The Digital CCTV & Remote Access course is designed to give participants a practical knowledge of integrating Analogue and Digital technologies in addition to access and control from remote locations such as laptops, tablets and mobile phones.
Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators or network administrators, software and DevOps engineers Overview By the end of the course, you should be able to meet the following objectives: Describe VMware NSX Advanced Load Balancer architecture Describe VMware NSX Advanced Load Balancer components and main functions Explain VMware NSX Advanced Load Balancer key features and benefits Describe and leverage VMware NSX Advanced Load Balancer REST API Describe and leverage VMware NSX Advanced Load Balancer SDKs with extended focus on Python SDK Leverage REST API and SDK features and functions to provision application delivery components Describe and leverage VMware NSX Advanced Load Balancer Ansible and Terraform integrations Describe and leverage VMware NSX Advanced Load Balancer Github, Docker (avinetworks/avitools), Ansible Galaxy and other open source resources to accelerate the automation planning and implementation Leverage VMware NSX Advanced Load Balancer Ansible and Terraform integrations to provision infrastructure components Leverage VMware NSX Advanced Load Balancer Ansible and Terraform integrations to automate and streamline application delivery services provisioning This three-day, fast-paced course provides comprehensive training on how to automate infrastructure and application components of VMware NSX Advanced Load Balancer (Avi Networks) solution. This course covers key application delivery features of NSX Advanced Load Balancer (Avi Networks) features and functionality offered in VMware NSX Advanced Load Balancer 18.2 release and focuses on how to plan and implement automation of infrastructure and application components leveraging REST API, SDK or automation solutions such as Ansible, Terraform or similar. Access to a software-defined data center environment is provided through hands-on labs to reinforce the skills and concepts presented in the course. Course Introduction Introductions and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases, and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and functions Virtual Services Configuration Concepts Explain Virtual Service components Explain Virtual Service types Explain and configure basic virtual services components such as Application Profiles, Network Profiles,Pools and Health Monitors Pools Configuration Concepts Explain and deep dive on Pool configuration options Describe multiple load balancing algorithms Explain multiple Health Monitor types Explain multiple Persistent profiles Explain and configure Pool Groups Leveraging NSX Advanced Load Balancer REST API Explain NSX Advanced Load Balancer automation vision Explain and introduce NSX Advanced Load Balancer REST API Describe NSX Advanced Load Balancer REST API methods and capabilities Describe NSX Advanced Load Balancer REST API session handling properties such authentication, API versioning and tenancy model Deep dive on NSX Advanced Load Balancer REST API Object Model Explain and investigate NSX Advanced Load Balancer REST API leveraging browser and command line utilities Explain and interact with NSX Advanced Load Balancer REST API leveraging browser, Postman and Curl Explain Swagger-based API Documentation Explain and leverage NSX Advanced Load Balancer Inventory API Explain and leverage NSX Advanced Load Balancer methods such as GET, PUT, POST and PATCH and associated queries, filters and parameters Deep dive on NSX Advanced Load Balancer PATCH method Explain and leverage NSX Advanced Load Balancer Analytics API Explain and leverage NSX Advanced Load Balancer MACRO API NSX Advanced Load Balancer Software-Defined Kits (SDKs) and ControlScripts Introduce NSX Advanced Load Balancer SDKs Describe, install and leverage NSX Advanced Load Balancer Python SDK Deep dive on NSX Advanced Load Balancer Python SDK Describe and leverage Golang SDK Leverage NSX Advanced Load Balancer open source resources such as Github, etc to accelerate SDKs adoption Describe NSX Advanced Load Balancer Events and Alerts framework Introduce ControlScripts foundations Leverage ControlScripts to automate configuration changes and alerts remediation Automating NSX Advanced Load Balancer Application Delivery Services with Ansible and Terraform Introduce NSX Advanced Load Balancer Configuration Orchestration and Management vision Introduce and explain Ansible foundations Describe