowledge base in your chosen course via IT Administration. Benefit from the flexibility and convenience of online learning. With the IT Administration package, validate your learning with a CPD certificate. Embrace the future of learning with the IT Administration, Networking, Cyber Security Awareness Training & GDPR, a rich anthology of 15 diverse courses. Each course in the IT Administration, bundle is handpicked by our experts to ensure a wide spectrum of learning opportunities. This IT Administration, Networking, Cyber Security Awareness Training & GDPR bundle will take you on a unique and enriching educational journey. The bundle encapsulates our mission to provide quality, accessible education for all. Whether you are just starting your career, looking to switch industries, or hoping to enhance your professional skill set, the IT Administration, Networking, Cyber Security Awareness Training & GDPR bundle offers you the flexibility and convenience to learn at your own pace. Make the IT Administration, package your trusted companion in your lifelong learning journey. Enrol IT Administration, Networking, Cyber Security Awareness Training & GDPR bundle today and start your career growth! CPD 205 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The IT Administration, Networking, Cyber Security Awareness Training & GDPR bundle is perfect for: Lifelong learners looking to expand their knowledge and skills. Professionals seeking to enhance their career with CPD certification. Individuals wanting to explore new fields and disciplines. Anyone who values flexible, self-paced learning from the comfort of home. Requirements Without any formal requirements, you can delightfully enrol in this IT Administration, Networking, Cyber Security Awareness Training & GDPR course. Career path Unleash your potential with the IT Administration, Networking, Cyber Security Awareness Training & GDPR bundle. Acquire versatile skills across multiple fields, foster problem-solving abilities, and stay ahead of industry trends. Ideal for those seeking career advancement, a new professional path in IT. Certificates Certificate Of Completion Digital certificate - Included Certificate Of Completion Hard copy certificate - Included You will get a complimentary Hard Copy Certificate.

IT Administration, Networking, Cyber Security Awareness Training & GDPR - 20 Courses Bundle
Delivered Online On Demand5 days
£79

VMware SD-WAN: Deploy and Manage [V4.x]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced system administrators, network administrators, and system integrators responsible for designing and implementing networking solutions Network and security professionals who work with enterprise and data center networks Overview By the end of the course, you should be able to meet the following objectives: Discuss the SD-WAN architecture and platform deployment model options Identify and describe the SD-WAN solution components Explain the interaction between the SD-WAN Edge, Orchestrator, and Gateway components Describe the SD-WAN Software-Defined Networking (SDN) approach, traffic, and network flows Explore SD-WAN core features and evaluate how these dramatically improve operational automation Use SD-WAN features to perform simple, agile, and secure SD-WAN operations Simplify branch infrastructure by inserting network services on the branch edge, in the cloud, or in the regional and enterprise data centers This course provides you with the knowledge, skills, and tools to achieve competency in deploying and managing the VMware SD-WAN by VeloCloud environment. In this course, you are introduced to workflows of various software-defined WAN constructs along with several operational tools that help you deploy and manage VMware SD-WAN by VeloCloud. Course Introduction Introductions and course logistics Course objectives Introduction to VMware SD-WAN Solution Revisit the traditional WAN technology, WAN topologies and downsides Explain the challenges solved by Secure Access Service Edge (SASE) and use cases List the components of the VMware SASE? solution Describe the VMware SD-WAN solution and list its capabilities VMware SD-WAN Components and Architecture Understand the architecture of the VMware SD-WAN solution and list all its components Explain the function of VMware SD-WAN Edges, Hub, Gateways, controllers, and Orchestrator Explain how the components of the VMware SD-WAN solution interact with each other Using VMware SD-WAN Orchestrator Describe key attributes of the VMware SD-WAN Orchestrator List primary features of the VMware SD-WAN Orchestrator Navigate the main menus of the VMware SD-WAN Orchestrator portal Deploy and Configure VMware SD-WAN Understand the deployment process of VMware SD-WAN components like VMware SD-WAN Edges, Hubs, Gateways, and more Understand the workflow of the VMware SD-WAN configuration List the optional network services that are supported by VMware and the steps to configure the same Understand the profiles and their application in the VMware SD-WAN infrastructure Describe the VMware SD-WAN Edge activation process Path and Traffic Management List the routing options supported by VMware SD-WAN: Static, BGP, OSPF Understand the Dynamic Multipath Optimization (DMPO) feature and its advantages Explain the Quality of Service and its configuration to manage traffic Securing VMware SD-WAN Environment Explain various options available to secure VMware SD-WAN environments. Understand the firewall capabilities and configuration Monitoring, Maintenance, and Troubleshooting List and understand the various features available to monitor the VMware SD-WAN infrastructure List and understand the various options available to troubleshoot and investigate issues in VMware SD-WAN

