Duration 1 Days 6 CPD hours This course is intended for This course is intended for network engineers, support personnel, reseller support, and others responsible for implementing ScreenOS products. Overview After successfully completing this course, you should be able to: Configure attack prevention features, including: ?SCREEN options; Deep Inspection (DI); and Antivirus (AV) scanning. Configure URL filtering. Configure antispam filters. This course meets the business needs of customers who are deploying the attack prevention features of ScreenOS software. The course focuses specifically on the attack-related features and assumes familiarity with ScreenOS software. Upon completing this course, you should be able to return to work and successfully configure and verify the desired attack prevention features. Chapter 1: Course Introduction Chapter 2: ScreenOS Basics Review Concepts Review Configuration Review Lab: ScreenOS Basics Review Chapter 3: SCREEN Options Multilayer Network Protection Types of Attacks SCREEN Options Configuration SCREEN Best Practices Lab: SCREEN Options Configuration Chapter 4: Deep Inspection Deep Inspection Overview Attack Database Configuration Policy Configuration Logging and Monitoring Lab: Deep Inspection Configuration Chapter 5: Antivirus Antivirus Operations Antivirus Configuration?Kaspersky Antivirus Configuration?ICAP Verifying Operations Lab: Antivirus Configuration Chapter 6: Web Filtering Web-Filtering Options Web-Filtering Configuration Verifying Operations Lab: Configuring Web Filtering Chapter 7: Antispam Antispam Concepts Antispam Configuration Verifying Operations Lab: Antispam Configuration Additional course details: Nexus Humans Attack Prevention with Juniper Networks Firewalls training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Attack Prevention with Juniper Networks Firewalls course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview Describe the history and rationale for MPLS, as well as its basic terminology. Explain the MPLS label operations (push, pop, swap) and the concept of label-switched path (LSP). Describe the configuration and verification of MPLS forwarding. Describe the functionalities and operation of RSVP and LDP. Configure and verify RSVP-signaled and LDP-signaled LSPs. Select and configure the appropriate label distribution protocol for a given set of requirements. Describe the default Junos OS MPLS traffic engineering behavior. Explain the Interior Gateway Protocol (IGP) extensions used to build the Traffic Engineering Database (TED). Describe the Constrained Shortest Path First (CSPF) algorithm, its uses, and its path selection process. Describe administrative groups and how they can be used to influence path selection. Describe the default traffic protection behavior of RSVP-signaled LSPs. Explain the use of primary and secondary LSPs. Describe the operation and configuration of fast reroute. Describe the operation and configuration of link and node protection. Describe the operation and configuration of LDP loop-free alternate. Describe the LSP optimization options. Explain LSP priority and preemption. Describe the behavior of fate sharing. Describe how SRLG changes the CSPF algorithm when computing the path of a secondary LSP. Explain how extended admin groups can be used to influence path selection. Explain the purpose of several miscellaneous MPLS features. This two-day course is designed to provide students with a solid foundation on Multiprotocol Label Switching (MPLS). Course Outline Course Introduction MPLS Fundamentals MPLS Foundation Terminology MPLS Configuration MPLS Packet Forwarding Label Distribution Protocols Label Distribution Protocols RSVP LDP Routing Table Integration Mapping Next-Hops to LSPs Route Resolution Example Route Resolution Summary IGP Passive Versus Next-Hop Self for BGP Destinations Constrained Shortest Path First RSVP Behavior Without CSPF CSPF Algorithm CSPF Tie Breaking Administrative Groups Inter-area Traffic Engineered LSPs Traffic Protection and LSP Optimization Default Traffic Protection Behavior Primary and Secondary LSPs Fast Reroute RSVP Link Protection LDP LFA and Link Protection LSP Optimization Fate Sharing Junos OS Fate Sharing SRLG Extended Admin Groups Miscellaneous MPLS Features Forwarding Adjacencies Policy Control over LSP Selection LSP Metrics Automatic Bandwidth Container LSPs TTL Handling Explicit Null Configuration MPLS Pings
Duration 2 Days 12 CPD hours This course is intended for Server administrators Network engineers Systems engineers Consulting systems engineers Technical solutions architects Network administrators Storage administrators Network managers Sales engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco UCS server hardware Describe Cisco UCS connectivity Describe the Cisco HyperFlex Data Platform, its data writing and reading processes, and data optimization Describe and configure Cisco UCS service profiles Describe and configure Cisco UCS service profile templates Describe and implement iSCSI on Cisco UCS Describe and implement Cisco UCS firmware updates Describe and implement Cisco UCS backups This introductory course shows you how to deploy, secure, operate and maintain the Cisco Unified Computing system (Cisco UCS) B-Series blade server, Cisco UCS C-Series and S-Series rack servers, and Cisco HyperFlex product family, for use in data centers. Describing Cisco UCS Server Hardware Cisco UCS B-Series Blade Servers Cisco UCS