Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Network Engineers, Network Administrators, Network Security Engineers, and NOC Administrators. Overview Successful completion of this five-day, instructor-led course will help enhance your understanding of how to design, implement, and effectively operate a Prisma SDWAN solution. You will get hands-on experience configuring Prisma SD-WAN with a branch and datacenter, configure policies, and use Prisma SD-WAN services. The Prisma SD-WAN Design and Operation (EDU-238) course describes the next generation Prisma SD-WAN solution, the capability and value it provides over legacy WAN and SD-WAN implementations, and how to configure, operate, and troubleshoot the solution. This course is intended for people who must configure, maintain, and use wide area networks, from data centers, to branches, to the cloud. Course Outline 1 - Solution Overview 2 - Branch Design 3 - Routing 4 - Policy Module #1 - Application Path and QoS Policy 5 - Policy Module #2 - NAT, ZBFW and Security 6 - Event Policy Management Services 7 - DNS and DHCP Services 8 - Operations and Troubleshooting 9 - CloudBlades 10 - Integrating Prisma SD-WAN and Prisma Access for SASE Implementation 11 - DevOps 12 - Next Steps Additional course details: Nexus Humans Palo Alto Networks :Prisma SD-WAN : Design and Operation EDU-238 (6.0) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks :Prisma SD-WAN : Design and Operation EDU-238 (6.0) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate course for experienced DBAs and technical individuals, with experience on other relational database platforms, who plan, implement, and maintain Db2 11.1 for Linux, UNIX, and Windows databases. These skills can also be utilize to support cloud based databases using Db2 on Cloud or Db2 Hosted environments. Overview Please refer to course overview This course teaches you to perform, basic and advanced, database administrative tasks using Db2 11.1. These tasks include creating and populating databases and implementing a logical design to support recovery requirements. The access strategies selected by the Db2 Optimizer will be examined using the Db2 Explain tools. Various diagnostic methods will be presented, including using various db2pd command options. Students will learn how to implement automatic archival for database logs and how to plan a redirected database restore to relocate either selected table spaces or an entire database. The REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces, will be discussed. We will also cover using the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases. The selection of indexes to improve application performance and the use of SQL statements to track database performance and health will be covered. This course provides a quick start to Db2 database administration skills for experienced relational Database Administrators (DBA). Overview of Db2 11Command Line Processor (CLP) and GUI UsageThe Db2 EnvironmentCreating Databases and Data PlacementCreating Database ObjectsMoving DataBackup and RecoveryLocks and ConcurrencyDatabase Maintenance, Monitoring and Problem DeterminationSecurityDatabase Rebuild SupportDb2 Database and Table Space RelocationUsing Explain ToolsUsing Indexes for PerformanceAdvanced Monitoring
Duration 5 Days 30 CPD hours This course is intended for Data Warehouse Administrator Database Administrators Database Designers Support Engineer Technical Administrator Overview Back up, restore, and patch DBCS database deployments Describe the DBaaS and on-premises Oracle Database architectures Manage database instances Manage UNDO data Move data between databases Implement basic backup and recovery procedures Monitor and tune database performance Tune SQL to improve performance Manage resources with Oracle Database Resource Manager Create pluggable databases (PDBs) Configure the Oracle network environment Administer user security and implement auditing Create and manage tablespaces Manage storage space Create and manage Database as a Cloud Service (DBCS) database deployments Register databases and manage performance with Enterprise Manager Cloud Control The Oracle Database 12c R2: Administration Workshop Ed 3 course is designed to provide students with a firm foundation in administration of an Oracle Database. In this course students will gain a conceptual understanding of Oracle Database architecture and learn how to manage an Oracle Database in an effective and efficient manner. Exploring Oracle Database Architecture Introducing Oracle Database Relation Database Models Oracle SQL and PL/SQL Oracle Database Server Architecture Connecting to Oracle Databases Oracle Database Tools Oracle-Supplied User Accounts Querying the Oracle Data Dictionary Managing Database Instances Initialization Parameter Files Starting Up Oracle Databases Shutting Down Oracle Databases Opening and Closing PDBs Working with the Automatic Diagnostic Repository (ADR) Querying Dynamic Performance Views Creating PDBs Methods and Tools to Create PDBs Creating PDBs from Seed with SQL*Plus Cloning PDBs with SQL*Plus Unplugging and Pluggin In PDBs with SQL*Plus Dropping PDBs with SQL*Plus Configuring the Oracle Network Environment Oracle Net Services How Listeners Work Configuring Listeners for Dynamic Service Registration Configuring Listeners for Static Service Registration Configuring Local Naming for Connections Testing Oracle Net Connectivity with tnsping Configuring Communication Between Databases Dedicated Versus Shared Server Configurations Administering User Security Creating Users Granting Privileges Creating and Granting Roles Revoking Privileges and Roles Creating and Assigning Profiles Authenticating Users Assigning Quotas to Users Applying the Principal of Least Privilege Creating and Managing Tablespaces How Table Data is Stored Creating Tablespaces in SQL*Plus Altering and Dropping Tablespaces in SQL*Plus Viewing Tablespace Information in SQL*Plus Implementing Oracle Managed Files Moving and Renaming Online Data Files in SQL*Plus Managing Storage Space Oracle Database Space Management Features Block Space Management Row Chaining and Migration Free Space Management Within Segments Types of Segments Allocating Extents Understanding Deferred Segment Creation Space-Saving Features Managing UNDO Data Undo Data: Overview Transactions and Undo Data Storing Undo Information Comparing Undo Data and Redo Data Managing Undo Local Undo Mode Versus Shared Undo Mode Configuring Undo Retention Categories of Undo Moving Data Moving Data: General Architecture Oracle Data Pump: Overview Oracle Data Pump: Benefits Data Pump Export and Import