Duration 1 Days 6 CPD hours This course is intended for Security operations personnel, including analysts and incident responders Overview By the end of the course, you should be able to meet the following objectives: Utilize Carbon Black EDR throughout an incident Implement a baseline configuration for Carbon Black EDR Determine if an alert is a true or false positive Fully scope out an attack from moment of compromise Describe Carbon Black EDR capabilities available to respond to an incident Create addition detection controls to increase security This course teaches you how to use the VMware Carbon Black© EDR? product during incident response. Using the SANS PICERL framework, you will configure the server and perform an investigation on a possible incident. This course provides guidance on using Carbon Black EDR capabilities throughout an incident with an in-depth, hands-on, scenariobased lab. Course Introduction Introductions and course logistics Course objectives VMware Carbon Black EDR & Incident Response Framework identification and process Preparation Implement the Carbon Black EDR instance according to organizational requirements Identification Use initial detection mechanisms Process alerts Proactive threat hunting Incident determination Containment Incident scoping Artifact collection Investigation Eradication Hash banning Removing artifacts Continuous monitoring Recovery Rebuilding endpoints Getting to a more secure state Lessons Learned Tuning Carbon Black EDR Incident close out
Duration 3 Days 18 CPD hours This course is intended for Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers, and Support Staff Overview The Palo Alto Networks Firewall 11.0: Troubleshooting course is three days of instructor-led training that will help you: Investigate networking issues using firewall tools including the CLI Follow proven troubleshooting methodologies specific to individual features Analyze advanced logs to resolve various real-life scenarios Solve advanced, scenario-based challenges Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud. Course Outline Module 1 - Tools and Resources Module 2 - CLI Primer Module 3 - Flow Logic Module 4 - Packet Captures Module 5 - Packet-Diagnostics Logs Module 6 - Host-Inbound Traffic Module 7 - Transit Traffic Module 8 - System Services Module 9 - Certificate Management and SSL Decryption Module 10 - User-ID Module 11 - GlobalProtect Module 12 - Support Escalation and RMAs Module 13 - Next Steps
Duration 5 Days 30 CPD hours This course is intended for Channel Partner/Reseller Customer Employee Overview Course Objectives Identify the basic components and operations of the Unified CCE solution. Configure and script a basic UCCE CVP deployment. Perform the ICM configuration tasks required to support basic agent functionality. Build and test a basic ICM script utilizing microapps. Configure and script UCCE to support reporting requirements, precision queuing and RONA. Identify how to successfully deploy the CVP VXML component in a Unified CCE solution. Generate basic reports using Cisco Unified IC. The Administering Cisco Unified Contact Center Enterprise Part 1 (AUCCE1) v2.0 is a 5 day instructor-led course presented by training partners to system engineers and customers who will be involved with Day 2 support of a UCCE solution deployed in a CVP comprehensive environment. This course describes the requirements, resources and tools needed to perform routine adds, moves and changes in the inbound/outbound UCCE environment. This course is intended for those administering the solution, or who may be responsible for Level 1-2 support of the solution. Course Outline Module 1: Cisco Unified Contact Center Enterprise v10 Foundations Module 2: UCCE Configuration and Scripting Module 3: Unified CCE Inbound Agent Considerations Module 4: Unified CCE IVR/VRU Functionality Module 5: Additional UCCE Considerations Module 6: VXML Implementation Module 7: Cisco Unified Intelligence Center Reporting
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers DR and BCP Engineers Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Disaster Recovery Engineer students will be able to establish industry acceptable DR & BCP standards with current best practices and policies. Students will also be prepared to competently take the C)DRE exam. A Certified Disaster Recovery Engineer, C)DRE, is the superhero of an information System! When a business is hit by a natural disaster, cybercrime or any other disruptive tragedy, how should the organization react? What if the network infrastructure is taken down? Will the business be able to continue operations? How much will it cost if the business is down during repairs? The answer is found in theÿ Certified Disaster Recovery Engineer certification course. Disaster recovery and business continuity planning is the process of having a professional work with a business to prepare processes, policies, and procedures to follow in the event of a disruption. The C)DRE prepares students to plan and present the latest methodologies and best practices for real-world system recovery. Course Outline Welcome to Disaster Recovery Training Business Impact Analysis Risk Analysis Design & Development Phase (BCP Strategies) IT Recovery Strategies Implementation Phase Testing and Exercise Maintenance and Updating Pandemics Case Studies and Templates