C-Series Rack Servers Cisco UCS S-Series Rack Servers Cisco Virtual Interface Cards Hyperconvergence Overview Cisco HyperFlex HX-Series Servers Describing Cisco UCS Connectivity Cisco UCS Fabric Interconnect Cisco UCS B-Series Connectivity Cisco UCS C-Series Connectivity Cisco UCS S-Series Connectivity Cisco HyperFlex Connectivity Architecture Cisco HyperFlex Edge Connectivity Ethernet End-Host Mode Compared to Switching Mode Cisco UCS Fabric Interconnect Uplink Pinning Cisco UCS C-Series Integration Describing the Cisco HyperFlex HX Data Platform Cisco HyperFlex HX Data Platform Software Writing Data to Cisco HyperFlex HX Data Platform Reading Data from Cisco HyperFlex HX Data Platform Data Optimization in Cisco HyperFlex HX Data Platform Configuring Cisco UCS Service Profiles Portability Issue with Nonabstracted Identities Cisco UCS Service Profile Identity Pools Server Pools IP Pools Configuring Cisco UCS Service Profile Templates Service Profile Templates Implementing iSCSI on Cisco UCS iSCSI Addressing Evolution of SCSI from DAS to SAN iSCSI Multipathing Implementing Cisco UCS Firmware Updates Update Cisco UCS C-Series Server Firmware Download Tasks for the Infrastructure Image Download Tasks for Cisco UCS B-Series Firmware Packages Best Practices for Updating Firmware in Cisco UCS Manager Firmware Upgrades Using Auto Install Capability Catalog Updates Host Firmware Packages Driver Updates for Operating Systems and Hypervisors Implementing Cisco UCS Backups Compare Backup Options in Cisco UCS Manager Compare Two Import Types Policy Backup
Duration 4.375 Days 26.25 CPD hours This course is intended for CCISOs are certified in the knowledge of and experience in the following CISO Domains:Governance (Policy, Legal & Compliance)IS Management Controls and Auditing Management (Projects, Technology & Operations)Management ? Projects and OperationsInformation Security Core CompetenciesStrategic Planning & Finance Overview Please refer to Overview. The Certified CISO (C|CISO) course has certified leading information security professionals around the world and is the first of its kind training and certification program aimed at producing top-level Information Security Leaders. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by seasoned CISOs for current and aspiring CISOs. Governance Drivers that Influence Governance Corporate Governance Activities Information Security Governance Activities Governance and Ethical Decision Making Security Risk Management, Controls, and Audit Management Risk Management Audit Management Risk Treatment Risk Management Frameworks Risk Communication and Organizational Reporting Security Program Management and Operations Information Security Portfolio Management Information Security Program Management Information Security Project Management Security Operations Information Security Core Competencies Access Control Physical Security Network and Communications Security Threat and Vulnerability Management System and Application Security Encryption Concepts and Technology Strategic Planning, Financial Management, and Vendor Management Strategic Planning Financial Management Vendor Risk Management Additional course details: Nexus Humans EC-Council Certified CISO (C|CISO) w/exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified CISO (C|CISO) w/exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1.5 Days 9 CPD hours This course is intended for This course is designed for software developers or anyone interested in building Android applications. Overview Install Android Studio. Writing a Java Program. Run a Java Program. Write a Java Comment. Understand Java Variables and Their Data Types. Acquiring Good Knowledge of Java Control Flow Statements. Understanding The Java Methods and Arrays. Understanding the Object-Oriented Programming (OOP) Concepts and Java Class. Developing applications for Android? systems requires basic knowledge of Java programming language. Introductory course that focuses on the fundamentals of Java programming language, its framework, syntax, and paradigm. First Step in Java The History of Java How Java Programs work? Install Java JDK and JRE Why did Google choose Java over other programming languages? Android OS Structure Install Android Studio Create and Run Java Projects Creating an Android Project (Java Project) Using Android Studio Writing a Java Program Java Methods Running a Java Program Write a Comment Java Variables and Their Data Type Control Flow Statements Introduction IF ? Else Statement If?Else and Else?If... Statement If Else and Logical Operators Switch Statement While Loop Do-while Loop For Loop The Break Statement The Continue Statement Methods and Arrays Introduction Method Structure Call Method by Value Call Method by Reference Arrays Enter Data to Java Program Object-Oriented Programming (OOP) Concepts Java Class Additional course details: Nexus Humans Java Fundamentals for Android Development training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Java Fundamentals for Android Development course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for The primary audience for this course is as follows: Cloud solution architects Cloud administrators Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview After you complete this course the learner will be able to meet these overall objectives: Describe what clouds are supported and how to configure clouds for Cost Optimizer Examine the Cost Optimizer