Duration 2 Days 12 CPD hours This course is intended for Technical professionals who support, install, deploy, or administer Check Point products in Cloud Environments. Overview Explain the nature of the cloud environment. Describe the five pillars of cloud architecture. Explain the Basics of Cloud Infrastructure. Explain the Basics of Cloud Automation. Explain Check Point Security Management and How it Applies to CloudGuard. Describe CloudGuard Security Gateway offerings. Describe Cloud Load Balancers. Explain CloudGuard Licensing. Explain the different Deployment options and architectures for CloudGuard. Explain how and why CloudGuard is automated. Describe the functions of CloudGuard that can be automated. Describe the tools used to automate CloudGuard. Explain CloudGuard Automation Requirements. Explain basic troubleshooting techniques specific to Check Point Security Management Servers and Security Gateways. Describe the steps for Troubleshooting CloudGuard Network Installation. Explain the tools and techniques used to troubleshoot CloudGuard Network Automation. Explain the need for Cloud Security Posture Management. Describe the posture management tools available in CloudGuard. Explain methods for correcting Cloud Security Posture Management issues. Learn basic concepts and develop skills necessary to administer Check Point CloudGuard security solutions Course Outline Deploy a Security Management Server in the Cloud. Install a Security Gateway Image. Create Virtual Networks. Deploy Internal and External Load Balancers Deploy a Security Gateway Using Templates. Assign Public IP Addresses to Cloud Devices Create Web Servers in the Cloud. Configure North-South Traffic Policy. Configure East-West Traffic Policy and Routes. Troubleshoot North-South Traffic Issues. Troubleshoot East-West Traffic Issues.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Technology Consultants, System AdministratorsTechnical Architects, and Support Consultants. Overview Understand and use the Monitoring and Alerting Infrastructure (MAI) for monitoring the system landscape with SAP Solution ManagerSetup and Configure the monitoring types System Monitoring, Self- Monitoring, End-user Experience, Integration Monitoring, Job & BI MonitoringUse the features of the Technical Monitoring Work CenterUse Technical Reporting options (EWA, SL Reporting, Interactive Reporting)Use the SAP Solution Manager Administration work center for Troubleshooting In this course, students learn to understand and use the Monitoring and Alerting Infrastructure (MAI) for monitoring the system landscape with SAP Solution Manager Setup and configure the monitoring types. Course Outline Get an overview about the Technical Monitoring in SAP Solution Manager 7.1 Get an overview about the Monitoring and Alerting Infrastructure (MAI) architecture Get a deep understanding about Monitoring Templates Using the Alert Inbox including Guided Procedures Configure Work Mode Management and Notification Management Configure and using System Monitoring Configure and using Interface Channel Monitoring and Connection Monitoring Configure and using End-user Experience Monitoring Configure and using BI-Monitoring and Job Monitoring Configure and using PI-Monitoring, Message Flow Monitoring and Workflow Monitoring Using Technical Reporting (EarlyWatch Alerts, Service Level Reporting, Interactive Reporting and Dashboards) Get an overview about SAP IT Infrastructure Management Get an overview about SAP Mobile Apps for the Monitoring and Alerting Infrastructure (MAI) Configure and using SAP Solution Manager Self-Monitoring and Self Diagnosis Using Monitoring and Alerting Infrastructure Analysis Tools
Duration 5 Days 30 CPD hours This course is intended for Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff Overview The Palo Alto Networks Firewall 10.2 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo Alto Networks next-generation firewalls Configure and manage Security and NAT policies to enable approved traffic to and from zones Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs Monitor network traffic using the interactive web interface and firewall reports Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud. Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud.
