• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

42604 Learning courses delivered Online

Reception perfection (In-House)

By The In House Training Company

The often-used phrase, 'just the receptionist', completely misrepresents the role. An excellent receptionist is a most valuable resource for any organisation. This programme has been designed specifically to deal with the essential skills necessary to represent the organisation to the best possible effect. It will also help you get the most out of your working day. There are six key reasons to take part in this workshop. It will help you: See your role in a new light Develop your communication skills Deal with different types of customer and situation Boost your confidence Cope in a pressurised environment Get more satisfaction from your working day 1 Introduction Workshop objectives and personal objectives The challenges of 21st century communication What makes an excellent point of Reception? And why is it so important? Who and where are our customers? As a customer, how do you like to be treated? What makes people feel valued? Objective and subjective aspects of customer service 'Micro moments' that shape the relationship 2 Communication on reception Definition of communication Barriers to good communication The 'recipe' of verbal, vocal and visual aspects of communication Differences between communicating face-to-face and on the telephone Communication 'leaks' The primitive human response The impact of visual communication - body language, gesture and facial expression Voice - tone, speed, volume, pitch, clarity, inflection, pacing Words - positive words and phrases compared with negative terminology Professional greetings face-to-face Steering the conversation with effective questioning 3 Telephone excellence How we use the telephone Qualities of the telephone Non-verbal communication on the telephone - what aspects can be 'seen' by the other person? Professional telephone etiquette Taking and leaving messages - key points that can help customers, colleagues and the organisation Clarifying information 4 Listening skills for accuracy and relationship building How accurate are your listening skills? What are the challenges for accurate listening? Active / empathetic listening 5 Creating a rapport by 'style flexing' Understanding how different people communicate Shaping our message to the other person so that they feel understood How changing situations can alter communication needs 6 Confidence and assertiveness Recognising different styles of behaviour - aggressive, passive and assertive Qualities of assertive communication - verbal, vocal and visual Assertive techniques - basic, persistence, negotiation / empathetic Demonstrating confidence 7 Coping in a pressurised environment Words - the most useful ones to use with stressed people and identifying the 'red rag' words Challenging situations - what do you find difficult and how do you respond? Dealing with outbursts of anger Bringing non-stop talkers back from their tangent Constructive ways to say 'no' 8 Pulling it all together Action plans Summary of key learning points

Reception perfection (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Conflict management (In-House)

By The In House Training Company

Conflict is a word that conjures up many emotions. It is something that most people would prefer to avoid, if possible. Work can be an emotive place. Positive relationships can make your life at work exciting, motivating and challenging, whilst relationships that do not hold value to you could make your life very difficult and stressful, especially if there is conflict between you and your manager. This course is essential for people who want to understand where conflict can be used to positive effect and how to manage conflict in your working relationships and see it as something positive that can stimulate the environment. Research has shown that relationships at work are an extremely high motivational factor, and for a lot of people it has a higher importance that salary! Therefore, it is essential that we invest in relationships and search out new ways to make them better in order to have a more positive influence on our surroundings. By understanding why other people are in conflict we can manage the conversation a lot better, with outcomes managed more effectively so the 'conflict' will add value to the organisation. This participative event will cover a wide variety of exercises and personal stories, and leave course participants with a clear strategy to identify when they are in conflict with someone and how they will structure their approach to get to a satisfactory outcome. This is a workshop that targets anyone where conflict needs to be managed and cannot seem to resolve it, whether internally or externally. At the end of the day, participants will: Know their key relationships and the strength of those relationships Complete the Strengths Deployment Inventory (SDI) to identify where you deploy your strengths Understand what is important to you and your key stakeholders Know how motivational value systems can influence behaviour Tailor your communication style to match that of your opposite party Know conflict strategies to resolve conflict in others Learn to be more assertive when challenging Achieve key personal, departmental and organisational objectives 1 Where are you now? How effective are your current working relationships? Can I work effectively without the input from others? Who do you need to be a success? 2 The Strengths Deployment Inventory (SDI) Completion of the SDI questionnaire An understanding of the theory A 'trip around the triangle' Predicting relationship interaction Your scores and what they mean in your relationships 3 Conflict theory What is conflict? The 3 flags of conflict What are your conflict triggers? Your conflict scores plotted The conflict sequence 4 Conflict resolution strategies Early warning signs Most productive behaviours Least productive behaviours Preventable / unwarranted conflict Review of the dynamic triangle Review of the day, personal learning and action planning

