Duration 5 Days 30 CPD hours This course is intended for Data center systems engineers Field engineers Architects Cisco partners using Cisco Nexus Series switch platforms Overview After taking this course, you should be able to: Describe the platforms that make the Cisco Nexus 9000, 7000, 3000, and 2000 product families Describe Cisco Nexus platform implementations Explain Cisco Nexus platform management Describe Port Channels and Virtual Port Channels Configure First Hop Redundancy protocols Configure security features of Cisco Nexus devices Describe the Cisco Nexus devices routing and forwarding Describe Virtual Extensible LAN (VXLAN) Describe Quality of Service (QoS) on Cisco Nexus Devices Explain system management and monitoring processes Describe Cisco NX-OS programmability Describe Cisco Nexus storage services Configure device aliases and zoning Configure FCoE Configure NPIV and NPV modes The Implementing Cisco NX-OS Switches and Fabrics in the Data Center (DCNX) v1.0 course gives you a detailed understanding of the CiscoNexus switch platform and teach you how to install, configure, and manage Cisco Nexusswitch platforms in a scalable, highly available environment. Through a combination of lectures and hands-on labs, you will learn how to describe various aspects of the Cisco Nexus product families and platforms, including implementation, management, security, programmability and storage. Additionally, you will learn how to configure device aliases and zoning, Fibre Channel over Ethernet (FCoE), and N-Port Identifier Virtualization (NPIV), and N-Port Virtualization (NPV) modes. Course Outline Describing Cisco Nexus Series Switches Describing Cisco Nexus Platforms Implementation Describing Cisco Nexus Platforms Management Describing Port Channels and Virtual Port Channels Configuring First Hop Redundancy Protocols Configuring Cisco Nexus Security Features Describing Cisco NX-OS Routing and Forwarding Describing Virtual Extensible LAN Describing QoS on Cisco Nexus Devices Configuring System Management and Monitoring Describing Cisco NX-OS Programmability Describing Cisco Nexus Storage Services Configuring Fibre Channel Over Ethernet Describing Device Aliases and Zoning Configuring NPIV and NPV Modes
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Developers System Administrators Solutions Architects Overview This course is designed to teach you how to: Design a microservices-based architecture that uses containers Use Amazon ECS to run and scale a microservices-based application Integrate Amazon ECS with other AWS services Running Container-Enabled Microservices on AWS is designed to teach you how to manage and scale container-enabled applications by using Amazon Elastic Container Service (ECS). This course highlights the challenges of running containerized applications at scale and provides guidance on creating and using Amazon ECS to develop and deploy containerized microservices-based applications. In the hands-on lab exercises you will use Amazon ECS to handle long-running services, build and deploy container images, link services together, and scale capacity to meet demand. You will also learn how to run container workers for asynchronous application processes. Module 1a: Overview of Microservices on AWS Welcome to Simple Mustache Service! The monolith What are microservices? How to implement a microservices infrastructure The six principles of microservices Module 1b: Containers and Docker Introduction to containers Comparing virtual machines with containers Docker Running containers Storing container images Hands-on lab: Building and running your first container Module 2: Continuous delivery for container-based microservices Compare and contrast different software development cycles Use AWS CodePipeline to code, build, and deploy a microservice Use AWS CodeCommit as a source control service Use Jenkins to perform a Docker build Use Postman to run and test microservices Use AWS CloudFormation to provision and deploy microservices Hands-on lab: Using the Amazon ECS Service Scheduler Module 3: High availability and scaling with Amazon Elastic Container Service High availability Cluster management and scheduling Monitoring Scaling a cluster Scaling services Hands-on lab: Continuous delivery pipelines for container-based microservices Module 4: Security for container-based microservices Implement security Apply best practices Automate security Evaluate compliance requirements Embed security into the CI/CD Hands-on lab: Extending Amazon ECS with Service Discovery and Config Management Additional course details: Nexus Humans Running Container Enabled Microservices on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Running Container Enabled Microservices on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course will help you: Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Overview Upon completing this course, students will be able to meet these objectives: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers. Compare and contrast the various hardware and software switching mechanisms and operation, while defining the TCAM and CAM, along with process switching, fast switching, and Cisco Express Forwarding concepts. Troubleshoot layer 2 connectivity using VLANs, trunking. Implementation of redundant switched networks using spanning tree protocol. Troubleshooting link aggregation using Etherchannel. Describe the features, metrics, and path selection concepts of EIGRP. Implementation and optimization of OSPFv2 and OSPFv3, including adjacencies, packet types, and areas, summarization and route filtering for IPv4 and IPv6. Implementing EBGP interdomain routing, path selection and single and dual-homed networking. Implementing network redundacy using protocols like HSRP and VRRP. Implementing internet connectivity within Enterprise using static and dynamic NAT. Describe the virtualization