Ready to step into management roles in payroll and finance? The Payroll Manager Mini Bundle is designed to make you stand out with expertise in payroll, Excel, financial analysis, administrative assistant skills, and Xero software. This bundle delivers exactly what employers want when hiring payroll managers and finance supervisors. Get ahead of your competition now—combine these powerful skills and become the hireable candidate every company is seeking. Description This bundle equips you with the essentials for payroll management success: proficiency in payroll processing, advanced Excel capabilities, sharp financial analysis, smooth administrative assistant operations, and mastery of Xero accounting software. Together, payroll, Excel, financial analysis, administrative assistant, and Xero form a formidable skill set that hiring managers trust. Ideal for leadership roles in HR, finance departments, and payroll management, this bundle is tailored to give you a competitive advantage. Organisations increasingly demand candidates who combine technical payroll knowledge with software skills like Excel and Xero—plus strong organisational ability as an administrative assistant. Elevate your career by enrolling today. FAQ Q: Who should choose this bundle? A: Aspiring payroll managers, finance supervisors, and HR leaders looking to upgrade their skills. Q: Does it require prior payroll experience? A: Some experience helps, but the bundle is accessible for motivated learners. Q: What software skills are covered? A: Emphasis on Excel and Xero, two of the most widely used tools in payroll management. Q: Will this help with leadership roles? A: Yes, it focuses on managerial skills alongside technical payroll and finance knowledge. Q: How does the administrative assistant skill fit? A: It strengthens your organisational and communication skills, crucial for managing teams and processes. Q: Is now a good time to enrol? A: Definitely. Payroll and finance roles continue to grow, and competition is fierce.
Fuel your career in automotive maintenance and technical trades with the Automotive Mechanic & Technical Training Mini Bundle. This bundle brings together essential, job-ready skills in Puwer, Bike Maintenance, Bicycle Maintenance, RIDDOR, and Welding—equipping you to meet employer demands in garages, workshops, manufacturing, and safety-critical environments. Whether you’re looking to maintain high standards or take on specialized technical roles, understanding Puwer and RIDDOR compliance alongside hands-on skills in Bike Maintenance, Bicycle Maintenance, and Welding sets you apart from the competition. Description The automotive industry values technicians who can combine mechanical know-how with health and safety compliance. This bundle delivers the full package. Puwer and RIDDOR training ensure you understand the essential workplace safety regulations, while Bike Maintenance, Bicycle Maintenance, and Welding provide practical skills needed for hands-on repairs and fabrication. Workshop owners and manufacturers are urgently seeking mechanics who bring both technical expertise and compliance confidence. This blend of skills means you’re not just fixing vehicles—you’re safeguarding operations. It’s a compelling combination that fast-tracks hiring decisions in automotive and related sectors. FAQ Which jobs does this bundle prepare me for? Automotive mechanic, bike technician, welder, workshop safety officer, and maintenance technician. Is health and safety training included? Yes—Puwer and RIDDOR focus on compliance with essential UK workplace safety regulations. Are these skills relevant beyond automotive? Absolutely. Skills like Welding and RIDDOR are valuable in manufacturing and industrial settings. Can I specialize in bike or bicycle maintenance? Yes. Both Bike Maintenance and Bicycle Maintenance skills are in demand in retail and service sectors. Is this bundle suitable for new entrants? Definitely. It offers a complete foundation to start or upgrade your career in automotive mechanics. How quickly can I expect to find work? Demand for qualified mechanics and technicians is strong; starting now puts you in prime position.