Conflict management (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Cloud Fundamentals

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Sr. Systems Administrator Cloud Engineer Systems Engineer Sr. Network Administrator Sr. Network Engineer Cloud Specialist Cloud Project Manager Overview After completion of this course you will be able to describe: Cloud architecture and design Security within the cloud Automation and virtualization Troubleshooting and Disaster recovery High availability  This course covers in depth the skills and abilities needed to operate in the cloud, validating that candidates have the technical experience needed to deploy, secure, and automate environments regardless of the vendor solution. Understanding Cloud Concepts Topic 1A: Recognize Cloud Concepts Topic 1B: Recognize Cloud Terms Topic 1C: Understand the Troubleshooting Methodology Planning and Designing a Cloud Environment Topic 2A: Meet Cloud Business Requirements Topic 2B: Design Capacity Planning and Requirements Administering Cloud Resources Topic 3A: Manage Cloud Administration Topic 3B: Manage Compute Resources in the Cloud Topic 3C: Manage Memory Resources Managing Cloud Storage Topic 4A: Understand Cloud Storage Types Topic 4B: Configure Cloud Storage Solutions Topic 4C: Configure Cloud Storage Protocols and RAID Managing Networks in the Cloud Topic 5A: Deploying Cloud Network Services Topic 5B: Identify Cloud Network Infrastructure Components Securing and Troubleshooting Networks in the Cloud Topic 6A: Secure a Network in a Cloud Environment Topic 6B: Troubleshooting Cloud Connectivity Managing Cloud Migrations and Troubleshooting Cloud Deployments Topic 7A: Manage Cloud Migrations Topic 7B: Troubleshoot Cloud Deployment and Migration Issues Managing Cloud Automation and Orchestration Topic 8A: Understand Cloud Automation and Orchestration Techniques Topic 8B: Troubleshoot Automation and Orchestration in the Cloud Understanding Cloud Security Concepts Topic 9A: Administer Identity and Access Management in the Cloud Topic 9B: Manage Cloud Operating System and Application Security Topic 9C: Manage Data Security and Compliance in the Cloud Managing Cloud Security Topic 10A: Implement Security Measures in the Cloud Domain Topic 10B: Troubleshoot Cloud Security Managing Cloud Performance Topic 11A: Operate Efficiently in the Cloud Topic 11B: Accomplish Cloud Operations Tasks Topic 11C: Optimize Cloud Resources Topic 11D: Troubleshoot Common Cloud Performance Problems Managing Maintenance in the Cloud Topic 12A: Configure Logs, Monitoring, and Alerting for Cloud Services Topic 12B: Manage Backup and Restore in the Cloud Implementing High Availability and Disaster Recovery in the Cloud Topic 13A: Understand High Availability and Scaling in the Cloud Topic 13B: Manage Disaster Recovery in the Cloud Topic 13C: Incident Response Additional course details: Nexus Humans Cloud Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloud Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cloud Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry

Cloudera Administrator Training for Apache Hadoop

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is best suited to systems administrators and IT managers. Overview Skills gained in this training include:Determining the correct hardware and infrastructure for your clusterProper cluster configuration and deployment to integrate with the data centerConfiguring the FairScheduler to provide service-level agreements for multiple users of a clusterBest practices for preparing and maintaining Apache Hadoop in productionTroubleshooting, diagnosing, tuning, and solving Hadoop issues Cloudera University?s four-day administrator training course for Apache Hadoop provides participants with a comprehensive understanding of all the steps necessary to operate and maintain a Hadoop cluster. The Case for Apache Hadoop Why Hadoop? Core Hadoop Components Fundamental Concepts HDFS HDFS Features Writing and Reading Files NameNode Memory Considerations Overview of HDFS Security Using the Namenode Web UI Using the Hadoop File Shell Getting Data into HDFS Ingesting Data from External Sources with Flume Ingesting Data from Relational Databases with Sqoop REST Interfaces Best Practices for Importing Data YARN & MapReduce What Is MapReduce? Basic MapReduce Concepts YARN Cluster Architecture Resource Allocation Failure Recovery Using the YARN Web UI MapReduce Version 1 Planning Your Hadoop Cluster General Planning Considerations Choosing the Right Hardware Network Considerations Configuring Nodes Planning for Cluster Management Hadoop Installation and Initial Configuration Deployment Types Installing Hadoop Specifying the Hadoop Configuration Performing Initial HDFS Configuration Performing Initial YARN and MapReduce Configuration Hadoop Logging Installing and Configuring Hive, Impala, and Pig Hive Impala Pig Hadoop Clients What is a Hadoop Client? Installing and Configuring Hadoop Clients Installing and Configuring Hue Hue Authentication and Authorization Cloudera Manager The Motivation for Cloudera Manager Cloudera Manager Features Express and Enterprise Versions Cloudera Manager Topology Installing Cloudera Manager Installing Hadoop Using Cloudera Manager Performing Basic Administration Tasks Using Cloudera Manager Advanced Cluster Configuration Advanced Configuration Parameters Configuring Hadoop Ports Explicitly Including and Excluding Hosts Configuring HDFS for Rack Awareness Configuring HDFS High Availability Hadoop Security Why Hadoop Security Is Important Hadoop?s Security System Concepts What Kerberos Is and How it Works Securing a Hadoop Cluster with Kerberos Managing and Scheduling Jobs Managing Running Jobs Scheduling Hadoop Jobs Configuring the FairScheduler Impala Query Scheduling Cluster Maintainence Checking HDFS Status Copying Data Between Clusters Adding and Removing Cluster Nodes Rebalancing the Cluster Cluster Upgrading Cluster Monitoring & Troubleshooting General System Monitoring Monitoring Hadoop Clusters Common Troubleshooting Hadoop Clusters Common Misconfigurations Additional course details: Nexus Humans Cloudera Administrator Training for Apache Hadoop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloudera Administrator Training for Apache Hadoop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cloudera Administrator Training for Apache Hadoop
Delivered OnlineFlexible Dates
Price on Enquiry

CWS-315 Citrix Virtual Apps and Desktops 7 Advanced Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Developed for experienced IT Professionals working with Citrix Virtual Apps and Desktops 7.1x. Potential students include administrators, engineers, and architects responsible for the end user workspace, provisioning services environment, and overall health and performance of the solution. Overview How to configure Workspace Environment Management to improve the end user environment and virtual resource consumption Understand Zones in Citrix Virtual Apps and Desktops 7.1x and how to account for user and desktop locations and optimal connection and registration How to build and manage App Layers to minimize image sprawl with Citrix Virtual Apps and Desktops 7.1x Understand and configure HDX channels and protocols for improved performance delivering multimedia and data over network connections Get more value out of your Citrix Virtual Apps and Desktops 7.1x investment through the use of Workspace Environment Management, Provisioning Services, Application Layering, and advanced features. Students leave this course with a good understanding of how to manage more complex solutions such as multizone environments spanning multiple locations with configurations around StoreFront, the Delivery Controllers, and HDX. Students will gain the skills to improve logon times, user personalization, and resource performance through Workspace Environment Management. Also, learn to optimize management of your app and desktop images by building and combining App Layers. End the course by learning to install, configure, and manage Provisioning Services in accordance with leading practices.This course includes a voucher to take the related exam (1Y0-311 Citrix XenApp and XenDesktop 7.15 Advanced Administration) and earn your Citrix Certified Professional - Virtualization (CCP-V) certification. Implementing Redundancy and Scalability StoreFront and Citrix Gateway Site Infrastructure Machines Running the Virtual Delivery Agent Managing a Virtual Apps and Desktops Environment with Multiple Locations Zones VDA Registration in a Multi-Zone Environment Zone Preference Optimal Gateway Routing and Zones Managing StoreFront Store Subscriptions in a Multi- Location Environment StoreFront and Citrix ADC Branding Implementing Backups and Disaster Recovery Backups Disaster Recovery Considerations Disaster Recovery Process Implementing Advanced Authentication Methods Multi-factor Authentication - RADIUS & OTP Multi-factor Authentication - Smart Card Authentication Federated Authentication - ADFS, SAML, and FAS Improving App and Data Security Introduction to Application Security Preventing Jailbreak Attacks Minimizing the Impact of Attacks Securing Machines Running the Virtual Delivery Agent TLS to VDA Encryption GPOs and Citrix Policies Image Management Introduction to Troubleshooting Troubleshooting Methodology Process (Standard Slide) Resource Tools and Utilities Introduction to PowerShell Troubleshooting Access Issues Troubleshooting StoreFront Troubleshooting Citrix Gateway Troubleshooting Delivery Controller Issues Validating FMA Services Troubleshooting VDA Registration Issues Troubleshooting VDA Registration Troubleshooting HDX Connection Issues Troubleshooting HDX Connections Introduction to App Layering App Layering Introduction Architecture and How it Works Creating an OS Layer The OS Layer Creating a Platform Layer The Platform Layer Creating App Layers The App Layers Creating Elastic App and User Layers Elastic App Layering User Layers Deploying a Layered Image using Citrix Virtual Apps and Desktops Using Templates in App Layering Using Layered Images in a Citrix Virtual Apps and Desktops Site Exploring Layer Priority Layer Priority Maintaining an App Layering Environment Updating Layers Maintaining and Updating the App Layering Environment Common App Layering Considerations and Additional Resources Introduction to Workspace Environment Management (WEM) Workspace Environment Management (WEM) Introduction WEM Administration Using WEM to Centralize Managing User Resources with WEM Managing Profiles with WEM Managing Endpoints with the WEM Transformer Feature Using WEM for Performance Optimization Optimizing Machine Performance with WEM Optimizing User Experience with WEM Using WEM to Secure Environments WEM Environments Migrating and Upgrading WEM Migrating to WEM Upgrading a WEM Deployment WEM Multi-Location Considerations

