Duration 1 Days 6 CPD hours This course is intended for The ProxySG 6.6 Diagnostics and Troubleshooting course is intended for students who wish to gain familiarity with ProxySG troubleshooting techniques and tools. Overview By the completion of this course, you will be able to:Describe the troubleshooting methodology as recommended by Symantec.Diagnose and solve a variety of access and performance issues using tools such as sysinfo files, packet captures, and policy traces. The ProxySG 6.6 Diagnostics and Troubleshooting course provides a structured approach to diagnosing and solving common troubleshooting issues related to ProxySG deployments. The course will emphasize hands-on experience, with extensive opportunities to build competency in the use of the powerful diagnostic tools available on the ProxySG. ProxySG Secure Web Gateway? Overview of Typical Troubleshooting Issues Overview of common issues related to internal resources, external dependencies, SSL interception, and policy efficiency. Introduction to how to use sysinfo files to gain useful troubleshooting information. Troubleshooting Issues Related to External Dependencies Methods for diagnosing and solving authentication issues. Methods for diagnosing and solving DNS issues. Troubleshooting SSL Interception Issues Methods for diagnosing and solving issues related to SSL interception. Troubleshooting Performance Issues Related to Policy Efficiency Methods for optimizing performance through tips for creating more efficient policies.
Duration 5 Days 30 CPD hours This course is intended for Anyone whose position requires CCSP certificationIndividuals whose responsibilities involve procuring, securing, and managing cloud environments or purchased cloud services Overview In-depth coverage of the six domains required to pass the CCSP exam:Architectural concepts and design requirementsCloud data securityCloud platform and infrastructure securityCloud application securityOperationsLegal and compliance This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the CCSP Common Body of Knowledge (CBK). You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments. You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes. Architectural Concepts and Design Requirements Cloud Data SecurityCloud Platform and Infrastucture Security Cloud Application SecurityOperations Legal and compliance
Duration 1 Days 6 CPD hours This course is intended for This course is intended for Administrator, Database Administrator, End User, Network Administrator, and Systems Administrator. Overview Upon completion of this course, students will be able to Describe and determine database security requirements, Understand Oracle security solutions to help meet security requirements, Implement basic database security, Configure network security, and Discover basic security configuration issues. This Introduction to Oracle Database Security Ed 1 training teaches you how to use Oracle Database features to help meet the security, privacy and compliance requirements of your organization. Introduction Course Objectives Course Schedule Detective Security Controls Preventive Security Controls Your Learning Aids Basic Workshop Architecture Understanding Security Requirements Fundamental Data Security Requirements Security Risks Techniques to Enforce Security Choosing Security Solutions Database Access Control: Authentication Protecting Against Database Bypass with Encryption Protecting Sensitive Data Protecting against Application Bypass Detecting Threats Compliance Implementing Basic Database Security Database Security Checklist Reducing Administrative Effort Principle of Least Privilege Objects Protection Configuring Network Security Network Access Control Listener Security Listener Usage Control Manage fine-grained access to external network services Discovering Basic Configuration Issues Accessing Enterprise Manager Security Reports Using Various Security Reports
Duration 1 Days 6 CPD hours This course is intended for Account and project managers Business liaisons Deployment engineers Managers overseeing CCE deployments Technical sales Overview After taking this course, you should be able to: Provide a high-level overview of the Cisco Contact Center portfolio List the key components within the Packaged Contact Center Enterprise (PCCE) architecture and their functions Describe how calls flow through PCCE using appropriate terms and naming conventions Introduce the tools used in the configuration, scripting, reporting and support of a PCCE deployment Identify advanced features available within the PCCE solution The Understanding Cisco Contact Center Enterprise Foundations (CCEF) v1.0 course gives you an overview of the Cisco© Packaged Contact Center Enterprise (PCCE) and Unified Contact Center Enterprise solutions. You will learn about the Cisco Contact Center Enterprise (CCE) products and explore features and functionality of the solution including major system components. Introduction to CCE Cisco Contact Center Basics Cisco Contact Center Fundamentals Functionality of PCCE Components Public Switched Telephone Network (PSTN) and Voice Gateways Cisco Unified Border Element (CUBE) Terms and Naming Conventions Used in CCE CCE Access Environment CCE Routing Configuration Access Tools Available in CCE Single Pane of Glass (SPOG) Cisco Intelligent Contact Management (ICM) Configuration Manager Discovering CCE Features Beyond Default Agent Management Agent Efficiency