technology of servers, switches, and the various network devices and components. Implementing overlay technologies like VRF, GRE, VPN and LISP. Describe the components and concepts of wireless networking including RF, antenna characteristics, and define the specific wireless standards. Describe the various wireless deployment models available, include autonomous AP deployments and cloud-based designs within the centralized Cisco WLC architecture. Describe wireless roaming and location services. Describe how APs communicate with WLCs to obtain software, configurations, and centralized management. Configure and verify EAP, WebAuth, and PSK wireless client authentication on a WLC. Troubleshoot wireless client connectivity issues using various tools available. Troubleshooting Enterprise networks using services like NTP, SNMP , Cisco IOS IP SLAs, NetFlow and Cisco IOS Embedded Event Manager. Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.2 course provides the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You?ll learn to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN Course Outline Examining Cisco Enterprise Network Architecture Understanding Cisco Switching Paths Implementing Campus Lan Connectivity Building Redundant Switched Topology Implementing Layer 2 Port Aggregation Understanding EIGRP Implementing OSPF Optimizing OSPF Exploring EBGP Implementing Network Redundancy Implementing NAT Introducing Virtualization Protocols And Techniques Understanding Virtual Private Networks And Interfaces Understanding Wireless Principles Examining Wireless Deployment Options Understanding Wireless Roaming And Location Services Examining Wireless AP Operation Understanding Wireless Client Authentication Troubleshooting Wireless Client Connectivity Introducing Multicast Protocols Introducing QoS Implementing Network Services Using Network Analysis Tools Implementing Infrastructure Security Implementing Secure Access Control Understanding Enterprise Network Security Architecture Exploring Automation and Assurance Using Cisco DNA Center Examining the Cisco SD-Access Solution Understanding the Working Principles of the Cisco SD-WAN Solution Understanding the Basics of Python Programming Introducing Network Programmability Protocols Introducing APIs in Cisco DNA Center and vManage
Duration 1 Days 6 CPD hours This course is intended for Business decision-makers: directors (managers of managers), managers of individual contributors (ICs) or ICs working in non-IT functions/divisions (such as finance, marketing, sales, HR, product design) interested in understanding the applications of Google?s cloud technology for business improvement opportunities and transformational project(s). Through this interactive training, you?ll learn about core cloud business drivers?specifically Google?s cloud?and gain the knowledge/skills to determine if business transformation is right for you and your team, and build short and long-term projects using the ?superpowers? of cloud accordingly. You?ll also find several templates, guides, and resource links through the supplementary student workbook to help you build a custom briefing document to share with your leadership, technical teams or partners. Why cloud technology is revolutionizing business This module introduces cloud technology as a paradigm shift and explains how it?s irrevocably transforming business globally. It defines the fundamental building blocks of cloud technology?compute power and data?and what they mean for you and your business. And finally, it reveals how these building blocks help to create five superpowers using concrete use cases of their transformative abilities for business, education, and government sectors. Foster an innovation culture Cloud is not just about a technological transformation; it's a business and cultural transformation, too. This module explores how the superpowers of the cloud are brought to life through people. It looks specifically at how to organically create and scale innovation through culture and business practices. It offers key principles, drawing examples from Google?s success and real world scenarios, that you can apply in your day-to-day operations. Define the ideal business transformation challenge Previous modules describe the journey with cloud technology to include business and cultural changes as well. This module sets the groundwork to build a transformational solution using cloud technology for your role or your business. This process starts with distinguishing between scaled improvements and transformations. Next, the module demonstrates how to write an ideal challenge question and use insights generated from a data ecosystem to address the challenge. Finally, it introduces a framework that you can use to assess and refine your challenge ideas, preparing you to build a business case in a later module. Build trust with availability, security, and compliance This module addresses common concerns about data privacy and security when migrating to the cloud. It defines key terms - privacy, security, compliance, and reliability - and reveals today?s top cybersecurity challenges and threats. It discusses how data security and compliance can be maintained when data is in the cloud, as illustrated by the Shared Responsibility Model. And finally, it uses a concrete example to explain how learners can build a high-level security program in their own organization. Build a business case for your transformation challenge This module explains how to identify the most transformative solution for your business challenge. It then breaks down steps to achieve the transformational solution through creating smaller projects and plotting them onto a transformation roadmap. It describes how to use the data ecosystem you mapped in a previous module to support your overall project. Finally, it explains step by step how to build a business case and gives tips to help you pitch your project idea to gain buy-in from leadership, teams, and technical partners. Additional course details: Nexus Humans Business Transformation with Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Transformation with Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
