• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1478 Insights courses in Nottingham delivered Live Online

Property Law

By NextGen Learning

Course Overview: This comprehensive Property Law course provides an in-depth understanding of property rights, ownership, and key legal principles. Learners will explore essential concepts such as land law, co-ownership, leases, mortgages, and property rights. The course covers both theoretical and practical aspects of property law, enabling learners to gain a clear understanding of property transactions and disputes. By the end of the course, participants will be equipped with the knowledge to navigate property law in both residential and commercial settings, offering them a strong foundation for a career in property law, real estate, or related sectors. Course Description: This Property Law course covers a range of crucial topics, from the fundamental principles of land law to complex property rights and ownership issues. Learners will examine the different forms of land tenure, including registered and unregistered land, and gain insights into the legalities of co-ownership and leases. Key areas such as mortgages, licenses, and proprietary estoppel will also be explored. Throughout the course, learners will develop an understanding of the rights and responsibilities of property owners, landlords, and tenants, and how these impact property transactions. By the end of the course, learners will have gained valuable legal knowledge applicable to property law disputes, legal agreements, and property transactions in the UK. Course Modules: Module 1: Introduction to Property Law Module 2: Land Law Principles- Rights and Interests Module 3: Registered and Unregistered Land Module 4: Ownership and Possession of the Property Module 5: Co-Ownership in Property Module 6: Leases and Bailment Module 7: Property Law: License Module 8: The Mortgage Law Module 9: Insurance for Property Maintenance Module 10: Proprietary Estoppel (Property Rights) Module 11: Security Interests in Property (See full curriculum) Who is this course for? Individuals seeking to gain a solid understanding of property law Professionals aiming to advance their careers in the property or real estate sectors Beginners with an interest in legal aspects of property ownership Aspiring property investors or those looking to specialise in property law Career Path: Property Lawyer Real Estate Consultant Mortgage Advisor Property Manager Legal Advisor for Property Transactions Estate Agent Landlord/Property Investor

Property Law
Delivered OnlineFlexible Dates
£9.99

Food Safety and Hygiene Level 2

By NextGen Learning

Course Overview The Food Safety and Hygiene Level 2 course is designed to equip learners with a strong understanding of the key principles underpinning food hygiene and safety in the UK. Covering essential topics such as microbiological hazards, legislation, allergen control, and hygiene practices, this course prepares learners to contribute effectively to safe food handling environments. Whether you're working in catering, hospitality, retail, or food production, the knowledge gained through this course helps ensure food is handled in compliance with UK standards. By the end of the course, learners will be confident in identifying hazards, understanding legal responsibilities, and maintaining hygienic practices within food premises. It also includes timely guidance for adapting food businesses during COVID-19, supporting learners in meeting current industry expectations. Course Description This CPD-accredited course explores the foundations of food safety and hygiene, including a detailed look into food legislation, storage, preparation, and cleaning protocols. Learners will gain insights into the causes of foodborne illnesses, methods to prevent cross-contamination, and best practices for managing allergenic, chemical, and physical hazards. The course also highlights the importance of personal hygiene, structural cleanliness, and effective waste control within food premises. A dedicated module addresses how food businesses can operate safely during and after the COVID-19 pandemic. Designed to support learners in understanding their responsibilities under food law, this course promotes awareness and compliance in diverse food-handling settings, from small catering units to large-scale food operations. Course Modules Module 01: Food Safety Legislation Module 02: Microbiological Hazards Module 03: Physical, Chemical and Allergenic Hazards Module 04: Food Storage Module 05: Food Preparation Module 06: Personal Hygiene Module 07: Food Premises Design and Cleaning Schedules Module 08: Further Information Module 09: Reopening and Adapting Your Food Business During COVID-19 (See full curriculum) Who is this course for? Individuals seeking to meet UK food safety training requirements. Professionals aiming to develop their food safety knowledge for supervisory or compliance roles. Beginners with an interest in food hygiene and regulatory standards. Business owners and managers in catering, hospitality, or food production. Career Path Food Safety Officer Catering Assistant Kitchen Supervisor Restaurant or Café Manager Food Retail Worker Compliance Assistant in Food Manufacturing