CWS-315 Citrix Virtual Apps and Desktops 7 Advanced Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Managing Campus Networks with Aruba AirWave, Rev. 19.21

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Ideal candidates are Network Administrators who monitor and troubleshoot wireless networks, and Network and System Administrators responsible for installing and configuring network monitoring systems. Overview This hands-on course prepares you with the knowledge and experience required to install and use the AirWave Wireless Management Suite: AirWave Management Platform (AMP), RAPIDS, Visual RF, network health diagnostics, client troubleshooting, alerts and reporting.  In this course, you learn about AirWave?s capabilities in troubleshooting network health and client status via the various stages of association and authentication, as well as redundancy and master consoles for large networks. Introduction to AWMS Airwave Platform. Features and Benefits of AMP RAPIDS and Visual RF. Airwave products. Basic operations using AWMS Installing AWMS Installing AMP. Hardware requirements. Cent OS and AWMS software. Basic configuration steps. Upgrade AWMS software. Licensing AWMS. AWMS documentation Adding Device to AWMS Folders and Groups. Adding devices general process. Manually adding devices. Device discovery and managing device discovery. Moving a device to a folder. Troubleshooting IAP Organizaion and Groups Overview of IAP.Airwave integration. Golden configuration. IAP Organization options. IAP Whitelist Using Visual RF and Visual RF Plan Navigation. Setup. Heat-maps and location information. Import floorplan graphics. Plan deployments. Provision APs. Manage Visual RF performance Network Health Diagnostics page indicators. Network performance tabs. Source of issues. Network issues Troubleshooting Clients and Wireless Networks Searching for users and Diagnostics tab. Client issues. Network issues. AP issues. Switch/Controller issues. General Issues Rogue Detection and Using RAPIDS Why use RAPIDS. Threat Detection Methods. Rules. Classifications. IDS Events Report. New Rogue Devices Report. Visualization. PCI Compliance.WMS Offload Managing Administrative Access, Alerts, Triggers and Reporting Configure role-based administrative use access to the AMP system. Triggers. Alerts. Define and generate reports Scalability and Redundancy VM Redundancy. Failover for Redundancy. Master Console for large deployments. Multiple AMP Server deployments. Large Deployment example System Administration AMP Maintenance. Device Maintenance Wired Device Management Monitoring wired devices in AWMS. Wired device port and interface information. Wired device bandwith statistics and counters. Managing and configuring wired devices via AWMS templates AirWave Aruba Groups How AWMS configures devices. Using groups to control policies. Creating and controlling groups. Basic Group Design.Configuration Audits IAP Template Configuration Fetching a Template. Template Variables. Templates Configuration IAP GUI Configuration Golden configuration. GUI mode. GUI configuration Additional course details: Nexus Humans Managing Campus Networks with Aruba AirWave, Rev. 19.21 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing Campus Networks with Aruba AirWave, Rev. 19.21 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Managing Campus Networks with Aruba AirWave, Rev. 19.21
Delivered OnlineFlexible Dates
Price on Enquiry

