• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

593 Technology courses in Birmingham delivered Live Online

Internal Audit Skills Diploma

By NextGen Learning

Internal Audit Skills Diploma Course Overview The "Internal Audit Skills Diploma" offers an in-depth exploration of internal audit processes and procedures, providing essential knowledge for individuals seeking to excel in auditing roles. The course covers auditing as a form of assurance, the technology used in audits, internal control, risk management, and UK-specific audit standards. Upon completion, learners will have a solid understanding of internal audit processes, report generation, and the skills necessary to pursue a career as an auditor. Course Description This comprehensive diploma course equips learners with the key skills required for a successful career in internal auditing. Topics include auditing as a form of assurance, internal audit procedures, the integration of technology in audits, and methods for evaluating internal controls and risk. In addition, the course explores how to conduct audit interviews, report findings, and understand UK internal audit standards. Learners will also gain insights into the various career paths within auditing, making this course valuable for those looking to enter or advance in the industry. Internal Audit Skills Diploma Curriculum Module 01: Auditing as a Form of Assurance Module 02: Internal Audit Procedures Module 03: Technology-based Internal Audit Module 04: Internal Control and Control Risk Module 05: Audit Interviews Module 06: Reporting Audit Outcome Module 07: UK Internal Audit Standards Module 08: Career as an Auditor (See full curriculum) Who is this course for? Individuals seeking to enter the field of internal auditing. Professionals aiming to enhance their audit knowledge and career development. Beginners with an interest in auditing or risk management. Those pursuing a career in compliance, risk, or financial sectors. Career Path Internal Auditor Risk and Compliance Officer Audit Manager Financial Auditor Internal Controls Specialist Business Consultant

Internal Audit Skills Diploma
Delivered OnlineFlexible Dates
£7.99

Cisco ASA Essentials (ASAE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students who need to know how to implement and manage Cisco ASA 5500-X. Overview Upon successful completion of this course, students should be able to do the following:? Technology and features of the Cisco ASA? Cisco ASA product family? How ASAs protect network devices from attacks? Bootstrap the security appliance? Prepare the security appliance for configuration via the Cisco Adaptive Security Device Manager (ASDM)? Launch and navigate ASDM? Essential security appliance configuration using ASDM and the command-line interface (CLI)? Configure dynamic and static address translations? Configure access policy based on ACLs? Use object groups to simplify ACL complexity and maintenance? Use the Modular Policy Framework to provide unique policies to specific data flows? Handle advanced protocols with application inspection? Troubleshoot with syslog and tcp ping? Configure the ASA to work with Cisco Secure ACS 5.2 for RADIUS-based AAA of VPNs? Implement site-to-site IPsec VPN? Implement remote access IPsec and SSL VPNs using the Cisco AnyConnect 3.0 Secure Mobility Client? Work with the 5.x Legacy Cisco IPsec VPN client and Anyconnect VPN client? Deploy clientless SSL VPN access, including smart tunnels, plug-ins, and web-type ACLs? Configure access control policies to implement your security policy across all classes of VPN? Configure Active/Standby failover for both firewall and VPN high availability Student will gain the essential skills required to configure, maintain, and operate Cisco ASA 5500-X Series Adaptive Security Appliances based on ASA Software v9.x. Cisco ASA Essentials ? Lesson 1: Evaluating Cisco ASA Technologies ? Lesson 2: Identifying Cisco ASA Families Basic Connectivity and Device Management ? Lesson 1: Preparing the Cisco ASA for Network Integration ? Lesson 2: Managing Basic Cisco ASA Network Settings ? Lesson 3: Configuring Cisco ASA Device Management Features Network Integration ? Lesson 1: Configuring Cisco ASA NAT Features ? Lesson 2: Configuring Cisco ASA Basic Access Control Features Cisco ASA Policy Control ? Lesson 1: Cisco ASA Modular Policy Framework ? Lesson 2: Configuring Cisco ASA Connection Policy Cisco ASA VPN Architecture and Common Components ? Lesson 1: Implementing Profiles, Group Policies, and User Policies ? Lesson 2: Implementing PKI Services Cisco ASA Clientless Remote Access SSL VPN Solutions ? Lesson 1: Deploying Basic Clientless VPN Solutions ? Lesson 2: Deploying Advanced Application Access for Clientless SSL VPNs Cisco AnyConnect Remote Access SSL Solutions ? Lesson 1: Deploying a Basic Cisco AnyConnect Full-Tunnel SSL VPN Solution Cisco ASA Remote Access IPsec VPNs ? Lesson 1: Deploying Cisco Remote Access VPN Clients ? Lesson 2: Deploying Basic Cisco Remote Access IPsec VPN Solutions Cisco ASA Site-to-Site IPsec VPN Solutions ? Lesson 1: Deploying Basic Site-to-Site IPsec VPNs ? Lesson 2: Deploying Advanced Site-to-Site IPsec VPNs Cisco ASA High Availability and Virtualization ? Lesson 1: Configuring Cisco ASA Active/Standby High Availability Labs Lab 1: Prepare the ASA for Administration Lab 2: Fundamental ASA Configuration Lab 3: Network Address Translation (NAT) Lab 4: Basic Access Control Lab 5: Basic Protocol Inspection Lab 6: Licensing, ACS, and Public CA Lab 7: Basic Clientless SSL VPN Lab 8: Clientless SSL VPN - Thin Apps Lab 9: Basic AnyConnect Full Tunnel SSL VPN Lab 10: Remote Access IPSec VPN Lab 11: IPSec Site-to-Site VPN Lab 12: Active/Standby Failover