Food Safety and Hygiene Level 2
Delivered OnlineFlexible Dates
£9.99

Meteorology

By NextGen Learning

Course Overview Delve into the dynamic world of weather and atmospheric sciences with this comprehensive Meteorology course. Whether you’re fascinated by weather patterns, climate systems, or the forces that shape our environment, this course offers a structured pathway to understanding the core principles of meteorology. Learners will explore atmospheric structures, cloud formation, precipitation processes, and major environmental challenges such as global warming and natural hazards. Designed to build both foundational knowledge and contextual awareness, the course helps learners appreciate the scientific mechanisms behind weather forecasts and climate behaviour. Upon completion, students will be well-prepared to engage in further academic studies or pursue roles that require a strong understanding of environmental and climatic phenomena. Course Description This Meteorology course introduces the scientific study of the atmosphere and its processes. Through a series of engaging modules, students will examine topics ranging from the composition of the atmosphere and cloud dynamics to rainfall systems, weather disturbances, and broader planetary influences. Emphasis is placed on understanding the environmental impact of climate change and how global weather systems interconnect. The course also includes a focus on natural hazards, such as storms and droughts, providing insights into how meteorological science is used to monitor and assess these events. Learners will gain theoretical knowledge supported by real-world examples and case studies, enabling them to interpret weather data and explore long-term climate patterns with confidence. Ideal for aspiring meteorologists or environmental enthusiasts, the course encourages critical thinking and scientific curiosity throughout. Course Modules: Module 01: Introduction to Meteorology Module 02: The Atmosphere Module 03: Clouds and their Development Module 04: Precipitation Module 05: Natural Hazards Module 06: The Solar System Module 07: Climate Change and Global Warming (See full curriculum) Who is this course for? Individuals seeking to understand how weather systems and climate change operate. Professionals aiming to expand their knowledge in environmental science or geography. Beginners with an interest in meteorology, climate studies, or Earth sciences. Educators, researchers, and those working in related academic fields. Career Path Meteorological Assistant Environmental Data Analyst Weather Forecaster Support Staff Academic Research Assistant in Climate Studies Climate Policy Advisor Public Sector Environmental Analyst

Meteorology
Delivered OnlineFlexible Dates
£9.99

Portuguese Language Course for Beginners

By NextGen Learning

Course Overview The Portuguese Language Course for Beginners is designed to introduce learners to the essentials of the Portuguese language, equipping them with the ability to communicate confidently in everyday situations. This course covers key aspects such as greetings, basic vocabulary, sentence structure, and conversational skills. Whether you are preparing for travel, work, or personal enrichment, this course provides a strong foundation for further language development. By the end of the course, learners will have gained the competence to understand and use common Portuguese expressions, engage in simple conversations, and appreciate the cultural nuances of Portuguese-speaking countries. With its clear structure and engaging approach, this course offers practical value by enhancing communication skills, boosting cultural understanding, and opening up new personal and professional opportunities. Course Description The Portuguese Language Course for Beginners offers a structured introduction to the language through a series of focused lessons. Learners will explore essential topics including basic grammar, vocabulary building, pronunciation techniques, and conversational etiquette. Each section of the course is designed to enhance comprehension and speaking abilities, fostering a gradual progression towards language confidence. Learners will also gain insights into Portuguese culture, helping them to apply their language skills in real-world contexts with sensitivity and awareness. The course combines interactive exercises, audio support, and accessible content to ensure an enriching learning experience. Upon completion, learners will have developed the linguistic tools necessary to engage in everyday Portuguese conversations, navigate simple social and professional interactions, and lay the groundwork for further language study. The course is ideal for those seeking a reliable and well-rounded entry point into Portuguese language acquisition. Course Modules Module 01: Lesson 1 Module 02: Lesson 2 Module 03: Lesson 3 Module 04: Lesson 4 (See full curriculum) Who is this course for? Individuals seeking to communicate effectively in Portuguese during travel or relocation. Professionals aiming to expand career opportunities in Portuguese-speaking markets. Beginners with an interest in learning a new language for cultural enrichment. Students or enthusiasts looking to build foundational language skills for academic or personal growth. Career Path Translator or Interpreter (Entry-Level) Customer Service Representative in multilingual environments Travel and Tourism Assistant International Sales or Business Support Officer Language Tutor (Beginner Level) Cultural Exchange Programme Coordinator