snapshots of costs incurred by the various clouds installed for an organization CLDCO, Mulitcloud Cost Optimization with Cisco CloudCenter Suite is a 1-day course that teaches you how the reporting and analysis of consumption the cost optimizer provides, functions within a Cisco© CloudCenter Suite. The cost optimizer works together with two other primary mechanisms: a workload manager that helps users deploy applications and manage governance policies, and an action orchestrator that provides seamless integration and workflow automation. Through lessons and hands-on experiences, you will learn the functionality of the CloudCenter cost optimizer.This course will help you:Acquire the advanced skills and techniques using the CloudCenter Suite for a consistent experience across all environments, whether you plan to deploy in the cloud or on-premisesLearn how to use the tools of cost management and workload optimization by leveraging the functionality of the entire CloudCenter suite Implementing Cisco CloudCenter Suite Cost Optimizer Cisco CloudCenter Suite Cost Optimizer Examining Cost Optimizer Inventory, Reports, Rightsizing, and Troubleshooting Configure Cost and Inventory Reports in the User Interface Additional course details: Nexus Humans Cisco Multicloud Cost Optimization with Cisco CloudCenter Suite (CLDCO) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Multicloud Cost Optimization with Cisco CloudCenter Suite (CLDCO) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is designed primarily for customer engineers and systems engineers in the following job roles: Automation architect Automation engineer Consulting systems engineer DevOps engineer Network administrator Network architect Network consulting engineer Network design engineer Network engineer Network operator Network reliability engineer Sales engineer Site reliability engineer Systems engineer Technical solutions architect Overview After taking this course, you should be able to: Articulate the role network automation and programmability play in the context of end-to-end network management and operations Define and differentiate between waterfall and agile software development methodologies Interpret and troubleshoot Python scripts with fundamental programming constructs built for network automation use cases Describe how DevOps principles, tools, and pipelines can be applied to network operations Understand the role of network automation development environments and associated technologies such as Python virtual environments, Vagrant, and Docker Understand and construct HTTP-based API calls to network devices Articulate the differences among and common use cases for XML, JSON, YAML, and protobuf Construct and interpret Python scripts using the Python requests module to automate devices that have HTTP-based APIs Understand the role YANG plays in network automation Understand that a number of tools exist to simplify working with YANG models Describe the functionality of RESTCONF and NETCONF and the differences between them Construct Ansible playbooks to configure network devices and retrieve operational state data from them Build Jinja2 templates and YAML data structures to generate desired state configurations The Introducing Automation for Cisco Solutions (CSAU) v1.1 course gives you a broad overview of network automation skills. Through a combination of lecture and hands-on labs, you will learn the fundamentals of automation such as working on model-driven programmability solutions with Representational State Transfer Configuration Protocol (RESTCONF) and Network Configuration Protocol (NETCONF) protocols. The course also covers data formats and types, including Extensible Markup Language (XML), JavaScript Object Notation (JSON), Yaml Ain?t Markup Language (YAML), and Yet Another Next Generation (YANG), and their value in network automation, along with DevOps tools such as Ansible and Git. Course Outline Examining Network Management and Operations Exploring Software Development Methodologies Using Python for Network Automation Describing NetDevOps: DevOps for Networking Managing Automation Development Environments Introducing HTTP Network APIs Reviewing Data Formats and Data Encoding Using Python Requests to Automate HTTP-Based APIs Exploring YANG Using YANG Tools Automating Model-Driven APIs with Python Introducing Ansible for Network Automation Templating Configurations with Jinja2
Duration 2.5 Days 15 CPD hours This course is intended for This course is designed for administrators who configure and manage web-based applications on WebSphere Application Server. Web administrators, application developers and deployers, security specialists, and application architects can also benefit from this course.Prerequisite(s) Overview After completing this course, you should be able to:Relate WebSphere Application Server to the WebSphere family of productsDescribe the features and standards in WebSphere Application Server V9Describe the use of WebSphere Application Server in cloud, hybrid cloud, and on-premises environmentsDescribe the architectural concepts that are related to WebSphere Application ServerAssemble and install server-side Java enterprise applicationsUse WebSphere administrative tools to configure and manage enterprise applicationsUse wsadmin scriptingConfigure WebSphere Application Server securityView performance information about server and application componentsTroubleshoot problems by using problem determination tools and log files In this course, you learn how to configure and maintain IBM WebSphere Application Server V9 in a single-server environment. Course Outline Course introduction WebSphere product family overview WebSphere Application Server architecture - stand-alone Exercise: Profile creation WebSphere Application Server administrative console Exercise: Exploring the administrative console Introduction to the PlantsByWebSphere application Application assembly Exercise: Assembling an application Application installation Exercise: Installing an application Problem determination Exercise: Problem determination Introduction to wsadmin and scripting Exercise: Using wsadmin WebSphere security Exercise: Configuring WebSphere Application Server security Exercise: Configuring application security Performance monitoring Exercise: Using the performance monitoring tools Course summary Additional course details: Nexus Humans WA590 IBM WebSphere Application Server V9 Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WA590 IBM WebSphere Application Server V9 Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Security-operations (SecOps), or security, orchestration, automation, and response (SOAR) engineers, managed security service providers (MSSPs), service delivery partners, system integrators, and professional services engineers Overview This training is designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow.The course includes coverage of a complete playbook-development process for automating a typical analyst workflow to address phishing incidents. This end-to-end view of the development process provides a framework for more focused discussions of individual topics that are covered in the course. The Cortex? XSOAR 6.2: Automation and Orchestration (EDU-380) course is four days of instructor-led training that will help you: Configure integrations, create tasks, and develop playbooks.Build incident layouts that enable analysts to triage and investigate incidents efficientlyIdentify how to categorize event information and map that information to display fields.Develop automations, manage content, indicator data, and artifact stores, schedule jobs, organize users and user roles, oversee case management, and foster collaboration Course Outline 1 - Core functionality and Feature Sets 2 - Enabling and Configuring Integrations 3 - Playbook Development 4 - Classification and Mapping 5 - Layout Builder 6 - Solution Architecture - Docker 8 - Automation Development & Debugging 9 - Content Management 10 - Indicators 11 - Jobs and Job Scheduling 12 - Users and Role Management 13 - Integration Development Additional course details: Nexus Humans Palo Alto Networks : Cortex XSOAR 6.8: Automation and Orchestration (EDU-380) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Cortex XSOAR 6.8: Automation and Orchestration (EDU-380) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Security administrators Security consultants Network administrators System engineers Technical support personnel Channel partners and resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Define the use and placement IDS/IPS components. Identify Snort features and requirements. Compile and install Snort. Define and use different modes of Snort. Install and utilize Snort supporting software. Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 is a 4-day course that shows you how to deploy Snort© in small to enterprise-scale implementations. You will learn how to install, configure, and operate Snort in Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) modes. You?ll practice installing and configuring Snort, utilize additional software tools and define rules to configure and improve the Snort environment, and more. The course qualifies for 32 Cisco Continuing Education credits (CE) towards recertification.This course will help you:Learning how to implement Snort, an open-source, rule-based, intrusion detection and prevention system. Gain leading-edge skills for high-demand responsibilities focused on security. Module 1: Detecting Intrusions with Snort 3.0 History of Snort IDS IPS IDS vs. IPS Examining Attack Vectors Application vs. Service Recognition Module 2: Sniffing the Network Protocol Analyzers Configuring Global Preferences Capture and Display Filters Capturing Packets Decrypting Secure Sockets Layer (SSL) Encrypted Packets Module 3: Architecting Nextgen Detection Snort 3.0 Design Modular Design Support Plug Holes with Plugins Process Packets Detect Interesting Traffic with Rules Output Data Module 4: Choosing a Snort Platform Provisioning and Placing Snort Installing Snort on Linux Module 5: Operating Snort 3.0 Start Snort Monitor the System for Intrusion Attempts Define Traffic to Monitor Log Intrusion Attempts Actions to Take When Snort Detects an Intrusion Attempt License Snort and Subscriptions Module 6: Examining Snort 3.0 Configuration Introducing Key Features Configure Sensors Lua Configuration Wizard Module 7: Managing Snort Pulled Pork Barnyard2 Elasticsearch, Logstash, and Kibana (ELK) Module 8: Analyzing Rule Syntax and Usage Anatomy of Snort Rules Understand Rule Headers Apply Rule Options Shared Object Rules Optimize Rules Analyze Statistics Module 9: Use Distributed Snort 3.0 Design a Distributed Snort System Sensor Placement Sensor Hardware Requirements Necessary Software Snort Configuration Monitor with Snort Module 10: Examining Lua Introduction to Lua Get Started with Lua