Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions
Duration 4 Days 24 CPD hours This course is intended for The course content is aimed at operators of devices running the Junos OS in a NOC environment. These operators include network engineers, administrators, support personnel, and reseller support personnel. Overview After successfully completing this course, you should be able to: Reduce the time it takes to identify and isolate the root cause of an issue impacting your network. Gain familiarity with Junos products as they pertain to troubleshooting. Become familiar with online resources valuable to Junos troubleshooting. Gain familiarity with Junos tools used in troubleshooting. Identify and isolate hardware issues. Troubleshoot problems with the control plane. Troubleshoot problems with interfaces and other data plane components. Describe the staging and acceptance methodology. Troubleshoot routing protocols. Describe how to monitor your network with SNMP, RMON, Junos Traffic Vision (formerly known as JFlow), and port mirroring. Become familiar with JTAC procedures. This instructor-led four-day course is designed to provide introductory troubleshooting skills for engineers in a network operations center (NOC) environment. Chapter 1: Course Introduction Course Introduction Chapter 2: Troubleshooting as a Process Before You Begin The Troubleshooting Process Challenging Network Issues The Troubleshooting Process Lab Chapter 3: Junos Product Families The Junos OS Control Plane and Data Plane Field-Replaceable Units Junos Product Families Lab: Identifying Hardware Components Chapter 4: Troubleshooting Toolkit Troubleshooting Tools Best Practices Lab: Using Monitoring Tools and Establishing a Baseline Chapter 5: Hardware and Environmental Conditions Hardware Troubleshooting Overview Memory and Storage Boot Monitoring Hardware-Related System Logs Chassis and Environmental Monitoring Lab: Monitoring Hardware and Environmental Conditions Chapter 6: Control Plane Control Plane Review System and User Processes Monitoring Routing Tables and Protocols Monitoring Bridging Monitoring the Address Resolution Protocol Lab: Control Plane Monitoring and Troubleshooting Chapter 7: Control Plane Protection Protection Overview DDOS Protection Loopback Filter Lab: Control Plane Monitoring and Troubleshooting Chapter 8: Data Plane ? Interfaces Interface Properties General Interface Troubleshooting Ethernet Interface Troubleshooting Lab: Monitoring and Troubleshooting Ethernet Interfaces Chapter 9: Data Plane ? Other Components Definition of a Data Plane Problem Data Plane Components Data Plane Forwarding Load-Balancing Behavior Firewall Filters and Policers Data Plane Troubleshooting Case Study Lab: Isolate and Troubleshoot PFE Issues Chapter 10: Staging and Acceptance Testing Initial Inspection and Power-on General System Checks Interface Testing Chapter 11: Troubleshooting Routing Protocols Troubleshooting OSPF Troubleshooting BGP Troubleshooting Routing Loops and Route Oscillation Lab: Troubleshooting Routing Protocols Chapter 12: High Availability High Availability Overview Graceful Routing Engine Switchover Graceful Restart Nonstop Active Routing and Bridging Unified In-Service Software Upgrade Chapter 13: Network Monitoring SNMP RMON Telemetry Flow Monitoring Lab: Monitoring the Network Chapter 14: vMX Troubleshooting vMX Overview Troubleshooting Lab: Monitoring vMX Chapter 15: JTAC Procedures Opening a Support Case Customer Support Tools The Content of a PR Transferring Files to JTAC Chapter 16: Automated Support and Prevention Overview Service Now Service Insight Lab: Automated Support and Prevention Additional course details: Nexus Humans JTNOC - Junos Troubleshooting in the NOC training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JTNOC - Junos Troubleshooting in the NOC course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Enterprise Network System Installers System Integrators System Administrators Network Administrators Solutions Designers Overview Upon completion of this course, you will be able to: Identify the various components and architecture of the Cisco SD-WAN solution. Deploy vEdge routers in a secure extensible network. Create templates to aide in the deployment and operation of the secure extensible network. Configure and verify overlay routing in the secure extensible network. Create simple policies to control traffic flow in the secure extensible network. The Cisco SD WAN Operation and Deployment (SDWFND) v1.0 is a 2-day, instructor-led, hands-on course that addresses the Cisco SD-WAN Operations and Deployment functions. Cisco SD-WAN is a new technology, this training covers salient features such as zero-touch provisioning, secure network bring-up, configuration using feature templates, configuration of Overlay Management Protocol (OMP) and policies for network traffic management. Module 1: SD-WAN Solution Components Lesson 1: SD-WAN Solution Overview Lesson 2: SD-WAN Components Lesson 3: Managing SD-WAN Components Module 2: Secure Extensible Network Deployment Lesson 1: Secure Control Plane Operation Lesson 2: Secure Control Plane Deployment Lesson 3: Secure Data Plane Operation Lesson 4: Cloud Deployments and Redundancy Module 3: SD-WAN Template Deployment Lesson 1: Templates Overview Lesson 2: Feature Templates Lesson 3: Device Templates Lesson 4: Attaching Devices to Templates Module 4: SD-WAN Overlay Routing Lesson 1: Overlay Routing Overview Lesson 2: OMP Route Advertisements Lesson 3: OMP Route Redistribution and Network Segmentation Lesson 4: Configuring and Verifying Overlay Routing Module 5: SD-WAN Policies and QoS Lesson 1: Policy Overview and Framework Lesson 2: vSmart Policy Operation and Construction Lesson 3: Forwarding and QoS Overview Lesson 4: Configuring and Monitoring QoS Forwarding Lab outline Lab 1: Manage and Monitor SD-WAN Components Lab 2: Deploy and Verify SD-WAN vEdge Routers Lab 3: Deploy SD-WAN Templates Lab 4: SD-WAN Overlay Routing Lab 5: SD-WAN Policies
Duration 2 Days 12 CPD hours This course is intended for Enterprise Network System Installers System Integrators System Administrators Network Administrators Solutions Designers Overview Upon completion of this course, you will be able to: Identify the various components and architecture of the Cisco SD-WAN solution. Deploy vEdge routers in a secure extensible network. Create templates to aide in the deployment and operation of the secure extensible network. Configure and verify overlay routing in the secure extensible network. Create simple policies to control traffic flow in the secure extensible network. The Cisco SD-WAN Operation and Deployment (ENSDW) v1.0 course provides an overview of the Cisco SD-WAN solution and SD-WAN components. Students will learn how to create, manage, and operate a secure extensible network using Cisco SD-WAN products. The course covers how to configure, operate, and monitor overlay routing in a secure extensible network. Students will also learn about policies and quality of service (QoS) in the SD-WAN overlay network. SD-WAN Solution Components SD-WAN Solution Overview SD-WAN Components Managing SD-WAN Components Secure Extensible Network Deployment Secure Control Plane Operation Secure Control Plane Deployment Secure Data Plane Operation Cloud Deployments and Redundancy SD-WAN Template Deployment Templates Overview Feature Templates Device Templates Attaching Devices to Templates SD-WAN Overlay Routing Overlay Routing Overview OMP Route Advertisements OMP Route Redistribution and Network Segmentation Configuring and Verifying Overlay Routing SD-WAN Policies and QoS Policy Overview and Framework vSmart Policy Operation and Construction Forwarding and QoS Overview Configuring and Monitoring QoS Forwarding Additional course details: Nexus Humans ENSDW-Cisco SD-WAN Operation and Deployment training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ENSDW-Cisco SD-WAN Operation and Deployment course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Definitive IP routing training course description An intensive hands on IP routing course leading to LINX Accredited Internet Technician stage 2 focusing on routing in an IP environment. The course concentrates on OSPF and IS-IS but also covers BGP and MPLS. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. A multiple choice exam, leading to the LAIT II certification, is available after the course. The exam consists of 60 questions and lasts 2.0 hours. What will you learn Calculate subnet numbers in seconds. Configure and troubleshoot static routes. Explain how OSPF works. Build resilient networks with VRRP and OSPF. Implement and troubleshoot OSPF, IS-IS and VLANS. Evaluate and choose appropriate routing protocols for particular scenarios. An optional multiple choice exam, leading to the LAIT II certification, is included at the end of the course. The exam consists of 60 questions and lasts 2.0 hours. Definitive IP routing training course details Who will benefit: Network engineers Prerequisites: TCP/IP Foundation for engineers Duration 5 days Definitive IP routing training course contents Basic routing Review of LAIT I routing, reading routing tables. Hands on Setting up a routed network. Static routes Why use static routes? Default routes. Hands on Configuring static routes. First hop redundancy Default gateways, VRRP/HSRP/GLBP. Load sharing, critical IP addresses. Hands on VRRP. Basic OSPF What is OSPF? Process IDs, passive interfaces. Hands on Simple OSPF. Subnetting Bit boundary subnetting, calculating network numbers. Exercise: Subnetting. OSPF overview Metrics, convergence, DV vs. Link state, IGPs, classless, OSPF features, load sharing, OSPF authentication. Hands on OSPF features. OSPF within an area How OSPF works, LSAs, LSDB, router IDs, hellos, configuring hellos, exchange protocol. Hands on Investigating OSPF structures. OSPF areas Scalability, why areas? Area IDs, area 0, ABRs, ABR resilience, areas & LSDBs & LSAs, virtual links. Hands