Portuguese Language Course for Beginners
Delivered OnlineFlexible Dates
£9.99

Store Assistant

By NextGen Learning

Course Overview The "Store Assistant" course offers learners an in-depth understanding of the retail sector, covering essential aspects such as customer service, store management, and retail operations. By completing this course, learners will gain the skills necessary to effectively contribute to the day-to-day operations of a retail environment. The course will also equip them with knowledge of retail management practices, customer interaction strategies, and industry regulations. Learners will come away with a comprehensive understanding of the role and the ability to enhance their professional practice in a retail setting, making them well-prepared for a variety of store assistant positions. Course Description This course is designed to provide learners with essential knowledge and skills for a career as a store assistant. Topics include the roles and responsibilities of store assistants, the basics of retail management, and how to effectively manage customer relationships. Learners will explore visual merchandising, consumer behaviour, and the psychological aspects of retail, along with understanding how to interact with suppliers. Additionally, the course covers relevant retail legislation to ensure compliance in day-to-day operations. Through a structured curriculum, learners will gain insights into managing a retail store, enhancing customer experiences, and applying effective store strategies to improve business outcomes. The course is ideal for those seeking to develop a strong foundation in retail roles and prepare for a successful career in the industry. Course Modules Module 01: Introduction to Store Assistant Module 02: Roles and Responsibilities of a Store Assistant Module 03: Introduction to Retail Management Module 04: Managing a Retail Store Module 05: Visual Merchandising Module 06: Consumer Behaviour Module 07: Dealing with Customers Module 08: Dealing with Suppliers Module 09: Store Psychology Module 10: Legislations Related to Retail (See full curriculum) Who is this course for? Individuals seeking to start a career in retail. Professionals aiming to enhance their retail management skills. Beginners with an interest in customer service and retail operations. Anyone looking to understand retail environments and store dynamics. Career Path Store Assistant Retail Associate Retail Manager Visual Merchandiser Customer Service Representative Retail Supervisor Supply Chain Assistant

Store Assistant
Delivered OnlineFlexible Dates
£9.99

JNCIA Practicum and Exam Preparation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This program is designed for students who have attended successfully the IJOS and JRE courses (prior to April 1, 2017) or the IJOS course (since April 3, 2017) and are working toward JNCIA-JUNOS certification. Overview The objectives for this course follow the requirements for the current JNCIA-JUNOS. At the end of this course, the successful student will be able to: Identify the concepts and functionality of various fundamental elements of networking Identify the concepts, benefits and functionality of the core elements of the Junos OS Identify the concepts, operation and functionality of the Junos user interfaces Identify the main elements for configuring Junos devices Describe how to configure basic components of a Junos device Identify methods of monitoring and maintaining Junos devices Describe monitoring and maintenance procedures for a Junos device Identify basic routing concepts and functionality for Junos devices Describe how to configure and monitor basic routing elements for a Junos device Identify the concepts and functionality of routing policy and firewall filters on Junos devices Describe how to configure and monitor routing policies and firewall filters on a Junos device Apply knowledge of Junos operating system configuration, operations, and functionality to real-world scenarios This intense, two-day program is designed to prepare attendees who have previously taken the Introduction to the Junos Operating System (IJOS) course for taking the certification exam while simultaneously gaining insight into real-world applications Session 1: Practice Labs Guided practice labs to reintroduce the lab environment Session 2: Real-World Scenario Labs Labs that emulate real-world application of JNCIA-level knowledge, configurations, operations, and functionality. These labs will challenge students to complete scenario-based problems to accomplish specific network goals. Session 3: Networking Fundamentals Collision domains and broadcast domains Function of routers and switches Optical network fundamentals ? SONET/SDH, OTN Ethernet networks Layer 2 addressing, including address resolution IPv4 and IPv6 fundamentals Layer 3 / IP addressing, including subnet masks Subnetting and supernetting Decimal to binary conversion Longest match routing Connection-oriented vs. connectionless protocols Session 4: Junos OS Fundamentals Junos device portfolio ? product families, general functionality Software architecture Control and forwarding planes Routing Engine and Packet Forwarding Engine Protocol daemons Transit traffic processing Exception traffic Session 5: User Interfaces CLI functionality CLI modes CLI navigation CLI Help Filtering output Active vs. candidate configuration Reverting to previous configurations Modifying, managing, and saving configuration files Viewing, comparing, and loading configuration files J-Web ? core/common functionality Session 6: Junos Configuration Basics Initial configuration User accounts Login classes User authentication methods Interface types and properties Configuration groups Additional initial configuration elements ? NTP, SNMP, syslog, etc. Configuration archival Logging and tracing Rescue configuration Session 7: Operational Monitoring and Maintenance Show commands Monitor commands Interface statistics and errors Network tools ? ping, traceroute, telnet, SSH, etc. Real-time performance monitoring (RPM) Junos OS installation Software upgrades Powering on and shutting down Junos devices Root password recovery Session 8: Routing Fundamentals Packet forwarding concepts Routing tables Routing vs. forwarding tables Route preference Routing instances Static routing Advantages of / use cases for dynamic routing protocols Session 9: Routing Policy and Firewall Filters Default routing policies Import and export policies Routing policy flow Effect of policies on routes and routing tables Policy structure and terms Policy match criteria, match types, and actions Firewall filter concepts Firewall filter concepts Filter match criteria and actions Effect of filters on packets Unicast reverse-path-forwarding (RPF) Session 10: JNCIA-JUNOS Certification Exam The exam voucher is included in the price of the course DWWTC is a certified PearsonVUE Testing Center' Additional course details: Nexus Humans JNCIA Practicum and Exam Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JNCIA Practicum and Exam Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

