Duration 3 Days 18 CPD hours This course is intended for Information System Owners Analysts Ethical Hackers ISSOs Cyber Security Managers IT Engineers Overview Upon completion, the Certified Vulnerability Assessor candidate will be able to competently take the exam. This course provides a solid understanding of the tools an IT engineer needs to review an Information System. In this course, you will learn the importance of vulnerability assessments and how they are used to prevent serious cyber break-ins. Lessons include understanding malware and viruses and how they can infiltrate an organization?s network. After you take this course, you will be able to assess a company?s security posture and perform a basic vulnerability test.ÿPlus, you will be able to generate reports to guide new security implementation. Course Outline Why Vulnerability Assessment Vulnerability Types Assessing the Network Assessing Web Servers and Applications Assessing Remote and VPN Services Vulnerability Assessments & Tools of the Trade Output Analysis
Duration 5 Days 30 CPD hours This course is intended for Security Professionals Incident Handling Professionals Anyone in a Security Operations Center Forensics Experts Cybersecurity Analysts Overview Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time. Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today's needs. When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today's exploits. This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time.Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today?s needs.When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today?s exploits.This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Blue Team?Principles Network Architecture?and how it lays the groundwork Defensive Network Security Data Locations?and how they tie together Security?Operations?Center The People, Processes, and Technology Triage and Analysis Digital Forensics Incident Handling Vulnerability Management Automation, Improvement, and Tuning Digital?Forensics Investigative Theory and?Processes Digital Acquisition Evidence Protocols Evidence Presentation Computer Forensics?Laboratory Protocols Processing Techniques Specialized?Artifacts Advanced Forensics for Today?s?Exploitations Malware Analysis Creating the Safe Environment Static Analysis Dynamic Analysis Behavior Based Analysis What is different about?Ransomware? Manual Code Reversing Traffic Analysis Manual Analysis Principles Automated?Analysis Principles Signatures?compared to?Behaviors Application Protocols Analysis Principles Networking Forensics Assessing the Current State of Defense with the?Organization Network Architecture and Monitoring Endpoint Architecture and Monitoring Automation, Improvement, and continuous?monitoring Leveraging SIEM for Advanced Analytics Architectural Benefits Profiling and?Baselining Advanced Analytics Defeating the Red Team with Purple Team tactics Penetration Testing?with full knowledge Reconnaissance Scanning Enumeration Exploitation Lateral Movement Additional course details: Nexus Humans C)CSA: Cybersecurity Analyst Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)CSA: Cybersecurity Analyst Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for individuals seeking a role as an associate-level cybersecurity analyst and IT professionals desiring knowledge in Cybersecurity operations or those in pursuit of the Cisco Certified CyberOps Associate certification including Students pursuing a technical degree Current IT professionals Recent college graduates with a technical degree Overview After taking this course, you should be able to Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst's perspective. Explain Network Security Monitoring (NSM) tools that are available to the network security analyst. Explain the data that is available to the network security analyst. Describe the basic concepts and uses of cryptography. Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts. Understand common endpoint security technologies. Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors. Identify resources for hunting cyber threats. Explain the need for event data normalization and event correlation. Identify the common attack vectors. Identify malicious activities. Identify patterns of suspicious behaviors. Conduct security incident investigations. Explain the use of a typical playbook in the SOC. Explain the use of SOC metrics to measure the effectiveness of the SOC. Explain the use of a workflow management system and automation to improve the effectiveness of the SOC. Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT). Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format. The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. This course teaches you how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents. Through a combination of lecture, hands-on labs, and self-study, you will learn the essential skills, concepts, and technologies to be a contributing member of a cybersecurity operations center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC. Course Outline Defining the Security Operations Center Understanding Network Infrastructure and Network Security Monitoring Tools Exploring Data Type Categories Understanding Basic Cryptography Concepts Understanding Common TCP/IP Attacks Understanding Endpoint Security Technologies Understanding Incident Analysis in a Threat-Centric SOC Identifying Resources for Hunting Cyber Threats Understanding Event Correlation and Normalization Identifying Common Attack Vectors Identifying Malicious Activity Identifying Patterns of Suspicious Behavior Conducting Security Incident Investigations Using a Playbook Model to Organize Security Monitoring Understanding SOC Metrics Understanding SOC Workflow and Automation Describing Incident Response Understanding the Use of VERIS Understanding Windows Operating System Basics Understanding Linux Operating System Basics Additional course details: Nexus Humans Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: System engineers Network engineers Technical architects Technical support engineers Cisco integrators and partners Overview Upon successful completion of this course, students will be able to meet these overall objectives: Describe Cisco ISE policies and authentication and authorization process Understand different AAA protocols Understand how Cisco ISE fits into Cisco DNA Center architecture Provide configuration examples of Cisco ISE and TrustSec solutions Describe Cisco ISE integration with Cisco DNA Center and policy enforcement using Security Groups Provide configuration examples for wired, wireless, and VPN network access Understand how inline tagging and SGT Exchange Protocol (SXP) works This course shows you how to deploy the Cisco© Identity Services Engine (ISE) to support the Software-Defined Access (SD-Access) solution within your enterprise networks. You will gain an understanding of how Cisco ISE is utilized by the SD-Access solution to provide security policies across the organization. You will learn Cisco ISE fundamentals and get hands-on practice configuring ISE, policies, AAA client configuration, VPN access, integration, wireless guest access, and more. Cisco ISE Overview Exploring the Cisco Identity Services Engine Examining AAA protocols Examining Authentication Examining Authorization Cisco ISE Guest Access Examining Guest Portal Types Examining Guest User Types Examining AAA Policies for Guest Access Cisco ISE and SD-Access Exploring Cisco SD-Access Examining Cisco ISE for SD-Access Cisco ISE SGT Exchange Protocol SD-Access Fabric and Host Provisioning Security Group Exchange Protocol Additional course details: Nexus Humans Cisco Configuring Cisco ISE Essentials for SD- Access v1.0 (ISESDA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Configuring Cisco ISE Essentials for SD- Access v1.0 (ISESDA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to install, configure, and manage multiple security domains within their network security environment. Overview Discuss challenges associated with securing large-scale business organizations with distributed network environments. Describe the Check Point Multi-Domain Security Management solution and its benefits. Understand the components of MDSM and how they work together to help administrators manage multiple network security environments within a single management framework. Understand how to install and configure the Multi-Domain Security Management environment. Describe how to implement Management High Availability within the MDSM environment. Discuss the two types of log server options used to store logs in the Multi-Domain Security Management environment, and how they differ. Understand how to manage and view Multi-Domain activity logs in SmartConsole. Understand how to configure and implement Global Policy to manage rules for multiple domains. Identify various MDSM command line tools commonly used to retrieve information and perform configuration changes on a MDSM Server. Describe troubleshooting tools to use for addressing MDSM Server issues. Understand how VSX works and how to integrate the technology within the MDSM environment. This course provides a comprehensive understanding of the Check Point Multi-Domain Security Management solution and describes how to deploy it within the corporate network environment. Course Outline Multi-Domain Security Management MDSM Installation and Configuration MDSM Log Management Global Policy Management MDSM Troubleshooting Incorporating VSX
Duration 5 Days 30 CPD hours This course is intended for Channel Partner/Reseller Customer Employee Overview To provide learners with the necessary knowledge and skills that are common in all Cisco Unified Communications Manager deployments and additionally, those that are required to fully implement a single site solution. Implementing Cisco Unified Communications Security (UCSEC) v1.0 is a new 5-day ILT class designed to provide students with the necessary knowledge and skills to implement security features in a Cisco Unified Communications environment. Cisco Unified Communications support several features and mechanisms to secure voice signaling and communications and to mitigate attacks against Cisco Unified Communications networks. The Implementing Cisco Unified Communications Security (UCSEC) v1.0 course introduces security mechanisms and describes different implementation scenarios that increase the security level of Cisco Unified Communications networks. Course Outline Course Overview Module 1 - Vulnerabilities of Cisco Unified Communications Networks and Security Fundamentals Module 2 - Network Infrastructure Security Module 3 - Cisco Unified Communications Manager and Endpoint Security Features Module 4 - Secure Cisco Unified Communications Integration and Features
