Take your practice to the next level with the Intermediate Yoga: Level Up Your Flow Training. This training offers a balanced approach to self-development and stress management that fits seamlessly into your busy life. Designed for ease, the Intermediate Yoga: Level Up Your Flow Training is low-effort and self-paced, empowering you to grow at your own rhythm while reaping lasting benefits. Description Elevate your yoga experience with the Intermediate Yoga: Level Up Your Flow Training. Perfectly tailored for those ready to deepen their practice, this training combines mindful progression with stress relief. The Intermediate Yoga: Level Up Your Flow Training ensures you stay motivated with a format that is both flexible and accommodating, allowing you to embrace self-development on your own terms. Don’t miss the opportunity to unlock your potential with this training designed for real-life balance and lasting results. Benefits Level up your flow and reduce stress with the Intermediate Yoga: Level Up Your Flow Training. Enjoy the convenience of a low-effort, self-paced training that fits your lifestyle. Enhance your self-development journey by mastering new skills in a supportive environment. Build confidence and mindfulness through the structured yet flexible Intermediate Yoga: Level Up Your Flow Training. Experience value for money with training designed to maximize impact and minimize pressure. Stay engaged and inspired with training that respects your personal pace and goals. Integrate stress management seamlessly into your routine through this accessible training. FAQ Q: Who is the Intermediate Yoga: Level Up Your Flow Training for? A: This training is ideal for practitioners who have a basic yoga foundation and want to advance further. Q: Can I take this training if I have a busy schedule? A: Yes, the training is self-paced and low-effort, making it easy to fit in any lifestyle. Q: How does this training help with stress management? A: The training includes elements focused on mindfulness and relaxation to support stress relief. Q: Are there any prerequisites? A: A basic understanding of yoga postures is recommended but not mandatory. Q: Is this training accessible online? A: Yes, the entire Intermediate Yoga: Level Up Your Flow Training is available online. Q: What if I can’t complete the training quickly? A: The self-paced design lets you progress comfortably at your own speed. N:B: This is not a Naked Yoga Course.
Discover the joy of movement and mindful living with the Yoga for Seniors: Age Gracefully Training. This training is designed to support your journey toward self-development and stress management in a gentle, accessible way. The Yoga for Seniors: Age Gracefully Training fits effortlessly into your life with a low-effort, self-paced format that respects your time and pace. If you want to age gracefully and enhance your wellbeing, this training is the perfect companion. Description The Yoga for Seniors: Age Gracefully Training invites you to embrace a new chapter with confidence and calm. This training is thoughtfully structured for seniors who want to cultivate inner peace and physical ease without overwhelming effort. Enjoy the freedom of progressing at your own pace and feel the benefits of a course designed specifically with your lifestyle in mind. The Yoga for Seniors: Age Gracefully Training blends self-development and stress relief naturally, making it ideal for anyone seeking balance and vitality. Don't miss the chance to be part of this enriching training that prioritizes your wellbeing. Benefits Experience stress management tailored for seniors through the Yoga for Seniors: Age Gracefully Training. Enhance your self-development journey with a training that adapts to your unique pace. Enjoy a low-effort, self-paced format designed to fit your daily routine comfortably. Feel the difference in your energy and calm with consistent practice from the Yoga for Seniors: Age Gracefully Training. Benefit from the value this training offers—accessible, practical, and focused on lasting wellbeing. Join a community embracing aging gracefully with mindful movement and inner balance. Build resilience and reduce stress naturally with the Yoga for Seniors: Age Gracefully Training. FAQ Q: Is the Yoga for Seniors: Age Gracefully Training suitable for beginners? A: Absolutely! This training is designed with seniors in mind and welcomes all experience levels. Q: How much time do I need to commit? A: The training is low-effort and self-paced, so you can tailor it to fit your schedule. Q: Will this training help with stress management? A: Yes, stress management is a core focus of the Yoga for Seniors: Age Gracefully Training. Q: Do I need special equipment? A: No special equipment is required to participate in this training. Q: Is the training accessible online? A: Yes, the entire Yoga for Seniors: Age Gracefully Training is available online for your convenience. Q: What if I fall behind? A: The self-paced nature of this training allows you to catch up anytime without pressure. N:B: This is not a Naked Yoga Course.