Passionate about plants and ready to turn that passion into a career? The Gardening Mini Bundle is designed for anyone looking to break into or advance in the horticulture, agriculture, landscaping, or floristry industries. With hands-on skills in Gardening, Horticulture, Agriculture, Floristry, and Greenhouse management, you’ll become the candidate every employer is searching for. Don’t miss out on the booming green industry where practical knowledge and experience with these skills open doors across nurseries, landscaping firms, greenhouses, and agricultural businesses. Description The demand for skilled professionals in Gardening and Horticulture continues to grow, driven by increased environmental awareness, urban landscaping, and sustainable agriculture. This bundle equips you with practical expertise in Gardening techniques, advanced Horticulture, and sustainable Agriculture practices, making you a versatile asset. Add to that the creative and technical aspects of Floristry, along with the specialized skills needed for Greenhouse operation and management, and you’re ready to handle a wide range of roles in the green industry. Employers across commercial farms, botanical gardens, landscaping companies, florists, and greenhouse operations seek professionals trained in these areas. The Gardening Mini Bundle offers the comprehensive skill set to meet those demands and make you job-ready. FAQ Who is this bundle for? Ideal for aspiring gardeners, horticulturists, agricultural technicians, florists, and greenhouse managers. If you want to excel in Gardening, Horticulture, Agriculture, Floristry, and Greenhouse skills, this bundle is your best choice. Why are these five skills grouped together? Because they reflect the full cycle of plant care and cultivation—from soil and crops (Agriculture) to flower design (Floristry) and controlled environment growing (Greenhouse). How quickly can this bundle help me find a job? The green sector is growing fast with many entry points. Mastering Gardening, Horticulture, Agriculture, Floristry, and Greenhouse skills significantly boosts your hireability in a wide range of roles.
Become indispensable in finance and accounting with the Value Added Tax (VAT) Mini Bundle. Perfect for professionals seeking roles in taxation, bookkeeping, and financial management, this bundle centers on expertise in VAT, Tax, Cashflow Management in Crisis, Data Entry, and MS Word. Together, these skills increase your hireability in industries reliant on precise financial operations. Don’t miss this opportunity to upgrade your skillset in critical tax and cashflow disciplines—designed for real-world job relevance. Description Businesses and financial institutions need experts who understand VAT intricacies alongside solid Tax knowledge. The Value Added Tax (VAT) Mini Bundle combines these with practical skills in Cashflow Management in Crisis, Data Entry, and MS Word to make you job-ready. Employers seek candidates proficient in VAT and Tax to ensure compliance and financial accuracy. Pairing this with Cashflow Management in Crisis skills shows your ability to navigate challenges. Accurate Data Entry and strong command of MS Word complete the profile that’s essential for finance roles. Investing in this bundle means mastering VAT, Tax, Cashflow Management in Crisis, Data Entry, and MS Word all at once—maximizing value and career potential. Don’t let this chance slip by. FAQ Who should enroll in this bundle? Ideal for professionals or beginners seeking roles involving VAT, Tax, Cashflow Management in Crisis, Data Entry, and MS Word in finance and accounting. Does this bundle improve practical skills? Yes. Skills in VAT, Tax, Cashflow Management in Crisis, Data Entry, and MS Word are highly sought after and directly applicable to daily tasks. Is this offer time-sensitive? Yes. Bundles combining VAT, Tax, Cashflow Management in Crisis, Data Entry, and MS Word are limited—act now to secure your spot.
Equip yourself for success as a new manager with our comprehensive “New Manager” course, covering essential leadership, communication, team building, and legal compliance skills. Gain the confidence and competence to lead effectively in today’s dynamic workplace.