Duration 1 Days 6 CPD hours This course is intended for This course is intended for those persons who will implement, manage and direct mobile asset Initiatives for their organizations. Overview The CMAM course prepares students to implement a foundation of best practice policies and processes whereby mobile assets are controlled. This should lead to savings opportunities, risk mitigation surrounding BYOD and financial responsibility. Students will be able to incorporate mobile asset management and BYOD into their environment, policies and procedures to mitigate risk, increase productivity of employees, and bring value from the mobile asset management program. The IAITAM Certified Mobile Asset Manager (CMAM) course prepares individuals and organizations responsible for the management of mobile devices. Proliferation of mobile devices within the enterprise, whether corporate-owned or BYOD-based, has brought a complexity to ITAM never before seen in IT environments. The course will prepare individuals with the knowledge to manage personnel, policies and processes, the key elements in organizational IT management. This course encompasses both organizational owned assets as well as BYOD (employee-owned). The CMAM course has the IAITAM Best Practice Library as its foundation and encompasses financial viability, risk mitigation, policy enforcement and lifecycle management of mobile assets. Course Outline Mobile Asset Management and ITAM People & Mobile Assets Bring Your Own Device (BYOD) Tools Repository Management Assessment The 12 KPAs and Mobile Asset Management Program Management & Mobility Policy Management & Mobility Communication & Education Management & Mobility Education & Mobility Acquisition Management & Mobility Asset Identification Management & Mobility Legislation & Compliance Management & Mobility Software & Application Licensing Disposal Management & Mobility Documentation Management & Mobility Financial Management & Mobility Vendor Management & Mobility Data Protection
Duration 1 Days 6 CPD hours This course is intended for IT professionals interested in understanding the capabilities of the MDS 9000 Series, including: Data center architects Data center engineers IT directors IT managers Network architects Network engineers Solutions architects Systems engineers Overview After taking this course, you should be able to: Describe Cisco MDS SAN features and advantages Define fixed and modular platforms Understand Cisco MDS architecture and high-availability mechanisms Identify technologies used in modern SANs Describe SAN management with Cisco Data Center Network Manager (DCNM) Explain key value-add features that distinguish Cisco MDS switches The Cisco MDS 9000 Series Switches Overview (DCMDSO) v1.5 course gives you a technical overview of how Cisco Multilayer Director Switch (MDS) 9000 Series, can be used to build highly available and scalable storage networks with advanced security and unified management. The course is for technical decision makers and IT professionals who architect, implement, and manage data center Storage Area Network (SAN) environments. In this course, you?ll learn about key capabilities of the MDS 9000 Series, including platforms, architecture, software, management, and key features that contribute to performance, high availability, flexibility, and operational simplicity of storage environments. Define Cisco MDS Platform Overview Introduction and Advantages of Cisco MDS Fixed Platforms Modular Platforms Describe Cisco MDS Architecture Store-and-Forward Architecture High Availability Redundancy Explore Cisco MDS Key Features Virtual Storage Area Networks Port Channels Slow Drain Device and Path Analysis Using Congestion Control Mechanisms Cisco DCNM SAN Insights for SAN Analytics Zoning Smart Zoning Other Differentiating Features Examine Cisco MDS Management Cisco Data Center Network Manager Additional course details: Nexus Humans Cisco MDS 9000 Series Switches Overview v1.5 (DCMDSO) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco MDS 9000 Series Switches Overview v1.5 (DCMDSO) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is for network professionals who need to learn the techniques to implement, configure, monitor, and support Service Provider VPN solutions based on MPLS backbones. Network administrators Network engineers Network supervisors Network managers Network Operations Center (NOC) personnel Network designers Network architects Channel partners Overview After taking this course, you should be able to: Describe VPN concepts and operation in a Service Provider environment Implement Layer 3 MPLS VPN operations in a Service Provider environment Implement Layer 3 Inter-domain MPLS VPN services traversing multiple Service Providers Implement Layer 3 Multicast MPLS VPN operations in a Service Provider environment Troubleshoot typical issues in Layer 3 MPLS VPN environments Implement Layer 2 VPN operations in a Service Provider environment Troubleshoot Layer 2 VPN issues in a Service Provider network Implement MPLS VPN solutions for IPv6 environments Troubleshoot MPLS VPN solutions for IPv6 environments The Implementing Cisco Service Provider VPN Services (SPVI) 5-day course