Duration 2 Days 12 CPD hours This course is intended for The primary audiences for this course are quality directors and quality assurance managers, managers responsible for the governance of an enterprise and management of its risks, technical experts, project managers and consultants, internal auditors, compliance officers and virtually anybody involved in ANSI/TIA-942 compliance certification related projects either from an end-user or vendor perspective. Participants must hold a valid CTDC certificate in order to be able to register for the CTIA class. Overview After completion of the course the participant will be able to: 1. Prepare the organisation for an audit according to ANSI/TIA-942 including preparation of the required documents, resource planning and management of the audit process itself 2. Conduct an internal audit according to ANSI/TIA-942 following ISO-19011 guidelines 3. Facilitate and support the external audit to ANSI/TIA-942 4. Manage the post-audit process with respect to CAR (Corrective Action Reports), gap closing and _nal certification 5. Facilitate surveillance and recertification audits This intensive course builds further on the technical understanding of the standard acquired in the CTDC© (Certified TIA-942 Design Consultant) course. Fundamental concepts and process of an internal audit Terms and de_nitions Difference between an internal and external auditor Audit principles Auditor competency requirements Managing an audit programme Establishing the audit objectives Establishing the audit programme Planning the audit Planning the schedule Resource planning Tools/equipment required Document requirements - Design documents - Process documents - Declarations Conducting the audit Conducting an opening meeting Conducting the audit Interviews Document review Facility review Typical non-conformities - Architectura - Electrica - Mechanical - Telecommunications Preparing the audit conclusions Conducting the closing meeting Preparing and distributing the audit report Audit report requirements Classification of non-conformities Typical format of an audit report Following up on the audit The CAR ? Corrective Action Report Evaluation of the Corrective Action Report Requesting a formal external auditIssuing a conformity certificate Requirements of the certificate Registration of the certificate Surveillance auditsRecertification auditsExam: Certified TIA-942 Internal Auditor) Actual course outline may vary depending on offering center. Contact your sales representative for more information. Additional course details: Nexus Humans Certified TIA-942 Internal Auditor (CTIA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified TIA-942 Internal Auditor (CTIA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Network analysts Network investigators Cisco integrators and partners Overview After taking this course, you should be able to: Describe the stages of the network attack lifecycle and identify ITD solution platform placement based on a given stage Detail how to locate and mitigate email malware attacks Describe email phishing attacks and the steps taken to locate and mitigate them on the network Identify and mitigate data exfiltration threats on the network Identify malware threats on the network and mitigate those threats after investigation The Cisco Integrated Threat Defense Investigation and Mitigation (SECUR202) v1.0 course shows you how to identify, isolate, and mitigate network threats using the Cisco© Integrated Threat Defense solution platform. Through expert instruction and lab-based scenarios, you will be introduced to network threat investigation, and learn how to identify relationships between Cisco products and the stages of the attack lifecycle. This course is the second in a pair of courses (SECUR201) covering the Cisco Integrated Threat Defense (ITD) solution. Network Threat Investigation Introduction Network Attack Introduction Hunting Network Threats in the Enterprise Investigation and Mitigation of Email Malware Threats Examining Email Malware Threats Investigating and Verifying Email Malware Threat Mitigation Investigation and Mitigation of Email Phishing Threats Examining Email Phishing Attacks Configuring Cisco Email Security Appliance (ESA) for URL and Content Filtering Investigating and Verifying Email Phishing Threat Mitigation Investigation and Mitigation of Data Exfiltration Threats Exploiting Vulnerable Network Servers Investigating Data Exfiltration Threats Mitigating and Verifying Data Exfiltration Threats nvestigation and Mitigation of Malware Threats Examining Endpoint Malware Protection Investigating and Mitigating Endpoint Malware Threats