Cisco ASA Essentials (ASAE)
Delivered OnlineFlexible Dates
Price on Enquiry

BW362 SAP BW on SAP HANA

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Technology Consultants Overview Enables you to implement and maintain SAP BW powered by SAP HANA.Outlines advantages of the new SAP 'In-Memory' database foundation for SAP BW.Explains HANA specific features as well as optimized existing as well as new data models and functions of SAP BW.Introduces the new SAP architecture framework of LSA++ and provides guidelines on how to convert your existing EDW-architecture into this new concept.Explains native HANA modeling and how both, HANA information views as well as BW InfoProviders, can complement each other in so-called 'mixed scenarios'. In this course, students gain the knowledge to enable themselves to implement and maintain SAP BW powered by SAP HANA. The course explains HANA specific features as well as optimized existing as well as new data models and functions of SAP BW. Getting Started SAP HANA Basics SAP BW Basics SAP HANA BW Modeling Tools SAP HANA Native Modeling Migration to SAP BW on HANA Migration Strategies and Tools SAP BW Migration Cockpit BW on HANA Data Management Multi-Temperature Data Management Optimizing BW Data Management based on Dynamic Tiering and Non- Active Concept Optimizing BW Data Management based on Nearline-Storage Optimization Areas in BW on HANA HANA-Optimized Data Modeling: InfoCubes HANA-Optimized Data Modeling: Advanced DataStore-Objects HANA-Optimized Data Modeling: CompositeProviders HANA-Optimized Data Staging HANA-Optimized Analytic Manager HANA-Optimized Analysis Processes Modeling with SAPïs Reference Architecture LSA++ Review of Layered Scalable Architecture (LSA) From LSA to LSA++: Streamline Core Layers LSA++: Open Operational Data Store Layer (Open ODS Views) LSA++: Agile Data Mart & BW Workspace Layer Hybrid Modeling in Mixed Scenarios Generation of HANA-Views of BW InfoProviders Mixed Scenarios SAP HANA Live HANA-Optimized BI Content Data Provisioning into SAP HANA and SAP BW Overview of Data Provisioning Methods to SAP HANA SLT Replication into SAP HANA SLT Replication into SAP BW Operational Data Provisioning into SAP BW DB-Connect and Open Hub Destination Additional Enhancements of BW 7.40 InfoObject Enhancements Authorization Enhancements Process Chain Monitoring HANA-Optimized BW Search HANA-Optimized BW Planning Obsolete BW Object Types Mobile Enablement Enhancements SAP HANA vs. BW Accelerator Summary & Outlook New Transactions and BW on HANA Roadmap Additional course details: Nexus Humans BW362 SAP BW on SAP HANA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BW362 SAP BW on SAP HANA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BW362 SAP BW on SAP HANA
Delivered OnlineFlexible Dates
Price on Enquiry