Starting something new doesn’t have to be overwhelming. Yoga for Absolute Beginners Training is your gateway to inner peace, confidence, and everyday calm—without the pressure, sweat, or time commitment. Whether you're craving more balance in your life or just need a quiet space to breathe, Yoga for Absolute Beginners Training is built for real people with real schedules. This is a self-paced, zero-intimidation path to self-development that respects your time, your energy levels, and your life. And right now? It's never been easier—or more affordable—to start. Enroll in Yoga for Absolute Beginners Training before the next enrollment wave closes! Description Feel like you need to be flexible or fit to do yoga? Not here. Yoga for Absolute Beginners Training strips away the pressure, judgment, and unrealistic expectations. This is a gentle invitation to reconnect with yourself, right where you are. No prior experience? Perfect. Limited energy? Even better. Yoga for Absolute Beginners Training is low-effort by design and flows at your pace. You decide when to show up. You decide how far to go. And through it all, you’ll be building emotional strength, mental clarity, and a quiet confidence that stays with you—on and off the mat. We built Yoga for Absolute Beginners Training with everyday stress in mind. With bite-sized segments and simple guidance, this is a course you’ll actually finish—and feel great about. Don’t wait for the “right” time. Create it. Benefits ✅ Self-paced freedom — complete Yoga for Absolute Beginners Training on your terms, not ours. ✅ Zero judgment — made for real bodies, real lives, and real goals. ✅ Stress relief without sweat — let go of tension in minutes, not hours. ✅ Lifelong tools for calm — use what you learn from Yoga for Absolute Beginners Training anywhere, anytime. ✅ Unbeatable value — gain access for a fraction of the price of studio sessions. ✅ Progress you can feel — even a few minutes a day makes a difference. ✅ No strings attached — jump in and out without guilt or commitment anxiety. FAQ Q: Is this course suitable for someone who’s never tried yoga before? Absolutely. Yoga for Absolute Beginners Training is built from the ground up for true first-timers and those returning after a long break. Q: How long does it take to complete? That’s up to you. Yoga for Absolute Beginners Training is 100% self-paced. Whether you have five minutes or fifty, it fits your day. Q: Do I need any equipment or flexibility? Nope. All you need is a quiet space and a willingness to start. Yoga for Absolute Beginners Training meets you exactly where you are. Q: Is this a workout course? No, this is about self-development and stress management—not sweat. Yoga for Absolute Beginners Training is gentle and restorative by nature. N:B: This is not a Naked Yoga Course
Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers Privacy Officers Health IS Managers Risk Managers Information Security Managers Compliance and Privacy Officers Overview Upon completion, the student will be ready to take the Certified Healthcare Information Systems Security Practitioner exam by mile2. In addition, at the end of the CHISSP course, the student will be versed with best practices in the healthcare industry and will be able to establish a framework with current best practices in respects to privacy, regulation and risk management. The Certified Healthcare IS Security Practitioner, C)HISSP certification course covers the skills and knowledge to implement the best IT healthcare practices, as well as, regulatory compliance and standards in the healthcare industry. Because of growing industry regulations and privacy requirements in the healthcare industry, the C)HISSP was developed by Mile2. Graduates of this course have become vital in managing and protecting healthcare data and are tasked to protect patient information by implementing, managing, and assessing proper IT controls for patient health information integrity. Course Outline Intro to the Healthcare Industry Regulatory Environment Healthcare Privacy and Security Policies Information Governance Risk Management Third-Party Risk Management