JNCIA Practicum and Exam Preparation
Delivered OnlineFlexible Dates
Price on Enquiry

BA17 - Advanced Root Cause Analysis

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, corrective action coordinators or managers; supervisors, team leaders, and process operators; anyone who wants to improve their ability to solve recurring problems. Overview At the completion of this course, you should be able to:Identify the different types of tools and techniques availableApply change management successfullyReview what to look for when applying business case thinking to Root Cause AnalysisDevelop a process to systematically approach problems Problem determination skills cannot be acquired by reading a book. They mostly come from experience. After this course, you will have a general understanding of a structured problem determination approach, which you can then apply in your daily work. RCA Foundation Concepts and Objectives Section Learning Objectives Discuss Definitions ? IT Perspective Discuss What is a problem and why do they exist? Exercise 1a: Why is RCA important What is Root Cause? RCA Benefits and Approaches Exercise 1b: Why are multiple approaches important? Event and Casual Analysis Exercise 1c: Apply Event and Causal Analysis Event and Causal Analysis: Exercise 1c Worksheet RCA Tools for each approach Exercise 1D: Prepare for Case Study Section Summary and Conclusions Enhance Use of RCA Tools Why use a Particular Method Tool: Change Analysis Change Analysis Examples Exercise 2a: Apply Change Analysis Exercise 2b: Change Analysis Worksheet Tool: How to Resolve Conflict Tool: 5 Why?s Example Learning Management Problem Exercise 2b: Apply 5 Why?s Sequence-of-Events Exercise 2b: Worksheet Tool: Cause and Effect Exercise 2c: Apply Cause and Effect Exercise 2c: Cause and Effect Worksheet Tool: Fault Tree Analysis Why do we use Fault Tree Analysis? How does it work? Fault Tree Diagram Symbols Example #1 of FTA: Car Hits Object Exercise 2D: Apply Fault Tree Analysis Tool: Failure Modes and Effects Analysis (FMEA) Example: Failure Modes and Effects Analysis Exercise 2E: Apply FMEA Tool: Design / Application Review Exercise 2d: Apply Design/Application Review Section summary & conclusions Problem Resolution & Prevention Section Objectives The Secret of Solving Problems A Note about Statistical Control A Note about Fire Fighting Technique: Business Process Mapping Example: IGOE Exercise 3A: Problem as IGOE Exercise 3A: IGOE Template Technique: Lean Six Sigma and DMAIC Lean Six Sigma Benefits Exercise 3B: Apply Lean Six Sigma Importance of Understanding the Business Process The Business Process Mandate Technique: Process Modeling Graphical Notation Standard (BPMN) What is Business Process Modeling Notation (BPMN)? Benefits of BPMN Basic Components of BPMN Exercise 3C: Use BPMN to Document a Current State Technique: Business Process Maturity Model Five Levels of Maturity Exercise 3D: Appraise Business Process Maturity Level Section Summary and Conclusions Capability Improvement for RCA Section Learning Objectives Steps in Disciplined Problem Solving RCA as a RCA Process Key RCA Role Considerations Exercise 4A: Apply RCA to RCA Process Sustainable RCA Improvement Organizational Units Process Area Goals, Practices Specific and General Practices Specific Practice Examples Software Maturity Survey Exercise 4B: Apply Strengths, Weakness, Opportunities and Threats (SWOT) to RCA SWOT Analysis Worksheet Recognize the importance of the Change Management component in your RCA implementation Using the ADKAR Model to Communicate Change Review ADKAR© Model ? Awareness of the need for change Desire to participate and support the change Knowledge on how to change Ability to implement required skills and behaviors Reinforcement to sustain the change Exercise 4C: Create an Ability Checklist The ADKAR Model: Reinforcement Exercise 4D: Find two examples of how ADKAR will be different Section Summary and Conclusions Course Summary & Conclusions Plan the Proposal and Business Case Example: 1 Page Business Case Exercise 5A: Creating Action Plans Resource Guide Questions Additional course details: Nexus Humans BA17 - Advanced Root Cause Analysis training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA17 - Advanced Root Cause Analysis course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA17 - Advanced Root Cause Analysis
Delivered OnlineFlexible Dates
Price on Enquiry

