Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer In this 3 Day Cisco Course, students will learn how to deploy Voice Gateways/CUBE and setup Cisco Unified Communication Manager (CUCM) to deploy SIP Trunking. The course starts out with an overview of Cisco gateways and their uses. Next, students learn about MGCP and SIP and how to implement each protocol. Students will then learn how to use Cisco CUBE to connect CUCM, Gateways and Service Providers together. This course details how to connect a Cisco environment to a Service Provider using a Cisco CUBE. Introduction to Voice Gateways Cisco UC Networks and the Role of Gateways Gateway Call Routing and Call Legs Configuring Gateway Voice Ports DSP Functionality, Codecs, and Codec Complexity Router Requirements for CUBE SIP Protocol Overview Gateway Dial Plans VoIP Call Legs Dial Plan Implementation Configuring (CUCM) Cisco Unified Communication Manager 12.5 Cisco UCM Audio Codec Preference List Cisco UCM Region Configuration Device Pool Configuration Annunciator Configuration Conference Bridge Configuration Media Termination Point Configuration Music on Hold Server Configuration Music on Hold Service (IP Voice Media Streaming App) Parameter Settings Music on Hold Service (Duplex Streaming) Parameter Settings Media Resource Group Configuration Media Resource Group List Configuration UC Service Configuration Service Profile Configuration End User Configuration SIP Trunk Security Profile Configuration used by SIP trunk to Cisco UBE SIP Profile Configuration used by SIP trunk to Cisco UBE SIP Trunk to Cisco UBE Configuration Route Pattern Configuration Configuring Cisco Unified Border Element (CUBE) Deploying Cisco VCUBE CUCM to CUBE Integration Configuration Steps to connecting to a SIP Trunk Provider Interworking Security and Call Admission Control Media Manipulation, Enhancement & Optimization SIP UA Translation Rules VoIP Dial Peer SIP Registration SIP attributes of CUBE Transcoding services Creating and configuring Sip Trunks CUBE Configuration CUBE Call Flow CUBE Dial-Peers Call Routing CUBE Advanced Call Routing Media Manipulation External/PSTN Call Recording Call Admission Control Multiple Non-Authenticated SIP Trunks on a CUBE Multiple Authenticated/Registered SIP Trunks on a CUBE Configuring High Availability High availability on ISR G2 High availability on ISR 4k High availability on ASR Cisco Unified Border Element (CUBE) Security Five Layers of Security in CUBE SIP TLS Support with SRTP Monitoring and Troubleshooting Cisco CUBE Dialed Number Analyzer (DNA) for CUBE SIP Profile Test Tool Troubleshooting Serviceability
Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Implement Zero-Trust Security using VMware NSX segmentation Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware vRealize Log Insight⢠for NSX⢠and VMware vRealize Network Insight⢠to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX Network Detection and Response This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX-T? Data Center for intrinsic security. In this course, you are introduced to all the security features in NSX-T Data Center, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© Network Detection and Response?.In addition, you are presented with common configuration issues and given a methodology to resolve them. Course Introduction Introductions and course logistics Course objectives Security Basics Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX-T Data Center aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust Architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX-T Data Center and VMware Identity Manager? Integrate NSX-T Data Center and LDAP Describe the native users and roles in NSX-T Data Center Create and assign custom user roles Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use vRealize Log Insight for NSX and vRealize Network Insight to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX Network Detection and Response Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX Network Detection and Response and its use cases Explain the architecture of NSX Network Detection and Response in NSX-T Data Center Describe the visualization capabilities of NSX Network Detection and Response
Duration 4 Days 24 CPD hours This course is intended for Data center architects Cloud infrastructure architects Network engineers System administrators Storage administrators Engineers requiring advanced configuration skills Cisco integrators and partners Overview After taking this course, you should understand: Data center challenges and cloud solutions Cisco UCS Director architecture Cisco UCS Director setup and configuration Cisco ACI Multitenancy in FlexPod Cisco ACI infrastructure Resource groups and service offerings Tenant onboarding Self-service provisioning Application containers The Designing and Deploying Cisco UCS Director with ACI (UCSDACI) v6.6 course shows you how to use Cisco UCS© Director software to manage physical and virtual infrastructure elements, including Cisco Application Centric Infrastructure (Cisco ACI?). You will learn to use orchestration and automation functions of Cisco UCS Director to effectively manage infrastructure and automate