Duration 5 Days 30 CPD hours This course is intended for IS Security Officers IS Managers Virtualization Engineers and Managers Cloud Security Managers Overview Upon completion, the Certified Digital Forensics Examiner candidate will be able to competently take the CDFE exam. The Certified Digital Forensics Examiner, C)DFE certification is designed to train Cyber Crime and Fraud Investigators. Students are taught electronic discovery and advanced investigation techniques.ÿ This course is essential to anyone encountering digital evidence while conducting an investigation. Mile2?s Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-ðcustody, and write a findings report. Through the use of a risk-based approach, the C)DFE is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Course Outline Computer Forensic Incidents Investigative Theory Investigative Process Digital Acquisition and Analysis Disks and Storages Live Acquisitions Windows Forensics Linux Forensics Mac Forensics Examination Protocols Digital Evidence Protocols Digital Evidence Presentation Laboratory Protocols Specialized Artifact Recovery eDiscovery and ESI Mobile Forensics Incident Handling Reporting Additional course details: Nexus Humans C)DFE - Certified Digital Forensics Examiner Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)DFE - Certified Digital Forensics Examiner Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Die Zertifizierung richtet sich an Fachexperten für Geschäftsprozesse aller Branchen und IT-Experten, die die Blockchain beruflich als kryptographische Lösung oder als Smart Contract (Computerprotokoll zur Abwicklung von Verträgen) einsetzen oder einsetzen wollen. Overview Mit einem EXIN Blockchain Foundation-Zertifikat weisen Sie professionelle Kenntnisse in den folgenden Bereichen nach: Grundlagen der Blockchain-Technologie Blockchain-Herausforderungen Blockchain-Anwendungen Blockchain-Innovationen EXIN Blockchain Foundation ist eine Zertifizierung auf Basisniveau. Mit dem EXIN Blockchain Foundation-Zertifikat wird professionelle Kenntnisse nachgewiesen Âber Blockchain als Transaktionsverzeichnis analog einem Hauptbuch (Ledger), wie das potenziell als weltweites, dezentralisiertes Register zur Aufzeichnung, Bestandsaufnahme und Å¡bertragung von materiellen Werten, wie z. B. Finanzmitteln, Immobilien, Produkten, aber auch immateriellen Werten, wie Wahlstimmen, Software, Gesundheitsdaten und Ideen genutzt werden kann. Die Zertifizierung deckt die Grundbegriffe der Blockchain-Technologie, m'gliche Anwendungsbereiche, den potenziellen Wert fÂr die Organisation und die der Blockchain zugrundeliegende Technologie ab. Grundalgen der Blockchain Die Blockchain-Technologie Zusâtzliche Blockchain-Elemente Aufbau eines Blockchain-Netzwerks Blockchain-Herausforderungen Die Herausforderungen bei einer Blockchain Begrenzung des Blockchain-Risikos Blockchain-Anwendungen Anwendugsfâlle fÂr Blockchains Blockchain-Technologie fÂr Unternehmenswanwendungen Blockchain-Technologie fÂr gesellschaftliche Anwendungen Erweiterung von Blockchain-Anwendungen Blockchain und globale Wirtschaft Blockchain-Innovationen Innovationen in der Blockchain-Technologie Additional course details: Nexus Humans EXIN Blockchain Foundation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EXIN Blockchain Foundation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Overview 1 day course on forensic accounting and analysis to unearth financial manipulation by companies Who the course is for Investors and analysts – equity and credit; public and private Bank loan officers M&A advisors Restructuring advisors Auditors Course Content To learn more about the day by day course content please click here To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now
Duration 1 Days 6 CPD hours This course is intended for This course is designed for non-technical business executives who are tasked with making business decisions about emerging technologies in their businesses. Overview You will learn:Blockchain Cloud BasicsIoT OverviewMobility and Ambient ComputingMachine Learning and Deep LearningChatbots, Robotics, and More This course is designed for non-technical business executives looking to learn and understand emerging technologies. Blockchain Cloud BasicsIoT OverviewMobility and Ambient ComputingMachine Learning and Deep LearningChatbots, Robotics, and More
Duration 2 Days 12 CPD hours This course is intended for Cybersecurity analysts and engineers Security operations specialists Overview Successful completion of this instructor-led course with hands-on lab activities should enable participants to: Investigate and manage incidents Describe the Cortex XDR causality and analytics concepts Analyze alerts using the Causality and Timeline Views Work with Cortex XDR Pro actions such as remote script execution Create and manage on-demand and scheduled search queries in the Query Center Create and manage the Cortex XDR rules BIOC and IOC Working with Cortex XDR assets and inventories Write XQL queries to search datasets and visualize the result sets Work with Cortex XDR's external-data collection This instructor-led course teaches you how to use the Incidents