• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

668 Identity courses in Nottingham delivered Online

Oracle 12c SQL Fundamentals

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The target audience for this textbook is all Oracle professionals, both business and systems professionals. Among the specific groups for whom this textbook will be helpful are: ? Business and non-IT professionals ? Application designers and database developers ? Business Intelligence (BI) analysts and consumers ? Database administrators ? Web server administrators Overview The first portion of this textbook considers the logical models upon which a relational database is based and the various configurations and environments in which you may work with the Oracle database. The next segment focuses on the actual SQL syntax for writing database queries. You will begin with the simplest of queries and then proceed onto moderately complex query scenarios. Finally, this textbook covers the DDL, DML and transaction control portions of the SQL language that allow one to create, maintain and manipulate application database objects and application data. This textbook takes a unique approach to SQL training in that it incorporates data modeling theory, relational database theory, graphical depictions of theoretical concepts and numerous examples of actual SQL syntax into one learning vehicle. Relational Databases & Data Models About Data Models About the Relational Model The Electronics Data Model About the Relational DBMS Selection & Setup of the Database Interface Considering Available Tools Selecting the Appropriate Tool Oracle Net Database Connections Oracle PAAS Database Connections Setup SQL Developer Setup SQL*Plus Setup Jdeveloper Using the Database Interface About Bind & Substitution Variables Using SQL Developer Using SQL*Plus Introduction to the SQL Language About the SQL Language Characteristics of SQL Introducing SQL Using Select SQL Rules The Select Statement The Select Statement Distinct/Unique Keyword Using Alias Names Restricting Results with the Where Clause About Logical Operators Equality Operator Boolean Operators REGEXP_LIKE() In Operator Sorting Data with the Order By Clause About the Order by Clause Multiple Column Sorts Specify the Sort Sequence About Null Values within Sorts Using Column Aliases Pseudo Columns, Functions & Top-N Queries Rowid Pseudo Column ORA_ROWSCN PSEUDO Column ROWNUM Pseudo Column About the Built-In Functions SYSDATE User & UID SESSIONTIMEZONE Function Using the Dual Table Row Limiting & Top-N Queries FETCH First x Rows Only Clause OFFSET x Rows Clause FETCH?PERCENT Clause The WITH TIES Option Joining Tables About Joins Inner Joins Reflexive Join Non-Key Join Outer Join Using the Set Operators About the Set Operators SQL Set Operator Examples UNION Example INTERECT Example MINUS Example UNION All Summary Functions Using Sub-Queries Finding Data with Sub-Queries Standard Sub-Queries Correlated Sub-Queries The EXISTS Operator Aggregating Data within Groups About Summary Groups Find Groups within the Tables Select Data From the Base Tables Select Groups from the Results Use DDL to Create & Manage Tables Create Table Statement Column Data Types Not Null Default Describe Alter Table Statement Drop Table Statement Table DDL Using SQL Developer Alter User Statement Alter Session Statement NLS_Language NLS_Date Use DML to Manipulate Data The Insert Statement The Delete Statement The Update Statement About Transactions Transaction Rollback Transaction Commit Transaction Savepoint The Set Transaction Statement Set Transaction