IT processes. The course offers hands-on experience installing and configuring Cisco UCS Director software. You will also learn about features such as bare-metal provisioning; compute, network, and storage management; orchestration, including Application Policy Infrastructure Controller (APIC); Cisco UCS Director custom tasks, and more. Introducing Cisco UCS Director Understanding Data Center Challenges Understanding the Benefits of Cisco UCS Director Understanding Cisco UCS Director Components Explaining Cisco UCS Director Architecture Explaining Bare-Metal Agent Introducing Cisco Application Centric Infrastructure Understanding Cisco ACI Overview Understanding Cisco ACI Terms and Constructs Understanding Cisco UCS Director Infrastructure Management Understanding Cisco UCS Director Deployment Introducing Role-Based Access Control Explaining User Groups/Roles/Users Introducing Orchestration Understanding Orchestration Introducing Cisco UCS Director ACI Explaining Cisco UCS Director with ACI So Understanding Multitenancy with Cisco UCS Director ACI Explaining Multitenancy with Cisco UCS Director ACI Understanding Resource Groups and Service Offerings Introducing Advanced Tenant Onboarding Onboarding a Tenant Tagging Resources Introducing Application Containers Understanding Application Profiles Understanding Service Container Catalog Understanding Deployment Through Self-Service Portal Understanding Self-Service Provisioning Portal Understanding Service Request Understanding Virtual Data Center Understanding Policies Understanding vDC and Groups Use Case Additional course details: Nexus Humans CiscoDesigning and Deploying Cisco UCS Director with ACI (UCSDACI) v6.6 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CiscoDesigning and Deploying Cisco UCS Director with ACI (UCSDACI) v6.6 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy. This course is also designed for students who are seeking the CertNexus Certified Internet of Things Security Practitioner (CIoTSP) certification and who want to prepare for Exam ITS-110. Overview This program will validate that the candidate has the knowledge, skills, and abilities to secure network environments for IoT devices, analyze vulnerabilities and determine reasonable controls against threats, and effectively monitor IoT devices and respond to incidents. This course is designed for practitioners who are seeking to demonstrate a vendor-neutral, cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem. Managing IoT Risks Map the IoT Attack Surface Build in Security by Design Securing Web and Cloud Interfaces Identify Threats to IoT Web and Cloud Interfaces Prevent Injection Flaws Prevent Session Management Flaws Prevent Cross-Site Scripting Flaws Prevent Cross-Site Request Forgery Flaws Prevent Unvalidated Redirects and Forwards Securing Data Use Cryptography Appropriately Protect Data in Motion Protect Data at Rest Protect Data in Use Controlling Access to IoT Resources Identify the Need to Protect IoT Implement Secure Authentication Implement Secure Authorization Implement Security Monitoring on IoT Systems Securing IoT Networks Ensure the Security of IP Networks Ensure the Security of Wireless Networks Ensure the Security of Mobile Networks Ensure the Security of IoT Edge Networks Ensuring Privacy Improve Data Collection to Reduce Privacy Concerns Protect Sensitive Data Dispose of Sensitive Data Managing Software and Firmware Risks Manage General Software Risks Manage Risks Related to Software Installation and Configuration Manage Risks Related to Software Patches and Updates Manage Risks Related to IoT Device Operating Systems and Firmware Promoting Physical Security Protect Local Memory and Storage Prevent Physical Port Access
Duration 4 Days 24 CPD hours This course is intended for C - Level Managers IT Managers Cyber Security Personelle Engineers Information Systems Owners ISSO's CISSP Students ISO's Overview Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam. You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture. Certified Security Leadership Officerÿ course is designed for mid and upper-level managers.ÿ If you are an engineer, this course will increase your knowledge in the leading information system security teams. Plus, the C)SLO will give you an essential understanding of current security issues, best practices, and technology. With this knowledge you will then be prepared to manage the security component of an information technology project. As a Security Leadership Officer, you will be the bridge between cybersecurity and business operations. Course Outline Security Management Risk Management Encryption Information Security Access Control Concepts Incident Handling and Evidence Operations Security Network Security Additional course details: Nexus Humans C)SLO-Certified Security Leadership Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)SLO-Certified Security Leadership Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This programme has been specifically designed to help experienced trainers, facilitators and coaches use Everything DiSC and the Five Behaviours assessments, and deliver workshops, with their own clients and in-house teams.
