Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces
Overview The course begins by introducing credit risk, its components and its drivers. The course then dives into business risk assessment and group structure risks. After examining financial statements, including accounting concepts and principles, the course concludes with a review of financial analysis and its four main risk areas.
Overview This course examines the major tools, techniques, and principles aimed at improving quality and productivity in the public sector. To provide students with practical methods for improving public organizations, this course will cover accountability systems, performance measurement, pay-for-performance reward systems, contracting out, and organizational assessment
Overview This training course will empower you to recognize the root causes of fraud and white-collar crime in the current economy, understand the categories of fraud, equip you with methodologies of fraud detection and prevention, and heighten your ability to detect potential fraudulent situations. In addition to the fundamentals of fraud investigation and detection in a digital environment; profit-loss evaluation, analysis of accounting books, legal concepts, and quantification of financial damages are also examined in this course
Overview This five-day workshop provides a detailed review of significant IFRS requirements for the upstream oil and gas sector, including regulatory reporting and the diverse accounting practices that arise from the many commercial and contracting arrangements which are unique to it. It includes coverage of IFRSs, hands-on case studies, examples, exercises, and benefits from the interactive participation of the attendees. The program includes the latest pronouncements, and participants are brought up-to-date on all topics. In addition, participants are provided with information to assist them in researching accounting issues and monitoring future changes.
Overview With the major responsibility of managing finances, managers have also responsibilities to write and control budgets. They face a number of decisions that need planning and forecasting, especially preparing budgets. Using examples and exercises from the gas and oil industry, this course is designed to break down all sorts of financial restrictions in an informative yet engaging style. It will provide the necessary skills to develop efficient strategic planning, forecasting and budgeting processes. The main aim of the training is to enable the participants to understand the framework that builds strategies for annual budgets targeting efficient management and organisational performance. Our course will explain financial terms and budgeting tools in such a way that a financial professional or even a non-financial profession will be able to understand and relate to in their working environment. It will include a lot of examples, a budgeting format and case studies.
Learn the skills of a Crime Scene Investigator ... Explore the exciting world of the Forensic Investigator in this unforgettable interactive experience day. You will spend the day using real forensic methods and techniques to perform a range of established crime scene investigations. All investigations that you perform are "hands-on", giving you the opportunity to learn how these procedures work in real life. Your day will include: DRUG TESTING: Perform a drugs test! The suspect was carrying a small plastic bag of a white substance when arrested. He was known to police as a cocaine dealer. Was he carrying cocaine? Carry out chemical tests to establish if the white powder was cocaine? FINGERPRINTING: Learn how to lift and record fingerprints using the conventional dusting process to detect and preserve fingerprints. MICROSCOPY: Use a light microscope to forensically examine crime scene samples. Discover how to use different magnifying powers to optimise the results. FABRIC SAMPLE ANALYSIS: Compare samples collected at the crime scene and on the suspect to identify human hairs. SOIL ANALYSIS: Analyse soil samples collected from the crime scene and compare against soil recovered from the suspect's shoes. Identify which soil sample is common between both crime scene and suspect. Use chemical tests to confirm your results. TOOL MARK IDENTIFICATION: You have a known tool impression from the crime scene. Use forensic casting techniques to create clay impressions and compare with a range of tools recovered from the suspect's tool shed. Which tool did he use? BLOOD DETECTION: Blood-like stains were found at the crime scene. Before sending samples to the forensic lab we need to establish if they are blood samples. Use established forensic tests and procedures to identify blood spots and stains that may not be visible to the naked eye. DNA EXTRACTION: Perform an extraction procedure to extract DNA from samples provided. You will be able to see (and feel) actual DNA once you have completed the process! Awards a Certificate of Completion OPEN TO ALL APPLICANTS LOCATIONS THROUGHOUT THE U.K. AFTER THE COURSE … Understand the breadth of career opportunities available to you in nearly 100 specific disciplines of forensic science, including: Forensic Art Forensic Photography Wildlife Forensics Forensic Statistics Entomology Cypercrime and Cyper-IT Forensic Meteorology DNA analysis Counterfeiting & Forgery Casts & Impressions incl. tyres & shoes and many more! Appreciate the difference in roles between Forensic Scientist posts and Crime Scene Investigator posts. Understand that there are many forensic posts in niche areas that may benefit from existing transferrable skills (such as IT). Apply qualifications and skills acquired to parallel fields such as teaching. For a more detailed overview please see our "Opportunities in Forensic Science" guide.