PMI Agile Certified Practitioner (PMI-ACP) Exam Preparation

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for project leaders, scrum masters, coaches, product owners, and team members who intend on taking the PMI-ACP© exam. This course provides participants with a foundation of the PMI-ACP© exam. Participants will be introduced to PMI Agile concepts and practices with banks of sample questions. PMI-ACP© Exam Preperation PMI-ACP© Exam Particulars Overview PMI-ACP© Exam Particulars PMI-ACP© Candidate Requirements PMI-ACP© Candidate Fees PMI-ACP© Exam Application Process Core Agile Concepts Core Agile Concepts Overview Traditional Project Management Methodologies Drawbacks of Waterfall Methodologies Agile Approach Empirical Process Control Agile and Traditional Project Management Choice of Methodologies/Frameworks The Agile Manifesto The Agile Manifesto Overview Manifesto Contributors Manifesto Values Manifesto Principles Common Agile Methodology Elements Common Agile Methodology Elements Overview Project (Product; Release) Initiation Agile Planning Iteration Planning and Executing Project Initiation Project Initiation Overview Determine Project Justifications and Metrics Provide Value-Driven Delivery Write Project Vision Statement Create Project Charter Identify Stakeholders and Leader/Coach Form Project Team Agile Teams and Team Space Agile Teams and Team Space Overview Scrum Master/Coach Product Owner/Customer Team Members/Developers (XP) Trackers and Testers Other Roles Team Space Physical Space Recommendations Agile Planning Agile Planning Overview Develop Epics and Stories Create Stories Non-Customer Facing Stories Personas and Extreme Personas Story Maps Estimating Stories Prioritizing Stories Create Product Backlog Create Product Roadmap Conduct Release Planning Create Parking Lot Iterations/Sprints Iterations/Sprints Overview Velocity Determination Iteration Planning Meeting Iteration Planning Guidelines Development Testing Daily Standup Meetings Progress Tracking Velocity Tracking Interpersonal Aspects of Agile Interpersonal Aspects of Agile Overview Methodologies and Uncertainty Coach/Scrum Master Team Motivation Soft Skills Emotional Intelligence Collaboration Negotiations Active listening Conflict Resolution Speed Leas? Model of Group Conflict Conducting Retrospectives Mindsets of Agile Coaches Leadership Stages Key Coaching Responsibilities Agile Methodologies Agile Methodologies Overview XP and Scrum Terms XP Terms and Concepts XP Primary Practices XP Corollary Practices Scrum Lean Software Development Seven Principles of Lean Seven Types of Muda Responsibilities Core Beliefs of Lean-Agile Software Development Other Principles of Lean-Agile Software Development Value Stream Mapping Lean-Agile Software Development Portfolio Management Additional course details: Nexus Humans PMI Agile Certified Practitioner (PMI-ACP) Exam Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PMI Agile Certified Practitioner (PMI-ACP) Exam Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

PMI Agile Certified Practitioner (PMI-ACP) Exam Preparation
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Endpoint Protection 14.X - Configure And Protect

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions

Symantec Endpoint Protection 14.X - Configure And Protect
Delivered OnlineFlexible Dates
Price on Enquiry