Efficient management of accounts receivable is vital for maintaining a healthy cash flow and ensuring the financial stability of any organisation. This course offers a thorough exploration of the essential components involved in overseeing outstanding customer payments. From setting effective credit policies to optimising billing and invoicing processes, participants will gain a clear understanding of how to manage receivables with confidence and precision. Additionally, the course examines a variety of collection strategies designed to enhance recovery rates while maintaining positive customer relationships. It also covers the critical tasks of cash application and reconciliation, ensuring that every payment is accurately recorded and accounted for. Finally, learners will stay ahead by exploring the latest technologies and trends transforming accounts receivable management today, equipping them with the knowledge to adapt to evolving business environments seamlessly. Key Features CPD Accredited FREE PDF + Hardcopy certificate Fully online, interactive course Self-paced learning and laptop, tablet and smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases Course Curriculum Module 01 : Introduction to Accounts Receivable Management Module 02 : Credit Policies and Procedures Module 03 : Billing and Invoicing Module 04 : Receivables Collection Strategies Module 05 : Cash Application and Reconciliation Module 06 : Accounts Receivable Technologies and Trends Learning Outcomes: Analyse and implement efficient credit policies. Streamline billing and invoicing procedures. Develop effective receivables collection strategies. Master the art of cash application and reconciliation. Stay updated with the latest Accounts Receivable technologies and trends. Enhance your financial management skills for a competitive edge. Accreditation This course is CPD Quality Standards (CPD QS) accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Finance professionals Business owners and managers Accountants Financial analysts Administrative professionals Anyone interested in financial management Graduates seeking to enhance their financial knowledge Those looking to advance their career in finance Career path Credit Manager Financial Analyst Accounts Receivable Specialist Finance Manager Business Owner Accounting Clerk Certificates Digital certificate Digital certificate - Included Once you've successfully completed your course, you will immediately be sent a FREE digital certificate. Hard copy certificate Hard copy certificate - Included Also, you can have your FREE printed certificate delivered by post (shipping cost £3.99 in the UK). For all international addresses outside of the United Kingdom, the delivery fee for a hardcopy certificate will be only £10. Our certifications have no expiry dates, although we do recommend that you renew them every 12 months.
Overview This comprehensive course on Pure Mathematics Fundamentals will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Pure Mathematics Fundamentals comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Pure Mathematics Fundamentals. It is available to all students, of all academic backgrounds. Requirements Our Pure Mathematics Fundamentals is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 14 sections • 193 lectures • 03:43:00 total length •About Course: 00:02:00 •Quick Guide: 00:01:00 •Topics of Essential Revision - 1: 00:00:00 •Negative numbers and operations on Integers: 00:14:00 •The rules of Indices in Algebra: 00:11:00 •Working with indices Part 1: 00:10:00 •Working with indices Part 2: 00:08:00 •Fractional Indices: 00:12:00 •What are Polynomials?: 00:07:00 •Writing statements in Algebraic Form: 00:06:00 •Simplification using BODMAS: 00:08:00 •Distributive Property: 00:07:00 •Addition of Algebraic expressions: 00:13:00 •Subtraction of Algebraic expressions: 00:12:00 •Multiplication of Algebraic Expressions Part 1: 00:05:00 •Multiplication of Algebraic Expressions Part 2: 00:05:00 •Multiplication of Algebraic Expressions Part 3: 00:06:00 •Division of algebraic