• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

679 Operations courses in Westergate delivered Live Online

Level 2 HACCP Training Course - Special Offer Remote Training

By Kitchen Tonic Training Company and Food Safety Consultants

HACCP Level 2 Training Courses for Food and Drink Manufacturers and Caterers. Special Offer

Level 2 HACCP Training Course - Special Offer Remote Training
Delivered OnlineFlexible Dates
£50

Microsoft Excel - Functions and Formulas

By AXIOM Learning Solutions

Microsoft Excel - Functions and Formulas
Delivered OnlineFlexible Dates
£99

Working with environmental responsibilities (In-House)

By The In House Training Company

This course follows the Institute of Occupational Safety and Health's syllabus. A one-day programme, it is suitable for all people at all levels in the workplace and gives a basic introduction to the principles of environmental management. On successful completion of the course, participants will be able to: Understand the terms 'environment' and 'pollution' Understand the terms 'hazard' and 'risk' related to the environment Better appreciate environmental issues generally, and specifically in respect of their organisation Identify hazards to the environment from working practices Outline the procedures/controls necessary to prevent damage to the environment 1 What is the environment? - putting the environment in context Key environmental issues and how we contribute Definition of the environment 2 Working with the environment What is pollution? Sources, receptors and pathways Environmental consequences workshop - identifying the environmental consequences of our working practices Environmental risk assessment Effective control mechanisms 3 Protecting the environment - Environmental Management Systems What is an Environmental Management System (EMS)? What are the benefits of having an EMS? EMS structure and models Identifying what elements of EMS your company has and how they work Roles and responsibilities 4 Choice of module Option 1: Organisation-specific moduleThis module can be used to introduce environmental concepts that are specific to your activities and operations, and will be compiled through discussion with your organisation Option 2: Environmental best practiceIf no organisation-specific module is required, or if participants from a number of organisations attend, generic operational environmental best practices can be covered instead. Areas covered include waste management, fuel storage and use, hazardous materials, emissions to air and water and environmental incidents

Working with environmental responsibilities (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Multicast v2.0 (MCAST)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network professionals, including systems engineers Channel Partners Customers Overview After taking this course, you should be able to: Describe IP multicast services Identify IP multicast issues on a data link layer Explain why Protocol Independent Multicast Sparse Mode (PIM-SM) is the most current scalable IP multicast routing protocol Describe Rendezvous Point (RP) distribution solutions Recognize the drawbacks of the PIM-SM and describe two extensions to provide possible solutions Explain basic concepts of Multiprotocol BGP (MP-BGP) and its use in the IP multicast environment Configure and deploy Multicast Source Discovery Protocol (MSDP) in the interdomain environment Describe solutions to mitigate security issues in the IP multicast network Describe the process of monitoring and maintaining multicast high-availability operations Design multicast-related application and network solutions in customer and service provider networks The Implementing Cisco Multicast (MCAST) v2.0 course teaches you the fundamentals of IP multicasting, including multicast applications, sources, receivers, group management, and IP multicast routing protocols such as Protocol Independent Multicast (PIM) used within a single administrative domain. You will learn about issues in switched LAN environments and reliable IP multicasting, and technical solutions for simple deployments of IP multicast within a provider or customer network. The course reviews the configuration and troubleshooting guidelines for implementation of IP multicast on Cisco© routers. Labs offer hands-on experience to help you prepare to deploy IP multicast successfully. Course Outline Module 1: IP Multicast Concepts and Technologies Module 2: Multicast on the LAN Module 3: PIM Sparse Mode Module 4: Rendezvous Point Engineering Module 5: PIM Sparse Mode Protocol Extensions Module 6: Multiprotocol Extensions for BGP Module 7: Interdomain IP Multicast Module 8: IP Multicast Security Module 9: Multicast Optimization and High-Availability Features Module 10: Applications of Multicast