Read Only Statement Rules Understanding the Data Models The Company Data Model The Electronics Data Model About the SQL-99 Standard SQL-92 & SQL-99 Cross Joins Natural Joins Inner Joins Implicit Inner Join Outer Joins Anti Joins Named Sub-Queries Enhancing Groups with Rollup & Cube Using Rollup The Grouping() Function Using Cube SQL Functions: Character Handling What are the SQL Functions? String Formatting Functions UPPER(), LOWER() Example INITCAP() Example Character Codes Functions CHR((), ASCII() Examples PAD & TRIM Functions RPAD() Example RTRIM() Example TRIM() Example String Manipulation Functions DECODE () Example SUBSTR() Example INSTR() Example TRANSLATE() Example REPLACE() Example String Comparison Functions LEAST() Example Phonetic Search Function SOUNDEX() Example SQL Functions: Numeric Handling About the Numeric Data Functions GREATEST() Example ABS() Example ROUND() Example TRUNC() Example SIGN() Example TO_NUMBER() Example & Data ype Conversions NULL VALUES FUNCTIONS NVL() & NVL2() Function NVL() Example (Character) NVL() Example (Numeric Loss of Data) NVL() Example (Numeric Output) NVL2() Example COALESCE() Function NULLIF() Function SQL Functions: Date Handling Date Formatting Functions TO_CHAR() & TO_DATE() Format Patterns TO_CHAR() Examples TO_DATE() Examples EXTRACT() Example Date Arithmetic Functions MONTHS_BETWEEN() Example ADD_MONTHS() Example LAST_DAY() Example NEXT_DAY() Example TRUNC(), ROUND() Dates Example NEW_ TIME() Example About V$TIMEZONE_NAMES CAST() FUNCTION & TIME ZONES Database Objects: About Database Objects About Database Objects About Schemas Making Object References Database Objects: Relational Views About Relations Views The Create View Statement Why Use Views? Accessing Views with DML Maintaining View Definitions Alter View Drop View DDL Using SQL Developer Database Objects: Indexes About Indexes Create & Drop Index Statements Indexes & Performance Data Dictionary Storage Database Objects: Creating Other Objects About Sequences Referencing NEXTVAL Referencing CURRVAL Within the DEFAULT Clause Alter Sequence & Drop Sequence ALTER SEQUENCE DROP SEQUENCE About Identity Columns CREATE TABLE?GENERATED AS IDENTITY ALTER TABLE?GENERATED AS IDENTITY Start With Limit Value ALTER TABLE...DROP IDENTITY About Synonyms CREATE & DROP SYNONYM Statements CREATE SYNONYM DROP SYNONYM Public Vs Private Synonyms CREATE SCHEMA AUTHORIZATION Database Objects: Object Management Using DDL The RENAME Statement TABLESPACE Placement CREATE TABLE?TABLESPACE The Comment Statement The TRUNCATE TABLE Statement Database Objects: Security About Object Security Grant Object Privileges Revoke Object Privileges Object Privileges & SQL Developer Data Integrity Using Constraints About Constraints NOT NULL Constraint NOT NULL Example CHECK Constraint UNIQUE Constraint PRIMARY KEY Constraint REFERENCES Constraint ON DELETE CASCADE Example ON DELETE SET NULL Example Constraints on Existing Tables Constraints & SQL Developer Managing Constraint Definitions RENAMING & DROPPING Constraints ENABLING & DISABLING Constraints DEFERRED Constraint Enforcement SET CONSTRAINTS Handling Constraint Exceptions Constraints with Views DATA Dictionary Storage The Data Dictionary Structure More About the Data Dictionary OBJECT-SPECIFIC Dictionary Views USER_UPDATABLE_COLUMNS The Dictionary Structure METADATA & SQL Developer Additional course details: Nexus Humans Oracle 12c SQL Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 12c SQL Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle 12c SQL Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry

Marketing Your Hypnotherapy Business M3

5.0(22)

By The Northern College Of Clinical Hypnotherapy

Welcome to the workshop on Marketing Your Hypnotherapy Business, where we delve into essential strategies to elevate your professional presence and attract a steady flow of clients. Today, we focus on entrepreneurial skills and actionable marketing techniques to drive your business forward.

Marketing Your Hypnotherapy Business M3
Delivered Online On Demand1 hour
£25

Exploring The Arts Through Cultural Anthropology

By The Teachers Training

Exploring The Arts Through Cultural Anthropology For centuries, art and culture have been the heartbeats of human civilization, weaving stories of creativity and identity across time and space. This Exploring The Arts Through Cultural Anthropology is not just a course. it's a journey through human expression! Dive into the vibrant meeting of art and culture with our course. The journey begins with an introduction that sets the stage for a fascinating exploration of diverse artistic expressions across cultures. As you progress, each unit unfolds a new aspect of how art is both a mirror and a maker of the cultural landscapes we inhabit. From the captivating visuals of paintings and sculptures to the rhythm and grace of music and dance, and the evocative world of theatre, this Exploring The Arts Through Cultural Anthropology course is a kaleidoscope of human creativity. The conclusion ties together these diverse strands, offering a comprehensive understanding of the intricate relationship between the arts and cultural anthropology. So if you are looking to learn about these subjects and grow more in your personal and professional life, enrol in the Exploring The Arts Through Cultural Anthropology course today! What Will You Learn? After enrolling in this Exploring The Arts Through Cultural Anthropology course, you will be able to: Explore the history of art and its cultural significance. Analyze visual arts from different cultures, decoding their hidden meanings. Decode the power of words through verbal art across societies. Immerse yourself in the rhythms and melodies of global music and dance. Uncover the theatrical traditions that reflect human narratives. Gain insights into the interplay of culture, identity, and artistic expression. Cultivate critical thinking skills through anthropological analysis. Develop a global perspective on the arts and their role in society. Why Choose Teachers Training Some of our website features are: This is a dedicated website for teaching 24/7 tutor support Interactive Content Affordable price Courses accredited by the UK's top awarding bodies 100% online Flexible deadline Entry Requirements No formal entry requirements. You need to have: Passion for learning A good understanding of the English language Be motivated and hard-working Over the age of 16. Certification CPD Certification from The Teachers Training Successfully completing the MCQ exam of this course qualifies you for a CPD-accredited certificate from The Teachers Training. You will be eligible for both PDF copy and hard copy of the certificate to showcase your achievement however you wish. You can get your digital certificate (PDF) for £4.99 only Hard copy certificates are also available, and you can get one for only £10.99 You can get both PDF and Hard copy certificates for just £12.99! The certificate will add significant weight to your CV and will give you a competitive advantage when applying for jobs. Unit 01: Introduction Welcome to Class 00:01:00 What is Anthropology? 00:04:00 Understanding Other Cultures 00:05:00 Why Study the Arts? 00:03:00 Unit 02: Art & Culture Introduction 00:01:00 What is Art? 00:05:00 Art & Culture 00:05:00 Functions of Art 00:06:00 Conclusion 00:01:00 Assignment 00:01:00 Answer 00:03:00 Unit 03: Visual Arts Introduction 00:01:00 Visual Art 00:08:00 Rock Art 00:05:00 Body Arts 00:08:00 Graffiti 00:06:00 Conclusion 00:01:00 Assignment 00:01:00 Answer 00:03:00 Unit 04: Verbal Art Introduction 00:01:00 Myths 00:04:00 Legends 00:03:00 Tales 00:04:00 Conclusion 00:01:00 Assignment 00:01:00 Answer 00:02:00 Unit 05: Music & Dance Introduction 00:02:00 Why Do We Have Music? 00:05:00 Creation and Function of Music 00:07:00 Dance & Culture 00:04:00 Functions of Dance 00:04:00 Conclusion 00:01:00 Assignment 00:01:00 Answer 00:02:00 Unit 06: Theatre Introduction 00:02:00 Theatre & Media 00:02:00 Theatre & Performers 00:03:00 Theatre & Content 00:02:00 Theatre & Audience Role 00:02:00 Conclusion 00:02:00 Assignment 00:01:00 Answer 00:02:00 Unit 07: Conclusion Course Summary 00:06:00 Real-World Connections 00:02:00 Be Like an Anthropologist! 00:03:00 Congratulations! 00:01:00 Bonus Lecture 00:01:00 Resources Resources - Cultural Anthropology: Explore the Arts 00:00:00