on Multi area OSPF. Redistribution Multiple routing protocols, common scenarios, routing distance, External LSAs, E1 and E2. Type 4 LSAs. OSPF and default routes. Hands on Configuring static route redistribution. Route aggregation Route summarisation. How to aggregate, CIDR, ASBR summarisation. Hands on OSPF address summarisation. OSPF packet formats OSPF packets, protocol stack, packet flows, OSPF headers, neighbours, neighbour states, DRs, adjacencies, BDRs, DR election. Hands on Analysing OSPF packets, troubleshooting. OSPF OSPF stub areas LSA types, area types, area architecture, stub areas, default routes, benefits & disadvantages of stub areas, TSSAs, NSSAs, Type 7 LSAs. Hands on Stub and TSSA configuration. IS-IS End systems, Intermediate systems, how IS-IS works, IS-IS router ID, Level 1, Level 2, IS-IS hierarchy. Hands on Configuring IS-IS, troubleshooting IS-IS. The Internet Autonomous systems, Peering, transit, looking glasses. Hands on Internet routing tables. Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. Routing IPv6 Multi protocol routing, IPv6 addressing, IPv6 routing tables, IPv6 static routes, OSPFv3, IS-IS and IPv6. Hands on Routing IPv6. STP and L2 routing STP, RSTP, L2 IS-IS, Multi system link aggregation. Hands on RSTP. MPLS Core MPLS, MPLS and the 7 layer model, MPLS protocol, MPLS standard, MPLS runs on routers, MPLS history, Why MPLS?, LSRs, PE and P router roles, FEC, swapping labels, MPLS packet format. Hands on Enabling MPLS. Testing and troubleshooting of MPLS. Appendix EIGRP: How EIGRP works, DUAL.
LINX II training course description An intensive hands on IP routing course leading to LINX Accredited Internet Technician stage 2 focusing on routing in an IP environment. The course concentrates on OSPF and IS-IS but also covers BGP and MPLS. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. A multiple choice exam, leading to the LAIT II certification, is available after the course. The exam consists of 60 questions and lasts 2.0 hours. What will you learn Calculate subnet numbers in seconds. Configure and troubleshoot static routes Explain how OSPF works. Build resilient networks with VRRP and OSPF. Implement and troubleshoot OSPF, IS-IS, simple BGP and simple MPLS. Evaluate and choose appropriate routing protocols for particular scenarios. LINX II training course details Who will benefit: Network engineers. Prerequisites: LAIT I attendance and 55%+ exam score OR LAIT I exam only and pass (70%+) OR CCNA and take LAIT I exam on this course. Duration 5 days LINX II training course contents Basic routing Review of LAIT I routing, reading routing tables. Hands on Setting up a routed network. Static routes Why use static routes? Default routes. Hands on Configuring static routes. First hop redundancy Default gateways, VRRP/HSRP/GLBP. Load sharing, critical IP addresses. Hands on VRRP. Basic OSPF What is OSPF? Process IDs, passive interfaces. Hands on Simple OSPF. Subnetting Bit boundary subnetting, calculating network numbers. Exercise: Subnetting. OSPF overview Metrics, convergence, DV vs. Link state, IGPs, classless, OSPF features, load sharing, OSPF authentication. Hands on OSPF features. OSPF within an area How OSPF works, LSAs, LSDB, router IDs, hellos, configuring hellos, exchange protocol. Hands on Investigating OSPF structures. OSPF areas Scalability, why areas? Area IDs, area 0, ABRs, ABR resilience, areas & LSDBs & LSAs, virtual links. Hands on Multi area OSPF. Redistribution Multiple routing protocols, common scenarios, routing distance, External LSAs, E1 and E2. Type 4 LSAs. OSPF and default routes. Hands on Configuring static route redistribution. Route aggregation Route summarisation. How to aggregate, CIDR, ASBR summarisation. Hands on OSPF address summarisation. OSPF packet formats OSPF packets, protocol stack, packet flows, OSPF headers, neighbours, neighbour states, DRs, adjacencies, BDRs, DR election. Hands on Analysing OSPF packets, troubleshooting. OSPF OSPF stub areas LSA types, area types, area architecture, stub areas, default routes, benefits & disadvantages of stub areas, TSSAs, NSSAs, Type 7 LSAs. Hands on Stub and TSSA configuration. IS-IS End systems, Intermediate systems, how IS-IS works, IS-IS router ID, Level 1, Level 2, IS-IS hierarchy. Hands on Configuring IS-IS, troubleshooting IS-IS. The Internet Autonomous systems, Peering, transit, looking glasses. Hands on Internet routing tables. Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. Routing IPv6 Multi protocol routing, IPv6 addressing, IPv6 routing tables, IPv6 static routes, OSPFv3, IS-IS and IPv6. Hands on Routing IPv6. STP and L2 routing STP, RSTP, L2 IS-IS, Multi system link aggregation. Hands on RSTP. MPLS Core MPLS, MPLS and the 7 layer model, MPLS protocol, MPLS standard, MPLS runs on routers, MPLS history, Why MPLS?, LSRs, PE and P router roles, FEC, swapping labels, MPLS packet format. Hands on Enabling MPLS. Testing and troubleshooting of MPLS. Appendix EIGRP: How EIGRP works, DUAL.