prepares you to manage end-customer Virtual Private Network (VPN) environments built over a common service provider Multiprotocol Label Switching (MPLS) backbone. You will complete hands-on labs to reinforce MPLS VPN fundamental concepts, benefits, and classification, MPLS components, MPLS control plane and data plane operations, MPLS VPN routing using Virtual Routing and Forwarding (VRF), Layer 2 and Layer 3 MPLS VPNs, IPv6 MPLS VPN implementations, IP Multicast VPNs, and shared services VPNs. The course also covers solutions for deploying MPLS VPN crossing multiple Service Provider domains that improve the use of network bandwidth.The course qualifies for 40 Cisco Continuing Education credits (CE) towards recertification.This course prepares you for the 300-515 Implementing Cisco© Service Provider VPN Services (SPVI) exam. By passing this exam, you earn the Cisco Certified Specialist - Service Provider VPN Services Implementation certification, and you satisfy the concentration exam requirement for the CCNP© Service Provider certification.This course will help you:Gain valuable skills in reinforcing MPLS VPN fundamental concepts, benefits, and classificationsLearn to configure optional paths for traffic to avoid network congestionPrepare to take the 300-515 SPVI exam Introducing VPN Services VPN Fundamentals MPLS VPN Control Plane Operation Troubleshooting MPLS VPN Underlay Troubleshoot Core Interior Gateway Protocol (IGP) Troubleshoot Border Gateway Protocol (BGP) Implementing Layer 3 MPLS VPNs Multiprotocol BGP (MP-BGP) Routing Requirements in MPLS VPNs Provider Edge to Customer Edge (PE-to-CE) Routing Requirements in Layer 3 MPLS VPNs Implementing Layer 3 Interdomain MPLS VPNs Inter-Autonomous System (AS) for Layer 3 MPLS VPNs Content Security and Control (CSC) for Layer 3 MPLS VPNs Implementing Layer 3 Multicast MPLS VPNs Multicast VPN (MVPN) Fundamentals Implement Intranet MVPN Troubleshooting Intra-AS Layer 3 VPNs Troubleshoot PE-CE Connectivity Troubleshoot PE-to-Route Reflecto Implementing Layer 2 VPNs Layer 2 Service Architecture and Carrier Ethernet Services Refresh on Traditional Ethernet LAN (E-LAN), E-Line, and E-Tree Solutions Troubleshooting Layer 2 VPNs Troubleshoot Common Issues for Traditional E-Line, E-LAN, and E-Tree Ethernet Solutions Troubleshoot Common Issues for Ethernet VPN (EVPN) Native, EVPN Virtual Private Wire Service (VPWS), and EVPN Integrated Routing and Bridging (IRB) Solutions Implementing Layer 3 IPv6 MPLS VPNs Classical Solutions for Deploying IPv6 over IPv4 Environments Using 6VPE to Deploy IPv6 Connectivity over MPLS Environment Troubleshooting Layer 3 IPv6 MPLS VPNs Troubleshooting PE-to-PE Connectivity Additional course details: Nexus Humans Cisco Implementing Cisco Service Provider VPN Services 1.0 (SPVI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Service Provider VPN Services 1.0 (SPVI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for the following roles: Network engineers Network security engineers Network architects Sales/presales engineers Overview After completing the course, you should be able to: Describe Cisco SD-WAN security functions and deployment options Understand how to deploy on-premises threat prevention Describe content filtering options Implement secure Direct Internet Access (DIA) Explain and implement service chaining Explore Secure Access Service Edge (SASE) and identify use cases Describe Umbrella Secure Internet Gateway (SIG) and deployment options Implement Cisco Umbrella SIG and DNS policies Explore and implement Cloud Access Security Broker (CASB) and identify use cases (including Microsoft 365) Discover how to use Cisco ThousandEyes to monitor cloud services Configure Cisco ThousandEyes to monitor Microsoft 365 applications Examine how to protect and optimize access to the software as a service (SaaS) application with Cisco SD-WAN Cloud OnRamp Discover and deploy Cloud OnRamp for multi-cloud, including interconnect and collocation use cases Examine Cisco SD-WAN monitoring capabilities and features with vManage and vAnalytics. The Implementing Cisco SD-WAN Security and Cloud Solutions (SDWSCS) v1.1 course is an advanced training course focused on Cisco SD-WAN security and cloud services. Through a series of labs and lectures you will learn about on-box security services, including application aware enterprise firewall, intrusion prevention, URL filtering, malware protection, and TLS or SSL decryption. You will also learn about cloud integration with multiple cloud services providers and multiple use-cases. Additionally, the lab will allow you to configure and deploy local security services and cloud security services with the Cisco Umbrella Secure Internet Gateway (SIG), as well as integrate the Cisco SD-WAN fabric with a cloud service provider using the Cisco vManage automated workflows. Course Outline Introducing Cisco SD-WAN Security Deploying On-Premises Threat Prevention Examining Content Filtering Exploring Cisco SD-WAN Dedicated Security Options Examining Cisco SASE Exploring Cisco Umbrella SIG Securing Cloud Applications with Cisco Umbrella SIG Exploring Cisco SD-Wan ThousandEyes Optimizing SaaS Applications Connecting Cisco SD-WAN to Public Cloud Examining Cloud Interconnect Solutions Exploring Cisco Cloud OnRamp for Colocation Monitoring Cisco SD-WAN Cloud and Security Solutions