Lean Six Sigma Green Belt Certification Program: In-House Training This learning series is designed to enable participants to fulfill the important role of a Lean Six Sigma Green Belt and to incorporate the Lean Six Sigma mindset into their leadership skills. Green Belt is not just a role, it is also a competency required for leadership positions at many top companies. This learning series is designed to enable participants to fulfill the important role of a Lean Six Sigma Green Belt and to incorporate the Lean Six Sigma mindset into their leadership skills. With a real-world project focus, the series will teach the fundamental methodology, tools, and techniques of the Define, Measure, Analyze, Improve and Control Process Improvement Methodology. This course is delivered through sixteen 3-hour online sessions. What you Will Learn At the end of this program, you will be able to: Identify strategies for effectively leading high performing process improvement teams Analyze whether projects align with business strategy Apply process improvement methodologies to DMAIC steps, based on real world scenarios Explain ways to appropriately respond to process variation Distinguish among best practice problem solving methodologies Evaluate and effectively communicate data-driven decisions, based on real world scenarios Introduction Lean Six Sigma & quality The vision The methodologies The metric Project Selection Why Projects Random idea generation Targeted idea generation CTQs (Critical to Quality) & projects Project screening criteria Quick improvements Introduction to Define Project Planning Developing the core charter Developing a project charter Facilitation Process Management Business process management Top-down process mapping Voice of the Customer Voice of Customer Stakeholder analysis Communication planning Kicking off the project Define Summary Introduction to Measure Data Collection Fact-based decision making Data sampling Operations definitions Data collection plan Measurement system analysis Graphical Statistics for Continuous Data Meet Six SigmaXL Graphical & statistical tools Data stratification Graphical Statistics for Discrete Data Pareto analysis Dot plots Plotting data over time: Looking for patterns Variation Concepts Variation is reality Special Cause and Common Cause variation Example of standard business reporting Individuals Control Chart Process Capability Genesis of process capability Calculating the metrics of Six Sigma Yield metrics: Measuring process efficiency Cost of Poor Quality The Cost of Poor Quality (COPQ) Cost of Quality categories Calculating the Cost of Poor Quality Measure Summary Introduction to Analyze Process Analysis Introduction to process analysis Value-added analysis Cycle time analysis WIP & pull systems Analyzing bottlenecks and constraints Cause & Effect Analysis Fishbone/Ishikawa diagram 5-Whys analysis Graphical & statistical tools Advanced Analysis Why use hypothesis rests? Hypothesis tests Correlation and regression analysis Analyze Summary Introduction to Improve Solutions Creativity techniques Generating alternative solutions Solution selection techniques Introduction to Design of Experiments Introduction to DOE DOE activity Error Proofing Failure mode & effect analysis Poka-Yoke Project Management Fundamentals Successful teams Project roles Conflict management Standardization Standardization The Visual Workplace 5S Piloting & Verifying Results What is a pilot? Evaluating results Improve Summary Introduction to Control Statistical Process Control Review of Special & Common Cause variation Review of Individual Control Chart P-Chart for discrete proportion data Transition Planning Control plan Project closure Control Summary Summary and Next Steps
Overview To understand the course thoroughly, you need to understand the practical application of the theory along with case studies as well as relevant examples. IT Project Management course will include those areas in managing the processes and activities related to guaranteeing the success of IT projects.
Overview This course will provide participants with an introduction to the key elements to consider in analysing financial institutions for example factors used in the assessment of the operational performance of financial institutions including but not limited to solvency, liquidity, earnings, management and systems/controls. The program will primarily cover banking institutions but there will also be some sessions devoted to risks associated with insurance companies.