Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Threat Intelligence Analyst students will be able to proactively collect threat data and implement strategies to limit exposure to those threats. Additionally, they will be prepared to take the C)TIA exam Everywhere you turn today, you hear about the need for threat intelligence analysis! However, in some cases, it is just a buzzword, while in other cases, threat intelligence is being touted as the remedy toward advanced persistent threats. The real question is, how do we leverage threat intelligence to reduce network vulnerabilities without wasting time and money? The answer is simple, Mile2?s Certified Threat Intelligence Analyst course. Mile2?s CTIA course will help security professionals learn how to make good use of the many sources of threat intelligence. It will aid an individual to understand what threat sources are helpful, which specific threats are targeted and which ones may need minor adjustments to monitor within your organization. Mile2?s CTIA course focuses heavily on hands-on labs, concentrating on discerning and interpreting threats and responding to them.ÿ The CTIA course focuses overall on current significant threats, threat actors, and identification procedures so that cyber-security professionals can implement the best policies and procures for their organizational security posture. Once complete, the student will be competent toward improving a company?s existing security infrastructure. Policies and methodologies learned in the CTIA will allow the student to use threat intelligence concepts to decrease overall company risk. Course Outline Threat Intelligence Basics Cyber Threats Threat Actors Case Studies Threat Identification Proactive Approach
Duration 2 Days 12 CPD hours This course is intended for Project Managers, Business Analysts, Business and IT stakeholders working with analysts Overview Provide a solid foundation for applying business process modeling principles and best practices with BPMN Demonstrate how to solve practical business problems using BPMN Business Process Diagrams (BPDs) Students will learn to map business processes easily and efficiently using the industry standard - BPMN which stands for Business Process Modeling Notation from the Object Management Group (OMG). Students will learn the best practices in process mapping using the latest industry standards (BPMN) so that both the business and IT stakeholders will be able to understand the models and map processes consistently through-out their organization. Introduction What is Business Process Modeling? What is Business Process Modeling Notation (BPMN)? Benefits of BPMN An Overview of Governance An overview of governance Key governance questions to ask What happens if you don?t have effective governance? Mapping the Business Problem Define a strategic outcomes map Define a Business model and relevant processes Modeling Simple BPMN Structures When do you use BPMN? What are simple BPMN structures? AS-IS vs. TO-BE modeling Modeling Complex BPMN Structures What are complex BPMN structures When to use complex BPMN structures Analyzing Process Models Identifying poor process models Creating process models that everyone can understand Identify criteria for a well-defined process Process Mapping vs. Process Modeling Determine when to create a process map Determine when to create a process model Asking the four ?Ares? Additional Resources Learning about BPMN 2.0 More useful BPMN links BPMN 2.0 free editors
Duration 3 Days 18 CPD hours This course is intended for This course is designed for administrators who install, manage, and monitor IBM© DataPower Gateway Appliances. The course is also relevant for developers who administer appliances. Overview Configure an appliance for its initial deployment Download and upgrade the firmware on the DataPower appliances Create and manage user accounts, groups, and domains Configure Secure Sockets Layer (SSL) to and from DataPower Appliances Troubleshoot and debug services by using the problem determination tools, logs, and probes that are provided with the DataPower appliance Configure logging of messages to external locations IBM© DataPower Gateway Appliances are network devices that help secure, integrate, and optimize access to web, web services, mobile, and API workloads. Through instructor-led lectures and hands-on lab exercises, you learn how to run various administrative procedures, from initial installation and setup through ongoing maintenance of the appliances in production. You learn about the available management interfaces, such as the command-line interface (CLI), Web Management graphical interface, and XML Management Interface. You also learn how to use these interfaces to run various administrative tasks, such as upgrading firmware, running backup and restore operations, and configuring user accounts and domains. The course includes some information on upgrading firmware and working with DataPower hardware appliances. Course introductionDataPower deployment environmentsInitial setupManaging firmwareExercise: Upgrading image firmwareDataPower administration overviewUsing CLI and the XML Management Interface to configure appliance accessExercise: Using the CLI and the XML Management Interface to manage DataPower appliancesDataPower services overviewUsing the Web Management Blueprint Console to configure appliance accessTroubleshootingExercise: Using the troubleshooting tools to debug errorsDataPower cryptographic tools and SSL setupExercise: Securing connections with SSLLogging and log targetsExercise: Logging to an external systemCourse summary
Duration 2 Days 12 CPD hours This two-day course provides students an opportunity to learn about the skills, tools, and knowledge needed to deploy iOS devices. Interactive discussions and hands-on exercises guide students through the configuration, management, and supervision of iOS devices. Students? knowledge and skills are tested and reinforced by working through real-world scenarios The Role of MDM, VPP, and DEP How to successfully deploy iOS devices Identify and respond to challenges when deploying and managing devices without MDM Apple IDs Explain what an Apple ID is and identify when it?s needed Security How security is relevant in the context of a given deployment scenario Design and implement a deployment solution for a given scenario DEP Devices Configure DEP registered devices for Over-the-Air Enrollment Configure and manage settings, apps, and content on user-owned and company-owned devicesPrerequisites Manual Configuration Explore the challenges and inconsistencies when manually configuring multiple devices. Creating Configuration profiles using Apple Configurator to view and edit a configuration profile. Learn how profiles ensure consistency across multiple devices Manage Settings The iOS MDM protocol How a MDM solution is used to configure and manage devices over-the-air with consistency and accountability Apps and Content Introduce and define VPP Assign apps and content to their user and then configure and test managed 'open in' functionality Company-Owned (Personalized and Shared) Configure settings to enable Over-the-Air Enrollment and supervision and learn how users can personalize company-owned devices. Configure and test shared (shared) device scenarios and how Apps and content are distributed to the devices Workshop Real-world deployment scenarios Design a deployment that meets your scenario?s needs
Duration 2 Days 12 CPD hours This course is intended for The primary audiences for the course are as follows: Cisco technical customers (IT, telephony members, etc.) Cisco technology partners Cisco employees Overview Upon completing this course, the learner will be able to meet these overall objectives: Describe the CUIC High-Level Architecture and Deployment considerations Understanding Cisco Unified Intelligence Center Security, License Types and User Security Describe the installation and function of both the Controller Node Member Nodes. CUIC Configurations as well as how to upgrade the product is discussed. Managing Cisco Unified Intelligence Center Components Understanding Cisco Unified Intelligence Center Administration Describe what a Value List is and its function in CUIC Describe how Value Lists are created Describe what a Collection is and when you would use it when running reports Describe what are Report Definitions Describe the creation of Report Definitions and how to build a new Report using the new Report Definition The Cisco Unified Intelligence Center 11.6 for Advanced Users v1.1 (CUIC11.6AU v1.1) course is a 2-day instructor-led training (ILT) course. Cisco Unified Intelligence Center is a comprehensive, end-to-end reporting solution, designed to simplify the task of creating and modifying reports. It also can manage disparate data sources and, at the same time, to present a consistent user interface and a common tool to access varied data across multiple Cisco product families. Cisco Unified Intelligence Center Overview for the Advanced User Understanding Cisco Unified Intelligence Center Deployment Considerations Understanding Cisco Unified Intelligence Center Security, License Types and User Security Installing Cisco Unified Intelligence Managing Cisco Unified Intelligence Center Components Understanding Cisco Unified Intelligence Center Administration Using CUIC Value Lists and Collections as well as Report Definitions Using Value Lists and Collections Using Report Definitions
Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: System Engineers Network Engineers Technical Architects Technical Support Personnel Channel Partners Resellers Overview Upon completing the course, the learner will be able to meet these overall objectives: Describe Cisco SD-Access and how it relates to Cisco DNA Orchestrate a Cisco SD-Access solution using the Cisco DNA Center⢠orchestration platform Use the Network Data Platform to demonstrate the assurance and analytics capabilities of SD-Access The Deploying Cisco SD-Access (ENSDA) v1.0 course is an instructor-led, lab based, hands-on course that teaches students how to successfully deploy the Cisco© Software-Defined Access (SD-Access) solution within their enterprise networks. The course discusses how Cisco SD-Access fits into the Cisco Digital Network Architecture (Cisco DNA?). It covers SD-Access fundamentals, provisioning, policies, wireless integration, border operations, and migration strategies. Module 1: Cisco SD-Access Overview Lesson 1: Exploring Cisco SD-Access Lesson 2: Describing the Cisco SD-Access Architecture Lesson 3: Exploring Cisco DNA Center Lesson 4: Configuring Underlay Automation Module 2: Cisco SD-Access Implementation Lesson 1: ISE Integration in DNA Center Lesson 2: Policy Provisioning Basics Lesson 3: Navigating and Managing the Policy Application Workflows Module 3: Cisco SD-Access Border Operations Lesson 1: Cisco SD-Access Deployment Models Lesson 2: Connecting the Fabric to External Domains Module 4: Wireless Integration Orchestration Lesson 1: Integrating Wireless with the Cisco SD-Access Solution Lesson 2: Workflow of Cisco SD-Access Wireless Lesson 3: Cisco SD-Access Wireless Network Design Lesson 4: Cisco SD-Access Wireless Basic Operation Module 5: Cisco SD-Access Assurance and Migration Lesson 1: Cisco Network Data Platform Lesson 2: Cisco SD-Access Migration Strategies
Duration 1 Days 6 CPD hours This course is intended for This beginner course is for personnel who are assessing and planning to deploy flash storage and solutions. Overview The objectives of this course are as follows:- Summarize the various types of solutions available when using the IBM flash portfolio- Classify the architecture and features of the flash storage family- Compare the products within the flash storage family- Recognize the high-level components associated with flash storage This course is designed to provide a brief overview of flash storage Outline Unit 1: Flash storage fundamentals: An overview Unit 2: Introduction to flash storage Unit 3: Flash storage portfolio Unit 4: IBM FlashSystem family Unit 5: IBM FlashSystem solutions Lab 1: Settings menu Lab 2: Access menu Lab 3: Volume menu Lab 4: Host menu Lab Exercise Activity Additional course details: Nexus Humans SSFS1 IBM Flash Storage Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SSFS1 IBM Flash Storage Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This in an Introductory and beyond level course is geared for experienced Java developers seeking to be proficient in Apache Kafka. Attendees should be experienced developers who are comfortable with Java, and have reasonable experience working with databases. Overview Working in a hands-on learning environment, students will explore Overview of Streaming technologies Kafka concepts and architecture Programming using Kafka API Kafka Streams Monitoring Kafka Tuning / Troubleshooting Kafka Apache Kafka is a real-time data pipeline processor. It high-scalability, fault tolerance, execution speed, and fluid integrations are some of the key hallmarks that make it an integral part of many Enterprise Data architectures. In this lab intensive two day course, students will learn how to use Kafka to build streaming solutions. Introduction to Streaming Systems Fast data Streaming architecture Lambda architecture Message queues Streaming processors Introduction to Kafka Architecture Comparing Kafka with other queue systems (JMS / MQ) Kaka concepts : Messages, Topics, Partitions, Brokers, Producers, commit logs Kafka & Zookeeper Producing messages Consuming messages (Consumers, Consumer Groups) Message retention Scaling Kafka Programming With Kafka Configuration parameters Producer API (Sending messages to Kafka) Consumer API (consuming messages from Kafka) Commits , Offsets, Seeking Schema with Avro Kafka Streams Streams overview and architecture Streams use cases and comparison with other platforms Learning Kafka Streaming concepts (KStream, KTable, KStore) KStreaming operations (transformations, filters, joins, aggregations) Administering Kafka Hardware / Software requirements Deploying Kafka Configuration of brokers / topics / partitions / producers / consumers Security: How secure Kafka cluster, and secure client communications (SASL, Kerberos) Monitoring : monitoring tools Capacity Planning : estimating usage and demand Trouble shooting : failure scenarios and recovery Monitoring and Instrumenting Kafka Monitoring Kafka Instrumenting with Metrics library Instrument Kafka applications and monitor their performance
Duration 3 Days 18 CPD hours This course is intended for This intermediate course is for technical specialists, support/services individuals, individuals implementing LPARs for Power Systems with IBM i. This course is also appropriate for IBM Business Partners who sell and plan for consolidated systems. Overview Describe the PowerVM features Identify, describe, and locate hardware components in the Power Systems, Flex System and Power Blade models Identify virtualization options available, reliability features and single points of failure for Power Systems Implement System Planning Tool in design or update your own system Explain Simultaneous Multithreading (SMT) Describe memory allocation and affinity concepts Describe and configure a partition profile, including shared processors: Capped Uncapped Virtual processors Weighting factor Shared Processor Pools Explain virtual I/O: Serial, Ethernet and SCSI Understand and implement: IBM i installation through NFS, image virtual repository in VIOS, and assigning VSCSI disks to partitions in VIOS Understand base characteristics of IVM and how to implement IBM i on Power Blades Describe the NPIV PowerVM feature, how to configure virtual Fiber Channel adapters on the Virtual I/O Server and client partitions Discuss how to use the HMC GUI and commands to work with the World Wide Port Name (WWPN) pairs Identify commands used to examine the NPIV configuration In this course you begin with an overview of LPAR on Power Systems, followed with more detailed information on configuration planning and implementation using hands-on exercises to create and implement logical partitions. PowerVM for IBM i - Overview . Power Systems for IBM i . Introduction to System Planning Tool . Virtualization of IBM i - Processor, Memory, Processor Pools . Virtualization of IBM i - Virtual I/O . Virtualization of IBM i - Installation from NFS or VIOS repository . Implementation of IBM i on Power Blades . PowerVM for IBM i - NPIV .
Duration 1 Days 6 CPD hours This course is intended for This class is designed for administrators preparing to take the Salesforce Marketing Cloud Administrator exam who are able to configure Marketing Cloud products using industry and product best practices. You should be generally familiar with data structure in subscriber data management. You should also be able to thoroughly navigate Setup, troubleshoot account configuration, and manage user requests. Overview When you complete this course, you will be able to: Recall exam objectives. Discuss product features and functionality covered on the exam. Assess your exam readiness by answering practice questions. Familiarize yourself with additional resources necessary to prepare for the exam. Take the next step in your career and become a Salesforce Certified Marketing Cloud Administrator. In this 1-day, expert-led certification prep class, boost your exam readiness with a detailed exam overview, exam resources, and practice exam questions to test your knowledge. This course includes a voucher to sit for the Salesforce Marketing Cloud Administrator exam. Course Outline Exam Overview Digital Marketing Proficiency Review Governance and Compliance in Relation to Digital Marketing Review Security Best Practices for Date, Permissions, and PII Review Marketing Cloud Product Inventory and Offerings Subscriber Data Management Review the Contact Model Review Data Quality Evaluation Review Preference and Profile Center Setup Review Business Units, Users, and Security Configuration Review Integrations Configuration Review Features in Setup Home Review Marketing Cloud Extension Products Channel Management Review Mobile Studio Configuration Review Email Studio Configuration Review Social Studio and Advertising Configuration Review Journey Builder Concepts and Use Cases Maintenance Review Data Extraction and Report Generation Solutions Review Monitoring and System Availability Review Additional Marketing Cloud Product Benefits Practice Exam and Wrap-up Complete a Practice Exam Review Next Steps