VMware SD-WAN: Deploy and Manage [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry

70-685 - Enterprise Desktop Support Technician for Windows 7

4.3(43)

By John Academy

Description: The purpose of 70-685 - Enterprise Desktop Support Technician for Windows 7 course is to teach you how to configure and deploy a private cloud with System Center 2012 R2. Throughout the course, you will know the ways of understanding and work with the cloud, the cloud components, including infrastructure and service catalog, and virtual applications. The course guides you how to use VMM or install VMM to deploy the cloud. You will also be introduced to host groups and security systems. After completing the course, you will be able to work with Private Cloud Infrastructures. You will also be able to learn dynamic application deployment, server application virtualization, web deployment packages, server App-V components and sequencing and deploying virtual apps. After that, the course will help you to understand the essential components of Private Cloud including SQL server profiles, OS profiles, application profiles, hardware profiles, VM templates and self-service user role. In the course, you will gain information about the Private Cloud computing, installing and configuring app controller and creating and managing services and service templates. Finally, you will know about server management, automation and security for the cloud. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? 70-685 - Enterprise Desktop Support Technician for Windows 7 is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our 70-685 - Enterprise Desktop Support Technician for Windows 7 is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Identifying Cause and Resolving Desktop Application Issues Identifying Cause and Resolving Desktop Application Issues FREE 00:17:00 Problem Steps Recorder 00:31:00 Other Group Policy Settings 00:15:00 AppLocker Advantages 00:27:00 Windows Installer 00:16:00 WSUS 00:29:00 Browsing History 00:13:00 Operating System Troubleshooting and Support Operating System Troubleshooting and Support 01:03:00 Safe Mode Options 00:48:00 Event Forwarding 00:16:00 Windows 7 and Language Packs 00:21:00 Networking with Windows 7 Networking with Windows 7 00:52:00 Automatic Configuration 00:18:00 TCP IP Configuration 01:12:00 IPv6 00:28:00 IPSec 00:23:00 Configuring Security and Troubleshooting Issues Configuring Security and Troubleshooting Issues 00:51:00 Windows Firewall with Advanced Security 00:45:00 Protecting the PC Proactively 00:18:00 Supporting Mobile Users Supporting Mobile Users 00:36:00 Remote Assistance 00:22:00 Maintaining Hardware on Windows 7 Maintaining Hardware on Windows 7 00:21:00 Working with Hard Drive Issues 00:48:00 Common Components 00:21:00 Power Management 00:21:00 Centralizing Configurations Centralizing Configurations 00:16:00 Administrative Templates 00:22:00 User Login, Profiles and Access to Resources User Login, Profiles and Access to Resources 00:29:00 DHCP 00:41:00 Configuring Offline Files - Client Side 00:21:00 Mock Exam Mock Exam- 70-685 - Enterprise Desktop Support Technician for Windows 7 00:20:00 Final Exam Final Exam- 70-685 - Enterprise Desktop Support Technician for Windows 7 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

70-685 - Enterprise Desktop Support Technician for Windows 7
Delivered Online On Demand15 hours 41 minutes
£24