Duration 5 Days 30 CPD hours This course is intended for This intermediate course is appropriate for experienced UNIX system administrators who want to support AIX running on POWER processor based systems in a mult-iuser POWER (System p) partitioned environment. Overview At course completion, you will be able to:- Install the AIX operating system, filesets, and RedHat Package Manager (RPM) packages - Perform system startup and shutdown - Discuss and use system management tools such as System Management Interface Tool (SMIT) and IBM systems director console for AIX - Manage physical and logical devices - Discuss the purpose of the logical volume manager - Perform logical volume and file system management - Perform and restore system backups - Use the AIX error log as a tool in problem determination - Configure TCP/IP networking Students will learn to install, customize and administer the AIX operating system in a multi-user POWER (System p) partitioned environment. Introduction to AIX and IBM Power systems AIX system management tools AIX software installation and maintenance System configuration and devices TCP/IP networking System startup and shutdown Basics of configuring logical partitions AIX installation Working with the Logical Volume Manager File systems administration The Object Data Manager LVM metadata Disk management procedures Backup and restore Error monitoring System initialization - I System initialization - II (00:35) Exercise 17 (00:25) Unit 18: The AIX system dump facility (00:15) Exercise 18 Advanced install techniques Alternate disk installation Alternate disk - part 1 (pre-clone) Using multibos Alternate disk - part 2 (post-clone) multibos Appendix A: Survey of additional AIX facilities
Duration 1 Days 6 CPD hours Companies are increasingly integrating Mac computers into Windows or other standards-based network environments. This Mac Integration Basics course examines how to best use a Mac(s) in an organization that predominantly functions with a Microsoft Windows operating system and Windows Servers. This course is also ideal for users who need to replace a Windows computer with a Mac and for IT professionals who support Mac users Directory Services Connecting a Mac to a Directory Server Using Network Account File Sharing Connecting to File Servers Turning on Personal File Sharing Email, Contacts, and Calendars Managing Internet Accounts Preferences Connecting to an Exchange Server Connecting Mail to Non-Windows Servers Adding Accounts in Mail, Contacts, and Calendars Security Built-in Security Features Creating Strong Passwords Using Two-factor Authentication Setting a Firmware Password Locking a Mac Screen Creating User Accounts Disabling Automatic Login Protecting Start-up Disk Files Ensuring that the Apps you Download are Safe Providing Network Security Printing Connecting to a Local Printer Setting up a Wireless Printer Sharing your Printer Setting up a Printer Shared by a Mac and a PC via SMB or CIFS Setting up an IP Printer Specifying Printer Features Printing from a Network Printer Instant Messaging iMessage Jabber Configuring Messages Adding Accounts Chatting on a local network with Bonjour Moving and Backing Up Content Moving Content Backing up Data with Time Machine Running Windows on a Mac Running Windows Natively or Virtually Using Office Using Cross-platform Apps Using Cross-platform Files
Duration 1 Days 6 CPD hours This course is intended for This course is designed for managers, supervisors, team leaders, or anyone who leads meetings as part of their job and wants to learn how to become a more effective meeting facilitator. Overview Build a foundation for a successful meeting. Prepare for a meeting. Set the stage for a meeting. Facilitate a meeting. Facilitate a specialized meeting Effective facilitators know how to take charge of meetings and lead groups toward successfully completing their work objectives. In this course, you will strategically plan meetings and create formal agendas, lead groups to generate new ideas through brainstorming events, and help people work through facilitated difficult sessions. You will also further develop your facilitation skills by leading virtual meetings and even moderating international sessions. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. Lesson 1: Building a Foundation for Successful Meetings Topic A: Identify Types of Meetings Topic B: Identify Attributes of Strong Meeting Leaders Lesson 2: Preparing for a Meeting Topic A: Clarify the Purpose of the Meeting Topic B: Identify Participants Topic C: Plan Meeting Logistics Topic D: Create an Agenda Lesson 3: Setting the Stage for a Meeting Topic A: Establish a Meeting Climate Topic B: Resolve Challenging Situations Lesson 4: Facilitating a Meeting Topic A: Lead a Meeting Topic B: Make Sound Decisions Topic C: Publish Meeting Minutes Topic D: Close a Meeting Lesson 5: Facilitating Specialized Meetings Topic A: Manage a Brainstorming Session Topic B: Manage a Virtual Meeting Topic C: Manage an International Meeting
Duration 2 Days 12 CPD hours This course is intended for Implementation Consultants Key Technical Business Users involved in a GRC 12.0 project IT Governance Experts Consultants for SAP Security and GRC IT Auditors Business Project Team Leaders Overview This course will prepare you to: Introduce SAP Governance, Risk, and Compliance (GRC) 12.0 Identify key governance, risk, and compliance processes supported in the SAP GRC 12.0 solution Describe key features and business benefits of the integrated solution Identify applications that integrate with the SAP GRC 12.0 solution Describe the purpose and location of key user interface components Discuss harmonized navigation and how authorizations affect what users see Describe how common functions and relative master data are shared across the SAP GRC solutions Describe the IMG organization for GRC 12.0 Describe a general implementation process and key steps This course provides foundation knowledge for SAP Governance, Risk and Compliance (GRC) 12.0. By gaining familiarity with this solution?s harmonized navigation, common functions, shared master data, and the harmonized reporting framework, you will be better able to get the most value out of using the integrated applications in SAP GRC. Introduction to SAP Governance, Risk, and compliance (GRC) 12.0 Solution Introduction Solution Overview ? Enterprise Risk and Compliance Solution Overview ? Access Governance Solution Overview ? International Trade Management Solution Overview ? Cybersecurity Information Architecture, Security, and Authorizations Understanding the SAP Fiori Concept and Architecture Security and Authorizations The SAP GRC 12.0 User Interface Work Centers SAP Fiori Common Functions and Data User Interface Configuration Framework Shared Master Data Implementation and Configuration Streamlined Configuration Reporting Harmonized Reporting Framework SAP HANA Integration