Duration 1 Days 6 CPD hours This course is intended for Experienced system administrators or network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Explain and configure Local Load Balancing constructors such as Virtual Services, Pools, Health Monitors and related components During this one-day course, you gain an understanding of the architecture and features of VMware NSX Advanced Load Balancer (Avi Networks) solution. This course provides hands-on labs to provide a solid foundation to load balancing fundamentals and work with most common load balancing functionality offered by VMware NSX Advanced Load Balancer (Avi Networks) solution. Course Introduction Introductions and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Virtual Services Configuration Concepts Explain Virtual Service components Explain Virtual Service types Explain and configure basic virtual services components such as Application Profiles, Network Profiles, Pools and Health Monitors Profiles and Policies Explain and deep dive on Advanced Virtual Service creation Explain and deep dive on Application Profiles and Types such as L4, DNS, Syslog and HTTP Explain and configure advanced application HTTP Profile options Deep dive on Network Profiles and Types Explain and configure SSL Profiles and Certificates Explain and Configure HTTP and DNS policies Pools Configuration Concepts Explain and deep dive on Pools configuration options Describe available Load Balancing algorithms Explain multiple Health Monitor types Explain multiple Persistence Profiles Explain and configure Pool Groups
Duration 1 Days 6 CPD hours Overview In writing, it is important to make sure your message is easy to understand, that you have included all the necessary information, and that the points are expressed clearly. In business writing, it is also essential to convey information in a professional and courteous manner using proper formatting. Learn how to perfect your business writing in this one-day workshop. This one-day workshop will help you teach participants how to: Write and proofread your work so it is clear, concise, complete, and correct. Apply these skills in real world situations. Use language that is courteous. Understand the proper format for memos, letters, and emails. Determine whether your writing can be easily understood by your intended audience. Learn how to perfect your business writing in this one-day workshop.While there are many types of business writing, this workshop will provide tools to write effective memos, emails, and letters, as well as briefly touch on reports and proposals. The 4 C?s: Clear, Concise, Complete, and Correct Good writing must be clear, concise, complete, and correct. In this session, learn how to write with these principles in mind. Manners and Courtesy Courtesy is an important part of good business writing. During this session, participants will learn ways to make their writing respectful and polite. Writing Memos Memos are another challenge that many writers face. Participants will look at parts of a memo and complete a fun exercise. Writing Effective E-mails Mostly everyone today uses email to communicate at work and at home. This session will give participants some tips on writing effective emails and managing email. Reports and Proposals Reports and proposals are two important types of business writing. In this session, an overview of the steps involved with writing these pieces is presented. Writing Business Letters This session reviews the steps for writing a business letter, types of letters, and the parts of a business letter. Participants then examine samples of business letters to determine the type and the parts of each letter. Readability Index The readability index determines the difficulty level of a written piece. Participants will apply the index to a sample and to their own work. Proofreading Participants learn about checking the grammar, spelling and punctuation in their written pieces, and then review their pre-assignment. Reviewing Your Writing In this session, participants complete a final review of their piece of writing. Workshop Wrap-Up At the end of the workshop, students will have an opportunity to ask questions and fill out an action plan.