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: Channel Partner System Engineers System Administrators Architects Security Professionals Overview Upon successful completion of this course, the student will gain the following knowledge:How to describe and position Cisco UmbrellaDiscuss Secure Internet Gateway and Ransomware ProtectionLearn about DNS & IP layer enforcement & Intelligent ProxyDescribe Command and control callback blockingDiscuss Threat IntelligenceCompare Umbrella PackagesUnderstand Roaming SecurityBasic understanding of Cisco Roaming ClientUnderstand how to use Cisco Umbrella Virtual ApplianceExplain the ease of Integrating Cisco Umbrella into Active DirectoryDiscuss Umbrella ReportingUnderstand Utilize Multi-Organization Tools Cisco Umbrella? is a cloud security platform that provides the first line of defense against threats on the Internet. Being able to understand and position how Cisco Umbrella? works and what are the features is the key focus of this 2-day Cisco© online IT class. Students who enter the course with a basic understanding of Cisco© products and IT solutions will be able to describe the Cisco Umbrella?, understand Secure Internet Gateway and Ransomware Protection, discuss Threat Intelligence, use Cisco© Roaming Client. Cisco Umbrella- Security Solution Discuss Security Internet Gateway Explain Ransomware Protection DNS & IP layer enforcement Intelligent Proxy Command & control callback blocking Threat Intelligence Umbrella Packages Implementing Cisco Umbrella Overview of Cisco Umbrella How do you Protect your network Review how to Point your DNS to Cisco Umbrella What are the custom policies? Discuss Intelligent Proxy Umbrella Policy Tester Policy Precedence Roaming Client Introduction to Umbrella Roaming Client Prerequisites Downloading and Installing Adding IP Layer Enforcement Status, States, and Functionality Virtual Appliances Internal Domains Umbrella Roaming Security AnyConnect: Cisco Umbrella Roaming Security Client Administrator Guide Cisco Umbrella Dashboard at a glance Cisco Certificate Import Virtual Appliance Setup Guide Discuss Deployment Guidelines How to Deploy the VAs Review via VMware Review via Hyper-V Understand Your VAs Local DNS Forwarding Overview of DNS Explain Sites and Internal Networks Sizing Active Directory Overview of Active Directory Discuss Up DNS Forwarding with your VAs Active Directory Environment Route DNS Traffic Communication Flow Multiple Active Directory and Umbrella Sites Reporting Overview Reporting Basics Understanding Security Categories Scheduled Reports: Overview Security Overview Report Activity Search Report Security Activity Report Destinations Report Identities Report Cloud Services Report Admin Audit Log Report Umbrella Multi-Org Overview Cisco Umbrella Multi-Org Overview Centralized Settings Centralized Reports: Service Status Centralized Reports: Cloud Services Additional course details: Nexus Humans Cisco Administering and Positioning Cisco Umbrella Operations (ADMUMB) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Administering and Positioning Cisco Umbrella Operations (ADMUMB) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Enhance your ability to apply a range of techniques and tools to help improve management of emotions under stress, make more effective decisions in difficult scenarios and manage your energy more effectively in stressful situations.