Exploring The Arts Through Cultural Anthropology
Delivered Online On Demand2 hours 19 minutes
£27.99

AWS Security Governance at Scale

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, security DevOps, and security engineers Overview In this course, you will learn to: Establish a landing zone with AWS Control Tower Configure AWS Organizations to create a multi-account environment Implement identity management using AWS Single Sign-On users and groups Federate access using AWS SSO Enforce policies using prepackaged guardrails Centralize logging using AWS CloudTrail and AWS Config Enable cross-account security audits using AWS Identity and Access Management (IAM) Define workflows for provisioning accounts using AWS Service Catalog and AWS Security Hub Security is foundational to AWS. Governance at scale is a new concept for automating cloud governance that can help companies retire manual processes in account management, budget enforcement, and security and compliance. By automating common challenges, companies can scale without inhibiting agility, speed, or innovation. In addition, they can provide decision makers with the visibility, control, and governance necessary to protect sensitive data and systems.In this course, you will learn how to facilitate developer speed and agility, and incorporate preventive and detective controls. By the end of this course, you will be able to apply governance best practices. Course Introduction Instructor introduction Learning objectives Course structure and objectives Course logistics and agenda Module 1: Governance at Scale Governance at scale focal points Business and Technical Challenges Module 2: Governance Automation Multi-account strategies, guidance, and architecture Environments for agility and governance at scale Governance with AWS Control Tower Use cases for governance at scale Module 3: Preventive Controls Enterprise environment challenges for developers AWS Service Catalog Resource creation Workflows for provisioning accounts Preventive cost and security governance Self-service with existing IT service management (ITSM) tools Module 4: Detective Controls Operations aspect of governance at scale Resource monitoring Configuration rules for auditing Operational insights Remediation Clean up accounts Module 5: Resources Explore additional resources for security governance at scale Additional course details: Nexus Humans AWS Security Governance at Scale training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Governance at Scale course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Security Governance at Scale
Delivered OnlineFlexible Dates
Price on Enquiry

Borderline Personality Disorder Awareness Course

3.5(2)

By Elearncollege

Description Borderline Personality Disorder Awareness Diploma  A mental illness with many names- BPD, Emotional Regulation Disorder, and Emotionally Unstable Personality, is too often misunderstood and misrepresented. The Borderline Personality Disorder Awareness Diploma course aims at providing accurate and comprehensive information about the disorder. Through the course, the students will gain a deep understanding of Borderline Personality Disorder (BPD), what it is, what symptoms it has, how it is diagnosed, and the available treatments. This Borderline Personality Disorder Awareness Diploma course starts with a broad introduction to BPD. It discusses the mental condition, providing the fundamental facts that will be the foundation for more detailed information that will be included in the course as it progresses. Every person who has the condition shows different sets of symptoms, and the reasons that underlie the cause of the condition are different for every patient. The Borderline Personality Disorder Awareness Diploma course will help you discover various ways the symptoms show in other people according to the different kinds of BPD that a person may have. BPD symptoms are seen among patients with other mental disorders, leading to people being misdiagnosed with another condition and some who do not have BPD being diagnosed with BPD. The course will teach you how the condition is diagnosed and the possible causes of this mental health condition. The Borderline Personality Disorder Awareness Diploma course also discusses the typical treatments for BPD, the limitations of the healthcare system in treating BPD, and alternative treatments that are available that can help people alleviate the symptoms of the disorder. The mental health condition, just like many other mental health conditions, is shrouded in misconceptions and myths, which are all too common. The course tries to clear this mystery by looking at these common misconceptions and showing what the condition is, including the treatment of such disorders in the media and the negative impacts this brings on people's perception of the illness. The Borderline Personality Disorder Awareness Diploma Course will help you express your support to yourself, other family members, friends, or patients working in the healthcare sector.  Assisting students with Borderline Personality Disorder (BPD) in knowing themselves, what triggers them, and managing symptoms is covered in this Borderline Personality Disorder Awareness Diploma course. What you will learn   1: Understanding BPD  2: Signs and Symptoms of BPD  3: Risk Factors of BPD  4: Impulsivity and BPD  5: Identity Issues with BPD 6: Dissociation from Reality in BPD 7: Fighting with BPD 8: Identifying Impulsivity 9: Understanding Other's Perspectives  10: Getting Along with Friends with BPD  Course Outcomes After completing the course, you will receive a diploma certificate and an academic transcript from Elearn college. Assessment Each unit concludes with a multiple-choice examination. This exercise will help you recall the major aspects covered in the unit and help you ensure that you have not missed anything important in the unit. The results are readily available, which will help you see your mistakes and look at the topic once again. If the result is satisfactory, it is a green light for you to proceed to the next chapter. Accreditation Elearn College is a registered Ed-tech company under the UK Register of Learning( Ref No:10062668). After completing a course, you will be able to download the certificate and the transcript of the course from the website. For the learners who require a hard copy of the certificate and transcript, we will post it for them for an additional charge.