IS-IS training course description A hands on course on IS-IS link state routing protocol. The main focus of the course is the use of IS-IS in an IP only environment but can be tailored to concentrate on the use of IS-IS in CLNP networks. Hands on sessions use Cisco routers. What will you learn Configure and troubleshoot IS-IS. Explain how IS-IS works. Describe the use of Level 1 and Level 2. Design IS-IS networks. IS-IS training course details Who will benefit: Network administrators. Network operators. Prerequisites: TCP/IP Foundation for engineers Duration 2 days IS-IS training course contents Introduction The history of IS-IS, OSI background, terminology, addressing, how OSI networking works, ES-IS, ISIS, IS types, basic OSI configuration, other configuration parameters. Running IS-IS in an IP environment Integrated routing, Dual IS-IS, OSI only IS-IS, IP only IS-IS, packet formats and the use of CLNP, Basic configuration. How IS-IS works in detail Link state theory, tuneable parameters, IS-IS metrics, hellos, CSNP intervals, retransmissions, TLVs, Sub TLVs, Designated routers and pseudo nodes, authentication. Level 1 and level 2 in detail Router types, circuit types, Hot potato routing, route leaking, Area partitioning. Multiple addresses Redistribution and summarisation Tagging and filtering
Highlights of the Course Course Type: Online Learning Duration: 9 Hours 45 Minutes Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about Cisco CCNA and networking Understand the core competencies and principles of Cisco CCNA and networking Explore the various areas of Cisco CCNA and networking Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert networking engineer Cisco CCNA (200-301) Volume 2 Complete Training Course Master the skills you need to propel your career forward in Cisco CCNA and networking. This course will equip you with the essential knowledge and skillset that will make you a confident networking engineer and take your career to the next level. This comprehensive cisco CCNA (200-301) volume 2 course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this cisco CCNA (200-301) volume 2 course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective Cisco CCNA and networking practice and equip you with the essential skills, confidence and competence to assist you in the Cisco CCNA and networking industry. You'll gain a solid understanding of the core competencies required to drive a successful career in Cisco CCNA and networking. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for networking engineer or for people who are aspiring to specialise in Cisco CCNA and networking. Enrol in this cisco CCNA (200-301) volume 2 course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive cisco CCNA (200-301) volume 2 course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this Cisco CCNA and networking can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This cisco CCNA (200-301) volume 2 course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This cisco CCNA (200-301) volume 2 course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This cisco CCNA (200-301) volume 2 course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction Introduction 00:06:00 Security Introduction to ACL 00:23:00 ACL Lab 00:42:00 SwitchPort Security 00:11:00 SwitchPort Security Lab 00:12:00 Understanding DHCP 00:10:00 DHCP Configuration Lab 00:49:00 DHCP Snooping 00:13:00 DHCP Snooping Lab 00:20:00 Securing Network Devices 00:14:00 Dynamic ARP Inspection 00:16:00 Device Management Protocol SNMP Protocol 00:13:00 SYSLOG Message Logging 00:08:00 Network Address Translation (NAT) Network Time Protocol 00:11:00 CDP and LLDP (LAB) 00:15:00 Network Address Translation 00:18:00 IP Services HSRP Redundancy Protocol 00:10:00 HSRP Redundancy Protocols Lab 00:19:00 QoS QoS Part 1 00:29:00 QoS Part 2 00:16:00 QoS Lab 00:25:00 WAN Architecture Metro Ethernet 00:22:00 MPLS 00:17:00 MPLS OSPF 00:09:00 MPLS OSPF Lab 00:14:00 Virtual Private Network 00:18:00 Cloud Architecture Understanding Cloud Architecture 00:25:00 Controller Based Networks SDN and Controller Based Networks 00:23:00 Cisco Software Design Access 00:18:00 Programability Understanding Rest and JSON 00:25:00 Understanding Chef Puppet and Ansible 00:22:00 Assessment Assessment - Cisco CCNA (200-301) Volume 2 Complete Training 00:10:00 Certificate of Achievement Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00