2 QLS Endorsed Course | CPD Certified | Free PDF + Hardcopy Certificates | 80 CPD Points | Lifetime Access
2 QLS Endorsed Course | CPD Certified | Free PDF + Hardcopy Certificates | 80 CPD Points | Lifetime Access
2 QLS Endorsed Course | CPD Certified | Free PDF + Hardcopy Certificates | 80 CPD Points | Lifetime Access
Are you ready to become the detective who doesn't just solve crimes, but anticipates them? Welcome to the cutting-edge world of Crime Intelligence Analysis, where data meets detective work, and you become the hero behind the scenes. And according to Indeed a Crime Intelligence Analysts in the UK can expect to earn anywhere between £30,000 for starting positions to £60,000 for highly experienced professionals. Imagine a career where every day is a new puzzle, a new challenge, and a new opportunity to make a difference. Crime Intelligence Analysts are essential to modern law enforcement, helping to keep our communities safer and more secure. Join our Crime Intelligence Analyst Course and be part of the solution. With our expert guidance and comprehensive curriculum, you'll be prepared to step into a role that's as rewarding as it is vital. Key Features: CPD Certified Developed by Specialist Lifetime Access Course Curriculum: Module:01 Fundamentals of Intelligence Analysis Module:02 Exploring Criminal Intelligence Analysis Module:03 Proficiency in Criminal Intelligence Analysis - Skills and Attributes Module:04 Exploring Criminal Behavioral Psychology Module:05 Techniques in Crime Analysis Research Module:06 Strategic Decision Making in Criminal Intelligence Analysis Module:07 Applications of Intelligence-Led Policing Module:08 Counterterrorism Strategies and Criminal Intelligence Analysis Module:09 Integration of Technology in Criminal Intelligence Analysis Module:10 Overview of the Criminal Justice System in England and Wales Learning Outcomes: Apply core intelligence analysis techniques for effective criminal investigations. Evaluate criminal behavioural patterns using psychological principles for accurate profiling. Explore methodologies and applications of criminal intelligence analysis. Utilise technology to enhance criminal intelligence analysis in practical law enforcement. Analyse criminal behaviour through criminal behavioural psychology insights. Integrate counterterrorism strategies into criminal intelligence analysis for national security. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Crime Intelligence Analyst course is accessible to anyone eager to learn more about this topic. Through this course, you'll gain a solid understanding of Crime Intelligence Analyst. Moreover, this course is ideal for: Law enforcement professionals seeking advanced criminal analysis skills. Criminal justice researchers exploring intelligence-focused methodologies. Professionals in criminal justice systems. Security analysts aiming to enhance expertise in criminal activities like counterterrorism intelligence. Individuals interested in contributing to strategic decision-making in law enforcement. Requirements There are no requirements needed to enrol into this Crime Intelligence Analyst course. We welcome individuals from all backgrounds and levels of experience to enrol into this Crime Intelligence Analyst course. Career path After finishing this Crime Intelligence Analyst course you will have multiple job opportunities waiting for you. Some of the following Job sectors of Crime Intelligence Analyst are: Crime Intelligence Analyst Criminal Behaviour Analyst Counterterrorism Analyst Police Intelligence Officer Crime Researcher Intelligence-Led Policing Specialist Certificates Will be downloadable when all lectures have been completed.
Introduction: Terminating employment is an unfortunate part of any manager's job. While you may strive to only recruit the best staff, the reality is that not everyone is a good fit for your company or its needs. After you go through disciplinary measures and put staff through coaching, there is a point where you simply need to move on. This is a very difficult task job, one that many managers actively avoid, which can put a strain on the rest of the office. Learning about the legal and practical aspects of employee termination can help make the process easier. This course goes into detail about each aspect of employee termination. It begins by giving you a brief overview of the legal aspects that you need to keep in mind, when considering termination of employment. Next, it covers the financial implications of dismissing an employee, helping you understand the costs involved. The level of involvement that your human resources department should have is also discussed in detail. Finally, we review the more practical aspects of termination of employment, giving you the tools that you need, in order to have that conversation. You will Learn: The reasons for fair dismissal Information regarding required notice periods, including statutory and contractual ones The steps that your human resources department needs to take, before you can terminate employment Why there is paperwork required, and what you should prepare before your meeting How to tell a staff member that they have been dismissed Who should be with you in that meeting Benefits of taking this Course: Understanding the difference between fair and unfair dismissal Learning what constructive dismissal is, so you can avoid it, where possible Understanding why you may wish to offer dismissed employees extra pay or extended benefits When you should contact security, in order to escort a dismissed employee off the premises How to inform the remaining staff of the change in personnel Course Modules: Module 01: General Information and the Law Module 02: Financial Implications of Termination of Employment Module 03: Human Resources Aspects of Termination of Employment Module 04: Practical Aspects of Termination of Employment
