Duration 5 Days 30 CPD hours This course is intended for Data center systems engineers Field engineers Architects Cisco partners using Cisco Nexus Series switch platforms Overview After taking this course, you should be able to: Describe the platforms that make the Cisco Nexus 9000, 7000, 3000, and 2000 product families Describe Cisco Nexus platform implementations Explain Cisco Nexus platform management Describe Port Channels and Virtual Port Channels Configure First Hop Redundancy protocols Configure security features of Cisco Nexus devices Describe the Cisco Nexus devices routing and forwarding Describe Virtual Extensible LAN (VXLAN) Describe Quality of Service (QoS) on Cisco Nexus Devices Explain system management and monitoring processes Describe Cisco NX-OS programmability Describe Cisco Nexus storage services Configure device aliases and zoning Configure FCoE Configure NPIV and NPV modes The Implementing Cisco NX-OS Switches and Fabrics in the Data Center (DCNX) v1.0 course gives you a detailed understanding of the CiscoNexus switch platform and teach you how to install, configure, and manage Cisco Nexusswitch platforms in a scalable, highly available environment. Through a combination of lectures and hands-on labs, you will learn how to describe various aspects of the Cisco Nexus product families and platforms, including implementation, management, security, programmability and storage. Additionally, you will learn how to configure device aliases and zoning, Fibre Channel over Ethernet (FCoE), and N-Port Identifier Virtualization (NPIV), and N-Port Virtualization (NPV) modes. Course Outline Describing Cisco Nexus Series Switches Describing Cisco Nexus Platforms Implementation Describing Cisco Nexus Platforms Management Describing Port Channels and Virtual Port Channels Configuring First Hop Redundancy Protocols Configuring Cisco Nexus Security Features Describing Cisco NX-OS Routing and Forwarding Describing Virtual Extensible LAN Describing QoS on Cisco Nexus Devices Configuring System Management and Monitoring Describing Cisco NX-OS Programmability Describing Cisco Nexus Storage Services Configuring Fibre Channel Over Ethernet Describing Device Aliases and Zoning Configuring NPIV and NPV Modes
Duration 2 Days 12 CPD hours This course is intended for Security professionals, System engineers, channel partners, service partners, and end users with 1+ years of experience in implementing IT security technologies (Network, Applications, and Systems) and are also SNSAcertified. Overview The students will learn how to monitor, investigate, analyze, and configure SonicWall Next-Gen firewalls running SonicOS to enable advanced functionality related to Secure and Remote Connectivity, Network Optimization, and Threat Prevention. Upon successful completion of the SNSP program, the students will be able to demonstrate SonicWall product expertise and the application skill sets required to mount a proactive, effective defense against current and evolving network and cyber security threats. A key issue affecting an organization?s business productivity and employee efficiency today is its ability to respond to dynamic changes in the cyber threat landscape. Coming up on the heels of the highly successful SNSA program launched earlier this year, SonicWall now presents the SonicWall Network Security Professional (SNSP) course, an expert-level training and certification program that builds on the enterprise security skills learned in the SNSA course. Previously known as the Network Security Advance Administration (NSAA) course, the revamped SNSP curriculum expands on the topics covered in SNSA and features advanced SonicWall firewall configuration and administration tasks aimed at helping enterprises adapt to dynamic security environments. Relevant changes to the curriculum include an enhanced and deeper scope of SonicOS 6.5.x features and functionality, as well as changes in the learning and delivery methodologies to better balance the professional needs of the students and the business requirements for network and cyber security. Course Outline Course Introduction and Overview Configuring VPN Auto Provisioning Configuring Advanced Routing Configuring Advanced Interface Settings Using SonicOS CLI Configuring Capture Client Capturing and Replaying Packets Configuring DPI-SSL/TLS Server Configuring DPI-SSH Configuring App Rules Configuring App Control Configuring Advanced High Availability Excluding Trusted Content Resolving and Reporting False Positives Configuring Content Filtering Implementing Best Practices
Duration 2 Days 12 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy a Cisco Integrated Threat Defense solution in their network environment. Cisco integrators and partners Systems and network engineers Technical architects Technical support personnel Overview After taking this course, you should be able to: Understand the network security landscape and the Cisco Integrated Threat Defense (ITD) solutions Describe the key components of the ITD solution and their use in the network Configure the Cisco Identity Services Engine (ISE) for a baseline of operation in the ITD solution Configure the integration between the Cisco Stealthwatch and Cisco ISE platforms Configure the integration between the Cisco Firepower and ISE platforms Configure the integration between Cisco Firepower and Cisco Advanced Malware Protection (AMP) for Endpoints The Implementing an Integrated Threat Defense Solution (SECUR201) v1.2 course provides an analysis of the cybersecurity landscape with an emphasis on the importance of an integrated threat defense