Duration 5 Days 30 CPD hours This course is intended for Anyone whose position requires CCSP certificationIndividuals whose responsibilities involve procuring, securing, and managing cloud environments or purchased cloud services Overview In-depth coverage of the six domains required to pass the CCSP exam:Architectural concepts and design requirementsCloud data securityCloud platform and infrastructure securityCloud application securityOperationsLegal and compliance This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the CCSP Common Body of Knowledge (CBK). You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments. You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes. Architectural Concepts and Design Requirements Cloud Data SecurityCloud Platform and Infrastucture Security Cloud Application SecurityOperations Legal and compliance
Duration 5 Days 30 CPD hours This course is intended for IS Security Owners Security Officers Ethical Hackers Information Owners Penetration Testers System Owners and Managers Cyber Security Engineers Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam. To protect an information system you need to be able to see that system through the eyes of the attacker.ÿThe Certified Professional Ethical Hackerÿcertification course is the foundational training to Mile2?s line of penetration testing courses because it teaches you to think like a hacker.ÿ Therefore, you can set up dynamic defenses to prevent intrusion. First, you will learn the value of vulnerability assessments.ÿ Then, you will discover how to use those assessments to make powerful changes in an information system?s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack. Course Introduction Introduction to Ethical Hacking Linux Fundamentals Protocols Cryptography Password Cracking Malware Security Devices Information Gathering ? Passive Reconnaissance Social Engineering Active Reconnaissance Vulnerability Assessment Network Attacks Hacking Servers Hacking Web Technologies Hacking Wireless Technologies Maintaining Access and Covering Tracks
Duration 5 Days 30 CPD hours This course is intended for This course is recommended for application or system support personnel or anyone who needs an overview of the capabilities of HP UD 10.1x. Overview Upon successful completion of this course, you should be able to: Identify the evolution of the Configuration Management System (CMS) from the Configuration Management Database (CMDB), the need for CMS, and working of CMS Define the concept of Universal Discovery (UD) and be able to identify its applications and types Identify the architecture and deployment process of UD, and the installation and setup of the data flow probe and its log files Define the concepts of discovery adapters, discovery jobs, discovery scripts, and other discovery resources Use the Universal Discovery module to perform application dependency mapping discovery and inventory discovery Use zone-based discover method and discovery activities Design and build agentless and agent-based discoveries, and use inventory scanners Work with the Software Library Viewer and various inventory tools Use the application recognition process, and discovery rules HP This course is designed to provide an understanding of the fundamental concepts and applications of the HP Universal Discovery (UD) solution. This course is designed to provide an understanding of the fundamental concepts and applications of the HP Universal Discovery (UD) solution.
Duration 3 Days 18 CPD hours This course is intended for Salesforce consultants and administrators Overview When you complete this course, you will be able to:Enable Field Service Lightning.Describe the capabilities and components of Field Service Lightning.Know the right questions to ask prior to implementing Field Service Lightning.Understand the steps to successfully implement Field Service Lightning In this hands-on course, you will learn about Field Service Lightning components and even have the opportunity to implement Field Service Lightning for AW Computing, our fictitious company. What is Field Service Lightning? Define Field Service Lightning Identify the challenges of field service management and how FSL can overcome those challenges Describe what connected field service looks like Explain the main components and capabilities of FSL Meet AW Computing Learn about AW Computing Understand the business reason why AW Computing has purchased FSL Plan for Field Service Lightning Learn the essential questions to ask before setting up FSL Consider FSL limitations Set Up Field Service Lightning (Long Module) Set up FSL Components and Managed Package Walk Through the FSL Process by Role View and perform FSL actions as a Service Agent View and perform FSL actions as a Dispatcher View and perform FSL actions as a Field Resource View and run FSL reports as a Supervisor / Manager
Duration 3 Days 18 CPD hours This course is intended for This course is for technical professionals to gain skills in writing rules for Snort-based Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). The primary audience includes: Security administrators Security consultants Network administrators System engineers Technical support personnel using open source IDS and IPS Channel partners and resellers Overview After taking this course, you should be able to: Describe the Snort rule development process Describe the Snort basic rule syntax and usage Describe how traffic is processed by Snort Describe several advanced rule options used by Snort Describe OpenAppID features and functionality Describe how to monitor the performance of Snort and how to tune rules The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.1 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules. Course Outline Introduction to Snort Rule Development Snort Rule Syntax and Usage Traffic Flow Through Snort Rules Advanced Rule Options OpenAppID Detection Tuning Snort
This nationally recognised and regulated qualification is the perfect opportunity for businesses to invest in the safety of their employees. Enhance their fire safety knowledge and equip them with the necessary skills to ensure a safe working environment at all times. With its foundation in National Occupational Standards for fire safety awareness and alignment with the Health and Safety Executive's guidelines for good practice, this is the ideal choice for businesses looking to make a proactive step in promoting workplace safety.