Security in Google Cloud

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Security in Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

AJSEC - Advanced Junos Security

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course benefits individuals responsible for implementing, monitoring, and troubleshooting Juniper security components. Overview After successfully completing this course, you should be able to: Demonstrate understanding of concepts covered in the prerequisite Juniper Security courses. Describe the various forms of security supported by the Junos OS. Describe the Juniper Connected Security model. Describe Junos security handling at Layer 2 versus Layer 3. Implement next generation Layer 2 security features. Demonstrate understanding of Logical Systems (LSYS). Demonstrate understanding of Tenant Systems (TSYS). Implement virtual routing instances in a security setting. Describe and configure route sharing between routing instances using logical tunnel interfaces. Describe and discuss Juniper ATP and its function in the network. Describe and implement Juniper Connected Security with Policy Enforcer in a network. Describe firewall filters use on a security device. Implement firewall filters to route traffic. Explain how to troubleshoot zone problems. Describe the tools available to troubleshoot SRX Series devices. Describe and implement IPsec VPN in a hub-and-spoke model. Describe the PKI infrastructure. Implement certificates to build an ADVPN network. Describe using NAT, CoS and routing protocols over IPsec VPNs. Implement NAT and routing protocols over an IPsec VPN. Describe the logs and troubleshooting methodologies to fix IPsec VPNs. Implement working IPsec VPNs when given configuration that are broken. Describe Incident Reporting with Juniper ATP On-Prem device. Configure mitigation response to prevent spread of malware. Explain SecIntel uses and when to use them. Describe the systems that work with SecIntel. Describe and implement advanced NAT options on the SRX Series devices. Explain DNS doctoring and when to use it. Describe NAT troubleshooting logs and techniques. This four-day course, designed to build off the current Juniper Security (JSEC) offering, delves deeper into Junos security, next-generation security features, and ATP supporting software. Chapter 1: Course Introduction Course Introduction Chapter 2: Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 1: Implementing Layer 2 Security Chapter 3: Firewall Filters Using Firewall Filters to Troubleshoot Routing Instances Filter-Based Forwarding Lab 2: Implementing Firewall Filters Chapter 4: Troubleshooting Zones and Policies General Troubleshooting for Junos Devices Troubleshooting Tools Troubleshooting Zones and Policies Zone and Policy Case Studies Lab 3: Troubleshooting Zones and Policies Chapter 5: Hub-and-Spoke VPN Overview Configuration and Monitoring Lab 4: Implementing Hub-and-Spoke VPNs Chapter 6: Advanced NAT Configuring Persistent NAT Demonstrate DNS doctoring Configure IPv6 NAT operations Troubleshooting NAT Lab 5: Implementing Advanced NAT Features Chapter 7: Logical and Tenant Systems Overview Administrative Roles Differences Between LSYS and TSYS Configuring LSYS Configuring TSYS Lab 6: Implementing TSYS Chapter 8: PKI and ADVPNs PKI Overview PKI Configuration ADVPN Overview ADVPN Configuration and Monitoring Lab 7: Implementing ADVPNs Chapter 9: Advanced IPsec NAT with IPsec Class of Service with IPsec Best Practices Routing OSPF over VPNs Lab 8: Implementing Advanced IPsec Solutions Chapter 10: Troubleshooting IPsec IPsec Troubleshooting Overview Troubleshooting IKE Phase 1 and 2 IPsec Logging IPsec Case Studies Lab 9: Troubleshooting IPsec Chapter 11: Juniper Connected Security Security Models Enforcement on Every Network Device Chapter 12: SecIntel Security Feed Encrypted Traffic Analysis Use Cases for SecIntel Lab 10: Implementing SecIntel Chapter 13:Advanced Juniper ATP On-Prem Collectors Private Mode Incident Response Deployment Models Lab 11: Implementing Advanced ATP On-Prem Chapter 14: Automated Threat Mitigation Identify and Mitigate Malware Threats Automate Security Mitigation Lab 12: Identifying and Mitigation of Threats Additional course details: Nexus Humans AJSEC - Advanced Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AJSEC - Advanced Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AJSEC - Advanced Junos Security