architecture. Through a combination of lessons and hands-on practice, you will learn to deploy and integrate Cisco©?s Integrated Threat Defense solutions which include: Cisco Identity Services Engine (ISE), Cisco Stealthwatch, Cisco Firepower NGFW, and Cisco AMP for Endpoints. This course provides you with the knowledge and skills to implement and integrate solution components with existing network services, integrate solution components with the pxGrid (Platform Exchange Grid) framework, integrate network and endpoint-based malware protection, and observation of security dataflow after the introduction of malware. Course Outline Integrated Threat Defense Introduction ITD Products Identity Services Engine Setup Integration of Stealthwatch with Identity Services Engine Integration of Firepower with Identity Services Engine Integration of Firepower with AMP for Endpoints Lab outline Connecting to the Lab Environment Integrating ISE and Active Directory Integrating ISE and Cisco Adaptive Security Appliance (ASA) Configuring pxGrid and Client Certificates Integrating Stealthwatch with Identity Services Engine Integrating Network Visibility Module (NVM) with AnyConnect Integrating Firepower with Identity Services Engine Integrating AMP for Endpoints with Firepower
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Administrator, Database Administrator, Network Administrator, Systems Administrator. Overview Upon successful completion of this course, students will be able to Configure and use Transparent Data Encryption, Understand and use Oracle Key Vault, Understand Oracle Data Redaction, Understand and use Oracle Data Masking and Subsetting, Understand security risks and identify appropriate Oracle solutions, Configure general authentication and authorization, Understand and implement Global Users, Set up and maintain a simple wallet, Install and use Oracle Database Vault, and Configure and use Transparent Sensitive Data Protection. In the Oracle Database Security: Preventive Controls course, students learn how they can use Oracle Database Security products and technologies to meet the security, privacy and compliance requirements of their organization. In the Oracle Database Security: Preventive Controls course, students learn how they can use Oracle Database Security products and technologies to meet the security, privacy and compliance requirements of their organization. Additional course details: Nexus Humans Oracle Database Security - Preventive Controls training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database Security - Preventive Controls course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Security administrators Security consultants Network administrators Systems engineers Technical support personnel Cisco integrators, resellers, and partners Overview Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection· Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations This course shows you how to deploy and use Cisco AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. Course Outline Introducing Cisco AMP Technologies Introducing AMP for Endpoints Overview and Architecture Navigating the Console Interface Using Cisco AMP for Endpoints Identifying Attacks Analyzing Malware Managing Outbreak Control Creating Endpoint Policies Working with AMP for Endpoint Groups Using Orbital for Endpoint Visibility Introducing AMP REST API Navigating Accounts
The Introduction To Ethical Hacking Mini Bundle is designed for curious minds who’d rather learn how systems break than sit through another vague tutorial about “cyber”. With modules on Cyber Security, GDPR, IT, Website Development, and Network Engineering, this bundle brings structure to the world of security—with zero cloak-and-dagger nonsense. Whether you're intrigued by how websites are built or how hackers slip through network gaps, this is a focused way to understand the building blocks. It’s straightforward, self-paced, and built for people who like clarity over chaos. The Introduction To Ethical Hacking Mini Bundle offers digital insights—minus the Hollywood soundtrack. Learning Outcomes: Understand key cyber threats and security methods across systems. Learn how GDPR relates to digital and online environments. Explore basic IT functions and digital system components. Gain insight into simple website structure and coding. Examine network design and fundamental communication protocols. Improve digital awareness for safe and smart browsing. Who is this Course For: Beginners interested in ethical hacking and system security. Students learning about data privacy and online systems. Tech-savvy individuals wanting basic network knowledge. Office workers handling digital and GDPR-sensitive material. Web enthusiasts curious about how websites are structured. Entry-level support staff in digital or IT departments. People exploring cyber safety as a new topic. Anyone who suspects “password123” isn’t a solid choice. Career Path: Cyber Security Assistant – £27,500/year IT Helpdesk Analyst – £26,000/year Junior Network Technician – £28,000/year Data Privacy Assistant – £25,500/year Website Administrator – £29,000/year Security Operations Support – £30,000/year
Learn about automated software testing with Python, BDD, Selenium WebDriver, and Postman, focusing on web applications
Ideal for beginners, the Complete Java Developer Course: From Beginner to Master is designed to get you coding in Java as quickly and confidently as possible. You will learn all the theory behind the code, while also building some exciting portfolio projects such as Mad Libs clone, tic-tac-toe, and more.