expressions Part 1: 00:11:00 •Division of algebraic expressions Part 2: 00:10:00 •Division of algebraic expressions Part 3: 00:07:00 •Topics of Essential Revision - 2: 00:00:00 •Factorization by method of common factor: 00:13:00 •Factorization by regrouping the terms: 00:10:00 •Factorization by difference of two squares: 00:11:00 •Factorization using identity (a + b) ² and (a - b) ²: 00:10:00 •Factorization using identity (a + b + c) ²: 00:05:00 •Factorization by middle term split Part 1: 00:12:00 •Factorization by middle term split Part 2: 00:09:00 •Simultaneous Linear Equations: 00:07:00 •Graphical Method: 00:06:00 •Graphical method Continued: 00:11:00 •Elimination by substitution Method: 00:09:00 •Equating the coefficients Method: 00:11:00 •Cross Multiplication: 00:10:00 •Equations Reducible to Linear Equations-1: 00:08:00 •Equations Reducible to Linear Equations-2: 00:14:00 •Introduction to Quadratic Equations: 00:05:00 •Solving Quadratic Equations by Factorization method: 00:09:00 •Writing in completed square form: 00:07:00 •Solving by completed square method: 00:08:00 •Sketching of Quadratic Graphs: 00:12:00 •Quadratic graphs using Transformations: 00:06:00 •Quadratic inequalities: 00:11:00 •Deriving Quadratic formula: 00:05:00 •Solving problems using Quadratic Formula: 00:06:00 •Nature of Roots Part - 1: 00:05:00 •Nature of roots Part - 2: 00:12:00 •Downloadable Resources: 00:00:00 •Distance formula: 00:18:00 •Mid point formula: 00:05:00 •Gradient of a line: 00:11:00 •Graphing using gradient and y intercept: 00:03:00 •Some standard lines: 00:05:00 •Slope intercept form y = m x +c: 00:06:00 •Point slope form and two point form: 00:11:00 •Intersection of line and parabola: 00:10:00 •Past Papers Problems Part 1: 00:09:00 •Past Papers Problems Part 2: 00:11:00 •Past Papers Problems Part 3: 00:09:00 •Past Papers Problems Part 4: 00:12:00 •Past Papers Problems Part 5: 00:12:00 •Downloadable Resources: 00:00:00 •Sequence and series ( video): 00:08:00 •Arithmetic Sequence: 00:10:00 •General term of an A.P.: 00:07:00 •Finding given term is which term: 00:05:00 •Writing sequence when two terms are known: 00:08:00 •Condition for three terms to be in A.P.: 00:05:00 •Sum to n terms of A.P.: 00:06:00 •Practice Problems 1 (A.P.): 00:09:00 •Practice problems 2 (A.P.): 00:07:00 •Practice problems 3 (A.P.): 00:07:00 •Practice problems 4 (A.P.): 00:11:00 •Geometric Progressions: 00:12:00 •Sum to n terms in G.P.: 00:14:00 •Sum to infinite Terms in G.P.: 00:13:00 •Practice Problems 1 (GP): 00:15:00 •Practice Problems 2 (GP): 00:12:00 •Practice Problems 3 (GP): 00:07:00 •Practice Problems based on AP and GP both: 00:15:00 •Past papers problems 1: 00:17:00 •Past papers problems 2: 00:10:00 •Past papers problems 3: 00:11:00 •Downloadable Resources: 00:00:00 •Geometric Progressions - Resources: 00:00:00 •What is Factorial?: 00:07:00 •n-choose -r problems: 00:07:00 •Properties of n - choose -r: 00:05:00 •Binomial Theorem for positive index: 00:20:00 •Expanding using Binomial Theorem: 00:11:00 •Finding the indicated term in the Binomial expansion: 00:11:00 •Finding the indicated term from end: 00:09:00 •Finding the coefficient for given exponent (index) of the variable: 00:09:00 •Finding the term independent of variable: 00:05:00 •Expanding in increasing and decreasing powers of x: 00:09:00 •Practice problems 1: 00:12:00 •Practice Problems 2: 00:09:00 •Practice problems 3: 00:10:00 •Past papers problems 1: 00:15:00 •Past Paper problems 2: 00:13:00 •Past Paper problems 3: 00:09:00 •Downloadable Resources: 00:00:00 •What is Function?: 00:08:00 •Vertical Line Test: 00:04:00 •Value of a Function Graphically: 00:08:00 •Domain Range of a function Algebraically: 00:14:00 •Domain Range of a function Graphically: 00:07:00 •Even & Odd Functions: 00:07:00 •One to one Function: 00:05:00 •Composite Functions: 00:09:00 •How to draw Rational Functions- 1: 00:05:00 •How to draw Rational Functions- 2: 00:10:00 •Inverse of a function Algebraically: 00:05:00 •Inverse of a function Graphically: 00:09:00 •Practice Problems 1: 00:16:00 •Practice Problems 2: 00:11:00 •Downloadable Resources: 00:00:00 •What is Derivative?: 00:08:00 •Derivation of formula for Derivative: 00:06:00 •Differentiation by definition or First Principle: 00:07:00 •Power Rule: 00:22:00 •Practice Problems on Power Rule 1: 00:07:00 •Practice Problems on Power Rule 2: 00:07:00 •Practice Problems on Power Rule 3: 00:05:00 •Practice Problems on Power Rule 4: 00:13:00 •Practice Problems on Power Rule 5: 00:08:00 •Downloadable Resources: 00:00:00 •Tangents and Normals- Basics: 00:13:00 •Practice- Tangents and Normals Part 1: 00:16:00 •Practice- Tangents and Normals Part 2: 00:13:00 •Practice- Tangents and Normals Part 3: 00:11:00 •Practice- Tangents and Normals Part 4: 00:14:00 •Downloadable Resources: 00:00:00 •Stationary Points - Basics: 00:13:00 •Practice- Increasing Decreasing & Maxima Minima part 1: 00:11:00 •Practice- Increasing Decreasing & Maxima Minima part 2: 00:12:00 •Practice- Increasing Decreasing & Maxima Minima part 3: 00:10:00 •Downloadable Resources: 00:00:00 •Concavity-Basics: 00:02:00 •Concavity & Second Derivative: 00:08:00 •Second Derivative Test: 00:09:00 •Practice Problems on second derivative: 00:04:00 •Practice Problem of Maxima Minima using second derivative test Part 1: 00:17:00 •Practice Problem of Maxima Minima using second derivative test Part 2: 00:10:00 •Practice Problem of Maxima Minima using second derivative test Part 3: 00:07:00 •Practice Problem of Maxima Minima using second derivative test Part 4: 00:07:00 •Applications of Maxima and Minima Part 1: 00:09:00 •Applications of Maxima and Minima Part 2: 00:07:00 •Applications of Maxima and Minima Part 3: 00:10:00 •Applications of Maxima and Minima Part 4: 00:09:00 •Applications of Maxima and Minima Part 5: 00:10:00 •Applications of Maxima and Minima Part 6: 00:08:00 •Past Paper Problems on applications of maxima and minima Part 1: 00:09:00 •Past Paper Problems on applications of maxima and minima Part 2: 00:09:00 •Past Paper Problems on applications of maxima and minima Part 3: 00:08:00 •Past Paper Problems on applications of maxima and minima Part 4: 00:07:00 •Chain Rule: 00:12:00 •Rate of change part 1: 00:05:00 •Rate of change part 2: 00:10:00 •Rate of change part 3: 00:07:00 •Past Paper Problems using chain rule -1: 00:06:00 •Past Paper Problems using chain rule -2: 00:07:00 •Past Paper Problems using chain rule - 3: 00:07:00 •Past Paper Problems using chain rule - 4: 00:04:00 •Downloadable Resources: 00:00:00 •What is Integration?: 00:12:00 •Practice Questions 1: 00:06:00 •Practice Questions 2: 00:09:00 •Practice Questions 3: 00:09:00 •Fundamental Theorem of Calculus: 00:09:00 •What is Definite Integration?: 00:10:00 •Finding Definite Integration: 00:09:00 •Practice Questions on Definite Integration 1: 00:10:00 •Practice Questions on Definite Integration 2: 00:10:00 •Practice Questions on Definite Integration 3: 00:15:00 •Area below x-axis: 00:12:00 •Practice Problems on Area below x-axis 1: 00:11:00 •Practice Problems on Area below x-axis 2: 00:13:00 •Practice Problems on Area below x-axis 3: 00:09:00 •Practice Problems on Area below x-axis 4: 00:07:00 •Area between two curves (Basics): 00:15:00 •Practice Problems on Area between two curves 1: 00:06:00 •Practice Problems on Area between two curves 2: 00:13:00 •Practice Problems on Area between two curves 3: 00:12:00 •Practice Problems on Area between two curves 4: 00:10:00 •Practice Problems on Area between two curves 5: 00:13:00 •The Reverse Chain Rule- Indefinite Integration: 00:06:00 •The Reverse Chain Rule- Definite Integration: 00:05:00 •Practice Problems on The Reverse Chain Rule: 00:09:00 •Improper Integrals: 00:06:00 •Volumes by Integration: 00:08:00 •Practice Problems on Volumes by Integration-1: 00:04:00 •Practice Problems on Volumes by Integration-2: 00:04:00
