• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3630 Ski courses in Cardiff delivered Live Online

CCSA Check Point Certified Security Administrator

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is recommended for technical professionals who support, install, deploy or administer Check Point products. Overview Know how to perform periodic administrator tasks. Describe the basic functions of the Gaia operating system. Recognize SmartConsole features, functions, and tools. Understand how SmartConsole is used by administrators to give user access. Learn how Check Point security solutions and products work and how they protect networks. Understand licensing and contract requirements for Check Point security products. Describe the essential elements of a Security Policy. Understand the Check Point policy layer concept. Understand how to enable the Application Control and URL Filtering software. Blades to block access to various applications. Describe how to configure manual and automatic NAT. Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements. Describe different Check Point Threat Prevention solutions for network attacks. Articulate how the Intrusion Prevention System is configured, maintained and tuned. Understand the Infinity Threat Prevention system. Knowledge about Check Point's IoT Protect. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. Course Outline Configure the Security Management Server. Use the WebUI to run the First Time Wizard. Install the Smart Console. Install the Alpha Gateway using the network detailed in the course topology. Demonstrate how the Security Management Server and Gateway communicate. Test SIC Status. Create multiple administrators and apply different roles and permissions for simultaneous administration. Validate existing licenses for products installed on the network. Create and configure host, network and group objects. Create a simplified Security Policy. Demonstrate how to use Security Zones in policy. Demonstrate how to share a layer between Security Polices. Configure Network Address Translation for server and network objects. Enable Identity Awareness. Deploy user access roles for more granular control of the security Policy. Generate network Traffic and use traffic visibility tools to monitor the data. Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic.

CCSA Check Point Certified Security Administrator
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing an Integrated Threat Defense Solution (SECUR201) v1.2

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy a Cisco Integrated Threat Defense solution in their network environment. Cisco integrators and partners Systems and network engineers Technical architects Technical support personnel Overview After taking this course, you should be able to: Understand the network security landscape and the Cisco Integrated Threat Defense (ITD) solutions Describe the key components of the ITD solution and their use in the network Configure the Cisco Identity Services Engine (ISE) for a baseline of operation in the ITD solution Configure the integration between the Cisco Stealthwatch and Cisco ISE platforms Configure the integration between the Cisco Firepower and ISE platforms Configure the integration between Cisco Firepower and Cisco Advanced Malware Protection (AMP) for Endpoints The Implementing an Integrated Threat Defense Solution (SECUR201) v1.2 course provides an analysis of the cybersecurity landscape with an emphasis on the importance of an integrated threat defense architecture. Through a combination of lessons and hands-on practice, you will learn to deploy and integrate Cisco©?s Integrated Threat Defense solutions which include: Cisco Identity Services Engine (ISE), Cisco Stealthwatch, Cisco Firepower NGFW, and Cisco AMP for Endpoints. This course provides you with the knowledge and skills to implement and integrate solution components with existing network services, integrate solution components with the pxGrid (Platform Exchange Grid) framework, integrate network and endpoint-based malware protection, and observation of security dataflow after the introduction of malware. Course Outline Integrated Threat Defense Introduction ITD Products Identity Services Engine Setup Integration of Stealthwatch with Identity Services Engine Integration of Firepower with Identity Services Engine Integration of Firepower with AMP for Endpoints Lab outline Connecting to the Lab Environment Integrating ISE and Active Directory Integrating ISE and Cisco Adaptive Security Appliance (ASA) Configuring pxGrid and Client Certificates Integrating Stealthwatch with Identity Services Engine Integrating Network Visibility Module (NVM) with AnyConnect Integrating Firepower with Identity Services Engine Integrating AMP for Endpoints with Firepower

Cisco Implementing an Integrated Threat Defense Solution (SECUR201) v1.2
Delivered OnlineFlexible Dates
Price on Enquiry

AS27 IBM Advanced System Operator Workshop for IBM i

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This advanced course is designed for those individuals who are responsible for operating and managing the operation of an IBM i system. Overview Explain the concept of how LPAR works Explain the functions served by the HMC Explain how user versus resource security are implemented Explain the difference between group profiles and authorization lists Describe how adopted authority works Describe how work is managed on the system and the concepts of the performance tuning process on the system Explain how Management Central can be used to manage a single system or a network of System i servers Perform the steps to create a basic CL program using both the traditional (PDM and SEU) and the newer GUI (RSE and LPEX) application development tools Perform the steps to create a menu using SDA Provide some tips on how you can improve your operations This course is designed to enhance the skills of an IBM i System Operator. This course explains the concept of how LPAR works and discusses the functions provided by the HMC LPAR concepts and overview . Console options and HMC overview . IASP concepts and overview . Security concepts and overview . System values . User security (user and group profiles) . Resource security . Authorization lists and adopted authority . Management Central overview . Commands and tasks using Management Central . Inventory using Management Central . System values using Management Central . Other Management Central functions . Work management: Concepts and overview . Work management: Subsystem concepts and overview . Work management: Job processing concepts and interactive jobs . Work management: Job processing concepts of other job types . Work management: Submitting and tracking of batch jobs . Programming concepts . CL programming concepts . Using PDM and SEU to create a CL program . Starting and setting up RSE . Creating a CL program using RSE and LPEX Editor . Creating a menu using SDA . Tips for improved operation .