Borderline Personality Disorder Awareness Course
Delivered Online On Demand9 days
£99

CompTIA Security+ (SY0-601)

4.8(9)

By Skill Up

In today's world, cyber security is more important than ever. With the increasing sophistication of cyberattacks, it is essential for businesses and organizations of all sizes to have a strong security posture in place. The CompTIA Security+ (SY0-601) course is the perfect way to get started in the world of cyber security.

CompTIA Security+ (SY0-601)
Delivered Online On Demand21 hours 59 minutes
£25

Starting a Business or Social Enterprise - The Stone Soup Way

4.3(43)

By John Academy

Embark on a transformative journey of entrepreneurship with 'Starting a Business or Social Enterprise - The Stone Soup Way.' Explore social impact, brand building, financial management, and more. Join us to create lasting change through purpose-driven ventures.

Starting a Business or Social Enterprise - The Stone Soup Way
Delivered Online On Demand1 hour
£23.99

Instagram Marketing

By Xpert Learning

About Course Instagram Marketing Mastery: Unleash the Power of Visual Storytelling to Grow Your Business and Brand Embark on an immersive journey to Instagram marketing mastery and transform your social media presence into a powerful engine for business growth and brand recognition. Learning Outcomes/Course Objectives: Master Instagram's fundamentals: Gain a comprehensive understanding of Instagram's features, algorithms, and user behavior, laying the foundation for effective marketing strategies. Craft captivating visual content: Learn the art of creating visually appealing and engaging Instagram posts, utilizing storytelling techniques, editing tools, and design principles. Harness the power of hashtags: Discover the secrets of effective hashtag usage to increase your content's visibility, reach a wider audience, and attract targeted followers. Develop a growth strategy: Implement proven strategies to grow your Instagram following organically, attracting genuine and engaged users who align with your brand's values. Build a consistent brand identity: Establish a cohesive and recognizable brand presence on Instagram, reinforcing your brand's message, voice, and visual aesthetic. Leverage influencer marketing: Explore the potential of influencer marketing to amplify your brand's reach, tap into new audiences, and boost your credibility. Utilize third-party tools: Discover and effectively utilize third-party tools to enhance your Instagram marketing efforts, streamline content creation, and gain valuable insights. Target Audience: Business owners: Entrepreneurs and established business leaders seeking to harness the power of Instagram to expand their reach, connect with a wider audience, and drive business growth. Marketing professionals: Marketers eager to integrate Instagram into their overall marketing strategy, leveraging its visual storytelling capabilities to enhance brand awareness, generate leads, and drive sales. Content creators: Aspiring and experienced content creators seeking to master Instagram's unique format, create captivating visuals, and build a thriving online community. Anyone interested in social media marketing: Individuals passionate about exploring the latest social media trends and leveraging Instagram for personal or professional endeavors. Requirements: An Instagram account: Create an Instagram account to actively participate in the platform and apply the course learnings. Basic knowledge of social media marketing: Familiarity with social media marketing principles and best practices will enhance your understanding of Instagram marketing strategies. Enthusiasm and willingness to learn: An open mind and a willingness to experiment with Instagram's creative tools and features will fuel your success in this dynamic platform. Enroll today and unlock the secrets to Instagram marketing mastery, transforming your social media presence into a powerful tool for business growth and brand recognition. What Will You Learn? Master Instagram's fundamentals: Gain a comprehensive understanding of Instagram's features, algorithms, and user behavior, laying the foundation for effective marketing strategies. Craft captivating visual content: Learn the art of creating visually appealing and