Overview This is a 2 day course to learn ALM tools to achieve strong and market-resilient, actuarially-resilient Solvency 2 (S2) ratios at Group consolidated level and at key cash-remitting entities to ensure dividend stability. For those not fully familiar with Solvency 2, this course is best taken in conjunction with “Solvency 2” Who the course is for Capital management / ALM / risk management staff within insurance company Investors in insurance company securities – equity, subordinated bonds, insurance-linked securities Salespeople covering insurance companies Course Content To learn more about the day by day course content please click here To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now
Duration 2.5 Days 15 CPD hours This course is intended for This course is intended to help participants learn basic principles and techniques of providing PC, mobile, applications, and network support. Overview Upon successful completion of this course, students will have introductory knowledge of computer systems and mobile devices. In this course, students will identify and set up: computer hardware, software, networks, files, wireless devices and discuss safety. Identifying Computer Hardware Identify Types of Computing Devices Identify Internal Computer Components Common Computer Connector Types Identify Common Peripheral Devices Identifying Computer Software Compare Functions and Features of Common Operating Systems Identify Application Software Setting Up a Basic Workstation Connect Hardware Install and Configure Operating Systems Install and Configure Applications Configure Accessibility Options Configuring Network Access Network Connection Types Install and Configure a SOHO Router Network and Alternative Technologies Sharing and Storage Methods Working with Files, Folders, and Applications Create Files Navigate a File Structure Manage Files and Folders Compress and Extract Files Create Screen Captures Configuring and Using Wireless Devices Configuring Wireless Devices Use Wireless Devices Securing Computing Devices Identify Security Threats Apply Security Best Practices Perform Secure Web Browsing Supporting Computers and Users Environmental and Safety Concepts Back Up and Restore Data Manage Software Implement Basic Support Measures
Duration 5 Days 30 CPD hours This course is intended for This is an advanced course for AIX system administrators, and system support individuals with at least six months of experience in AIX. Overview Perform system problem determination and reporting procedures including analyzing error logs, creating dumps of the system, and providing needed data to the AIX Support personnel Examine and manipulate Object Data Manager databases Identify and resolve conflicts between the Logical Volume Manager (LVM) disk structures and the Object Data Manager (ODM) Complete a very basic configuration of Network Installation Manager to provide network boot support for either system installation or booting to maintenance mode Identify various types of boot and disk failures and perform the matching recovery procedures Implement advanced methods such as alternate disk install, multibos, and JFS2 snapshots to use a smaller maintenance window In this course, learn advanced AIX system administrator skills focusing on availability and problem determination and learn detailed knowledge of the ODM database where AIX maintains configuration information. Day 1 Advanced AIX administration overview The Object Data Manager Error monitoring Day 2 Network Installation Manager basics System initialization: Accessing a boot image Day 3 System initialization: rc.boot and inittab LVM metadata and related problems Disk management procedures Day 4 Disk management procedures (continued) Install and cloning techniques Advanced backup techniques Day 5 Advanced backup techniques (continued) Diagnostics The AIX system dump facility
Duration 2 Days 12 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy a Cisco Integrated Threat Defense solution in their network environment. The primary audience for this course includes: Systems and network engineersTechnical architectsTechnical support personnelChannel partners and resellers Overview After completing this course, you should be able to: Describe the current network security landscape and the Cisco Integrated Threat Defense (ITD) solutionDescribe the key components of the ITD solution and their use in the networkConfigure the ISE for a baseline of operation in the ITD solutionConfigure the integration between the Stealthwatch and ISE platformsConfigure the integration between the Cisco Firepower and ISE platformsConfigure the integration between Cisco Firepower and AMP for Endpoints This course begins with an analysis of the current cybersecurity landscape and includes details on why networks today need an integrated threat defense architecture. You will integrate and verify proper operation of the key Cisco Integrated Threat Defense products, including Cisco Identity Services Engine (ISE), Cisco Stealthwatch©, Cisco Firepower© NGFW, and Cisco AMP for Endpoints. Verification includes the introduction of malware into the network to ensure proper identification, analysis, and quarantine. Course Outline Integrated Threat Defense Introduction Itd Products Identity Services Engine Setup Integration Of Stealthwatch With Identity Services Engine Integration Of Firepower With Identity Services Engine Integration Of Firepower With Amp For Endpoints