Duration 2.5 Days 15 CPD hours This course is intended for This course is intended to help participants learn basic principles and techniques of providing PC, mobile, applications, and network support. Overview Upon successful completion of this course, students will have introductory knowledge of computer systems and mobile devices. In this course, students will identify and set up: computer hardware, software, networks, files, wireless devices and discuss safety. Identifying Computer Hardware Identify Types of Computing Devices Identify Internal Computer Components Common Computer Connector Types Identify Common Peripheral Devices Identifying Computer Software Compare Functions and Features of Common Operating Systems Identify Application Software Setting Up a Basic Workstation Connect Hardware Install and Configure Operating Systems Install and Configure Applications Configure Accessibility Options Configuring Network Access Network Connection Types Install and Configure a SOHO Router Network and Alternative Technologies Sharing and Storage Methods Working with Files, Folders, and Applications Create Files Navigate a File Structure Manage Files and Folders Compress and Extract Files Create Screen Captures Configuring and Using Wireless Devices Configuring Wireless Devices Use Wireless Devices Securing Computing Devices Identify Security Threats Apply Security Best Practices Perform Secure Web Browsing Supporting Computers and Users Environmental and Safety Concepts Back Up and Restore Data Manage Software Implement Basic Support Measures
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Database Administrators, Database Developers, BI professionals, and Business reporting users. Overview Upon successful completion of this course, students will be able to run Queries and retrieve results, perform conditional searches, and retrieve data from multiple tables. Before starting this course, make sure you meet at least one of the following prerequisites: Basic knowledge of the Microsoft Windows operating system and its core functionality. Basic working knowledge of Relational Databases. In this course, students will gain a good understanding of the Transact-SQL language. They will be able to create queries, sort, filter the data, execute procedures with T-SQL. Course Outline 1.Introduction to Microsoft SQL Server 2.Introduction to T-SQL Querying 3.Writing SELECT Queries 4.Querying Multiple Tables 5.Sorting and Filtering Data 6.Working with SQL Server Data Types 7.Using DML to Modify Data 8.Using Built-In Functions 9.Grouping and Aggregating Data 10.Using Subqueries 11.Using Table Expressions 12.Using Set Operators 13.Using Windows Ranking, Offset, and Aggregate Functions 14.Pivoting and Grouping Sets 15.Executing Stored Procedures 16.Programming with T-SQL
Duration 2 Days 12 CPD hours This course is intended for Security professionals, System engineers, channel partners, service partners, and end users with at least one year of experience in implementing IT security technologies (Network, Applications, and Systems). Overview This course will enable students to configure, monitor, manage, and optimize the SonicWall Network Security firewall appliances running the new SonicOS 7 to effectively defend against limitless network and cyberthreats and implement SonicWall Boundless Cybersecurity safeguards for seamless protection. Upon completion of the course, students will be able to configure the SonicWall firewall for Secure and Remote Connectivity, Network Optimization, and Advanced Threat Protection. The SonicWall Network Security Administrator (SNSA) for SonicOS 7.0curriculum provides students the required background, knowledge, and hands-on experience to begin designing, implementing, and troubleshooting SonicWall Network Security products. SonicOS 7 is SonicWall?s brand new and most advanced security operating system and is at the core of its latest physical and virtual firewalls, including models from the TZ, NSv, NSa and NSsp Series. SonicOS 7.0 features advanced security, simplified policy management, and critical networking and management capabilities for distributed enterprises and small- to medium-sized businesses with SD-branch support. Course Outline Setting up Basic Firewall Components Unified Threat Management Secure Access Deep Packet Inspection for SSL (DPI-SSL) Content Filtering Services Application Control Scalability and Reliability SD-WAN High Availability Troubleshooting Tools
Duration 2 Days 12 CPD hours This course is intended for This course is ideal for users who need to replace a Windows computer with a Mac and for IT professionals who support Mac users. Overview Organizations are increasingly integrating Mac computers into Windows or other standards-based network environments. This course gives both users and the IT professionals who support them the skills necessary to make integration easy. This two day Mac Integration Basics course examines how to best use a Mac(s) in an organization that predominantly functions with a Microsoft Windows operating system and Windows Servers. Directory Services Connect a Mac to an Active Directory server Share Files Connect to file servers. Turn on personal file sharing. Configure Collaborative Services Manage Internet Accounts preferences. Connect to an Exchange Server. Connect Mail to non-Windows servers. Add accounts in Mail, Contacts, and Calendars. Secure a Mac Built-In Security features. Create strong passwords. Use two-factor authentication. Set a firmware password. Lock a Mac screen. Create user accounts. Disable automatic login. Protect start-up disk files. Ensure that the apps you download are safe. Provide network security. Printing Connect to a local printer. Connect to, share, and print from network printers. Move and Back Up Content Move content. Back up content. Run Windows on a Mac Run Windows natively or virtually. Microsoft Office for macOS. Cross-platform apps. Cross-platform files. Troubleshooting How to best troubleshoot macOS. Questions & Answers