Duration 5 Days 30 CPD hours This course is intended for This course is intended for those responsible for the installation, configuration, maintenance, or troubleshooting of PGP Universal Server or PGP Desktop. Overview This course provides instruction on PGP Universal Server 3.2 and PGP Desktop 10.2.At the completion of the course, you will be able to: Describe the features, concepts, components, and terminology of both the PGP Universal Server 3.2 and PGP Desktop 10.2products. Install PGP Universal Server 3.2 and complete setup using the most commonly configured options. Install a managed and customized PGP Desktop 10.2 client. Configure, complete administration tasks for, and use PGP Whole Disk Encryption and other PGP Desktop features. Configure policy-based messaging security for internal and external recipients. Create and modify users, user policies, and groups using either manual or directory integration methods. Combine two or more PGP Universal Servers into a cluster. This is designed to provide you with the fundamental knowledge a nd hands-on lab experience to install, administer, and troubleshoot the PGP Universal Management Server and primary client product. Cryptography Essentials Cryptography defined Caesar cipher Symmetric-Key Cryptography Public-Key Cryptography PGP Public-Key Cryptography Digital Signatures Trust Models Keys, Key Signatures and Key properties Verifying keys with key fingerprints Passphrases Certificates PGP Product Information PGP Universal Server PGP Desktop PGP Command Line PGP Support Package for BlackBerry PGP Mobile PGP iOS Viewer Installing PGP Universal Server PGP Universal Server overview Installation tasks and options Completing the PGP Universal Server Setup Assistant Administrative Keys A review of trust and verification The Organization Key The Organization Certificate Configuration and usage of the Additional Decryption Key Other certificates used for trust on PGP Universal Server Ignition key types and features Consumers and Groups Consumers and Groups PGP product user definition Consumer groups Introduction to consumer policy How users, groups, and policy work together Server Messaging Learn Mode In-depth look at Mail Proxy configuration Description of server mail flow and typical configurations Monitoring and Reporting Server monitoring and logging Updates, backups, and restoring Mail Policy Definition of policy chains and rules Rule conditions, actions, and key searches Default mail flow and message policy Adding custom chains to mail flow Overview of various types of policy chains Demonstration and detailed explanation of adding a rule Special messaging actions and dictionaries Key Not Found Problems that require a Key Not Found policy Introduction to Key Not Found configuration Web Messenger Definition of Web Messenger Description of functionality Demonstration of end-user inbox creation Inbox and service administration Inbox replication and backup Customization templates Regular Email option for Web Messenger PDF Messenger statement and certified delivery How the Out of Mail Stream Consumer Policy option functions PGP public key directories Smart Trailer invitation option overview PGP Desktop / S/MIME option overview PGP Universal Satellite overview Preparing Universal Server for PGP Desktop Clients Introduction to directory synchronization High-level overview of LDA P How the server uses a directory to add and assign users to groups Configuring PGP Universal Server Directory Synchronization Keys Managed key configuration Key modes Subkeys Key usage flags Smart card Introduction to key management services Installing PGP Desktop System requirements Citrix and TS compatibility Downloading a custom PGP Desktop installer Modifying installed components Configuring Client Enrollment Definition of enrollment Email, LDA P, and Silent enrollment type overview General PGP Desktop Policy General PGP Desktop Policy Options on the General Card of the PGP Desktop settings of a consumer policy Licensing managed PGP Desktop clients Updating settings for managed installations PGP Desktop Messaging How PGP Desktop affects messaging infrastructure Options on the Messaging Card of the PGP Desktop settings of a consumer policy MAPI encrypt and sign buttons and offline mail processing Configuring PGP Whole Disk Encryption What is Whole Dis k Encryption Configuring WDE PGP Whole Disk Encryption for Windows PGP Whole Disk Encryption for Mac OSX PGP w hole Disk Encryption for Linux PGP Whole Disk Encryption Management and Recover The pgpwd command-line tool Logon failure and reporting The WDE-ADMIN group for large-scale administration PGP Whole Disk Encryption in the PGP Desktop settings of a consumer policy, including authentication methods and user per missions Recovery options PGP NetShare Defining PGP NetShare Encrypted folder creation Configuration of the PGP Universal Server Consumer Policy options for NetShare, including automated folder protection and application-based file protection Client-side administration features for PGP NetShare Miscellaneous compatibility and feature information about PGP NetShare Active Directory Group integration and PGP NetShare usage demonstrations Other PGP Desktop Utilities PGP Zip file and folder protection Securely erasing information using PGP Shredder and the Shred Free Space features PGP Virtual Disk secure volumes Usage cases and PGP Portable definition Clustering How PGP Universal Server Clustering works Using the DMZ Clustering Zone Cluster failover Web Messenger inbox replication Demonstration of cluster creation