Duration 5 Days 30 CPD hours This course is intended for This course is intended for entry-level network administrators, network support and help desk technicians. Overview Upon successful completion of this course, students will be able to build, connect and manage networks, and IP traffic routing. In this course the student will learn to install, operate, configure and secure basic and enterprise networks. Networking BasicsNetworking ModelsNetwork AddressingPacket DeliveryDevice ManagementNetwork Security BasicsAdvanced Network Security with ACLsSwitchesAdvanced Switching ConceptsRoutersAdvanced Routing ConceptsBasic Network ServicesCisco Device ManagementTroubleshooting and Data CollectionAdvanced Switch RedundancyOSPF ConfigurationEIGRP ConfigurationPPP WANsFrame Relay WANsSecure VPNs and Tunneling Additional course details: Nexus Humans Cisco Networking training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Networking course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1.5 Days 9 CPD hours This course is intended for This course is designed for WebSphere administrators who have experience with stand-alone application server environments, and want to learn about creating and managing a federated environment. Overview After completing this course, you should be able to: Describe the architectural concepts that are related to WebSphere Application Server Network Deployment Create a deployment manager instance Federate an application server to a cell Add a stand-alone application server to a WebSphere Application Server cell Cluster an application server within a WebSphere Application Server cell Configure WebSphere Application Server SSL security settings Deploy applications in clustered environments Describe the features of Intelligent Management This course teaches you the skills that are needed to administer IBM WebSphere Application Server V9 in a federated environment.This release of IBM WebSphere Application Server provides enhanced support for standards (notably Java 7 EE), emerging technology, and a choice of development frameworks.In this course, you learn how to configure and maintain IBM WebSphere Application Server V9 Network Deployment. You learn how to deploy and create a deployment manager and federate a cell. In addition, you learn how to create a cluster within the federated cell.Throughout the course, hands-on exercises and demonstrations reinforce lecture content. You gain practicalexperience with WebSphere Application Server V9 by completing tasks such as creating a deployment manager, federating a stand-alone application server, creating a custom profile, and clustering an existing application server. Course Introduction WebSphere Application Server architecture: Federated Federating a cell Exercise: Configuring the lab workstation Exercise: Creating a federated cell Workload management Exercise: Clustering and workload management WebSphere security: SSL Exercise: Configuring SSL for WebSphere Overview of Intelligent Management Course summary
Duration 4 Days 24 CPD hours This course is intended for Primary audience: IT administrators, architects, and business leaders who already manage Nutanix clusters in the datacenter, but who would like more in-depth knowledge of Nutanix datacenter administration. Anyone seeking preparation for the Nutanix Platform Professional (NPP) Advanced certification (in development).Secondary audience: Managers and technical staff seeking more detailed information before making a purchase decision. Overview Protect intellectual property and company data to guarantee business continuity with a complete, advanced data protection strategy.Practice advanced datacenter management procedures using hands on labs.Get the most out of Nutanix systems by maximizing configuration and operation for peak efficiency.Validate new skills by preparing for and completing the Nutanix Platform Professional Advanced certification. The Nutanix AAPM Advanced Administration & Performance Management course is an advanced level training program for experienced Nutanix data center administrators, technicians, and support personnel.The course features comprehensive coverage of performance management for Nutanix clusters, including options for performance optimization, troubleshooting issues and tuning. Learn through hands-on labs to monitor system performance, advanced networking and storage to help optimize data center administration.Advanced Administration explains in detail how to use the major Acropolis services such as Acropolis Block Services (ABS) and Acropolis File Services (AFS). The course also explains how to define and manage assets and applications using Calm, including how to connect to clouds, automation of the Life Cycle Management (LCM) application, and how to implement and configure Self Service Portal and governance.Take advantage of Flash mode to improve system performance as well as how to effectively clone and delete VMs, move them between storage containers, and how to manage VMs (tagging, sizing, migration). Performance ManagementManaging Controller VM ServicesAdvanced Virtual Machine AdministrationImplementing Business Continuity/Disaster RecoveryConfiguring Advanced NetworkingCustomizing Security ServicesManaging Acropolis ServicesPrism Central Management