Duration 1 Days 6 CPD hours This course is intended for Account and project managers Business liaisons Deployment engineers Managers overseeing CCE deployments Technical sales Overview After taking this course, you should be able to: Provide a high-level overview of the Cisco Contact Center portfolio List the key components within the Packaged Contact Center Enterprise (PCCE) architecture and their functions Describe how calls flow through PCCE using appropriate terms and naming conventions Introduce the tools used in the configuration, scripting, reporting and support of a PCCE deployment Identify advanced features available within the PCCE solution The Reporting Cisco Contact Center Enterprise (CCER) v1.0 course provides an architectural overview of the Contact Center Enterprise (CCE) Solution components and deployment models. You will learn the end-to-end reporting solutions of CCE designed to assist customers and partners in the task of creating reports and managing disparate data sources. Introduction to CCE Cisco Contact Center Basics Cisco Contact Center Fundamentals Functionality of PCCE Components Public Switched Telephone Network (PSTN) and Voice Gateways Cisco Unified Border Element (CUBE) Terms and Naming Conventions Used in CCE CCE Access Environment CCE Routing Configuration Access Tools Available in CCE Single Pane of Glass (SPOG) Cisco Intelligent Contact Management (ICM) Configuration Manager Discovering CCE Features Beyond Default Agent Management Agent Efficiency
Duration 2 Days 12 CPD hours This course is intended for Security professionals, System engineers, channel partners, service partners, and end users with at least one year of experience in implementing IT security technologies (Network, Applications, and Systems). Overview This course will enable students to configure, monitor, manage, and optimize the SonicWall Network Security firewall appliances running the new SonicOS 7 to effectively defend against limitless network and cyberthreats and implement SonicWall Boundless Cybersecurity safeguards for seamless protection. Upon completion of the course, students will be able to configure the SonicWall firewall for Secure and Remote Connectivity, Network Optimization, and Advanced Threat Protection. The SonicWall Network Security Administrator (SNSA) for SonicOS 7.0curriculum provides students the required background, knowledge, and hands-on experience to begin designing, implementing, and troubleshooting SonicWall Network Security products. SonicOS 7 is SonicWall?s brand new and most advanced security operating system and is at the core of its latest physical and virtual firewalls, including models from the TZ, NSv, NSa and NSsp Series. SonicOS 7.0 features advanced security, simplified policy management, and critical networking and management capabilities for distributed enterprises and small- to medium-sized businesses with SD-branch support. Course Outline Setting up Basic Firewall Components Unified Threat Management Secure Access Deep Packet Inspection for SSL (DPI-SSL) Content Filtering Services Application Control Scalability and Reliability SD-WAN High Availability Troubleshooting Tools
Duration 2 Days 12 CPD hours This course is intended for This is an advanced course for DBAs and technical individuals who plan, implement, and maintain Db2 11.1 databases Overview Please refer to course overview This course is designed to teach you how to:Perform advanced monitoring using the Db2 administrative views and routines in SQL queries.Manage the disk space assigned in Database Managed Storage (DMS) and Automatic Storage table spaces, including the activities of the rebalancer.Use SQL queries and Db2 commands to check the high water mark on table spaces and to monitor the rebalance operation.Utilize the REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces using database or tablespace backup images.Plan and execute the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases.Create incremental database or tablespace level backups to reduce backup processing and backup image storage requirements.Implement automatic storage management for table spaces and storage groups or enable automatic resize options for DMS managed table spaces to reduce administration requirements and complexity.Describe the various types of database memory including buffer pools, sort memory, lock memory and utility processing memory.Adjust database or Db2 instance configuration options to improve application performance or processing efficiency.Implement Db2 Self Tuning Memory management for specific database memory areas. Advanced MonitoringDb2 Table Space ManagementDb2 Database Memory ManagementDatabase rebuild supportDb2 database and tablespace relocationDb2 Incremental Backup