Hyper V for engineers training course description This five day course will provide you with the knowledge and skills required to design and implement Microsoft Server Virtualization solutions using Hyper-V and System Center. Please note that due to the nature of the lab / environment build delegates may be required to work in pairs. What will you learn Install and configure the Hyper-V server role. Create virtual machines, create and manage virtual hard disks and work with snapshots. Create and configure virtual machine networks in a Hyper-V environment. Provide high availability for Hyper-V environment by implementing failover clustering. Use System Center 2012 R2 Virtual Machine Manager. Create and manage virtual machines by using VMM. Hyper V for engineers training course details Who will benefit: Anyone designing, implementing, managing and maintaining a virtualization infrastructure. Prerequisites: Supporting Windows server 2012 Duration 5 days Hyper V for engineers training course contents Evaluating the environment for virtualization Overview of Microsoft virtualization, Overview of system center 2012 R2 components, Evaluating current environment for virtualization, Extending virtualization to the cloud environment. Selecting the appropriate virtualization method, Assessing the environment by using MAP. Installing and configuring the Hyper-V role Installing the Hyper-V role, Managing Hyper-V, Configuring Hyper-V settings, Hyper-V Host storage and networking, Installing the Hyper-V server role, Configuring Hyper-V settings, Accessing and managing Hyper-V remotely. Creating and managing virtual hard disks, virtual machines, and checkpoints Creating and configuring virtual hard disks, Creating and configuring virtual machines, Installing and Importing virtual machines, Managing virtual machine checkpoints, Monitoring Hyper-V, Designing virtual machines for server roles and services, Creating and managing virtual hard disks, Creating and managing virtual machines, Importing virtual machines and working with checkpoints monitoring Hyper-V. Creating and configuring virtual machine networks Creating and using Hyper-V virtual switches, Advanced Hyper-V networking features, Configuring and using Hyper-V network virtualization, Creating and using Windows Server 2012 R2 Hyper-V virtual switches, Configuring and using advanced virtual switch features, Configuring Hyper-V Network virtualization. Virtual machine movement and Hyper-V replica Providing high availability and redundancy for virtualization, Implementing virtual machine movement, Implementing and managing Hyper-V replica, Moving Hyper-V storage and virtual machines, Configuring and managing Hyper-V replica. Implementing failover clustering with Hyper-V Overview of failover clustering, Configuring and using shared storage, Implementing and managing failover clustering with Hyper-V, Creating a Hyper-V failover cluster, Managing a Hyper-V failover cluster. Installing and configuring System Center 2012 R2 virtual machine manager Integrating system center and server virtualization, Overview of VMM, Installing VMM, Adding hosts and managing host groups, Installing and configuring System Center 2012 R2 VMM, Managing hosts and host groups. Managing the Networking and storage infrastructure in System Center 2012 R2 VMM Managing networking infrastructure managing storage infrastructure, Managing infrastructure updates, Implementing a network infrastructure, Implementing a storage infrastructure, Managing infrastructure updates. Creating and managing VM using MS System Center 2012 R2 VMM VMM tasks in VMM, Creating, cloning, and converting VMs, Overview of VM updating, Creating a VM and modifying it's properties, Cloning a VM. Configuring and managing the MS System Center 2012 R2 VMM library and library objects Overview of the VMM library, Working with profiles and templates, Configuring and managing the VMM library, Creating and managing profiles and templates. Managing clouds in MS System Center 2012 R2 VMM Introduction to clouds, Creating and managing a cloud, Working with user roles in VMM, Creating a cloud, Working with user roles, Deploying VMs to a private cloud. Managing services in MS System Center 2012 R2 VMM and app controller Understanding services in VMM, Creating and managing services in VMM, Using app controller Creating a service template, Deploying a service and updating a service template, Configuring app controller, Deploying a VM in app controller. Protecting and monitoring virtualization infrastructure Overview of backup and restore options for VM, Protecting virtualization Infrastructure using DPM, Using Operations Manager for monitoring and reporting, Integrating VMM with Operations Manager, Implementing MS System Center 2012 R2 Operations Manager agents, Configuring Operations Manager monitoring components, Configuring Operations Manager integration with System Center 2012 R2 VMM.