pages of the Cortex XDR management console to investigate attacks. It explains causality chains, detectors in the Analytics Engine, alerts versus logs, log stitching, and the concepts of causality and analytics. You will learn how to analyze alerts using the Causality and Timeline Views and how to use advanced response actions, such as remediation suggestions, the EDL service, and remote script execution. Multiple modules focus on how to leverage the collected data. You will create simple search queries in one module and XDR rules in another. The course demonstrate how to use specialized investigation views to visualize artifact-related data, such as IP and Hash Views. Additionally, it provides an introduction to XDR Query Language (XQL). The course concludes with Cortex XDR external-data collection capabilities, including the use of Cortex XDR API to receive external alerts. This class is powered by Cloud Harmonics. Course Outline Module 1 - Cortex XDR Incidents Module 2 - Causality and Analytics Concepts Module 3 - Causality Analysis of Alerts Module 4 - Advanced Response Actions Module 5 - Building Search Queries Module 6 - Building XDR Rules Module 7 - Cortex XDR Assets Module 8 - Introduction to XQL Module 9 - External Data Collection
Duration 5 Days 30 CPD hours
Duration 2 Days 12 CPD hours This course is intended for The primary audiences for the course are as follows: Cisco customers ? Contact Center Management, Contact Center Supervisors and Customer technical personnel Cisco technology partners Cisco employees Overview Upon completing this course, the learner will be able to meet these overall objectives: Provide a comprehensive overview of Cisco Unified Intelligence Center Describe reporting concepts and capabilities and features of Cisco Unified Intelligence Center reports Provide a detailed description and labs of how to modify reports from normal data sources (Cisco Unified CCE and Cisco Unified CVP) by customizing reports using various methods. (i.e. creating thresholds, show/hide columns, charts and more) The Cisco Unified Intelligence Center 11.6 for End Users (CUIC11.6EU v1.1) course is a two-day instructor-led training (ILT) course. Cisco Unified Intelligence Center is a comprehensive, end-to-end reporting solution, designed to make the task of creating and modifying reports easier on the customer and, at the same time, to present a consistent user interface and a common tool to access varied data across multiple Cisco product families. Cisco Unified Intelligence Center Overview Introducing Cisco Unified Intelligence Center What Contact Center products use CUIC for reporting Cisco Unified Intelligence Center Administration and Security The End User and CUIC Security Running and Modifying CUIC Reports Running Cisco Unified Intelligence Center Reports Using Permalinks Help Dashboards Modifying a CUIC Stock Report Cisco Unified Intelligence Center Dashboards Understanding Cisco Unified CCE Key Concepts Creating a New Cisco Unified Intelligence Center Report
Duration 0.5 Days 3 CPD hours This course is intended for This 4-hour course is intended for business leads in project management, marketing and sales who are seeking to grow their organization through IoT technology solutions. This course prepares students for taking the CertNexus IoTBIZ Credential (IOZ-110). Overview This course and associated credential (IOZ-110) will validate your knowledge of IoT terminology and your ability to understand the components of IoT infrastructure, help you uncover challenges for consideration and understand the impact that IoT has on your organization. This includes being able to identify what IoT can do for your organization and the various business and technical challenges that you must address. The Internet of Things (IoT) allows organization to collect an extraordinary volume of data and new analysis tools can enable you to use this data to make well-informed decisions to be made quickly. But before you can successfully plan and implement an IoT solution, you must understand the various factors that will drive your decisions. Putting IoT systems into place can be a complicated proposition with unique considerations distinctly different from traditional IT solutions. This course will familiarize you with IoT components, understand the challenges that you may face, and make design decisions about your IoT projects. Course includes an exam voucher for the IoTBIZ exam (exam IOZ-110). Planning an IoT Implementation Defining IoT IoT Infrastructure Identify Benefits and Challenges of IoT Undertaking an IoT Project Identify Real World Applications for IoT The IoT Development Lifecycle Additional course details: Nexus Humans CertNexus Internet of Things for Business Professionals (IoTBIZ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Internet of Things for Business Professionals (IoTBIZ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.