Network forensics training course description This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. What will you learn Recognise network forensic data sources. Perform network forensics using: Wireshark NetFlow Log analysis Describe issues such as encryption. Network forensics training course details Who will benefit: Technical network and/or security staff. Prerequisites: TCP/IP foundation for engineers. Duration 3 days Network forensics training course contents What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.
Overview This course is a rare opportunity to acquire important leadership skills and use those newfound skills to gain the respect of co-workers and those you supervise. It's filled with insights into the special and often-overlooked talents women leaders can bring to the table and cutting-edge tactics successful women leaders are using right now to make things happen in their organizations.
Concise Cisco switches course description A hands on course covering the product specifics of Cisco switches. Installation, configuration, maintenance and troubleshooting are all covered in a practical oriented way. VLANs often take up a large part of the course. The course covers all interfaces but concentrates on using the command line interface. Delegates are, however, free to use the web based interface in all exercises. What will you learn Install Cisco switches. Use the command line interface and the web based interface to manage Cisco switches. Configure and troubleshoot Cisco switches. Perform software upgrades and maintain configurations using TFTP. Concise Cisco switches course details Who will benefit: Anyone working with Cisco switches. Particularly aimed at engineers and technicians supporting Cisco switches. Prerequisites: None. Duration 2 days Concise Cisco switches course content Ethernet review Single segment Ethernet, CSMA/CD, Broadcast domains, collision domains. Hubs, Extending the LAN. Hands on Hub based Ethernet. Cisco switches What are switches, frame forwarding and filtering, the forwarding database. Hands on Switched based Ethernet. Configuring Cisco switches Accessing the switch, installing the switch, The CLI, connecting PCs using the switch. Hands on Configuring Cisco switches. The command line interface User and privilege modes, online help, show, basic troubleshooting. The configuration editor, Global, major and sub commands, enable, secret and other passwords. Hands on Simple troubleshooting using the CLI. Port configuration Speed, duplex, security, trunking. Hands on Port trunking. Spanning Tree Protocol Spanning Tree, Loops, effect, root bridges, bridge port states, STP reconfiguration. RSTP and variants. Hands on STP. VLANS What are VLANs, configuring VLANs, access ports and trunks, 802.1Q, inter VLAN routing. Hands on Access ports, trunks, layer 3 switching. Housekeeping Configuration management, software management, password recovery. Hands on TFTP. Managing interconnection devices SNMP, RMON, RMON II. Troubleshooting LEDs, CDP, logging, Layer 1, layer 2, layer 3. Hands on Fixing things.
Effecting Business Process Improvement: In-House Training Business analysts facilitate the solution of business problems. The solutions are put into practice as changes to the way people perform in their organizations and the tools they use. The business analyst is a change agent who must understand the basic principles of quality management. This course covers the key role that business analysts play in organizational change management. What you will Learn You will learn how to: Define and document a business process Work with various business modeling techniques Perform an enterprise analysis in preparation for determining requirements Analyze business processes to discern problems Foundation Concepts Overview of business analysis and process improvement Defining the business process Introducing the proactive business analyst Focusing on business process improvement for business analysts Launching a Successful Business Process Improvement Project Overview of the launch phase Understanding and creating organizational strategy Selecting the target process Aligning the business process improvement project's goals and objectives with organizational strategy Defining the Current Process Overview of current process phase Documenting the business process Business modeling options: work-flow models Business modeling options: Unified Modeling Language (UML) model adaptations for business processes Analyzing the Current Process Process analysis overview Evaluation: establishing the control group Opportunity techniques: multi-discipline problem-solving Opportunity techniques: matrices Building and Sustaining a Recommended Process Overview of the recommended process and beyond Impact analysis Recommended process Transition to the business case Return to proactive state