Duration 5 Days 30 CPD hours This course is intended for This is a comprehensive course for team members responsible for implementation, administration, operations, or maintenance of the Infoblox BloxOne Threat Defense solution Overview Course Topics The Infoblox Grid Setting up the Grid Grid Manager Managing Grid Members Infoblox High Availability DNS Services DNS Zones DNS Resource Records DNS Anycast DNSSEC DNS and Network Views Reporting - Dashboards Reporting - Searches, Reports and Alerts DNS Firewall Overview Local RPZ and RPZ Rules BloxOne Threat Defense RPZ Feeds DNS Firewall Monitoring and Reporting Infoblox TIDE Infoblox Dossier Dossier API Threat Insight Overview Configuring Threat Insight Threat Insight Monitoring and Reporting ADP Overview ADP Appliance Configuration ADP Rulesets, Rules and Profiles ADP Monitoring and Reporting ADP Tuning Establish working knowledge of how to configure and administer Infoblox appliances, Infoblox Grid and manage DNS protocol as a prerequisite to protecting and securing your DNS infrastructure and network from attacks with Infoblox BloxOne Threat Defense Establish working knowledge of how to configure and administer Infoblox appliances, Infoblox Grid and manage DNS protocol as a prerequisite to protecting and securing your DNS infrastructure and network from attacks with Infoblox BloxOne Threat Defense
Duration 1 Days 6 CPD hours This course is intended for System administrators, security operations personnel including analyst and managers. Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of application control. Manage and configure the Carbon Black App Control server based on organizational requirements. Create policies to control enforcement levels and agent functionality. Implement rules to support the organization's security posture. Use the Carbon Black App Control tools to understand agent and server data. This course teaches you how to use the VMware Carbon Black© App ControlTM product and leverage the capabilities to configure and maintain the system according to their organization?s security posture and organizational policies. This course provides an in-depth, technical understanding of the Carbon Black App Control product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Login Accounts and Groups User accounts User roles Policies Modes and Enforcement Levels Rule sets Notifiers Agent side display notification use Computer Details View agent information Related views Local Approval Timed Policy Override Use case and functionality Software Approvals Methods and use cases Custom Rules Rule type and use cases Tools Meters and Alerts Events Agent and server events Baseline Drift Changes in a baseline
SAP Courses Overview SAP is one of the largest ERP(Enterprise Resource Planning) software in the world. It provides end to end solution for Financials, Manufacturing, Logistics, Distributions etc. SAP applications, built around their latest R/3 system, provide the capability to manage financial, asset, and cost accounting, production operations and materials, personnel, plants, and archived documents. The R/3 system runs on a number of platforms including Windows and MAC and uses the client/server model. SAP Business Cases/ Live Project Our SAP training courses are designed in a way which gives the students maximum exposure of real-life scenario through no of business cases and guidance on implementation by professional SAP Consultants. Certificate of Attendance- You receive a certificate once you finish the course from Osborne Training, SAP Certification During the training, you get access to the SAP sandbox which continues even after training finishes until the completion of the Internship. You can also do an external exam to receive certification from SAP (Optional), for details on exam booking you may visit the SAP website. SAP Training Modules Available Financial & Controlling (FICO) High-Performance Analytic Appliance (HANA) Supply Relationship Management (SRM) Customer Relationship Management (CRM) Free SAP Access Free SAP Sandbox Access provided for 6 months so that you can practice even after your SAP training course.