CCAS Check Point Certified Automation Specialist

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who automate, orchestrate, and troubleshoot Check Point secured environments. Overview Explain how automation and orchestration work together Understand the key drivers for incorporating automation and orchestration into security management Execute a shell script that demonstrates how to build a comprehensive Security Policy. Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions Demonstrate how to define new objects and modify existing ones by using the Check Point API The goal of this course is to provide an understanding of the advanced concepts and skills necessary to automate and orchestrate tasks relating to managing Check Point Security Policies Course Ouline Explain how automation and orchestration work together Understand the key drivers for incorporating automation and orchestration into security management Execute a shell script that demonstrates how to build a comprehensive Security Policy. Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions Demonstrate how to define new objects and modify existing ones by using the Check Point API Demonstrate how to create API commands to efficiently maintain the Check Point Security Management Server database Demonstrate how to use different methods to update the database with API commands Become familiar with client-side and server-side scripting and scripting languages Understand how to use the Bash shell to develop APIs Recognize and describe many of the open source tools that are available to assist with API development Demonstrate how to use a custom REST application to update the database of a Security Management Server Demonstrate how to use Postman to manage the Security Policy database through the Check Point API Understand what steps to take to troubleshoot and debug API scripts Demonstrate basic troubleshooting techniques by reviewing debugging messages in various forms Understand how to use self-service portal capabilities to provide general IT services Recognize how automation tools work with Check Point APIs to automate security management tasks and orchestrate workflow behind service portals Demonstrate common tasks that are automated in a Web portal to manage the Security Policy LAB Exercises Demonstrate Check Point automation and orchestration Manage objects using the Check Point API Create a management API shell script Use a variety of methods to execute API commands Use a custom REST tool for API calls Use Postman for API calls Debug the Check Point management API Automate tasks using a Check Point API enabled Web portal Additional course details: Nexus Humans CCAS Check Point Certified Automation Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCAS Check Point Certified Automation Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCAS Check Point Certified Automation Specialist
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Designing the FlexPod Solution (FPDESIGN)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for post-sales audiences and is aimed at channel partners, customer network engineers and administrators whose interest is focused around designing a scalable infrastructure with the FlexPod. Overview Upon completing this course, you will be able to meet these overall objectives: Describe the FlexPod data center solutions and architecture Identify FlexPod workload sizing and technical specifications Describe the FlexPod deployment and management strategies The goal of this course is to evaluate the FlexPod solution design process in regards to the contemporary data center challenges. The course provides a comprehensive understanding of the reconnaissance and analytics to assess computing solution performance characteristics and requirements. In addition this course will describe the hardware components of the FlexPod and the process for selecting proper hardware for a given set of requirements. FlexPod Data Center Solutions and Architecture Describe data center elements Identify data center business challenges Identify data center environmental challenges Identify data center technical challenges Describe the data center consolidation trend Describe the FlexPod solution Identify the benefits of FlexPod Describe FlexPod platforms Describe FlexPod validated and supported designs Identify the supported Cisco UCS components Identify the supported Cisco Nexus switch components Identify the supported NetApp storage components FlexPod Workload Sizing and Technical Specifications Describe FlexPod performance characteristics Describe server virtualization performance characteristics Describe desktop virtualization performance characteristics Describe reconnaissance and analysis tools Describe the process for deploying analysis tools Configure the Microsoft MAP Toolkit Identify FlexPod Design components Describe FlexPod Sizing considerations Employ Cisco UCS Application Sizer Employ Cisco UCS VXI Resource Comparison tool Describe NetApp Solution Builder Sizing tool FlexPod Deployment and Management Strategies Describe key FlexPod LAN features Describe key FlexPod SAN features Identify FlexPod server provisioning features List FlexPod high availability features Describe supported FlexPod SAN features Describe FlexPod virtual storage tiering features Identify Cisco FlexPod validated designs Identify FlexPod data center with VMware vSphere 5.1 Identify FlexPod data center with VMware vSphere 5.1 with Cisco Nexus 7000 Identify FlexPod data center with Microsoft Private Cloud Enterprise Design Guide Identify FlexPod Select with Cloudera's Distribution including Apache Hadoop (CDH) Identify FlexPod Cisco Nexus 7000 and NetApp MetroCluster for multisite deployment Identify data center operations and management challenges Describe FlexPod validated management solutions Describe Cisco UCS Director turnkey solutions Identify Cisco UCS Director management types Describe Cisco UCS Director automation Describe self-service provisioning and reporting Identify the customer challenges and goals Describe the workload analysis Describe the component selection process Review the selected component Analyze the solution Additional course details: Nexus Humans Cisco Designing the FlexPod Solution (FPDESIGN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Designing the FlexPod Solution (FPDESIGN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Designing the FlexPod Solution (FPDESIGN)
Delivered OnlineFlexible Dates
Price on Enquiry