Cisco Implementing Cisco Multicast v2.0 (MCAST)
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks : Cortex XDR 3.2: Investigation and Response (EDU-262)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Cybersecurity analysts and engineers and security operations specialists, as well as administrators and product deployers. Overview Successful completion of this instructor-led course with hands-on lab activities should enable you to: Describe the architecture and components of the Cortex XDR family Use the Cortex XDR management console Create Cortex XDR agent installation packages, endpoint groups, and policies Deploy Cortex XDR agents on endpoints Create and manage exploit and malware prevention profiles Investigate alerts and prioritize them using starring and exclusion policies Tune Security profiles using Cortex XDR exceptions Perform and track response actions in the Action Center Perform basic troubleshooting related to Cortex XDR agents Deploy a Broker VM and activate the Local Agents Settings applet Understand Cortex XDR deployment concepts and activation requirements Work with the Customer Support Portal and Cortex XDR Gateway for authentication and authorization This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create Security profiles and policies. The training enables you to perform and track response actions, tune profiles, and work with Cortex XDR alerts. The training concludes with discussions about basic troubleshooting of the agent, the on-premises Broker VM component, and Cortex XDR deployment. Course Outline This class is comprised of the following modules: Module 1 - Cortex XDR Family Overview Module 2 - Cortex XDR Main Components Module 3 - Cortex XDR Mangement Components Module 4 - Profiles and Policy Rules Module 5 - Malware Protection Module 6 - Exploit Protection Module 7 - Cortex XDR Alerts Module 8 - Tuning Policies using Exceptions Module 9 - - Response Actions Module 10 - Basic Agent Troubleshooting Module 11 - Broker VM Overview Module 12 - Deployment Consideration

Palo Alto Networks : Cortex XDR 3.2: Investigation and Response (EDU-262)
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Network Defender (C|ND) v.2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Administrators Network security Administrators Network Security Engineer Network Defense Technicians CND Analyst Security Analyst Security Operator Anyone who involves in network operations Overview A dedicated focus on IoT security Network virtualization practices for the remote workforce Enhanced Cloud Security & IoT and Operational Technology (OT) Modules Introduction to threat intelligence In-depth Attack Surface Analysis Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF) as well as a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators. The program prepares network administrators how to identify what parts of an organization need to be reviewed and tested for security vulnerabilities and how to reduce, prevent, and mitigate risks in the network. CND covers the protect, detect, respond and predict approach to network security. Course Outline Network Attacks and Defense Strategies Administrative Network Security Technical Network Security Network Perimeter Security Endpoint Security-Windows Systems Endpoint Security-Linux Systems Endpoint Security- Mobile Devices Endpoint Security-IoT Devices Administrative Application Security Data Security Enterprise Virtual Network Security Enterprise Cloud Network Security Enterprise Wireless Network Security Network Traffic Monitoring and Analysis Network Logs Monitoring and Analysis Incident Response and Forensic Investigation Business Continuity and Disaster Recovery Risk Anticipation with Risk Management Threat Assessment with Attack Surface Analysis Threat Prediction with Cyber Threat Intelligence

EC-Council Certified Network Defender (C|ND) v.2
Delivered OnlineFlexible Dates
Price on Enquiry

WE761 IBM Administration of IBM DataPower Gateway V7.6

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for administrators who install, manage, and monitor IBM© DataPower Gateway Appliances. The course is also relevant for developers who administer appliances. Overview Configure an appliance for its initial deployment Download and upgrade the firmware on the DataPower appliances Create and manage user accounts, groups, and domains Configure Secure Sockets Layer (SSL) to and from DataPower Appliances Troubleshoot and debug services by using the problem determination tools, logs, and probes that are provided with the DataPower appliance Configure logging of messages to external locations IBM© DataPower Gateway Appliances are network devices that help secure, integrate, and optimize access to web, web services, mobile, and API workloads. Through instructor-led lectures and hands-on lab exercises, you learn how to run various administrative procedures, from initial installation and setup through ongoing maintenance of the appliances in production. You learn about the available management interfaces, such as the command-line interface (CLI), Web Management graphical interface, and XML Management Interface. You also learn how to use these interfaces to run various administrative tasks, such as upgrading firmware, running backup and restore operations, and configuring user accounts and domains. The course includes some information on upgrading firmware and working with DataPower hardware appliances. Course introductionDataPower deployment environmentsInitial setupManaging firmwareExercise: Upgrading image firmwareDataPower administration overviewUsing CLI and the XML Management Interface to configure appliance accessExercise: Using the CLI and the XML Management Interface to manage DataPower appliancesDataPower services overviewUsing the Web Management Blueprint Console to configure appliance accessTroubleshootingExercise: Using the troubleshooting tools to debug errorsDataPower cryptographic tools and SSL setupExercise: Securing connections with SSLLogging and log targetsExercise: Logging to an external systemCourse summary