Successful account management requires time and investment to achieve high levels of customer satisfaction and develop new business opportunities. Ensuring you are equipped with the right tools to approach every customer interaction in a structured way will help you have productive relationships with your clients. Whether you're new to account management or experienced in business development and looking to expand your skillset, understanding how you can maximise customer relationships will be key to your success. We have developed this programme to be practical, fun and interactive. Participants will have the opportunity to learn and practice a number of key skills that will see successful results, and are encouraged to bring real life examples to the course so that learning can be translated to real world scenarios. This course will help participants: Learn how to plan growth and increase revenue from existing accounts Develop skills to build and develop essential relationships to increase value and visibility Learn how best to create loyalty and customer satisfaction Identify how to set account targets and development plan for building contacts and cross-selling Develop persuasion and influencing skills to better define needs and develop opportunities Learn how to add value at all stages; plus gaining competitive advantage Develop an up-selling, cross-selling strategy 1 Performance metrics for account management Introduction to the PROFIT account management model Using practical tools to measure account performance and success Planning your account strategy - red flags and green lights 2 Relationships for account management How to build and manage key relationships Producing a 'relationship matrix' Developing a coach or advocate 3 Setting objectives for your account Developing an upselling cross-selling strategy Setting jointly agreed goals, objectives and business plans Planning session 4 Feedback and Retention - building loyal and satisfied customers How to monitor and track your customer's satisfaction Building a personalised satisfaction matrix Customer service review meetings 5 Influence Getting your message and strategy across to C-level contacts Being able to better develop a business partnership within an accountes 6 Teamwork and time management Working with others to achieve your account goals Managing and working with a virtual team Managing your time and accounts effectively 7 Gaining commitment and closing the sale Knowing when to close for commitment How to ask for commitment professionally and effectively Key negotiation skills around the closing process - getting to 'yes' Checklist of closing and negotiation skills Practice session
WhatsUp Gold training course description A hands on course focusing on network management using WhatsUp Gold. What will you learn Discover devices using WhatsUp Gold. Use WhatsUp Gold. Poll and monitor devices using WhatsUp Gold. Create Alarms, alerts and reports. Diagnose faults using WhatsUp Gold. Administrate a WhatsUp Gold system. WhatsUp Gold training course details Who will benefit: Technical staff working with WhatsUp Gold. Prerequisites: None. Duration 2 days WhatsUp Gold for engineers Getting started with WhatsUp Gold Starting WhatsUp Gold, manual discovery, automatic discovery, controlling IP discovery, mapping network devices. Hands on Using WhatsUp Gold. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. MIBs. Hands on Device discovery. Adding devices. Customising maps. Using WhatsUp Gold Polling, obtaining MIB information, MIB walking, Active monitors, critical monitors, passive monitors. Hands on Monitoring devices. Groups. MIB walking. SNMP trap monitor. Syslog monitor. Alarms Actions, Alert centre, thresholds, actions on events. Hands on Using the alert centre. Web tools. Reports Creating reports, automatic reports, customising reports. Hands on Performance reports. Graphs. Administration Users, backups, the database. Hands on Adding a user. Backups.
CCNP training course description The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.2 course provides the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You'll learn to implement security principles within an enterprise network and how to overlay network design using solutions such as SDAccess and SD-WAN. Course content includes 3 days of self-study material. This course helps you prepare for the 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) exam What will you learn Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Prepare you prepare to take the 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) exam CCNP training course details Who will benefit: Mid-level network engineers, Network administrators, Network support technicians, Help desk technicians. Prerequisites: Implementation of Enterprise LAN networks. Basic understanding of Enterprise routing and wireless connectivity, and Python scripting Duration 5 days CCNP training course content Cisco Enterprise Network Architecture: Access, distribution, core in the hierarchical network. Cisco Switching Paths: Switching mechanisms, TCAM, CAM, process switching, fast switching, and CEF. Implementing Campus LAN Connectivity: Troubleshoot L2 connectivity using VLANs and trunkingBuilding Redundant Switched Topology: STP Implementing Layer 2 Port Aggregation Troubleshoot link