Certified TIA-942 Design Consultant (CTDC)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Participants must possess a valid data centre training certificate such as CDCP or any other approved equivalent. Please submit a copy of your certificate for verification upon registration for the CTDC course. Overview After completion of the course the participant will be able to:1. Learn to properly comprehend and apply the ANSI/TIA-942 Standard requirements and guidelines2. Understand the proper intent of the ANSI/TIA-942 Standard to avoid both over- and/or under-investment3. Align the selection of redundancy levels and infrastructure investments to the business requirements.4. Understand the criteria and requirements for a high-availability data centre design and how to effectively establish the data centre from the perspective of the ANSI/TIA-942 Standard5. Understand how the ANSI/TIA-942 Standard relates to various worldwide standards This course, the participant will learn how to design an ANSI/TIA-942 compliant data centre. It will provide a clear understanding of the requirements of the ANSI/TIA-942 Standard and possible implementation variations. Introduction to Data Centre Facilities About the ANSI/TIA-942 Life of the ANSI/TIA-942 Standard Relation to other standards Architectural Electrical Mechanical Telecommunication Areas under scope High level redundancy definitions Redundancy options (N, N+1 etc.) Fault tolerant Concurrent maintainability Compartmentalisation Examples of redundancy levels Data Centre Space PlanningData Centre TopologiesRecommendations for Energy EfficiencyArchitectural Site selection Parking Multi-tenant building Building construction Vapor barrier Roofing Floor loading Raised flooring Suspended/drop ceiling Hanging load Seismic Building Security & Safety Security CCTV Staffing Bullet/ballistic proofing Lighting Safety - Signage Building and Room Access Security checkpoints Entry lobby Doors and windows Exit corridors Shipping and receiving areas Room/Area Design Requirements Administrative offices Security offce Operations centre Restroom and break room UPS/Battery rooms Generator and fuel storage area Computer room Electrical Utility power - Substation - Feed requirements - Self-generation HT/HV switch gear Generator and fuel supply LT/LV switch gear - ATS - Alternatives to ATS UPS and batteries PDU STS Grounding Surge protection EPO Central power monitoring Load banks Testing Equipment maintenance - Preventive maintenance - Facility training programs Mechanical Environmental design - Temperature and humidity requirements - Contamination - Sources - Clean air - Pressurisation - Radio sources - Vibration - Water ingress Water cooled systems - Heat rejection - Chilled water system - Condenser water? - Make up water Air cooled systems HVAC control systems Plumbing - Pipe routing Fire suppression Water leak detection Telecommunications Network topology Redundancy level design Media and connectors Cabling pathways Detailed cabling design considerations Administration and labeling Cable testing Data centre fabrics Exam: Certified TIA-942 Design Consultant Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Certified TIA-942 Design Consultant (CTDC)
Delivered OnlineFlexible Dates
£2,400

AI Frontiers 2025: THE FUTURE IS NOW!

By IIL Europe Ltd

Join us online on May 15, 2025 when IIL brings together experts from Google, IBM, Microsoft, BAE Systems, and many more to break down the future. Discussions, debates and presentations will cover making AI trustworthy, its many uses, what “AI Agents” are all about, and the exciting things to come! No matter where you stand with AI – just beginning, a true believer, a critical thinker, a forward-looking innovator, or a practical user – AI Frontiers 2025 guarantees valuable takeaways for you.