Duration 3 Days 18 CPD hours This course is intended for Risk managersBusiness Process OwnersBusiness Finance ManagersBusiness Risk ManagersRegulatory Compliance ManagersProject ManagementPersons responsible for information security or conformity within an organization Overview To understand the concepts, approaches, methods and techniques allowing an effective risk managementaccording to ISO 31000To understand the relationship between the risk management and the compliance with the requirements ofdifferent stakeholders of an organizationTo acquire the competence to implement, maintain and manage an ongoing risk management program accordingto ISO 31000To acquire the competence to effectively advise organizations on the best practices in risk management In this three-day intensive course participants develop the competence to master a model for implementing risk management processes throughout their organization using the ISO 31000:2009 standard as a reference framework. Day 1 Introduction to the Risk Management framework according to ISO 31000 Concepts and definitions related to Risk Management Risk Management standards, frameworks and methodologies Implementation of a Risk Management framework Understanding an organization and its context Day 2 Risk identification and assessment, risk evaluation, treatment, acceptance, communication and surveillance according to ISO 31000 Risk identification Risk analysis and risk evaluation Risk treatment Risk acceptance and residual risk management Risk communication and consultation Risk monitoring and review Day 3 Risk assessment methodologies according to ISO 31000 and Certification Exam Presentation of risk assessment methodologies Certification Exam
Duration 2 Days 12 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy a Cisco Integrated Threat Defense solution in their network environment. The primary audience for this course includes: Systems and network engineersTechnical architectsTechnical support personnelChannel partners and resellers Overview After completing this course, you should be able to: Describe the current network security landscape and the Cisco Integrated Threat Defense (ITD) solutionDescribe the key components of the ITD solution and their use in the networkConfigure the ISE for a baseline of operation in the ITD solutionConfigure the integration between the Stealthwatch and ISE platformsConfigure the integration between the Cisco Firepower and ISE platformsConfigure the integration between Cisco Firepower and AMP for Endpoints This course begins with an analysis of the current cybersecurity landscape and includes details on why networks today need an integrated threat defense architecture. You will integrate and verify proper operation of the key Cisco Integrated Threat Defense products, including Cisco Identity Services Engine (ISE), Cisco Stealthwatch©, Cisco Firepower© NGFW, and Cisco AMP for Endpoints. Verification includes the introduction of malware into the network to ensure proper identification, analysis, and quarantine. Course Outline Integrated Threat Defense Introduction Itd Products Identity Services Engine Setup Integration Of Stealthwatch With Identity Services Engine Integration Of Firepower With Identity Services Engine Integration Of Firepower With Amp For Endpoints
Duration 1 Days 6 CPD hours This course is intended for System administrators, security operations personnel including analyst and managers. Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of application control. Manage and configure the Carbon Black App Control server based on organizational requirements. Create policies to control enforcement levels and agent functionality. Implement rules to support the organization's security posture. Use the Carbon Black App Control tools to understand agent and server data. This course teaches you how to use the VMware Carbon Black© App ControlTM product and leverage the capabilities to configure and maintain the system according to their organization?s security posture and organizational policies. This course provides an in-depth, technical understanding of the Carbon Black App Control product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Login Accounts and Groups User accounts User roles Policies Modes and Enforcement Levels Rule sets Notifiers Agent side display notification use Computer Details View agent information Related views Local Approval Timed Policy Override Use case and functionality Software Approvals Methods and use cases Custom Rules Rule type and use cases Tools Meters and Alerts Events Agent and server events Baseline Drift Changes in a baseline