aggregation using Etherchannel EIGRP Implement and optimize OSPFv2/v3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4/v6 Implement EBGP interdomain routing, path selection, and single and dual-homed networkingImplementing Network Redundancy: HSRP and VRRP Implement static and dynamic NAT Virtualization Protocols and TechniquesVPNs and Interfaces: Overlay technologies such as VRF, GRE, VPN, and LISP Wireless Principles: RF, antenna characteristics, and wireless standards.Wireless Deployment: Models available, autonomous AP deployments and cloud-based designs within the centralized Cisco WLC architecture Wireless Roaming and Location ServicesWireless AP Operation: How APs communicate with WLCs to obtain software, configurations, and centralized managementWireless Client Authentication: EAP, WebAuth, and PSK wireless client authentication on a WLC. Troubleshoot wireless client connectivity issues using various available tools Troubleshoot networks using services such as NTP, SNMP, Cisco IP SLAs, NetFlow, and Cisco IOS EEM Explain network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshootingMulticast Protocols: IGMP v2/v3, PIM DM/SM and RPs Introducing QoS: Concepts and features. Implementing Network Services: Secure administrative access for Cisco IOS devices using CLI access, RBAC, ACL, and SSH, and device hardening concepts to secure devices from less secure applications Using Network Analysis ToolsInfrastructure Security: Scalable administration using AAA and the local database, features and benefits Enterprise Network Security Architecture: VPNs, content security, logging, endpoint security, personal firewalls, and other security features. Automation and Assurance with Cisco DNA Center: Purpose, function, features, and workflow. Intent-Based Networking, for network visibility, proactive monitoring, and application experienceCisco SD-Access Solution: Nodes, fabric control plane, and data plane, VXLAN gatewaysCisco SD-WAN Solution: Components and features of Cisco SD-WAN solutions, including the orchestration, management, control, and data planesBasics of Python Programming: Python components and conditionals with script writing and analysis Network Programmability: NETCONF and RESTCONF APIs in Cisco DNA Center and vManage Labs: Investigate the CAM. Analyze CEF. Troubleshoot VLAN and Trunk Issues. Tuning STP and Configuring RSTP. Configure MSTP. Troubleshoot EtherChannel. Implement Multi-area OSPF. Implement OSPF Tuning. Apply OSPF Optimization. Implement OSPFv3. Configure and Verify Single-Homed EBGP. Implementing HSRP. Configure VRRP. Implement NAT. Configure and Verify VRF. Configure and Verify a GRE Tunnel. Configure Static VTI Point-to-Point Tunnels. Configure Wireless Client Authentication in a Centralized Deployment. Troubleshoot Wireless Client Connectivity Issues. Configure Syslog. Configure and Verify Flexible NetFlow. Configuring Cisco IOS EEM. Troubleshoot Connectivity and Analyze Traffic with Ping, Traceroute, and Debug. Configure and Verify Cisco IP SLAs. Configure Standard and Extended ACLs. Configure Control Plane Policing. Implement Local and Server-Based AAA. Writing and Troubleshooting Python Scripts. Explore JSON Objects and Scripts in Python. Use NETCONF Via SSH. Use RESTCONF with Cisco IOS XE.
The aim of this course is to provide project managers, project engineers and project support staff with a toolkit they can use on their projects. The tools range from the simple that can be used on all projects to the advanced that can be used where appropriate. This programme will help the participants to: Identify and engage with stakeholders Use tools for requirements gathering and scope management Produce better estimates using a range of techniques Develop more reliable schedules Effectively manage delivery DAY ONE 1 Introduction Overview of the programme Review of participants' needs and objectives 2 Stakeholder management Using PESTLE to aid stakeholder identification Stakeholder mapping The Salience model Stakeholder engagement grid 3 Requirements management Using prototypes and models to elucidate requirements Prioritising techniques Roadmaps Requirements traceability 4 Scope management Work breakdown structures Responsibility assignment matrix 5 Delivery approaches Sequential Agile 6 Estimating Comparative estimating Parametric Bottom-up Three-point estimating Delphi and Planning Poker Creating realistic budgets DAY TWO 7 Scheduling Critical path analysis Smoothing and levelling Timeboxing Team boards Monte Carlo simulations Probability of completion 8 People management Situational Leadership The Tuckman model Negotiation Conflict management Belbin 9 Monitoring and control Earned value management 10 Course review and action planning Identify actions to be implemented individually Conclusion PMI, CAPM, PMP and PMBOK are registered marks of the Project Management Institute, Inc.
In this course you will understand what mentoring is about, understand your roles in the process. Gain self-insight into your own interpersonal style and way of relating to others that may affect mentoring interactions.