AS27 IBM Advanced System Operator Workshop for IBM i
Delivered OnlineFlexible Dates
Price on Enquiry

CNS-319 Citrix ADC 12.x Advanced Concepts - Management and Optimization

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for students with previous Citrix ADC experience, and best suited for individuals who will be deploying Citrix Application Delivery Management to administer a Citrix Networking environment or optimize Citrix ADC-managed application delivery traffic. Overview Manage multiple Citrix ADC platforms centrallyOrchestrate configuration changesReport on transactions passing through the Citrix ADC environmentVisualize infrastructure and plan expansion Master the deployment and usage of Citrix Application Delivery Management with this two-day management and optimization course. Students will gain the skills needed to automate and manage network services for scale out of application architectures, and to optimize Citrix ADC-managed application delivery traffic. The curriculum focuses on centrally managing multiple Citrix ADC platforms, orchestrating configuration changes, reporting on transactions, visualizing infrastructure and planning infrastructure expansion. Students will also learn how to implement Citrix ADC features, including caching, frontend optimization, Citrix ADC web logging and TCP/HTTP optimization, to optimize traffic managed by your Citrix networking environment. Citrix Application Delivery Management Introduction An introduction to Application Delivery Management Application Delivery Management Deployment and Configuration Deploying Application Delivery Management in High Availability Application Delivery Management Instance Management Managing and Monitoring Application Delivery Management An introduction to Application Delivery Management Application Delivery Management Deployment and Configuration Deploying Application Delivery Management in High Availability Application Delivery Management Instance Management Managing Citrix ADC Configuration Application Management StyleBooks Configuration Management Citrix ADC Web Logging Understanding Web Traffic Installing and configuring Citrix ADC Web Logging Troubleshooting Citrix ADC Web Logging Citrix ADC Integrated Caching Introduction to Integrated Caching Static and Dynamic Content Request and Response Process Flow Understanding Cache Policies Identifying Content Group Settings Front-End Optimization Improving Content Delivery Front-End Optimization Use Cases Understanding Minification CSS Optimizations Tuning and Optimizations Connections on the Citrix ADC Connection Profiles Queuing on the Citrix ADC Connection Tuning Practices

CNS-319 Citrix ADC 12.x Advanced Concepts - Management and Optimization
Delivered OnlineFlexible Dates
Price on Enquiry

Next-Level PowerBI for Experienced Users (TTDPB02)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This is an Intermediate PowerBI course geared for experienced users who wish to leverage the tool's more advanced capabilities Overview This course is about 50% hands-on lab and 50% lecture, designed to train attendees in essential PowerBI data handling functions and reporting skills, coupling the most current, effective techniques with the soundest practices. Attendees of this course will gain practical examples from the experienced instructor who has deployed and configured Power BI reporting in a wide variety of businesses. Working in a hands-on learning environment led by our expert facilitator, students will learn how to: Create Advanced Power BI Reports Advanced understanding of the data schemas and extracting data Perform advanced transformations of data or any data schema Utilize time-phased data in the creation of complex analyses Create new measures using DAX Filter data using row-level security Create and deploy content packs Use Power BI to integrate with line-of-business applications Next Level Power BI for Experienced Users is a two day, course that provides attendees already experienced with Microsoft Power BI basics with a hands-on exploration of intermediate and beyond level features. This course is geared for attendees ready to learn the advanced techniques that you, your business analysts, and your stakeholders need to create complex information from projects, program, and portfolio reporting to utilizing time-phased data and, potentially, data from your enterprise?s other line-of-business tools. Get Project Online Data Select and mine relevant tables with ODATA Advanced ODATA data mining Importing other data formats Advanced Editing of data queries Advanced Data Transformations Managing table relationships Creating & using data hierarchies Creating custom columns and measures and metrics for filtering and reporting Creating Power BI Reports Using advanced visualizations Configuring drill-down Modifying visual interactions Importing and creating custom visuals Configure Power BI Security Creating Dashboard and row-level security Utilizing Filtering using row-level security Publishing Reports and Dashboards Building Mobile Reporting Creating and deploying content packs Configuring natural language query

Next-Level PowerBI for Experienced Users (TTDPB02)
Delivered OnlineFlexible Dates
Price on Enquiry