Ansible and NSX Advanced Load Balancer Ansible capabilities Deep dive and implement NSX Advanced Load Balancer Ansible Core configuration modules (avinetworks/avisdk) Deep dive and implement Ansible NSX Advanced Load Balancer Declarative configuration role (avinetworks/aviconfig) Leverage Swagger NSX Advanced Load Balancer REST API models to develop and implement Ansible playbooks Explain application delivery configuration automation approach and models Apply configuration automation models with Ansible Introduce and explain Terraform foundations Describe Terraform and NSX Advanced Load Balancer Terraform capabilities Deep dive and implement NSX Advanced Load Balancer Terraform Provider Leverage Swagger NSX Advanced Load Balancer REST API models to develop and implement Terraform plans Apply configuration automation models with Terraform Automating NSX Advanced Load Balancer Infrastructure with Ansible and Terraform Introduce NSX Advanced Load Balancer infrastructure Automation vision Describe infrastructure deployment approach and capabilities Describe Ansible and NSX Advanced Load Balancer Ansible Infrastructure deployment approach and capabilities Describe Terraform and NSX Advanced Load Balancer Terraform deployment approach and capabilities Leverage Terraform to deploy Controllers and perform system configuration, including control plane cluster setup Leverage Terraform to provision Cloud, Service Engine Groups and Service Engine components Describe and leverage Ansible roles to deploy Controllers and perform initial system configuration, including control plane cluster setup Leverage Ansible declarative and core roles to provision Cloud, Service Engine Groups and Service Engine components Describe and implement combined Terraform + Ansible model to streamline NSX Advanced Load Balancer solution deployment
Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Use NSX segmentation to implement Zero-Trust Security Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware Aria Operations⢠for Logs and VMware Aria Operations⢠for Networks to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX NDR This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX© for intrinsic security. This course introduces all the security features in NSX, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© NDR?. In addition, this course presents common configuration issues and gives a methodology to resolve them. Course Introduction Introduction and course logistics Course objectives Security Basics Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX and VMware Identity Manager? Integrate NSX and LDAP Describe the native users and roles in NSX Create and assign custom user roles Explain object-based RBAC in a multitenancy environment Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Configure the distributed firewall to block malicious IPs Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use VMware Aria Operations for Logs and VMware Aria Operations for Networks to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX NDR Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX NDR and its use cases Explain the architecture of NSX NDR in NSX Describe the visualization capabilities of NSX NDR Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX for Intrinsic Security [V4.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX for Intrinsic Security [V4.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The ideal audience for this course includes database enthusiasts, IT professionals, and developers who are eager to expand their knowledge and skill set in database management and optimization. Roles that would greatly benefit from attending this course include: Database Developers: Those who design, implement, and maintain databases as part of their primary responsibilities and want to improve their expertise in schema design, query optimization, and advanced database features. Backend Developers: Professionals who work on server-side application logic and require a strong understanding of database management to integrate data storage and retrieval processes into their applications. Overview Upon completing this course, database developers will be able to: Design and implement efficient database schemas by employing normalization techniques, appropriate indexing strategies, and partitioning methods to optimize data storage and retrieval processes. Develop advanced SQL queries, including joining multiple tables, utilizing subqueries, and aggregating data, to extract valuable insights and facilitate decision-making processes. Implement stored