Aruba ClearPass Essentials, Rev. 20.11

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Ideal candidates include network professionals who are looking to build their foundational knowledge of the ClearPass product portfolio. Overview After you successfully complete this course, expect to be able to: Ability to setup ClearPass as a AAA server Demonstrate Configuration Guest, OnGurad, Onboard and Profiling features Integrate with External AD Server Understand Monitoring and Reporting Demonstrate Scaling and deployment of best practices Configure AAA services for both wired and wireless networks Demonstrate the configuration of Aruba Downloadable User Roles. Demonstrate the configuration of Dynamic Segmentation with Aruba switches. This course prepares participants with foundational skills in Network Access Control using the ClearPass product portfolio. This 5-day classroom session includes both instructional modules and labs to teach participants about the major features of the ClearPass portfolio. Participants will learn how to setup ClearPass as an AAA server, and configure the Policy Manager, Guest, OnGuard and Onboard feature sets. In addition, this course covers integration with external Active Directory servers, Monitoring and Reporting, as well as deployment best practices. The student will gain insight into configuring authentication with ClearPass on both wired and wireless networks. Intro to ClearPass BYOD High Level Overview Posture and Profiling Guest and Onboard ClearPass for AAA Policy Service Rules Authentication Authorization and Roles Enforcement Policy and Profiles Authentication and Security Concepts Authentication Types Servers Radius COA Active Directory Certificates Intro to NAD NAD Devices Adding NAD to ClearPass Network Device Groups Network Device Attributes Aruba Controller as NAD Aruba Switch Aruba Instant Monitoring and Troubleshooting Monitoring Troubleshooting Logging Policy Simulation ClearPass Insight Insight Dashboard Insight Reports Insight Alerts Insight Search Insight Administration Insight Replication Active Directory Adding AD as Auth Source Joining AD domain Using AD services External Authentication Multiple AD domains LDAP Static Host Lists SQL Database External Radius Server Guest Guest Account creation Web Login pages Guest Service configuration Self-registration pages Configuring NADS for Guest Guest Manager Deep Dive Web Login Deep Dive Sponsor Approval MAC Caching Onboard Intro to Onboard Basic Onboard Setup Onboard Deepdive Single SSID Onboarding Dual SSID Onboarding Profiling Intro to Profiling Endpoint Analysis Deep Dive Posture Intro to Posture Posture Deployment Options OnGuard Agent Health Collection OnGuard workflow 802.1x with Posture using Persistent/dissolvable agent OnGuard web Login Monitoring and Updates Operation and Admin Users Operations Admin Users Clustering and Redundancy Clustering Redundancy LAB Licensing ClearPass Licensing Base License Applications ClearPass Exchange Intro Examples General HTTP Palo Alto Firewall Configuration Case Study Objectives Discussion Advanced Labs Overview Wired Port Authentication 802.1X for access layer switch ports Profiling on Wired Network Configuration of Dynamic Segmentation Aruba Downloadable User Roles Downloadable User Role Enforcement in ClearPass Aruba Controller/Gateway configuration Aruba Switch configuration Troubleshooting

Aruba ClearPass Essentials, Rev. 20.11
Delivered OnlineFlexible Dates
Price on Enquiry

AZ-030T00-A: Microsoft Azure technologies for AWS architects

By Nexus Human

Duration 3.5 Days 21 CPD hours This course is intended for This course is for AWS Cloud Architects with expertise in designing and implementing solutions running on AWS who now want to design for Microsoft Azure. Overview After completing this course, students will be able to: Secure identities with Azure Active Directory and users and groups. Implement identity solutions spanning on-premises and cloud-based capabilities Apply monitoring solutions for collecting, combining, and analyzing data from different sources. Manage subscriptions, accounts, Azure policies, and Role-Based Access Control. Administer Azure using the Resource Manager, Azure portal, Cloud Shell, and CLI. Configure intersite connectivity solutions like VNet Peering, and virtual network gateways. Administer Azure App Service, Azure Container Instances, and Kubernetes. This course teaches Solutions Architects who have previously designed for Amazon Web Services how to translate business requirements into secure, scalable, and reliable solutions for Azure. Introduction to Azure Subscriptions and accounts Resource groups and templates in Azure Resource Manager Azure global infrastructure Azure regions Azure Availability Zones Comparison with AWS Implement Azure Active Directory Introduction to Azure Active Directory Domains and custom domains Safety features Guest users in Azure Active Directory Manage multiple directories Comparison with AWS Implement and manage hybrid identities Introduction to Azure AD Connect Comparison with AWS Implement virtual networking Azure Virtual Network and VNet peering VPN and ExpressRoute connections Comparison with AWS Implement VMs for Windows and Linux Configure high availability Comparison with AWS Implement load balancing and network security Implement Azure Load Balancer Implement an Azure Application Gateway Implement Azure Firewall Implement network security groups and application security groups Comparison with AWS Implement container-based applications Configure Azure Kubernetes Service Publish a solution on an Azure Container Instance Comparison with AWS Implement an application infrastructure Create an App Service plan Create and configure Azure App Service Configure networking for an App Service Introduction to Logic Apps and Azure Functions Comparison with AWS Implement storage accounts Azure Storage core concepts Managing the Azure Blob storage lifecycle Working with Azure Blob storage Comparison with AWS Implement NoSQL databases Introduction to Azure Cosmos DB Consistency Select appropriate CosmosDB APIs Set up replicas in CosmosDB Comparison with AWS DynamoDB Implement Azure SQL databases Configure Azure SQL database settings Implement Azure SQL Database managed instances Configure high availability for an Azure SQL database Comparison with AWS Implement cloud infrastructure monitoring Monitor security Monitor cost Configure a Log Analytics workspace Comparison with AWS Implement and manage Azure governance solutions Assign RBAC roles Configure management access to Azure Implement and configure an Azure Policy Comparison with AWS Manage security for applications Implement Azure Key Vault Implement and configure Azure AD Managed Identities Register and manage applications in Azure AD Comparison with AWS Migration, backup, and disaster recovery management Migrate workloads Implement Azure Backup for VMs Implement disaster recovery Comparison with AWS