Description: Pet care can be a difficult job if you are not passionate about pets. Most of the people in this industry are pet lovers themselves. There are a lot of opportunities to have a career in pet care, as long as you have the right knowledge and skills in pet care then you are good to go. Educate yourself in this pet care skills course to learn about pet care and pet health problems. This course includes lessons in (1) pet care basics; (2) pet choosing; (3) taking care of cats; (4) taking care of dogs; and (5) making pet food. Learn a lot without sacrificing so much time by enrolling in this course. Who is the course for? Animal Health Care employees or professionals who want to improve themselves. Dog owners and lovers who want to learn how to train their dogs Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam, you will have the opportunity to test your proficiency with a mock exam. Certification: After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hard copy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognised accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path: The Pet Care Skills Course is perfect for those animal health professionals like: Animal Breeder Animal Groomer Animal Handler Veterinary Doctor Veterinary Technician. Basics Various breeds of cats 00:30:00 Safety is most important for your pet 00:15:00 What kind of food will you choose for your pets? 00:15:00 Your cat's bath - what do you need to do 00:15:00 Toys - your cat's best friends or foes? 00:20:00 Tips to train your cats 00:20:00 Preventing your pet from high temperature in warm hot months 00:20:00 How to care for your diabetic cat 00:30:00 Understanding cat fights- Can you avoid them? 00:15:00 Is your cat not using litter box- Find out why 00:15:00 Conclusion 00:15:00 Choosing Your Pet Small Mammal Basics 00:30:00 Research The Type Of Small Mammal You Want 00:30:00 Determine The Pet Which Will Be The Best Fit To Your Family 00:30:00 Consider Other Pets In The House 00:30:00 Consider Your Budget And Resources 00:30:00 The Dangers Of Choosing The Wrong Small Mammal 00:15:00 Wrapping Up 00:15:00 Taking Care of Cat Introduction 00:15:00 Popular Cat Breeds 01:00:00 Choosing a Cat 00:15:00 Tips for Dealing with a New Kitten 01:00:00 Cat Supplies 00:30:00 Cat Food and Feeding Tips 00:30:00 The Health of Your Feline 01:00:00 The Basics of Grooming 01:00:00 Traveling With Your Feline Companion 01:00:00 Behaviors That Many Cats Share 00:30:00 Disciplining Your Cat 00:30:00 Cat Organizations 00:15:00 Cat Glossary 00:15:00 Taking Care of Dog Understanding the appropriate food ingredients 00:30:00 Dogs need different diets at different ages 00:15:00 Vitamin and mineral supplements 00:15:00 Boredom and variety 00:15:00 Cost of feeds 00:15:00 Dry vs. Canned food 00:15:00 Homemade diets 00:15:00 Food allergies 00:30:00 How much should I feed my dog? 00:30:00 How often should I feed my dog? 00:30:00 Signs of ill health 00:30:00 Heart worm, fleas and other parasites 00:30:00 Heartworm prevention 00:15:00 Common questions about heartworm 00:30:00 Fleas and other parasites 00:30:00 Do parasites cause 'Scooting'? 00:15:00 Preventing dental disease 00:30:00 Home dental care 00:30:00 Veterinary dental treatments 00:30:00 The importance of the physical examination 00:30:00 Why are regular check-ups important? 00:15:00 What happens during an examination? 00:30:00 How often should my pet be examined? 00:15:00 How to administer medicine 00:30:00 Nursing a sick dog 00:30:00 Vaccinations 00:30:00 Common questions about vaccinations 00:30:00 Spaying and neutering 00:30:00 Spaying of the Female dog 00:30:00 Surgical neutering of the male dog 00:30:00 Pet health insurance 00:30:00 Clipping a dog 00:15:00 First steps in grooming 00:30:00 Bathing a dog 00:30:00 Pet Identification 00:30:00 Making Pet Food Homemade Pet Food - Why it is so beneficial 01:00:00 Making Pet Food for First Time - What Precautions to Take 01:00:00 Natural Pet Food Making Techniques 01:00:00 Home made Pet Food for Dogs 01:00:00 Homemade Pet Food for Cat 01:00:00 Making Homemade Dry Pet Food 01:00:00 Great Way to Save Money Spent on Pet Food 01:00:00 What Kind of Food Animals Love 00:30:00 Nutrients to Supply Pets with Food Made at Homes 01:00:00 Tips to Make Excellent Quality Food 00:30:00 Conclusion 00:15:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00