procedures, functions, and triggers to automate common database tasks, enforce data integrity, and improve overall application performance. Apply database performance tuning techniques, such as query optimization, index management, and transaction control, to ensure optimal resource usage and enhanced system responsiveness. Integrate databases with various programming languages and platforms, enabling seamless data access and manipulation for web, mobile, and desktop applications. PostgreSQL is a powerful, open-source object-relational database management system that emphasizes extensibility, data integrity, and high performance. Its versatility and robust feature set make it an ideal choice for developers working on projects of all sizes, from small-scale applications to enterprise-level systems. By learning PostgreSQL, developers can tap into its advanced capabilities, such as full-text search, spatial data support, and customizable data types, allowing them to create efficient and scalable solutions tailored to their unique needs. PostgreSQL for Database Developers is a three-day hands-on course that explores the fundamentals of database management, covering everything from installation and management to advanced SQL functions. Designed for beginners and enthusiasts alike, this course will equip you with the knowledge and skills required to effectively harness the power of PostgreSQL in today's data-driven landscape. Throughout the course you?ll be immersed in a variety of essential topics, such as understanding data types, creating and managing indexes, working with array values, and optimizing queries for improved performance. You?ll gain valuable hands-on experience with real-world exercises, including the use of the psql client, writing triggers and stored procedures with PL/pgSQL, and exploring advanced SQL functions like Common Table Expressions (CTE), Window Functions, and Recursive Queries. You?ll exit this course with a solid foundation in PostgreSQL, enabling you to confidently navigate and manage your databases with ease and efficiency. Installing & Managing PostgreSQL PostgreSQL installation process Optimal configuration settings User and role management Database backup and restoration Overview of PostgreSQL Database PostgreSQL architecture overview Understanding database objects Efficient data storage Transaction management basics Using the psql client Introduction to psql Essential psql commands Executing queries effectively Managing databases with psql Understanding PostgreSQL data types Numeric data types explored Character and binary types Date, time, and boolean values Array and other types Understanding sequences Sequence creation and usage Customizing sequence behavior Implementing auto-increment columns Sequence manipulation and control Creating & managing indexes PostgreSQL index fundamentals Designing partial indexes Utilizing expression-based indexes Index management techniques Using COPY to load data COPY command overview Importing and exporting data Handling CSV and binary formats Performance considerations Working with Array Values Array value basics Array manipulation functions Querying arrays efficiently Multidimensional array handling Advanced SQL Functions Mastering Common Table Expressions Utilizing Window Functions Regular Expressions in SQL Crafting Recursive Queries Writing triggers & stored procedures with PL/pgSQL PL/pgSQL variables usage Implementing loop operations PERFORM and EXECUTE statements Developing PostgreSQL triggers Using the PostgreSQL query optimizer Query analysis and optimization EXPLAIN command insights PostgreSQL query operators Identifying performance bottlenecks Improving query performance Query performance tuning Index optimization strategies Efficient database partitioning Connection and resource management Wrap Up & Additional Resources Further learning opportunities Staying up-to-date with PostgreSQL Community engagement and support Additional course details: Nexus Humans PostgreSQL for Database Developers (TTDB7024) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PostgreSQL for Database Developers (TTDB7024) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This is an introductory level SQL course, appropriate for anyone needing to interface with an Oracle database or those needing a general understanding of Oracle database functionality. That would include end users, business analysts, application developers and database administrators. Overview Working in a hands on learning environment led by our expert practitioner, attendees will explore: Basic RDBMS Principles The SQL