Clients Data Pump Utility: Interfaces and Modes Data Pump Import: Transformations SQL*Loader Overview Loading Methods Backup and Recovery Concepts DBA Responsibilities Categories of Failure Understanding Instance Recovery Understanding Types of Backups Comparing Complete and Incomplete Recovery Oracle Data Protection Solutions Flashback Technology Monitoring and Tuning Database Performance Managing Performance Activities Performance Planning Considerations Database Maintenance Automatic Workload Repository (AWR) Automatic Database Diagnostic Monitor Performance Monitoring Performance Tuning Methodology Database Server Statistics and Metrics SQL Tuning SQL Tuning Process Oracle Optimizer Optimizer Statistics SQL Plan Directives Adaptive Execution Plans SQL Tuning Advisor SQL Access Advisor SQL Performance Analyzer Oracle Database Resource Manager Oracle Database Resource Manager: Overview Resource Manager Elements Using Resource Manager to Allocate Resources Creating a Simple Resource Plan Creating a Complex Resource Plan Using the Active Session Pool Feature Limiting CPU Utilization at the Database Level Limiting CPU Utilization at the Server Level Enterprise Manager Cloud Control Controlling the Enterprise Manager Cloud Control Framework Starting the Enterprise Manager Cloud Control Framework Stopping the Enterprise Manager Cloud Control Framework Introduction to Oracle Database Cloud Service Oracle Cloud: Overview Database Cloud Service Offerings DBCS Architecture Features and Tooling Additional Database Configuration Options Creating DBCS Database Deployments Automated Database Provisioning Creating a Database Deployment How SSH Key Pairs are Used Creating an SSH Key Pair Storage Used for Database Files Managing DBCS Database Deployments Cloud Tooling Accessing Tools and Features from the DBCS Console Managing the Compute Node Associated With a Database Deployment Managing Network Access to DBCS Enabling Access to a Compute Node Port Scaling a Database Deployment Backing Up and Restoring DBCS Database Deployments Backing Up and Recovering Databases on DBCS Backup Destination Choices Backup Configuration Creating an On-Demand Backup Customizing the Backup Configuration Performing Recovery by Using the Console Performing Recovery by Using the dbaascli Utility Patching DBCS Database Deployments Patching DBCS Using the DBCS Console to Manage Patches Using the dbaascli Utility to Manage Patches Creating Master Encryption Keys for PDBs CDB and PDB Master Encryption Keys Determining Whether You Need to Create and Activate and Encryption Key for a PDB Creating and Activating an Encryption Key Tablespace Encryption by Default Tablespace Encryption by Default in DBCS Transparent Data Encryption (TDE) Overview Components of TDE Using TDE Defining the Keystore Location Controlling Tablespace Encryption by Default Managing the Software Keystore and Master Encryption Key Managing the Keystore in CDBs and PDBs Additional course details: Nexus Humans Oracle Database 12c R2 - Administration Workshop Ed 3 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database 12c R2 - Administration Workshop Ed 3 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Administrator Architect Database Administrator Overview To provide an acceptable response time to users and manage resources effectively, you learn how to monitor performance and manage resources within the multitenant container database and its pluggable databases, and within each pluggable database. Another important aspect is the data movement between non-CDBs and pluggable databases, and between pluggable databases. It is also important to understand the procedures of upgrading an Oracle Database multitenant container database or an Oracle Database pluggable database. Finally, students discover the way multitenant container database and pluggable databases are created and monitored in the Cloud. This course covers all aspects of the multitenant architecture, providing detailed information on the components of an Oracle multitenant container database and its regular and application pluggable databases. You learn why and how to create and manage a multitenant container database and its regular and application pluggable databases, with storage structures appropriate for the business applications. You practice cold and hot cloning, plugging unplugged pluggable databases in multitenant container databases using various methods. CDB BasicsCDB and Regular PDBsApplication PDBs and Application InstallationPDB CreationCDB and PDB ManagementStorageSecurityBackup and DuplicateRecovery and FlashbackPerformance MonitoringResources AllocationData MovementUpgrade methods
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, cloud engineers, including security engineers, delivery and implementation engineers, professional services, and Cloud Center of Excellence (CCOE) Overview In this course, you will learn to: Design and implement a secure network infrastructure Design and implement compute security Design and implement a logging solution Currently, the average cost of a security breach can be upwards of $4 million. AWS Security Best Practices provides an overview of some of the industry best practices for using AWS security and control types. This course helps you understand your responsibilities while providing valuable guidelines for how to keep your workload safe and secure. You will learn how to secure your network infrastructure using sound design options. You will also learn how you can harden your compute resources and manage them securely. Finally, by understanding AWS monitoring and alerting, you can detect and alert on suspicious events to help you quickly begin the response process in the event of a potential compromise. Module 1: AWS Security Overview Shared responsibility model Customer challenges Frameworks and standards Establishing best practices Compliance in AWS Module 2: Securing the Network Flexible and secure Security inside the Amazon Virtual Private Cloud (Amazon VPC) Security services Third-party security solutions Module 3: Amazon EC2 Security Compute hardening Amazon Elastic Block Store (EBS) encryption Secure management and maintenance Detecting vulnerabilities Using AWS Marketplace Module 4: Monitoring and Alerting Logging network traffic Logging user and Application Programming Interface (API) traffic Visibility with Amazon CloudWatch Enhancing monitoring and alerting Verifying your AWS environment Additional course details: Nexus Humans AWS Security Best Practices training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Best Practices course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.