Duration 1 Days 6 CPD hours Companies are increasingly integrating Mac computers into Windows or other standards-based network environments. This Mac Integration Basics course examines how to best use a Mac(s) in an organization that predominantly functions with a Microsoft Windows operating system and Windows Servers. This course is also ideal for users who need to replace a Windows computer with a Mac and for IT professionals who support Mac users Directory Services Connecting a Mac to a Directory Server Using Network Account File Sharing Connecting to File Servers Turning on Personal File Sharing Email, Contacts, and Calendars Managing Internet Accounts Preferences Connecting to an Exchange Server Connecting Mail to Non-Windows Servers Adding Accounts in Mail, Contacts, and Calendars Security Built-in Security Features Creating Strong Passwords Using Two-factor Authentication Setting a Firmware Password Locking a Mac Screen Creating User Accounts Disabling Automatic Login Protecting Start-up Disk Files Ensuring that the Apps you Download are Safe Providing Network Security Printing Connecting to a Local Printer Setting up a Wireless Printer Sharing your Printer Setting up a Printer Shared by a Mac and a PC via SMB or CIFS Setting up an IP Printer Specifying Printer Features Printing from a Network Printer Instant Messaging iMessage Jabber Configuring Messages Adding Accounts Chatting on a local network with Bonjour Moving and Backing Up Content Moving Content Backing up Data with Time Machine Running Windows on a Mac Running Windows Natively or Virtually Using Office Using Cross-platform Apps Using Cross-platform Files
Duration 5 Days 30 CPD hours This course is intended for This course is designed for professionals in the following job roles: Network security engineer CCNP Security candidate Channel Partner Overview After taking this course, you should be able to: Introduce site-to-site VPN options available on Cisco router and firewalls Introduce remote access VPN options available on Cisco router and firewalls Review site-to-site and remote access VPN design options Review troubleshooting processes for various VPN options available on Cisco router and firewalls The Implementing Secure Solutions with Virtual Private Networks (SVPN) v1.0 course teaches you how to implement, configure, monitor, and support enterprise Virtual Private Network (VPN) solutions. Through a combination of lessons and hands-on experiences you will acquire the knowledge and skills to deploy and troubleshoot traditional Internet Protocol Security (IPsec), Dynamic Multipoint Virtual Private Network (DMVPN), FlexVPN, and remote access VPN to create secure and encrypted data, remote accessibility, and increased privacy. Course Outline Introducing VPN Technology Fundamentals Implementing Site-to-Site VPN Solutions Implementing Cisco Internetwork Operating System (Cisco IOS©) Site-to-Site FlexVPN Solutions Implement Cisco IOS Group Encrypted Transport (GET) VPN Solutions Implementing Cisco AnyConnect VPNs Implementing Clientless VPNs Lab Outline Explore IPsec Technologies Implement and Verify Cisco IOS Point-to-Point VPN Implement and Verify Cisco Adaptive Security Appliance (ASA) Point-to-Point VPN Implement and Verify Cisco IOS Virtual Tunnel Interface (VTI) VPN Implement and Verify Dynamic Multipoint VPN (DMVPN) Troubleshoot DMVPN Implement and Verify FlexVPN with Smart Defaults Implement and Verify Point-to-Point FlexVPN Implement and Verify Hub and Spoke FlexVPN Implement and Verify Spoke-to-Spoke FlexVPN Troubleshoot Cisco IOS FlexVPN Implement and Verify AnyConnect Transport Layer Security (TLS) VPN on ASA Implement and Verify Advanced Authentication, Authorization, and Accounting (AAA) on Cisco AnyConnect VPN Implement and Verify Clientless VPN on ASA
Duration 3 Days 18 CPD hours This course is intended for This course is recommended for technical professionals who support, install, deploy or administer Check Point products. Overview Know how to perform periodic administrator tasks. Describe the basic functions of the Gaia operating system. Recognize SmartConsole features, functions, and tools. Understand how SmartConsole is used by administrators to give user access. Learn how Check Point security solutions and products work and how they protect networks. Understand licensing and contract requirements for Check Point security products. Describe the essential elements of a Security Policy. Understand the Check Point policy layer concept. Understand how to enable the Application Control and URL Filtering software. Blades to block access to various applications. Describe how to configure manual and automatic NAT. Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements. Describe different Check Point Threat Prevention solutions for network attacks. Articulate how the Intrusion Prevention System is configured, maintained and tuned. Understand the Infinity Threat Prevention system. Knowledge about Check Point's IoT Protect. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. Course Outline Configure the Security Management Server. Use the WebUI to run the First Time Wizard. Install the Smart Console. Install the Alpha Gateway using the network detailed in the course topology. Demonstrate how the Security Management Server and Gateway communicate. Test SIC Status. Create multiple administrators and apply different roles and permissions for simultaneous administration. Validate existing licenses for products installed on the network. Create and configure host, network and group objects. Create a simplified Security Policy. Demonstrate how to use Security Zones in policy. Demonstrate how to share a layer between Security Polices. Configure Network Address Translation for server and network objects. Enable Identity Awareness. Deploy user access roles for more granular control of the security Policy. Generate network Traffic and use traffic visibility tools to monitor the data. Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy. This course is also designed for students who are seeking the CertNexus Certified Internet of Things Security Practitioner (CIoTSP) certification and who want to prepare for Exam ITS-110. Overview This program will validate that the candidate has the knowledge, skills, and abilities to secure network environments for IoT devices, analyze vulnerabilities and determine reasonable controls against threats, and effectively monitor IoT devices and respond to incidents. This course is designed for practitioners who are seeking to demonstrate a vendor-neutral, cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem. Managing IoT Risks Map the IoT Attack Surface Build in Security by Design Securing Web and Cloud Interfaces Identify Threats to IoT Web and Cloud Interfaces Prevent Injection Flaws Prevent Session Management Flaws Prevent Cross-Site Scripting Flaws Prevent Cross-Site Request Forgery Flaws Prevent Unvalidated Redirects and Forwards Securing Data Use Cryptography Appropriately Protect Data in Motion Protect Data at Rest Protect Data in Use Controlling Access to IoT Resources Identify the Need to Protect IoT Implement Secure Authentication Implement Secure Authorization Implement Security Monitoring on IoT Systems Securing IoT Networks Ensure the Security of IP Networks Ensure the Security of Wireless Networks Ensure the Security of Mobile Networks Ensure the Security of IoT Edge Networks Ensuring Privacy Improve Data Collection to Reduce Privacy Concerns Protect Sensitive Data Dispose of Sensitive Data Managing Software and Firmware Risks Manage General Software Risks Manage Risks Related to Software Installation and Configuration Manage Risks Related to Software Patches and Updates Manage Risks Related to IoT Device Operating Systems and Firmware Promoting Physical Security Protect Local Memory and Storage Prevent Physical Port Access
Duration 5 Days 30 CPD hours This course is intended for Pen Testers Ethical Hackers Network Auditors Cybersecurity Professionals Vulnerability Assessors Cybersecurity Managers IS Managers Overview A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system. You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system. Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants. In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system.ÿ You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system.ÿ ÿ Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants.ÿ In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. Course Outline Business & Technical Logistics of Pen Testing Information Gathering Reconnaissance ? Passive (External Only) Detecting Live Systems ? Reconnaissance (Active) Banner Grabbing and Enumeration Automated Vulnerability Assessment Hacking Operating Systems Advanced Assessment and Exploitation Techniques Evasion Techniques Hacking with PowerShell Networks and Sniffing Accessing and Hacking Web Techniques Mobile and IoT Hacking Report Writing Basics
Duration 2 Days 12 CPD hours This course is intended for Server administrators Network engineers Systems engineers Consulting systems engineers Technical solutions architects Network administrators Storage administrators Network managers Sales engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco UCS server hardware Describe Cisco UCS connectivity Describe the Cisco HyperFlex Data Platform, its data writing and reading processes, and data optimization Describe and configure Cisco UCS service profiles Describe and configure Cisco UCS service profile templates Describe and implement iSCSI on Cisco UCS Describe and implement Cisco UCS firmware updates Describe and implement Cisco UCS backups This introductory course shows you how to deploy, secure, operate and maintain the Cisco Unified Computing system (Cisco UCS) B-Series blade server, Cisco UCS C-Series and S-Series rack servers, and Cisco HyperFlex product family, for use in data centers. Describing Cisco UCS Server Hardware Cisco UCS B-Series Blade Servers Cisco UCS C-Series Rack Servers Cisco UCS S-Series Rack Servers Cisco Virtual Interface Cards Hyperconvergence Overview Cisco HyperFlex HX-Series Servers Describing Cisco UCS Connectivity Cisco UCS Fabric Interconnect Cisco UCS B-Series Connectivity Cisco UCS C-Series Connectivity Cisco UCS S-Series Connectivity Cisco HyperFlex Connectivity Architecture Cisco HyperFlex Edge Connectivity Ethernet End-Host Mode Compared to Switching Mode Cisco UCS Fabric Interconnect Uplink Pinning Cisco UCS C-Series Integration Describing the Cisco HyperFlex HX Data Platform Cisco HyperFlex HX Data Platform Software Writing Data to Cisco HyperFlex HX Data Platform Reading Data from Cisco HyperFlex HX Data Platform Data Optimization in Cisco HyperFlex HX Data Platform Configuring Cisco UCS Service Profiles Portability Issue with Nonabstracted Identities Cisco UCS Service Profile Identity Pools Server Pools IP Pools Configuring Cisco UCS Service Profile Templates Service Profile Templates Implementing iSCSI on Cisco UCS iSCSI Addressing Evolution of SCSI from DAS to SAN iSCSI Multipathing Implementing Cisco UCS Firmware Updates Update Cisco UCS C-Series Server Firmware Download Tasks for the Infrastructure Image Download Tasks for Cisco UCS B-Series Firmware Packages Best Practices for Updating Firmware in Cisco UCS Manager Firmware Upgrades Using Auto Install Capability Catalog Updates Host Firmware Packages Driver Updates for Operating Systems and Hypervisors Implementing Cisco UCS Backups Compare Backup Options in Cisco UCS Manager Compare Two Import Types Policy Backup