engaging Instagram posts, utilizing storytelling techniques, editing tools, and design principles. Harness the power of hashtags: Discover the secrets of effective hashtag usage to increase your content's visibility, reach a wider audience, and attract targeted followers. Develop a growth strategy: Implement proven strategies to grow your Instagram following organically, attracting genuine and engaged users who align with your brand's values. Build a consistent brand identity: Establish a cohesive and recognizable brand presence on Instagram, reinforcing your brand's message, voice, and visual aesthetic. Leverage influencer marketing: Explore the potential of influencer marketing to amplify your brand's reach, tap into new audiences, and boost your credibility. Utilize third-party tools: Discover and effectively utilize third-party tools to enhance your Instagram marketing efforts, streamline content creation, and gain valuable insights. Course Content Instagram Marketing 3 Things You Should Never Do When Using Instagram Marketing 3 Ways to Produce More Instagram Content 5 Tips for Better Hashtags 5 Tips to Grow Your Instagram Audience Faster How to Create a Consistent Instagram Account to Grow Your Audience Massively How to Create a Strong Brand for Your Instagram How to Sell the Dream How to Set Up Your Instagram Business Account in 5 Easy Steps How to Use Influencer Marketing on Instagram to Accelerate Your How to Win at Instagram Without Taking a Single Photo A course by eTrain Course Provider Xpert Learning RequirementsAn Instagram account: Create an Instagram account to actively participate in the platform and apply the course learnings.Basic knowledge of social media marketing: Familiarity with social media marketing principles and best practices will enhance your understanding of Instagram marketing strategies.Enthusiasm and willingness to learn: An open mind and a willingness to experiment with Instagram's creative tools and features will fuel your success in this dynamic platform. Audience Business Owners Marketing Professionals Content creators Anyone interested in social media marketing: Audience Business Owners Marketing Professionals Content creators Anyone interested in social media marketing:

Instagram Marketing
Delivered Online On Demand
£9.99

VMware NSX for Intrinsic Security [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Use NSX segmentation to implement Zero-Trust Security Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware Aria Operations™ for Logs and VMware Aria Operations™ for Networks to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX NDR This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX© for intrinsic security. This course introduces all the security features in NSX, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© NDR?. In addition, this course presents common configuration issues and gives a methodology to resolve them. Course Introduction Introduction and course logistics Course objectives Security Basics Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX and VMware Identity Manager? Integrate NSX and LDAP Describe the native users and roles in NSX Create and assign custom user roles Explain object-based RBAC in a multitenancy environment Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Configure the distributed firewall to block malicious IPs Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use VMware Aria Operations for Logs and VMware Aria Operations for Networks to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX NDR Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX NDR and its use cases Explain the architecture of NSX NDR in NSX Describe the visualization capabilities of NSX NDR Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX for Intrinsic Security [V4.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX for Intrinsic Security [V4.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX for Intrinsic Security [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Nice Work x Jones Knowles Ritchie (JKR)

By Right Aligned

Our masterclass series goes behind the studio door and explores the processes of globally respected people, studios and businesses.

Nice Work x Jones Knowles Ritchie (JKR)
Delivered OnlineFlexible Dates
FREE to £100