Language and Tools Using SQL Developer SQL Query Basics WHERE and ORDER BY Functions ANSI 92 Joins ANSI 99 Joins Subqueries Regular Expressions Analytics A company?s success hinges on responsible, accurate database management. Organizations rely on highly available data to complete all sorts of tasks, from creating marketing reports and invoicing customers to setting financial goals. Data professionals like analysts, developers and architects are tasked with creating, optimizing, managing and analyzing data from databases ? with little room for error. When databases aren?t built or maintained correctly, it?s easy to mishandle or lose valuable data. Our SQL Programming and Database Training Series provides students with the skills they require to develop, analyze and maintain data and in correctly structured, modern and secure databases. A full presentation of the basics of relational databases and their use are also covered. Basic RDBMS Principles Relational design principles Accessing data through a structured query language Entity relationship diagrams Data Domains Null values Indexes Views Denormalization Data Model Review The SQL Language and Tools Using SQL*Plus Why Use SQL*Plus When Other Tools Are Available? Starting SQL*Plus EZConnect SQL Commands PL/SQL Commands SQL*Plus Commands The COLUMN Command The HEADING Clause The FORMAT Clause The NOPRINT Clause The NULL Clause The CLEAR Clause Predefined define variables LOGIN.SQL Command history Copy and paste in SQL*Plus Entering SQL commands Entering PL/SQL commands Entering SQL*Plus commands Default output from SQL*Plus Entering Queries What about PL/SQL? Using SQL Developer Choosing a SQL Developer version Configuring connections Creating A Basic Connection Creating A TNS Connection Connecting Configuring preferences Using SQL Developer The Columns Tab The Data Tab The Constraints Tab The Grants Tab The Statistics Tab Other Tabs Queries In SQL Developer Query Builder Accessing Objects Owned By Other Users The Actions Pulldown Menu Differences between SQL Developer and SQL*Plus Reporting Commands Missing In SQL Developer General Commands Missing In SQL Developer Data Dictionary report User Defined reports Using scripts in SQL Developer WHERE and ORDER BY WHERE clause basics Comparison operators Literals and Constants in SQL Simple pattern matching Logical operations The DUAL table Arithmetic operations Expressions in SQL Character operators Pseudo columns Order by clause basics Ordering Nulls Accent and case sensitive sorts Sampling data WHERE and ORDER BY in SQL Developer All, Any, Some Functions The basics of Oracle functions Number functions Character functions Date functions Conversion functions Other functions Large object functions Error functions The RR format mode; Leveraging your knowledge ANSI 92 JOINS Basics of ANSI 92 Joins Using Query Builder with multiple tables Table Aliases Outer joins Outer Joins In Query Builder Set operators Self-referential joins Non-Equijoins ANSI 99 Joins Changes with ANSI99 CROSS Join NATURAL Join JOIN USING JOIN ON LEFT / RIGHT OUTER JOIN FULL OUTER JOIN Subqueries Why use subqueries? WHERE clause subqueries FROM clause subqueries HAVING clause subqueries CORRELATED subqueries SCALAR subqueries DML and subqueries EXISTS subqueries Hierarchical queries TOP N AND BOTTOM N queries Creating subqueries using Query Builder Regular Expressions Available Regular Expressions Regular Expression Operators Character Classes Pattern matching options REGEX_LIKE REGEXP_SUBSTR REGEXP_INSTR REGEXP_REPLACE REGEXP_COUNT Analytics The WITH clause Reporting aggregate functions Analytical functions User-Defined bucket histograms The MODEL clause PIVOT and UNPIVOT Temporal validity More Analytics RANKING functions RANK DENSE_RANK CUME_DIST PERCENT_RANK ROW_NUMBER Windowing aggregate functions RATIO_TO_REPORT LAG / LEAD Linear Regression functions Inverse Percentile functions Hypothetical ranking functions Pattern Matching Additional course details: Nexus Humans Introduction to SQL Programming Basics (TTSQL002) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to SQL Programming Basics (TTSQL002) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Python Programming: Beginner To Expert Course Overview The "Python Programming: Beginner to Expert" course provides a comprehensive learning journey from the basics of Python to advanced programming techniques. Designed to equip learners with the skills necessary to become proficient Python developers, this course covers a broad range of essential topics, including data types, operators, functions, error handling, and