One of the most frequent telephone queries we receive at Inclusive Solutions is from parents whose disabled son or daughter is about to make the transition from Primary to Secondary School. Typically there is a tale to be told of LA planning procedures that are too little and too late, and a severe lack of confidence from all parties that the transition will be successful. Little wonder that transfers from mainstream to special schools continue to peak at Year 7! Course Category Peer Support Strategic Work Visioning and Problem Solving Person Centred Planning Description One of the most frequent telephone queries we receive at Inclusive Solutions is from parents whose disabled son or daughter is about to make the transition from Primary to Secondary School. Typically there is a tale to be told of LA planning procedures that are too little and too late, and a severe lack of confidence from all parties that the transition will be successful. Little wonder that transfers from mainstream to special schools continue to peak at Year 7! Because of this we have put together a different kind of support plan that aims to maximise the chances of Primary/Secondary transitions being successful. In essence our approach brings together a person centred planning tool called ‘MAPS’ and a ‘Circle of Friends’ recruited from within the Year 7 tutor group. The Circle of Friends forms the core of the MAPS session and are central in developing (with parents and staff) a Plan for embedding the focus child in the new school setting. Community Circles bring together disabled and non disabled pupils in a network of mutual support. Peer support is an approach to impacting on inclusion and transition in primary and secondary schools by actively involving other pupils. Enjoy participating in a multi media workshop that will challenge, entertain and reach for your emotions. Watch young people doing their stuff! Testimonials ‘It had a huge impact on all levels’ ‘Very user friendly’ Learning Objectives To be able to understand the values and wider context of peer support To be able to set up and run a peer counselling scheme to reduce bullying To understand and be able to maximise the power of the peer group in supporting relationships, achievement and behaviour change Who Is It For ? Primary and secondary teachers Heads and Deputies SENCOs Learning Support and Guidance staff Advanced Skills Teachers Parents Local Authority Support Services Community Development workers Early Years and School based Practitioners Course Content The course explores the questions : How can we improve our transition arrangements? Practically how do we go about involving pupils in this process? Do you have any fresh ideas on transition processes? Take a tour through this range of strategies for bringing about smooth transitions, meeting challenging emotional needs and to develop inclusion. Circles of friends: peer support and inclusion. Pupils work to problem solve with and actively support the inclusion and behaviour change of one of their peers Community Circles of Exchange and Mutual Support set up between disabled and non disabled group Peer support, counselling and mediation: reduce bullying and address emotional needs as older pupils offer active listening support and interventions Cross Age Mentoring: older pupils offer supportive mentoring to younger pupils in the same school or in feeder primary schools MAPS and PATH as person centred planning for transitions
Duration 5 Days 30 CPD hours This course is intended for Linux system administrators, site reliability engineers, and other IT professionals with some Ansible experience who are interested in learning how to manage and automate the deployment, configuration, and operation of key network services included with Red Hat Enterprise Linux 8. Overview Provide key network services using software included with Red Hat Enterprise Linux 8, including DNS with Unbound and BIND9, DHCP and DHCPv6, client e-mail transmission, printing service, NFS and SMB protocol file sharing, SQL database service with MariaDB, and web services using Apache HTTPD, nginx, Varnish, and HAProxy. Configure advanced networking for server use cases, including device teaming. Use Red Hat Ansible Engine to automate the manual deployment and configuration tasks covered in this course. Learn how to configure, manage, and scale key services used in the data center Red Hat Services Management and Automation (RH358) is designed for IT professionals with some experience managing Linux© systems and want to learn more about how to manage and deploy network services included with Red Hat© Enterprise Linux which are particularly important in the modern IT data center. You will learn how to install, configure, and manage basic configurations of these services manually, and then use Red Hat Ansible© Engine to automate your work in a scalable, repeatable manner. This course is based on Red Hat Ansible Engine 2.9 and Red Hat Enterprise Linux 8.1. 1 - Manage network services Discuss and review key tools and skills needed to manage network services. 2 - Configure link aggregation Improve the redundancy or throughput of network connections of servers by configuring Linux network teaming between multiple network interfaces. 3 - Manage DNS and DNS servers Explain the operation of DNS service, troubleshoot DNS issues, and configure servers to act as a DNS caching nameserver or as an authoritative name server. 4 - Manage DHCP and IP address assignment Explain and configure services used for IPv4 and IPv6 address assignment including DHCP, DHCPv6, and SLAAC. 5 - Manage printers and printing files Configure systems to print to a network printer that supports IPP Everywhere, as well as manage existing printer queues. 6 - Configure email transmission Discuss how mail servers operate, then configure a server to use system tools and Postfix to send email messages through an outbound mail relay. 7 - Configure MariaDB SQL databases Discuss the basic operation of SQL-based relational databases, perform basic SQL queries for troubleshooting, and be able to set up a simple MariaDB database service. 8 - Configure web servers Provide web content from Apache HTTPD or Nginx web servers, then configure them with virtual hosts and TLS-based encryption. 9 - Optimize web server traffic Improve performance of your web servers by using Varnish to cache static content being served and HAProxy to terminate TLS connections and balance load between servers. 10 - Provide file-based network storage Deliver simple file-based network shares to clients using the NFS and SMB protocols. 11 - Access block-based network storage Configure iSCSI initiators on your servers to access block-based storage devices provided by network storage arrays or Ceph storage clusters.