Getting Started with Kubernetes (TTDV7590)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This in an introductory-level class for intermediate skilled team members. Students should have prior software development experience or exposure, have some basic familiarity with containers, and should also be able to navigate the command line. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment led by our expert facilitator, students will explore: What a Kubernetes cluster is, and how to deploy and manage them on-premises and in the cloud. How Kubernetes fits into the cloud-native ecosystem, and how it interfaces with other important technologies such as Docker. The major Kubernetes components that let us deploy and manage applications in a modern cloud-native fashion. How to define and manage applications with declarative manifest files that should be version-controlled and treated like code. Containerization has taken the IT world by storm in the last few years. Large software houses, starting from Google and Amazon, are running significant portions of their production load in containers. Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. This is a hands-on workshop style course that teaches core features and functionality of Kubernetes. You will leave this course knowing how to build a Kubernetes cluster, and how to deploy and manage applications on that cluster. Getting Started Our sample application Kubernetes concepts Declarative vs imperative Kubernetes network model First contact with kubectl Setting up Kubernetes Working with Containers Running our first containers on Kubernetes Exposing containers Shipping images with a registry Running our application on Kubernetes Exploring the Kubernetes Dashboard The Kubernetes dashboard Security implications of kubectl apply Scaling a deployment Daemon sets Labels and selectors Rolling updates Next Steps Accessing logs from the CLI Managing stacks with Helm Namespaces Next steps

Getting Started with Kubernetes (TTDV7590)
Delivered OnlineFlexible Dates
Price on Enquiry

Enterprise Linux System Admin 1 Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IT professionals across a broad range of disciplines who need to perform essential Linux administration tasks including installation, establishing network connectivity, managing physical storage, and basic security administration. This course relates to Red Hat Enterprise Linux 7 and is designed for IT pros without previous Linux admin experience. The course focuses on providing students with Linux admin 'survival skills' by focusing on core admin tasks. Access the command line Log in to a Linux system and run simple commands using the shell. Manage files from the command line Copy, move, create, delete, and organize files from the bash shell prompt. Getting help in Red Hat Enterprise Linux Resolve problems by using online help systems and Red Hat support utilities. Create, view, and edit text files Create, view, and edit text files from command output or in an editor Manage local Linux users and groups Manage local Linux users and groups, and administer local password policies. Control access to files with Linux file system permissions Set Linux file system permissions on files and interpret the security effects of different permission settings. Monitor and manage Linux processes Obtain information about the system, and control processes running on it. Control services and daemons Control and monitor network services and system daemons using systemd. Configure and secure OpenSSH service Access and provide access to the command line on remote systems securely using OpenSSH. Analyze and store logs Locate and accurately interpret relevant system log files for troubleshooting purposes. Manage Red Hat Enterprise Linux networking Configure basic IPv4 networking on Red Hat Enterprise Linux systems. Archive and copy files between systems Archive files and copy them from one system to another. Install and update software packages Download, install, update, and manage software packages from Red Hat and yum package repositories. Access Linux file systems Access and inspect existing file systems on a Red Hat Enterprise Linux system. Use virtualized systems Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.

Enterprise Linux System Admin 1 Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

Continuous Testing Foundation (DevOps Institute)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevOps Test Engineering course is anyone involved in defining a DevOps Testing strategy, such as: Delivery Staff DevOps Engineers IT Managers Project Managers Lab Staff Maintenance and Support Staff Quality Assurance Managers Quality Assurance Teams Release Managers Testers Software Engineers Overview The learning objectives for DTE include a practical understanding of: The purpose, benefits, concepts and vocabulary of DevOps testing How DevOps testing differs from other types of testing DevOps testing strategies, test management and results analysis Strategies for selecting test tools and implementing test automation Integration of DevOps testing into Continuous Integration and Continuous Delivery workflows How DevOps testers fit with a DevOps culture, organization and roles This comprehensive course addresses testing in a DevOps environment and covers concepts such as the active use of test automation, testing earlier in the development cycle, and instilling testing skills in developers, quality assurance, security, and operational teams. The course is relevant for every modern IT professional involved in defining or deploying a DevOps testing strategy for their organization, as test engineering is the backbone of DevOps and the primary key for successful DevOps pipeline to support digital transformation. This course prepares you for the Continuous Testing Foundation(CTF) certification. Course Objectives and Modules, Logistics What is DevOps Testing and its Business Benefits?Relation of DevOps Testing in other Test MethodologiesDevOps Testing Best Practices DevOps Testing Terminology Culture changes Organization changes Process and team friction Motivation strategies Measuring Success Continuous Evolution Troubleshooting What is the DevOps pipeline? DevOps Testing on the pipeline Test strategy choices Pre-Flight strategies Continuous Integration Testing System, Delivery and Customer Testing Test Environments Lab Management Topology orchestration Test Automation Frameworks Test Tools Selection criterion Automated metrics Key concepts Test Case Best Practices & Design Exercise Test Suite Best Practices & Design Exercise Principles of DevOps Management DevOps Test Management Metrics DevOps Management Tools DevOps Test Results Analysis Integrating DevOps Results Analysis Test Management Exercise Fictitious Product Test Requirements Individual Exercise Class discussion Exam Preparation