object-oriented programming (OOP). By the end of the course, learners will gain the expertise needed to develop complex applications and tackle real-world problems using Python. The course is ideal for those looking to deepen their understanding of programming and advance their careers in software development, data science, or automation. Course Description This course delves deeply into Python programming, beginning with the fundamentals and progressing to advanced concepts. Learners will explore core programming techniques, including control flow, functions, and error handling, as well as specialized topics such as object-oriented programming (OOP) and libraries like NumPy and Pandas. The course also covers career development topics, such as how to start a career in Python programming. Students will gain a solid understanding of Python’s capabilities and how to apply them across a variety of programming contexts, from scripting to data analysis and more. With its structured modules and clear guidance, learners will finish the course ready to take on more advanced programming projects and pursue roles in the field. Python Programming: Beginner To Expert Curriculum Module 01: Introduction to Python Programming from A-Z Module 02: Getting Familiar with Python Module 03: Basic Data Types Module 04: Python Operators Module 05: Advanced Data Types Module 06: Control Flow Part 1 Module 07: Control Flow Part 2 Module 08: Python Functions Module 09: User Input and Error Handling Module 10: Python Advanced Functions Module 11: Python Scripting and Libraries Module 12: NumPy Module 13: Pandas Module 14: Introduction to OOP Module 15: Advanced OOP Module 16: Starting a Career in Python (See full curriculum) Who is this course for? Individuals seeking to start a career in Python programming. Professionals aiming to enhance their programming skills for career development. Beginners with an interest in software development, data science, or automation. Those looking to expand their programming knowledge in a structured and progressive way. Career Path Python Developer Software Engineer Data Analyst Data Scientist Automation Specialist Web Developer Backend Developer
Formation officielle Auditeur Principal (Lead Auditor) BRCGS Food v9 (Norme Mondiale pour la Sécurité des Denrées Alimentaires version 9) en français. Dispensée en ligne (Zoom) en direct par un partenaire de formation agréé BRCGS. Frais d'examen et de certificat inclus dans le prix.
Duration 5 Days 30 CPD hours This course is intended for The primary audiences for this course are the following: • Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview After successfully completing this course, you should be able to: Identify security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain SRX Series session management. Explain Junos ALG functions and when to use them. Describe policy logging on the SRX series device. Explain security policy scheduling. Describe application security theory. Explain application signature usage in AppID. Describe the AppTrack service. Describe the AppFW service. Describe the AppQoS service. Configure security policies using the AppSecure suite of services. Explain unified security policies. Describe IPS signatures. Configure an IPS policy using pre-defined templates. Describe how to update the IPS attack object database. Describe IPS rules and rule bases. Configure custom attack objects. Describe Junos Space and Security Director. Configure policy management using Security Director. Describe Security Director objects. Explain the different licensing options for Sky ATP List Sky ATP's features and benefits. Configure Sky ATP profiles and enroll an SRX Series device. Configure file scanning on Sky ATP. Configure Sky ATP to scan email Configure GeoIP on Sky ATP. Describe the JATP features and benefits List the JATP device options. Explain the JATP architecture. List 3rd party support options for JATP. Explain JATP SmartCore analytics processes. Describe Policy Enforcer configuration options. Describe Policy Enforcer integration with Sky ATP. Configure Policy Enforcer to block lateral malware movement. Explain Juniper Secure Analytics features and benefits. Describe JSA log collection. Describe JSA network flow collection. Describe the JSA Offense Management workspace. Explain the JSA Risk Manager features. Configure JSA to collect network and log collection. Explain the features of JIMS. Describe JIMS integration into the current AD network. Describe the Sky Enterprise service and how it can save resources. Explain the Sky Enterprise monitoring