AZ-030T00-A: Microsoft Azure technologies for AWS architects
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IT professionals with five to eight years of experience in these roles: Data center engineers Network designers Network administrators Network engineers Systems engineers System administrator Consulting systems engineers Technical solutions architects Server administrators Network managers Cisco integrators or partners Overview After taking this course, you should be able to: Describe the Layer 2 and Layer 3 forwarding options and protocols used in a data center Describe the rack design options, traffic patterns, and data center switching layer access, aggregation, and core Describe the Cisco Overlay Transport Virtualization (OTV) technology that is used to interconnect data centers Describe Locator/ID separation protocol Design a solution that uses Virtual Extensible LAN (VXLAN) for traffic forwarding Describe hardware redundancy options; how to virtualize the network, compute, and storage functions; and virtual networking in the data center Describe solutions that use fabric extenders and compare Cisco Adapter Fabric Extender (FEX) with single root input/output virtualization (SR-IOV) Describe security threats and solutions in the data center Describe advanced data center security technologies and best practices Describe device management and orchestration in the data center Describe the storage options for compute function and different Redundant Array of Independent Disks (RAID) levels from a high-availability and performance perspective Describe Fibre Channel concepts, topologies, architecture, and industry terms Describe Fibre Channel over Ethernet (FCoE) Describe security options in the storage network Describe management and automation options for storage networking infrastructure Describe Cisco UCS servers and use cases for various Cisco UCS platforms Explain the connectivity options for fabric interconnects for southbound and northbound connections Describe the hyperconverged solution and integrated systems Describe the systemwide parameters for setting up a Cisco UCS domain Describe role-based access control (RBAC) and integration with directory servers to control access rights on Cisco UCS Manager Describe the pools that may be used in service profiles or service profile templates on Cisco UCS Manager Describe the different policies in the service profile Describe the Ethernet and Fibre Channel interface policies and additional network technologies Describe the advantages of templates and the difference between initial and updated templates Describe data center automation tools The Designing Cisco Data Center Infrastructure (DCID) v7.0 course helps you master design and deployment options focused on Cisco© data center solutions and technologies across network, compute, virtualization, storage area networks, automation, and security. You will learn design practices for the Cisco Unified Computing System? (Cisco UCS©) solution based on Cisco UCS B-Series and C-Series servers, Cisco UCS Manager, and Cisco Unified Fabric. You will also gain design experience with network management technologies including Cisco UCS Manager, Cisco Data Center Network Manager (DCNM), and Cisco UCS Director. This course helps you prepare to take the exam, Designing Cisco Data Center Infrastructure (300-610 DCID) Describing High Availability on Layer 2 Overview of Layer 2 High-Availability Mechanisms Virtual Port Channels Cisco Fabric Path Virtual Port Channel+ Designing Layer 3 Connectivity First Hop Redundancy Protocols Improve Routing Protocol Performance and Security Enhance Layer 3 Scalability and Robustness Designing Data Center Topologies Data Center Traffic Flows Cabling Challenges Access Layer Aggregation Layer Core Layer Spine-and-Leaf Topology Redundancy Options Designing Data Center Interconnects with Cisco OTV Cisco OTV Overview Cisco OTV Control and Data Planes Failure Isolation Cisco OTV Features Optimize Cisco OTV Evaluate Cisco OTV Describing Locator/ID Separation Protocol Locator/ID Separation Protocol Location Identifier Separation Protocol (LISP) Virtual Machine (VM) Mobility LISP Extended Subnet