Continuous Testing Foundation (DevOps Institute)
Delivered OnlineFlexible Dates
Price on Enquiry

55345 Implementing and Managing Windows 11

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is aimed at IT professionals who support Windows 11 desktops, devices, users, and associated network and security resources. The secondary audience for this course is Desktop/Device Support Technicians (DSTs) who provide Tier 2 support to users with computers that are running the Windows 11 operating system (OS) in a on-premises environment. Overview After completing this course, you will be able to: Install and configure Windows 11 desktops and devices in a Windows Server domain corporate environment Install and customize Windows 11 operating systems and apps Configure local and remote network connectivity and storage Configure data security, device security, and network security Maintain, update, and recover Windows 11. This is a 4-day ILT course designed to provide you with the knowledge and skills required to install and configure Windows 11 desktops and devices in an on-premises Windows Server Active Directory domain environment. Module 1: Installing Windows 11 Introducing Windows 11 Installing Windows 11 Module 2: Upgrading and updating Windows 11 Upgrading to Windows 11 Migrating user state Managing Windows 11 updates Module 3: Configuring Windows 11 devices Local configuration tools in Windows 11 Using Windows Admin Center Using Windows PowerShell Implementing Remote Management Module 4: Configuring network connectivity Configuring network connectivity Implementing name resolution Implementing remote access Module 5: Managing storage Overview of storage options Managing local storage Managing Storage Spaces Module 6: Managing resources Configuring and managing file access Configuring and managing shared folders Implementing Work Folders Managing printers Module 7: Managing apps in Windows 11 Deploying apps Managing access to the Microsoft Store Configuring Microsoft Edge Module 8: Implementing and managing security Managing user and group accounts Configuring User Account Control Implementing BitLocker Implementing Windows 11 security features Securing against network threats Module 9: Monitoring Windows 11 Monitoring Windows 11 Optimizing Windows 11 performance Module 10: Troubleshooting Windows 11 Managing Windows 11 startup Recovering Windows 11 Managing devices and drivers Understanding the registry Recovering files

55345 Implementing and Managing Windows 11
Delivered OnlineFlexible Dates
Price on Enquiry

ICM-SA-CT-Installing and Configuring Meraki MS Switch Appliances

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: IT Staff and Managers Network and systems personnel and engineers Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment. This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics. Overview Following completion of this course, students will understand, Install, Configure, Monitor, and Troubleshoot the following: Navigate and Configure the dashboard Add MX/MS devices to the Dashboard Understand and Configure Configuration Templates Understand and Configure Group Policies Manage/Configure/Integrate Users and Radius Policies Configure, Monitor, and Troubleshoot MS Switches Troubleshoot devices and Connectivity This 3-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students will learn how to install and optimize Meraki MS Switches. Students will also learn how to configure the Meraki Dashboard. Student will troubleshoot and configure the Meraki environment and learn how to diagnose and resolve user and Network issues that may arise. Introduction to Meraki The Meraki Mission Cisco Meraki: Bringing the Cloud to Enterprise Networks Cloud-Managed Networking Architecture Benefits of a Cloud-Based Solution The Meraki Full Stack: New and Unique Value Proposition Meraki Deployment ? How it works Why Customers Choose Meraki Meraki MS Switches Overview Meraki API Overview Meraki Licensing Enterprise Support Cisco Meraki Documentation Cloud Management with the Meraki Dashboard The Meraki Dashboard Dashboard: Organizational Structure Out-of-band Cloud Management Loss of Connectivity to the Cisco Meraki Cloud Meraki Dashboard Logins Create Dashboard Accounts and Organization MSP Logins - Manage Multiple Organizations Modify an Organization View Organizations Health Meraki Dashboard Best Practices Dashboard Search Meraki Help Organizational Wide Settings Configure Monitor Create and Manage Configuration Templates Network-Wide Settings Configure Meraki Switching MS Switch Platforms and Features MS Feature: Multi-gigabit Ethernet Cisco Meraki MS Access Switches Cisco Meraki MS Aggregation Switches Using Tags to search, monitor and configure Meraki Switches Meraki Switch Configuration Port Configuration Meraki Switch Monitoring Troubleshooting Tools Managing Firmware Upgrades

ICM-SA-CT-Installing and Configuring Meraki MS Switch Appliances
Delivered OnlineFlexible Dates
Price on Enquiry