Complete Python training course description Python is an agile, robust, expressive, fully objectoriented, extensible, and scalable programming language. It combines the power of compiled languages with the simplicity and rapid development of scripting languages. This course covers Python from the very basics of 'hello world!' through to object oriented programming and advanced topics such as multi threading. Hands on follows all the major sections in order to reinforce the theory. What will you learn Read Python programs. Write Python programs. Debug Python programs. Use Python's objects and memory model as well as its OOP features. Complete Python programming training course details Who will benefit: Anyone wishing to learn Python. Prerequisites: None. Duration 5 days Complete Python programming training course contents Welcome to Python: What is Python? Origins, features. Downloading and installing Python, Python manuals, comparing Python, other implementations. Getting started: Program output, the print statement, "hello world!", Program input, raw_input(), comments, operators, variables and assignment, numbers, strings, lists and tuples, dictionaries, indentation, if statement, while Loop, for loop. range(), list comprehensions. Files, open() and file() built-in functions. Errors and exceptions. Functions, Classes, Modules, useful functions. Python basics: Statements and syntax, variable assignment, identifiers, basic style guidelines, memory management, First Python programs, Related modules/developer tools. Python Objects: Other built-in types, Internal Types, Standard type operators, Standard type built-in functions, Categorizing standard types, Unsupported types. Numbers: Integers, Double precision floating point numbers, Complex numbers, Operators, Built-in and factory functions, Other numeric types. Sequences: strings, lists, and tuples: Sequences, Strings, Strings and operators, String-only operators, Built-in functions, String built-in methods, Special features of strings, Unicode, Summary of string highlights, Lists, Operators, Built-in functions, List type built-in methods, Special features of lists, Tuples, Tuple operators and built-in functions, Tuples special features, Copying Python objects and shallow and deep copies. Mapping and set types: Mapping Type: dictionaries and operators, Mapping type built-in and factory functions, Mapping type built-in methods, Dictionary keys, Set types, Set type operators, Built-in functions, Set type built-in methods. Conditionals and loops: If, else and elif statements, Conditional expressions, while, for, break, continue and pass statements, else statement . . . take two, Iterators and iter(), List comprehensions, Generator expressions. Files and input/output: File objects, File built-in functions [open() and file()], File built-in methods and attributes, Standard files, Command-line arguments, File system, File execution, Persistent storage modules. Errors and exceptions: What are exceptions? Detecting and handling exceptions, Context management, Exceptions as strings, Raising exceptions, Assertions, Standard exceptions, Creating Exceptions, Why exceptions, Exceptions and the sys module. Functions: Calling, creating and passing functions, formal arguments, variable-length arguments, functional programming, Variable scope, recursion, generators. Modules: Modules and files, Namespaces, Importing modules, Module import features, Module built-in functions, Packages, Other features of modules. Object-Oriented Programming (OOP): Classes, Class attributes, Instances, Instance attributes, Binding and method invocation, Static methods and class methods, Composition, Sub-classing and derivation, Inheritance, Built-in functions for classes, and other objects, Customizing classes with special methods, Privacy, Delegation, Advanced features of new-style classes (Python 2.2+), Related modules and documentation. Execution environment: Callable and code Objects, Executable object statements and built-in functions, Executing other programs. 'Restricted' and 'Terminating' execution, operating system interface. Regular expressions: Special symbols and characters, REs and Python, Regular expressions example. Network programming: Sockets: communication endpoints, Network programming in Python, SocketServer module, Twisted framework introduction. Internet client programming: What are internet clients? Transferring files, Network news, E-mail. Multithreaded Programming: Threads and processes Python, threads, and the global interpreter lock, The thread and threading Modules. GUI programming: Tkinter and Python programming, Tkinter Examples, Brief tour of other GUIs. Web programming: Web surfing with Python: creating simple web clients, Advanced Web clients, CGI: helping web servers process client data, Building CGI applications, Using Unicode with CGI, Advanced CGI, Web (HTTP) Servers. Database programming: Python database application programmer's interface (DB-API), ORMs. Miscellaneous Extending Python by writing extensions, Web Services, programming MS Office with Win32 COM, Python and Java programming with Jython.