Mode (ESM) Multihop Mobility LISP VPN Virtualization Describing VXLAN Overlay Networks Describe VXLAN Benefits over VLAN Layer 2 and Layer 3 VXLAN Overlay Multiprotocol Border Gateway Protocol (MP-BGP) Ethernet VPN (EVPN) Control Plane Overview VXLAN Data Plane Describing Hardware and Device Virtualization Hardware-Based High Availability Device Virtualization Cisco UCS Hardware Virtualization Server Virtualization SAN Virtualization N-Port ID Virtualization Describing Cisco FEX Options Cisco Adapter FEX Access Layer with Cisco FEX Cisco FEX Topologies Virtualization-Aware Networking Single Root I/O Virtualization Cisco FEX Evaluation Describing Basic Data Center Security Threat Mitigation Attack and Countermeasure Examples Secure the Management Plane Protect the Control Plane RBAC and Authentication, Authorization, and Accounting (AAA) Describing Advanced Data Center Security Cisco TrustSec in Cisco Secure Enclaves Architecture Cisco TrustSec Operation Firewalling Positioning the Firewall Within Data Center Networks Cisco Firepower© Portfolio Firewall Virtualization Design for Threat Mitigation Describing Management and Orchestration Network and License Management Cisco UCS Manager Cisco UCS Director Cisco Intersight Cisco DCNM Overview Describing Storage and RAID Options Position DAS in Storage Technologies Network-Attached Storage Fibre Channel, FCoE, and Internet Small Computer System Interface (iSCSI) Evaluate Storage Technologies Describing Fibre Channel Concepts Fibre Channel Connections, Layers, and Addresses Fibre Channel Communication Virtualization in Fibre Channel SAN Describing Fibre Channel Topologies SAN Parameterization SAN Design Options Choosing a Fibre Channel Design Solution Describing FCoE FCoE Protocol Characteristics FCoE Communication Data Center Bridging FCoE Initialization Protocol FCoE Design Options Describing Storage Security Common SAN Security Features Zones SAN Security Enhancements Cryptography in SAN Describing SAN Management and Orchestration Cisco DCNM for SAN Cisco DCNM Analytics and Streaming Telemetry Cisco UCS Director in the SAN Cisco UCS Director Workflows Describing Cisco UCS Servers and Use Cases Cisco UCS C-Series Servers Fabric Interconnects and Blade Chassis Cisco UCS B-Series Server Adapter Cards Stateless Computing Cisco UCS Mini Describing Fabric Interconnect Connectivity Use of Fabric Interconnect Interfaces VLANs and VSANs in a Cisco UCS Domain Southbound Connections Northbound Connections Disjoint Layer 2 Networks Fabric Interconnect High Availability and Redundancy Describing Hyperconverged and Integrated Systems Hyperconverged and Integrated Systems Overview Cisco HyperFlex? Solution Cisco HyperFlex Scalability and Robustness Cisco HyperFlex Clusters Cluster Capacity and Multiple Clusters on One Cisco UCS Domain External Storage and Graphical Processing Units on Cisco HyperFlex Cisco HyperFlex Positioning Describing Cisco UCS Manager Systemwide Parameters Cisco UCS Setup and Management Cisco UCS Traffic Management Describing Cisco UCS RBAC Roles and Privileges Organizations in Cisco UCS Manager Locales and Effective Rights Authentication, Authorization, and Accounting Two-Factor Authentication Describing Pools for Service Profiles Global and Local Pools Universally Unique Identifier (UUID) Suffix and Media Access Control (MAC) Address Pools World Wide Name (WWN) Pools Server and iSCSI Initiator IP Pools Describing Policies for Service Profiles Global vs. Local Policies Storage and Basic Input/Output System (BIOS) Policies Boot and Scrub Policies Intelligent Platform Management Interface (IPMI) and Maintenance Policies Describing Network-Specific Adapters and Policies LAN Connectivity Controls SAN Connectivity Controls Virtual Access Layer Connectivity Enhancements Describing Templates in Cisco UCS Manager Cisco UCS Templates Service Profile Templates Network Templates Designing Data Center Automation Model-Driven Programmability Cisco NX-API Overview Programmability Using Python Cisco Ansible Module Use the Puppet Agent Additional course details: Nexus Humans Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID)
Delivered OnlineFlexible Dates
Price on Enquiry