Duration 3.25 Days 19.5 CPD hours This course is intended for This course is intended for IT administrators with a minimum 2-5 years of experiencing working with Microsoft Windows Server, Windows 10, and Office 365 licensing. The course will utilize a pre-provisioned lab environment which includes Microsoft 365 E5 licenses and Enterprise Mobility and Security E5 licenses for each student. Powershell management topics will be discussed where applicable in the respective topics. This course will address Windows devices only enrolled in Intune. Configuring and Licensing Intune Endpoint Manager - quick discussion, portal access Discuss which licenses include Intune Discuss Microsoft Intune device-only subscription Discuss Azure Active Directory basic, P1, P2 licensing Intune setup and overview of capabilities Supported configurations Logging in and using Intune Admin portal via Azure Portal and via Endpoint manager site Configure a domain name (needed to support labs though may be done already for E1B/district) Add users and groups in Azure Portal Configure Azure AD connect and discuss AAD Connect Health Assigning licenses manually, via Powershell, and via AAD groups Set the MDM authority and enable device enrollment Add Apps to Intune - covered in detail in a later topic Configuring device profiles - covered in detail in a later topic Company Portal discussion - covered in detail in a later topic Configure app policies - covered in detail in a later topic Windows device management What is co-management - brief discussion on Endpoint Manager with Configuration Manager Registering, joining, hybrid join to Azure AD Enrollment method capabilities Azure AD joined Azure AD joined with Autopilot (User driven mode) Azure AD joined with Autopilot (Self deploying mode) Autopilot pre-provisioned deployment (formally known as white-glove) Device group tags for profile deployment Troubleshooting Autopilot Policy conflicts Known issues Using Powershell to connect to and manage Intune Software deployment Add apps to Intune Windows Store apps Microsoft Store for Business apps LOB apps - Sideloading Adding Win32 apps Running Powershell Scripts on devices Assigning Apps Monitor Apps Discovered Apps Configure Apps App Configuration Policies Office app policys Custom OMA-URI Policies Troubleshooting Managing devices Windows 10 Feature Updates Update rings to manage updates Mapping drives to SMB shares Discuss OneDrive for Business Manage Enterprise Wireless - Windows Configuration Designer, provisioning packages Implementing Conditional Access - device based, app based Printer management Universal Print Deploying printer settings Remote administration Intune Device Management Inventory Fresh Start Full Scan Remote Lock Restart Sync devices Bulk device actions Teamviewer integration requirements Intune Reporting Accessing Reports Exporting Reports using Graph
Duration 2 Days 12 CPD hours This course is intended for Experienced security administrators and security analysts who are already familiar with VMware Carbon Black Cloud Overview By the end of the course, you should be able to meet the following objectives: Describe and determine use cases for integrating with VMware Carbon Black Cloud Configure, automate, and troubleshoot the VMware Carbon Black Cloud Syslog Integration Use VMware Carbon Black Cloud APIs to pull data with Postman Install and use the VMware Carbon Black Cloud Python SDK Automate operations using the VMware Carbon Black Cloud SDK and APIs Identify and troubleshoot VMware Carbon Black Cloud sensor installations Gather troubleshooting data within the browser to remediate or escalate problems Identify and resolve sensor usage, networking, and performance problems with the VMware Carbon Black Cloud sensor This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in performing advanced operations and troubleshooting of VMware Carbon Black Cloud. This course will go into integrating VMware Carbon Black Cloud with other third-party components and utilizing the API and the SDK to automate operations within the product and your security stack. This course will also enable you to troubleshoot common problems during sensor installation, operations, and within the VMware Carbon Black Cloud console with hands-on lab problems. Course Introduction Introductions and course logistics Course objectives VMware Carbon Black Cloud Integrations Describe the integration capabilities with VMware Carbon Black Cloud Determine integration use cases for VMware Carbon Black Cloud Identify required components for integrating VMware Carbon Black Cloud Differentiate VMware Carbon Black Cloud integration vendors VMware Carbon Black Cloud Syslog Integration Describe the function of the Syslog Connector Generate API and SIEM keys from the Cloud console Validate a successful Syslog integration Describe how to automate the Syslog Connector Troubleshoot problems with the Syslog integration Using Postman Explain the concept and purpose of an API Interpret common REST API Status codes Recognize the difference between platform and product APIs Using the Postman Client to initiate API calls Create a custom access level and respective API key Create a valid API request Using the VMware Carbon Black Cloud Python SDK Install the VMware Carbon Black Cloud Python SDK Describe the different authentication methods Evaluate the best authentication method for a given task Automating Operations Automate basic Incident Response tasks using the VMware Carbon Black Cloud SDK and API Automate basic watchlist interactions using the VMware carbon