Want to stand out in today’s high-stakes tech job market? The Ethical Hacking Mini Bundle was designed to launch your career in the world’s most security-critical sectors. With in-demand skills in cyber security, GDPR, IT, DevOps, and Python, this bundle positions you for job relevance in government, corporate, and cloud-based roles—where employers are actively hiring and paying well. The future of digital trust depends on cyber security, GDPR, IT, DevOps, and Python. With this bundle, you’ll speak the language of security teams, tech leads, and compliance officers—before someone else gets hired in your place. Description Companies are in a constant arms race to defend their data—and they’re not just looking for qualifications. They want professionals skilled in cyber security, fluent in GDPR, equipped in IT, familiar with DevOps practices, and comfortable using Python. This Ethical Hacking Mini Bundle delivers exactly that, with a sharp eye on employability and relevance. Cyber security isn’t just a buzzword—it’s the backbone of digital safety. Pair it with GDPR compliance and you’re instantly useful in regulated industries. Add IT support expertise, layer in DevOps workflows, and back it all with Python skills, and suddenly you’re not just job-ready—you’re a recruitment magnet. Whether you’re eyeing roles in ethical hacking, infrastructure support, DevOps pipelines, or compliance-based IT systems, employers will prioritise CVs listing cyber security, GDPR, IT, DevOps, and Python. This bundle fast-tracks your entry into tech’s most secure and scalable career paths. In a job market flooded with generic IT applicants, don’t be overlooked—be overqualified. FAQ Q: Who should consider this Ethical Hacking Mini Bundle? A: Anyone aiming for roles in cyber security, GDPR compliance, IT support, DevOps operations, or Python-based automation. Q: What industries does it apply to? A: Tech firms, cloud services, government, fintech, health IT, and any company needing strong cyber security and GDPR oversight. Q: Why are DevOps and Python included? A: DevOps is essential for modern deployment pipelines, and Python is the most used language in automation, scripting, and ethical hacking. Q: Will this help me move into ethical hacking roles? A: Yes—cyber security, IT, Python, GDPR, and DevOps are core pillars in that career path. Q: Is there a high demand for these skills? A: Extremely. Cyber security and GDPR are now regulatory necessities, and DevOps, Python, and IT professionals remain in high demand.
Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances
Duration 4 Days 24 CPD hours This course is intended for This course is intended for security and network administrators who will be responsible for the installation, deployment, tuning, and day-to-day maintenance of the F5 Advanced Web Application Firewall. In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks. The course includes lecture, hands-on labs, and discussion about different F5 Advanced Web Application Firewall tools for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Leveraging F5 Support Resources and Tools Module 2: Traffic Processing with BIG-IP Identifying BIG-IP Traffic Processing Objects Overview of Network Packet Flow Understanding Profiles Overview of Local Traffic Policies Visualizing the HTTP Request Flow Module 3: Web Application Concepts Overview of Web Application Request Processing Web Application Firewall: Layer 7 Protection F5 Advanced WAF Layer 7 Security Checks Overview of Web Communication Elements Overview of the HTTP Request Structure Examining HTTP Responses How F5 Advanced WAF Parses File Types, URLs, and Parameters Using the Fiddler HTTP Proxy Module 4: Common Web Application Vulnerabilities A Taxonomy of Attacks: The Threat Landscape What Elements of Application Delivery are Targeted? Common Exploits Against Web Applications Module 5: Security Policy Deployment Defining Learning Comparing Positive and Negative Security Models The Deployment Workflow Policy Type: How Will the Policy Be Applied Policy Template: Determines the Level of Protection Policy Templates: Automatic or Manual Policy Building Assigning Policy to Virtual Server Deployment Workflow: Using Advanced Settings Selecting the Enforcement Mode The Importance of Application Language Configure Server Technologies Verify Attack Signature Staging Viewing Requests Security Checks