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Client Management Suite 7.6 - Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for IT administrators who will be maintaining and installing software, taking inventory of computers, distributing software updates to computers or remotely managing computers. Overview Upon completion of this course, students will be able to: Discover and import computer and user resources that you want to manage. Deploy the Symantec Management Agent and plug-ins. Gather hardware, software and operating system inventory from managed computers. Maintain a software catalog containing software components. Deliver software to managed computers. Meter software on managed computers. Distribute software updates to managed computers. Remotely manage computers. Analyze gathered data using predefined reports. This hands-on course teaches students the underlying components and concepts of the Symantec Management Platform along with the Symantec Management Console that is used by CMS to perform its management functions. Introduction Course overview The classroom lab environment Understanding the Symantec Client Management Suite Symantec Client Management Suite demonstration Learning about the Symantec Client Management Suite Symantec Management Platform components used by CMS Symantec Management Platform concepts used by CMS How the platform and CMS work The Symantec Management Console Accessing the Symantec Management Console Getting to know the Symantec Management Console Getting to know the enhanced console views Symantec Management Platform Basics Importing computer resources from Active Directory Discover computer resources using Network Discovery Grouping resources Applying CMS policies to resource targets Deploying the Symantec Management Agent Installing the Symantec Management Agent - push method Installing the Symantec Management Agent - pull method Installing solution plug-ins for the Symantec Management Agent Working with the Symantec Management Agent GUI Working with the Symantec Management Agent health settings Gathering Inventory from Managed Computers Introducing Inventory Solution Creating and configuring inventory policies Using inventory tasks Other Inventory Solution capabilities Introducing inventory reports Managing the Software Catalog Preparing the Software Management Framework to support the Software Catalog Populating the Software Catalog with software components Working with software component resources Creating and configuring software products Delivering Software to Managed Computers Choosing a method to deliver software Understanding the software blade of the enhanced console view Managing software deliveries with tasks Installing software using a managed software delivery policy Introducing software management reports Managing Software with Application Metering Understanding Application Metering Tracking software usage on managed computers Metering software with Application Metering policies Application metering reports Managing Organizational Views and Organizational Groups Learning about organizational views and groups Creating custom organizational views and group Managing organizational views and groups Managing Resource Filters and Resource Targets More about resource filters Managing and working with existing filters Creating and modifying filters More about resource targets Working with targets Managing Software Updates on Windows Computers Introducing Patch Management Solution for Windows Preparing your environment for Patch Management Distributing software updates Patch Management Solution reports Managing Virtualized Software Introducing Symantec Workspace Virtualization Installing the Symantec Workspace Virtualization agent Using CMS to deliver virtualized software Remotely Managing Computers Introducing Symantec Remote Access Connector Overview or Real-Time System Manger Remote management reports Managing Policies Getting to know policies Understanding user-based policies Understanding maintenance windows Configuring automation policies Managing shared schedules Managing Jobs and Tasks Overview of task management Creating and scheduling tasks and jobs Overview of Deployment Solution Introducing Deployment Solution Configuring Deployment Solution Creating and managing deployment jobs and tasks Deployment Solution imaging Reporting Introducing reports Using and creating standard reports Configuring and using IT Analytics Solution Site Management Introducing site management Managing sites, subnets and site servers Reviewing site server plug-ins to the Symantec Management Agent Configuring site services Security Learning about security Managing user accounts, security roles, and privileges Managing permissions Additional course details: Nexus Humans Symantec Client Management Suite 7.6 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Client Management Suite 7.6 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Client Management Suite 7.6 - Administration
Delivered OnlineFlexible Dates
Price on Enquiry