service. Explain the vSRX Series device benefits. Describe use cases for the vSRX. Explain the cSRX Series device benefits. Describe use cases for the cSRX. Describe SSL Proxy Concepts. Explain Forward and Reverse Proxy and the limitations of each. Configure both Forward and Reverse Proxy. This five-day course uses the Junos J-Web, CLI, Junos Space, and other user interfaces to introduce students to the concept of Juniper Connected Security. Chapter 1: Course Introduction Course Introduction Chapter 2: CLI Overview User Interface Options Command-Line Interface Initial Configuration Interface Configuration Lab 1: CLI Overview Chapter 3: Advanced Security Policy Session Management Junos ALGs Policy Scheduling Policy Logging Lab 2: Advanced Security Policy Chapter 4: Application Security Theory Application ID Application Signatures App Track App Firewall App QoS App QoE Chapter 5: Application Security Implementation AppTrack Implementation AppFW Implementation AppQos Implementation APBR Implementation Lab 3: Application Security Chapter 6: Intrusion Detection and Prevention IPS Overview IPS Policy Attack Objects IPS Configuration IPS Monitoring Lab 4: Implementing IPS Chapter 7: Security Director Overview Security Director Objects Security Director Policy Management Lab 5: Security Director Chapter 8: Sky ATP Implementation Architecture and Key Components Features and Benefits Configuration Compromised Hosts Command and Control File Scanning E-mail Scanning Geo IP Security Policy Integration Troubleshooting Lab 6: Sky ATP Implementation Chapter 9: Policy Enforcer Policy Enforcer Concepts Configuration Options Policy Enforcer Installation Lab 7: Policy Enforcer Chapter 10: JATP Overview Traffic Inspection Threat Detection Threat Analysis JATP Architecture Chapter 11: JATP Implementation Data Collectors Configure SmartCore Analytics Engine Log Ingestion Incident Management SRX Threat Prevention 3rd Party support for Threat Prevention Reporting Lab 8: JATP Chapter 12: Juniper Secure Analytics (JSA) JSA Overview Data Collection Log Analytics Threat Analytics Vulnerability Management Risk Management Lab 9: JSA Chapter 13: JIMS JIMS Overview JIMS Integration Lab 10: JIMS Chapter 14: vSRX and cSRX vSRX Overview vSRX Supported Features vSRX Use Cases cSRX Overview Lab 11: vSRX Installation Chapter 15: SSL Proxy SSL Proxy Overview SSL Concepts SSL Proxy Configurations Troubleshooting Lab 12: SSL Proxy Chapter 16: Cluster Concepts Chassis Cluster Concepts Chassis Cluster Operation Chapter 17: Chassis Cluster Implementation Chassis Cluster Configuration Chassis Cluster Advanced Options Lab 13: Chassis Cluster Implementation Chapter 18: Chassis Cluster Troubleshooting Chassis Cluster Case Studies Troubleshooting Examples Lab 14: Chassis Cluster Troubleshooting Additional course details: Nexus Humans JSEC - Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JSEC - Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is intended for security and network administrators who will be responsible for the installation, deployment, tuning, and day-to-day maintenance of the F5 Advanced Web Application Firewall. In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks. The course includes lecture, hands-on labs, and discussion about different F5 Advanced Web Application Firewall tools for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Leveraging F5 Support Resources and Tools Module 2: Traffic Processing with BIG-IP Identifying BIG-IP Traffic Processing Objects Overview of Network Packet Flow Understanding Profiles Overview of Local Traffic Policies Visualizing the HTTP Request Flow Module 3: Web Application Concepts Overview of Web Application Request Processing Web Application Firewall: Layer 7 Protection F5 Advanced WAF Layer 7 Security Checks Overview of Web Communication Elements Overview of the HTTP Request Structure Examining HTTP Responses How F5 Advanced WAF Parses File Types, URLs, and Parameters Using the Fiddler HTTP Proxy Module 4: Common Web Application Vulnerabilities A Taxonomy of Attacks: The Threat Landscape What Elements of Application Delivery are Targeted? Common Exploits Against Web Applications Module 5: Security Policy Deployment Defining Learning Comparing Positive and Negative Security Models The Deployment Workflow Policy Type: How Will the Policy Be Applied Policy Template: Determines the Level of Protection Policy Templates: Automatic or Manual Policy Building Assigning Policy to Virtual Server Deployment Workflow: Using Advanced Settings Selecting the Enforcement Mode The Importance of Application Language Configure Server Technologies Verify Attack Signature Staging Viewing Requests Security Checks Offered by Rapid Deployment Defining Attack Signatures Using Data Guard to Check Responses Module 6: Policy Tuning and Violations Post-Deployment Traffic Processing Defining Violations Defining False Positives How Violations are Categorized Violation Rating: A Threat Scale Defining Staging and Enforcement Defining Enforcement Mode Defining the Enforcement Readiness Period Reviewing the Definition of Learning Defining Learning Suggestions Choosing Automatic or Manual Learning Defining the Learn, Alarm and Block Settings Interpreting the Enforcement Readiness Summary Configuring the Blocking Response Page Module 7: Attack Signatures & Threat Campaigns Defining Attack Signatures Attack Signature Basics Creating User-Defined Attack Signatures Defining Simple and Advanced Edit Modes Defining Attack Signature Sets Defining Attack Signature Pools Understanding Attack Signatures and Staging Updating Attack Signatures Defining Threat Campaigns Deploying Threat Campaigns Module 8: Positive Security Policy Building Defining and Learning Security Policy Components Defining the Wildcard Defining the Entity Lifecycle Choosing the Learning Scheme How to Learn: Never (Wildcard Only) How to Learn: Always How to Learn: Selective Reviewing the Enforcement Readiness Period: Entities Viewing Learning Suggestions and Staging Status Violations Without Learning Suggestions Defining the Learning Score Defining Trusted and Untrusted IP Addresses How to Learn: Compact Module 9: Cookies and Other Headers F5 Advanced WAF Cookies: What to Enforce Defining Allowed and Enforced Cookies Configuring Security Processing on HTTP headers Module 10: Reporting and Logging Overview: Big Picture Data Reporting: Build Your Own View Reporting: Chart based on filters Brute Force and Web Scraping Statistics Viewing F5 Advanced WAF Resource Reports PCI Compliance: PCI-DSS 3.0 The Attack Expert System Viewing Traffic Learning Graphs Local Logging Facilities and Destinations How to Enable Local Logging of Security Events Viewing Logs in the Configuration Utility Exporting Requests Logging Profiles: Build What You Need Configuring Response Logging Module 11: Lab Project 1 Lab Project 1 Module 12: Advanced Parameter Handling Defining Parameter Types Defining Static Parameters Defining Dynamic Parameters Defining Dynamic Parameter Extraction Properties Defining Parameter Levels Other Parameter Considerations Module 13: Automatic Policy Building Overview of Automatic Policy Building Defining Templates Which Automate Learning Defining Policy Loosening Defining Policy Tightening Defining Learning Speed: Traffic Sampling Defining Track Site Changes Lesson 14: Web Application Vulnerability Scanner Integration Integrating Scanner Output Importing Vulnerabilities Resolving Vulnerabilities Using the Generic XML Scanner XSD file Lesson 15: Deploying Layered Policies Defining a Parent Policy Defining Inheritance Parent Policy Deployment Use Cases Lesson 16: Login Enforcement and Brute Force Mitigation Defining Login Pages for Flow Control Configuring Automatic Detection of Login Pages Defining Session Tracking Brute Force Protection Configuration Source-Based Brute Force Mitigations Defining Credentials Stuffing Mitigating Credentials Stuffing Lesson 17: Reconnaissance with Session Tracking Defining Session Tracking Configuring Actions Upon Violation Detection Lesson 18: Layer 7 DoS Mitigation Defining Denial of Service Attacks Defining the DoS Protection Profile Overview of TPS-based DoS Protection Creating a DoS Logging Profile Applying TPS Mitigations Defining Behavioral and Stress-Based Detection Lesson 19: Advanced Bot Protection Classifying Clients with the Bot Defense Profile Defining Bot Signatures Defining Proactive Bot Defense Defining Behavioral and Stress-Based Detection Defining Behavioral DoS Mitigation Lesson 20: Form Encryption using DataSafe Targeting Elements of Application Delivery Exploiting the Document Object Model Protecting Applications Using DataSafe The Order of Operations for URL Classification Lesson 21: Review and Final Labs Review and Final Labs
This course provides a comprehensive introduction to foodborne viruses, focusing on their properties, transmission, and impact on food safety. Designed for professionals at all levels, it covers detection methods, contamination risks, and prevention strategies to help businesses mitigate viral threats in food supply chains. Delivered by an industry expert, the course includes an interactive Q&A session for deeper insights. No prior knowledge is required.