Black Cloud SDK and API Sensor Installation Troubleshooting Describe sensor install log collection process Identify sensor install log parameters Create a detailed sensor install log Locate sensor install logs on an endpoint Interpret sensor install success from an install log Determine likely cause for install failure using sensor logs Propose resolution steps for a given sensor install failure VMware Carbon Black Cloud Console Troubleshooting Identify sensor bypass status reasons Simplify console data exports using search Describe differences in Audit Log detail levels Locate built-in browser tools Gather console diagnostics logs from a browser Review console diagnostics logs Sensor Operations Troubleshooting Identify available types of diagnostic logs Gather appropriate diagnostic logs for a given issue Identify steps for resolving software interoperability problems Identify steps for resolving resource problems Identify steps for resolving network problems Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud:Advanced Operations and Troubleshooting training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud:Advanced Operations and Troubleshooting course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators or network administrators and security professionals Overview By the end of the course, you should be able to meet the following objectives: Describe NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Describe NSX Advanced Load Balancer Web Application Firewall architecture Describe the NSX Advanced Load Balancer Web Application Firewall components and main functions Explain the NSX Advanced Load Balancer Web Application Firewall key features and benefits Explain and configure Local Load Balancing constructors such as Virtual Services, Pools, Health Monitors and related components Understand and modify application behavior leveraging Profiles, Policies and DataScripts Configure and customize the NSX Advanced Load Balancer Web Application Firewall Describe and leverage NSX Advanced Load Balancer REST API interfaces and related automation capabilities Describe and configure NSX Advanced Load Balancer Web Application Firewall application and infrastructure monitoring Gather relevant information and perform basic troubleshooting of Web Application Firewall applications leveraging built-in NSX Advanced Load Balancer tooling This three-day course provides comprehensive training on how to configure, maintain and troubleshoot the Web Application Firewall component of the VMware NSX Advanced Load Balancer (Avi Networks) solution as well as provide an understanding of additional security related functionality. This course covers key NSX Advanced Load Balancer (Avi Networks) Web Application Firewall features and functionality offered in the NSX Advanced Load Balancer 18.2 release, including the overall infrastructure, virtual services and application components as well as application troubleshooting and solution monitoring. Access to a software-defined data center environment is provided through hands-on labs to reinforce the skills and concepts presented in the course. Course Introduction Introductions and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Introduction to NSX ALB Web Application Firewall Introduce the NSX Advanced Load Balancer Web Application Firewall Discuss NSX Advanced Load Balancer Web Application Firewall use cases and benefits Virtual Services Configuration Concepts Explain Virtual Service components Explain Virtual Service types Explain and configure basic virtual services components such as Application Profiles, Network Profiles, Pools and Health Monitors Attacking and Defending Web Applications Introduce the processes and methodologies used when attacking and defending web applications Introduce the tools used to attack web applications Explain with examples terminology such as Reflected XSS and SQL injection Profiles and Policies Explain and deep dive on Advanced Virtual Service creation Explain and deep dive on Application Profiles and Types such as L4, DNS, Syslog and HTTP Explain and configure advanced application HTTP Profile options Deep dive on Network Profiles and Types Explain and configure SSL Profiles and Certificates Explain and Configure HTTP and DNS policies DDOS Protection Introduce the NSX Advanced Load Balancer rate limiting functionality Explain the NSX Advanced Load Balancer rate limiting functionality Hands on examples of rate limiting in action Customizing Application Delivery with Datascripts Introduce the concept of datascripts to manipulate data Explain the various components and inspection points IWAF Deep Dive Describe the building blocks of the iWAF implementation Explain the various iWAF components Introduce both Positive and Negative security models Explain the iWAF Policies, profiles and rule sets IWAF Core Rule Set Explain the history and rationale of the core rule set Describe the NSX ALB (Avi) Core Rule Set IWAF Custom Rules Describe the power and complexity available via custom rules Explain the rule language Implement various use cases Explain common errors and possible solutions IWAF Operations Describe the iWAF application onboarding process Tuning the iWAF policies Working with iWAF logs and analytics Explaining false positive mitigation tactics IWAF Best Practices Provide guidance on how to get the best results Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Web Application Firewall Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Web Application Firewall Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.