Offered by Rapid Deployment Defining Attack Signatures Using Data Guard to Check Responses Module 6: Policy Tuning and Violations Post-Deployment Traffic Processing Defining Violations Defining False Positives How Violations are Categorized Violation Rating: A Threat Scale Defining Staging and Enforcement Defining Enforcement Mode Defining the Enforcement Readiness Period Reviewing the Definition of Learning Defining Learning Suggestions Choosing Automatic or Manual Learning Defining the Learn, Alarm and Block Settings Interpreting the Enforcement Readiness Summary Configuring the Blocking Response Page Module 7: Attack Signatures & Threat Campaigns Defining Attack Signatures Attack Signature Basics Creating User-Defined Attack Signatures Defining Simple and Advanced Edit Modes Defining Attack Signature Sets Defining Attack Signature Pools Understanding Attack Signatures and Staging Updating Attack Signatures Defining Threat Campaigns Deploying Threat Campaigns Module 8: Positive Security Policy Building Defining and Learning Security Policy Components Defining the Wildcard Defining the Entity Lifecycle Choosing the Learning Scheme How to Learn: Never (Wildcard Only) How to Learn: Always How to Learn: Selective Reviewing the Enforcement Readiness Period: Entities Viewing Learning Suggestions and Staging Status Violations Without Learning Suggestions Defining the Learning Score Defining Trusted and Untrusted IP Addresses How to Learn: Compact Module 9: Cookies and Other Headers F5 Advanced WAF Cookies: What to Enforce Defining Allowed and Enforced Cookies Configuring Security Processing on HTTP headers Module 10: Reporting and Logging Overview: Big Picture Data Reporting: Build Your Own View Reporting: Chart based on filters Brute Force and Web Scraping Statistics Viewing F5 Advanced WAF Resource Reports PCI Compliance: PCI-DSS 3.0 The Attack Expert System Viewing Traffic Learning Graphs Local Logging Facilities and Destinations How to Enable Local Logging of Security Events Viewing Logs in the Configuration Utility Exporting Requests Logging Profiles: Build What You Need Configuring Response Logging Module 11: Lab Project 1 Lab Project 1 Module 12: Advanced Parameter Handling Defining Parameter Types Defining Static Parameters Defining Dynamic Parameters Defining Dynamic Parameter Extraction Properties Defining Parameter Levels Other Parameter Considerations Module 13: Automatic Policy Building Overview of Automatic Policy Building Defining Templates Which Automate Learning Defining Policy Loosening Defining Policy Tightening Defining Learning Speed: Traffic Sampling Defining Track Site Changes Lesson 14: Web Application Vulnerability Scanner Integration Integrating Scanner Output Importing Vulnerabilities Resolving Vulnerabilities Using the Generic XML Scanner XSD file Lesson 15: Deploying Layered Policies Defining a Parent Policy Defining Inheritance Parent Policy Deployment Use Cases Lesson 16: Login Enforcement and Brute Force Mitigation Defining Login Pages for Flow Control Configuring Automatic Detection of Login Pages Defining Session Tracking Brute Force Protection Configuration Source-Based Brute Force Mitigations Defining Credentials Stuffing Mitigating Credentials Stuffing Lesson 17: Reconnaissance with Session Tracking Defining Session Tracking Configuring Actions Upon Violation Detection Lesson 18: Layer 7 DoS Mitigation Defining Denial of Service Attacks Defining the DoS Protection Profile Overview of TPS-based DoS Protection Creating a DoS Logging Profile Applying TPS Mitigations Defining Behavioral and Stress-Based Detection Lesson 19: Advanced Bot Protection Classifying Clients with the Bot Defense Profile Defining Bot Signatures Defining Proactive Bot Defense Defining Behavioral and Stress-Based Detection Defining Behavioral DoS Mitigation Lesson 20: Form Encryption using DataSafe Targeting Elements of Application Delivery Exploiting the Document Object Model Protecting Applications Using DataSafe The Order of Operations for URL Classification Lesson 21: Review and Final Labs Review and Final Labs