WE761 IBM Administration of IBM DataPower Gateway V7.6
Delivered OnlineFlexible Dates
Price on Enquiry

FortiGate Security 7.2

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks should attend this course. You should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course. Overview After completing this course, the successful student should be able to: Deploy the appropriate operation mode for your network Use the GUI and CLI for administration Control network access to configured networks using firewall policies Apply port forwarding, source NAT, and destination NAT Authenticate users using firewall policies Understand encryption functions and certificates Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports Fight hacking and denial of service (DoS) Collect and interpret log entries Identify the characteristics of the Fortinet Security Fabric In this three-day course, you will learn how to use the most common FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, the Fortinet Security Fabric, user authentication, and how to protect your network using security profiles, such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security. Product Version FortiOS 7.2 Course Outline 1. Introduction and Initial Configuration 2. Firewall Policies 3. Network Address Translation 4. Firewall Authentication 5. Logging and Monitoring 6. Certificate Operations 7. Web Filtering 8. Application Control 9. Antivirus 10. Intrusion Prevention and Denial of Service 11. Security Fabric

FortiGate Security 7.2
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black EDR Administrator

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of the Carbon Black EDR server Identify the architecture and data flows for Carbon Black EDR communication Describe the Carbon Black EDR server installation process Manage and configure the Carbon Black EDR sever based on organizational requirements Perform searches across process and binary information Implement threat intelligence feeds and create watchlists for automated notifications Describe the different response capabilities available from the Carbon Black EDR server Use investigations to correlate data between multiple processes This course teaches you how to use the VMware Carbon Black© EDR? product and leverage the capabilities to configure and maintain the system according to your organization?s security posture and policies. This course provides an in-depth, technical understanding of the Carbon Black EDR product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Planning and Installation Hardware and software requirements Architecture Data flows Server installation review Installing sensors Server Administration Configuration and settings Carbon Black EDR users and groups Process Search and Analysis Filtering options Creating searches Process analysis and events Binary Search and Banning Binaries Filtering options Creating searches Hash banning Search best practices Search operators Advanced queries Threat Intelligence Enabling alliance feeds Threat reports details Use and functionality Watchlists Creating watchlists Use and functionality Alerts / Investigations / Response Using the HUD Alerts workflow Using network isolation Using live response

VMware Carbon Black EDR Administrator
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX for Intrinsic Security [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Use NSX segmentation to implement Zero-Trust Security Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware Aria Operations™ for Logs and VMware Aria Operations™ for Networks to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX NDR This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX© for intrinsic security. This course introduces all the security features in NSX, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© NDR?. In addition, this course presents common configuration issues and gives a methodology to resolve them. Course Introduction Introduction and course logistics Course objectives Security Basics Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX and VMware Identity Manager? Integrate NSX and LDAP Describe the native users and roles in NSX Create and assign custom user roles Explain object-based RBAC in a multitenancy environment Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Configure the distributed firewall to block malicious IPs Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use VMware Aria Operations for Logs and VMware Aria Operations for Networks to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX NDR Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX NDR and its use cases Explain the architecture of NSX NDR in NSX Describe the visualization capabilities of NSX NDR Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX for Intrinsic Security [V4.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX for Intrinsic Security [V4.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX for Intrinsic Security [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry