Duration 4 Days 24 CPD hours This course is intended for IS Security Officers Privacy Officers Health IS Managers Risk Managers Information Security Managers Compliance and Privacy Officers Overview Upon completion, the student will be ready to take the Certified Healthcare Information Systems Security Practitioner exam by mile2. In addition, at the end of the CHISSP course, the student will be versed with best practices in the healthcare industry and will be able to establish a framework with current best practices in respects to privacy, regulation and risk management. The Certified Healthcare IS Security Practitioner, C)HISSP certification course covers the skills and knowledge to implement the best IT healthcare practices, as well as, regulatory compliance and standards in the healthcare industry. Because of growing industry regulations and privacy requirements in the healthcare industry, the C)HISSP was developed by Mile2. Graduates of this course have become vital in managing and protecting healthcare data and are tasked to protect patient information by implementing, managing, and assessing proper IT controls for patient health information integrity. Course Outline Intro to the Healthcare Industry Regulatory Environment Healthcare Privacy and Security Policies Information Governance Risk Management Third-Party Risk Management
Duration 5 Days 30 CPD hours This course is intended for This class is intended for DBAs and IT Professionals who are responsible for administration and maintenance of PostgreSQL, and want to increase proficiency and learn best practices. Targeted at: DBAs and Architects, and appropriate for Analysts, Support Engineers, and other IT professionals Overview Please refer to overview This is an immersive 5-day class that offers hands-on labs and combines the core topics from Foundations of Postgres Administration and Advanced PostgreSQL Administration into a one-week class, with significant savings over list price. Upon course completion, you will be prepared to manage mission critical PostgreSQL installations, and perform core administration tasks with confidence and skill. Course Outline 1 - POSTGRES SYSTEM ARCHITECTURE 2 - INSTALLATION AND GETTING STARTED 3 - CONFIGURATION, CREATING, MANAGING DATABASES 4 - USER TOOLS ? USING PSQL 5 - GUI TOOLS - USING PGADMIN 4 6 - SECURITY BASICS 7 - SQL PRIME BACKUP AND RECOVERY 8 - ROUTINE MAINTENANCE 9 - POSTGRES DATA DICTIONARY 10 - MOVING DATA 11 - SQL TUNING 12 - PERFORMANCE TUNING 13 - STREAMING REPLICATION 14 - TABLE PARTITIONING 15 - EXTENSION MODULES 16 - MONITORING 17 - UPGRADING BEST PRACTICES
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Database Administrators, Database Developers, BI professionals, and Business reporting users. Overview Upon successful completion of this course, students will be able to run Queries and retrieve results, perform conditional searches, and retrieve data from multiple tables. Before starting this course, make sure you meet at least one of the following prerequisites: Basic knowledge of the Microsoft Windows operating system and its core functionality. Basic working knowledge of Relational Databases. In this course, students will gain a good understanding of the Transact-SQL language. They will be able to create queries, sort, filter the data, execute procedures with T-SQL. Course Outline 1.Introduction to Microsoft SQL Server 2.Introduction to T-SQL Querying 3.Writing SELECT Queries 4.Querying Multiple Tables 5.Sorting and Filtering Data 6.Working with SQL Server Data Types 7.Using DML to Modify Data 8.Using Built-In Functions 9.Grouping and Aggregating Data 10.Using Subqueries 11.Using Table Expressions 12.Using Set Operators 13.Using Windows Ranking, Offset, and Aggregate Functions 14.Pivoting and Grouping Sets 15.Executing Stored Procedures 16.Programming with T-SQL
Duration 2 Days 12 CPD hours This course is intended for This course is intended for SQL Server administrators who work in a Windows network environment. At least one year of experience administering SQL Servers and using PowerShell is recommended. Overview After completing this course, students will be able to: •Install and Configure SQL Server and all its components using PowerShell •Manage day-to-day SQL Server Administration with PowerShell •Maintain the SQL Server environment using PowerShell scripting and programming options This course provides candidates with the knowledge and skills needed to use PowerShell for SQL Server administration. Students will learn how to manage day-to-day and scheduled maintenance tasks. Install and Configure SQL Server with PowerShell Install SQL Server Configure Database Settings Configure SQL Server Settings Configure SQL Server Policy-Based Management Lab 1: Configuring SQL Server with PowerShell Administering SQL Servers with PowerShell Managing Users and Roles Managing Database Performance Managing Database Availability Managing SQL Server Features Lab 1: Administering SQL Servers with PowerShell Maintaining SQL Server with PowerShell Managing Backups and Restores Maintaining Database Integrity and Performance Monitoring and Auditing Task Automation Generating Reports Lab 1: Maintaining SQL Servers with PowerShell
Duration 1 Days 6 CPD hours This course is intended for The ProxySG 6.6 Diagnostics and Troubleshooting course is intended for students who wish to gain familiarity with ProxySG troubleshooting techniques and tools. Overview By the completion of this course, you will be able to:Describe the troubleshooting methodology as recommended by Symantec.Diagnose and solve a variety of access and performance issues using tools such as sysinfo files, packet captures, and policy traces. The ProxySG 6.6 Diagnostics and Troubleshooting course provides a structured approach to diagnosing and solving common troubleshooting issues related to ProxySG deployments. The course will emphasize hands-on experience, with extensive opportunities to build competency in the use of the powerful diagnostic tools available on the ProxySG. ProxySG Secure Web Gateway? Overview of Typical Troubleshooting Issues Overview of common issues related to internal resources, external dependencies, SSL interception, and policy efficiency. Introduction to how to use sysinfo files to gain useful troubleshooting information. Troubleshooting Issues Related to External Dependencies Methods for diagnosing and solving authentication issues. Methods for diagnosing and solving DNS issues. Troubleshooting SSL Interception Issues Methods for diagnosing and solving issues related to SSL interception. Troubleshooting Performance Issues Related to Policy Efficiency Methods for optimizing performance through tips for creating more efficient policies.
Duration 4 Days 24 CPD hours This course is intended for Project administrators and ETL developers responsible for data extraction and transformation using DataStage. Overview Describe the uses of DataStage and the DataStage workflowDescribe the Information Server architecture and how DataStage fits within itDescribe the Information Server and DataStage deployment optionsUse the Information Server Web Console and the DataStage Administrator client to create DataStage users and to configure the DataStage environmentImport and export DataStage objects to a fileImport table definitions for sequential files and relational tablesDesign, compile, run, and monitor DataStage parallel jobsDesign jobs that read and write to sequential filesDescribe the DataStage parallel processing architectureDesign jobs that combine data using joins and lookupsDesign jobs that sort and aggregate dataImplement complex business logic using the DataStage Transformer stageDebug DataStage jobs using the DataStage PX Debugger This course enables the project administrators & developers to acquire the skills necessary to develop parallel jobs in DataStage. Students will learn to create parallel jobs that access sequential & relational data, and combine and transform the data. Course Outline Introduction to DataStage Deployment DataStage Administration Work with Metadata Create Parallel Jobs Access Sequential Data Partitioning and Collecting Algorithms Combine Data Group Processing Stages Transformer Stage Repository Functions Work with Relational Data Control Jobs
Duration 5 Days 30 CPD hours This course is intended for Anyone whose position requires CCSP certificationIndividuals whose responsibilities involve procuring, securing, and managing cloud environments or purchased cloud services Overview In-depth coverage of the six domains required to pass the CCSP exam:Architectural concepts and design requirementsCloud data securityCloud platform and infrastructure securityCloud application securityOperationsLegal and compliance This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the CCSP Common Body of Knowledge (CBK). You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments. You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes. Architectural Concepts and Design Requirements Cloud Data SecurityCloud Platform and Infrastucture Security Cloud Application SecurityOperations Legal and compliance
Duration 5 Days 30 CPD hours This course is intended for Application Consultants, Business Analysts, Program/Project Managers, System Architects Overview At the end of this course, students will be able to explain and use major features of SAP Extended Warehouse Management. This course will give you a solid fundamental and comprehensive overview of SAP Extended Warehouse Management and is a mandatory prerequisite for all other EWM courses. Warehousing Structures and Master Data Differentiating the SAP Solutions for Warehouse Management Outlining Organizational Structures Maintaining Master Data for SAP EWM Warehouse Monitoring & Processing with Mobile Devices Managing the Warehouse Outlining the Radio Frequency (RF) Framework Additional Functions in SAP EWM Applying Storage Control Employing Serial Numbers Processing Batches Mapping Quality Inspection Processes Applying Value-Added Services Warehouse Organization Performing Slotting Applying Replenishment Methods Performing a Physical Inventory Optimization of Resources Applying Wave Management Applying Labor Management Executing the Production Supply Process Executing Expected Goods Receipts Processes Applying Cross Docking Warehouse Extensions Planning the Shipping and Receiving of Products Controlling the Material Flow System (MFS) SAP EWM Rapid Deployment Solution Accelerating Implementation Processes Combined Inbound and Outbound Processes Executing an End-to-End Process with SAP EWM
Duration 5 Days 30 CPD hours This course is intended for This course is recommended for application or system support personnel or anyone who needs an overview of the capabilities of HP UD 10.1x. Overview Upon successful completion of this course, you should be able to: Identify the evolution of the Configuration Management System (CMS) from the Configuration Management Database (CMDB), the need for CMS, and working of CMS Define the concept of Universal Discovery (UD) and be able to identify its applications and types Identify the architecture and deployment process of UD, and the installation and setup of the data flow probe and its log files Define the concepts of discovery adapters, discovery jobs, discovery scripts, and other discovery resources Use the Universal Discovery module to perform application dependency mapping discovery and inventory discovery Use zone-based discover method and discovery activities Design and build agentless and agent-based discoveries, and use inventory scanners Work with the Software Library Viewer and various inventory tools Use the application recognition process, and discovery rules HP This course is designed to provide an understanding of the fundamental concepts and applications of the HP Universal Discovery (UD) solution. This course is designed to provide an understanding of the fundamental concepts and applications of the HP Universal Discovery (UD) solution.
Duration 5 Days 30 CPD hours This course is intended for IS Security Owners Security Officers Ethical Hackers Information Owners Penetration Testers System Owners and Managers Cyber Security Engineers Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam. To protect an information system you need to be able to see that system through the eyes of the attacker.ÿThe Certified Professional Ethical Hackerÿcertification course is the foundational training to Mile2?s line of penetration testing courses because it teaches you to think like a hacker.ÿ Therefore, you can set up dynamic defenses to prevent intrusion. First, you will learn the value of vulnerability assessments.ÿ Then, you will discover how to use those assessments to make powerful changes in an information system?s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack. Course Introduction Introduction to Ethical Hacking Linux Fundamentals Protocols Cryptography Password Cracking Malware Security Devices Information Gathering ? Passive Reconnaissance Social Engineering Active Reconnaissance Vulnerability Assessment Network Attacks Hacking Servers Hacking Web Technologies Hacking Wireless Technologies Maintaining Access and Covering Tracks