Duration 5 Days 30 CPD hours This course is intended for New users of BSM 9.0 -- 9.2,including:? IT Tools engineers? Database administrators? System administrators? Network administrators? Operations managers? Availability engineers Overview After completing this course, you should be able to:? Identify HP Business Service Management (BSM)deployment scenarios? Monitor application performance and availability fromthe end user perspective? Integrate HP SiteScope with the BSM environment? Monitor the real-time status of Key PerformanceIndicators (KPIs), view performance metrics, and workwith reports containing historical performance data? Configure and work with an IT model to build atopology of your system, populate the model withconfiguration items (CIs) and relationships, and use themodel to measure and manage critical businessprocesses? Create and analyze reports that present and organizespecific data your organization might need? Create and manage service level agreements (SLAs)representing your department contracts with serviceproviders, customers, and internal business units? Perform administrative tasks to enable user access,configure licenses, and enhance system performance? Work with the following applications: End UserManagement (EUM), Business Process Monitor (BPM),SiteScope/System Availability Manager (SAM), Run-Time Service Model (RTSM), BSM applications ? ServiceHealth (SH), MyBSM, Service Level Management (SLM). This entry-level, instructor-led classroom training offers technical personnel, who are new to HP Business Service Management (BSM) 9.0 ? 9.21, the opportunity to develop hands-on experience in applying the fundamental concepts, principles This entry-level, instructor-led classroom training offers technical personnel, who are new to HP Business Service Management (BSM) 9.0 ? 9.21, the opportunity to develop hands-on experience in applying the fundamental concepts, principles
Duration 3 Days 18 CPD hours This course is intended for Developers Architects Administrators Overview By the end of the course, you should be able to meet the following objectives: Install and configure RabbitMQ Activate and use plugins such as the web management console Implement messaging patterns and applications using the Java client Set up a cluster of RabbitMQ nodes Configure high availability appropriately Tune and optimize RabbitMQ for better performance Secure RabbitMQ This intensive instructor-led course in RabbitMQ provides a deep dive into how to install, configure, and develop applications which leverage RabbitMQ messaging. The course begins with RabbitMQ installation and general configuration. It continues with developing messaging applications using the Java APIs, and delves into more advanced topics including clustering, high availability, performance, and security. Modules are accompanied by lab exercises that provide hands-on experience Introduction to Spring Essentials Kubernetes Overview BOSH Introduction Deploy, Patch & Upgrade Deploy a simple release Inside the VM Persistent Disks Patch the OS Upgrade Nginx Entry Point Set up a jumpbox Platform Infrastructure Pave the IaaS Deploy ops manager Deploy BOSH director Containerized Workloads Deploy Pivotal Container Service Provision a Kubernetes Cluster Harbor Container Registry Application Deployment Helm Advanced BOSH Deploy a distributed system Deploy Concourse CredHub Troubleshooting Concourse Deployment Concourse Day 2 Operations
This course offers a dynamic introduction to Globalization and the Global Political Economy (GPE), exploring the intricate relationship between political actors and the global economic marketplace. Through a theoretically rich and historically grounded lens, you’ll examine the development, operations, and future trajectory of the global political economy. You’ll learn to apply diverse theoretical frameworks to critically analyze global economic processes. The course begins with an in-depth look at foundational GPE perspectives—mercantilism, liberalism, and structuralism—each built on distinct assumptions that shape our understanding of global economic events. From there, we’ll investigate the international "structures" of production, trade, finance, and knowledge, addressing critical questions: Who controls these structures, and to what end? What rules govern international trade? How do institutions like the IMF, World Bank, and multinational corporations shape global flows of goods and investment? Who benefits from controlling knowledge? The course culminates with an exploration of 21st-century global governance, highlighting the rise of new economic and political power centers and their evolving roles in the world. The course concludes with an exploration of 21st-century global governance, spotlighting the emergence of new economic and political power centers, such as BRICS, and their evolving roles in the world. We’ll also examine how the United States under Donald Trump shifted from traditional liberal internationalism toward more transactional and bilateral approaches, reshaping global relationships and challenging established norms Learning Outcomes By the end of this course, you will be able to: Analyze the major political themes in the historical evolution of the international economy. Understand debates surrounding the emergence and impacts of a globalized economy, including patterns of inequality. Evaluate key GPE theories and perspectives in both historical and contemporary contexts. Apply theoretical insights to explain the causes and effects of international trade, capital flows, monetary relations, and globalization debates. Recognize the vital role of human and environmental security in political economy studies. Demonstrate strong analytical and critical thinking skills when assessing political phenomena. Why Study Global Political Economy? Global Political Economy (GPE), also known as International Political Economy (IPE), untangles the complex interplay between global politics and economics. It’s an ideal field for anyone eager to understand how international policies, trade, finance, and institutions shape the world’s economic landscape. Whether you’re aiming for a career in policymaking, international relations, or a related field, this course equips you with essential tools to navigate the complexities of the global economic system and its profound influence on our world. Who Should Take This Course? This course is perfect for professionals, academics, and students interested in international relations, the global economy, or related disciplines. Whether your focus is policymaking, economic analysis, or global studies, you’ll gain valuable insights and analytical skills to deepen your understanding. Take the Next Step Don’t miss out—register today to secure your spot and immerse yourself in the fascinating world of globalization and political economy!