AI Frontiers 2025: THE FUTURE IS NOW!
Delivered OnlineFlexible Dates
£115

Blockchain Architecture Training

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Technical Leaders Overview What is BlockchainHow does Blockchain workTypes of BlockchainsHow is Blockchain different from what we have todayWhat are use cases for BlockchainWhat does a Blockchain app look likeHow do I design a Blockchain appHow do I develop a Blockchain appHow do I test a Blockchain app This instructor-led 3 day Blockchain Architecture training is for technical leaders who need to make decisions about architecture, environment, and development platforms. What is Blockchain? A record keeping system Trust Decentralization Trustless environment How does Blockchain work? Announcements Blocks Nodes Chaining Verification Consensus Scalability Privacy Crypto Hashing Digital Fingerprinting PoW vs PoS Types of Blockchains Public vs Private Open vs closed Smart Contracts Blockchain as History Tokens / Coins Gas How is Blockchain different from what we have today? Decentralized Peer-to-peer architecture Software vs Firmware Database vs Blockchain Distributed database or other technology? Data Sovereignty Group Consensus What are Use Cases for Blockchain? Use Case Examples Currency Banking Services Voting Medical Records Supply Chain / Value Chain Content Distribution Verification of Software Updates (cars, planes, trains, etc) Law Enforcement Title and Ownership Records Social Media and Online Credibility Fractional asset ownership Cable Television billing High fault tolerance DDoS-proof Public or Private Blockchain? Who are the participants? What does a Blockchain app look like? DApp Resembles typical full stack web application Any internal state changes and all transactions are written to the blockchain Node.js IDE Public Blockchain visibility Private Blockchain solutions Oracles How do I design a Blockchain app? What does this solution need to let users do? Will the proposed solution reduce or remove the problems and pain points currently felt by users? What should this solution prevent users from doing? Do you need a solution ready for heavy use on day 1? Is your solution idea enhanced by the use of Blockchain? Does the use of Blockchain create a better end-user experience? If so, how? Has your business developed custom software solutions before? What level of support are you going to need? How big is the developer community? Does your vision of the future align with the project or platform's vision of the future? Does the platform aim to make new and significant contributions to the development space, or is it an efficiency / cost play? Should the solution be a public or private Blockchain? Should the solution be an open or closed Blockchain? Create a plan for contract updates and changes! Hybrid solutions Monetary exchanges? How do I develop a Blockchain app? AGILE approach pre-release Define guiding principles up front Software vs Firmware Announcements, not transactions! Classes, not contracts Link contracts to share functions Use calling contracts to keep contract address the same Hyperledger vs Ethereum CONSIDER No of Users * Avg No of Transactions (state changes) per User Should a Blockless solution be applied? Performance Security Anonymity Security Monolithic vs Modular Sandwich complexity model How do I test a Blockchain app? Recommend 5x to 10x traditional application testing time Security Networks

Blockchain Architecture Training
Delivered OnlineFlexible Dates
Price on Enquiry

Minute Taking Executive Training

By NextGen Learning

Minute Taking Executive Training Course Overview This Minute Taking Executive Training course equips learners with essential skills to accurately record, organise, and present meeting minutes with professionalism and clarity. Designed to enhance effectiveness in administrative and executive roles, the course covers key concepts including meeting preparation, understanding meeting structure, capturing decisions and actions, and mastering the responsibilities of a minute taker. Learners will gain confidence in their note-taking abilities and discover how to leverage technology to streamline the process. By the end of the course, participants will be capable of producing clear, concise, and well-structured minutes that support organisational efficiency and communication. Course Description This comprehensive training delves into the full scope of minute taking, starting with foundational knowledge on the importance and types of minutes. Learners explore how to prepare thoroughly before meetings and understand different meeting formats and protocols. The course covers how to accurately document discussions, decisions, and assigned actions, while also clarifying the specific duties and ethical considerations of a minute taker. Practical guidance on effective note-taking techniques and strategies for building confidence in minute-taking situations is included. Additionally, learners will examine how digital tools and technology can aid in capturing and distributing minutes efficiently. Throughout, the course emphasises professionalism and accuracy, ensuring participants develop skills that are highly valued across various industries. Minute Taking Executive Training Curriculum Module 01: Introduction to Minute Writing Module 02: Preparation for Minute Taking Module 03: The Meeting Structure Module 04: Minute Meeting, Decision and Action Module 05: Roles and Responsibility of Minute Taker Module 06: Tips for Minute Taking Module 07: Technology in Minute Taking Module 08: Building Confidence (See full curriculum) Who Is This Course For? Individuals seeking to enhance their minute-taking skills for professional settings. Professionals aiming to advance their administrative or executive support career. Beginners with an interest in administrative functions and effective communication. Office staff looking to improve meeting documentation accuracy and efficiency. Career Path Executive Assistant Administrative Officer Office Manager Project Coordinator Corporate Secretary Meeting Coordinator

Minute Taking Executive Training
Delivered OnlineFlexible Dates
£7.99

Blockchain Project Management Training

By NextGen Learning

Blockchain Project Management Training Course Overview This Blockchain Project Management Training course offers a comprehensive introduction to managing projects within the rapidly evolving blockchain and Web3 environments. It equips learners with essential knowledge of project and product management principles tailored specifically for blockchain technology. Participants will gain insights into the unique challenges and opportunities presented by Web3 projects, learning how to navigate this innovative landscape efficiently. By the end of the course, learners will be able to understand key concepts, develop management strategies, and prepare effectively for careers in the blockchain sector. This training is designed to enhance career prospects by providing relevant skills aligned with current industry demands. Course Description This course delves deeply into the fundamentals of project and product management in the context of blockchain technology and Web3. Topics include understanding the roles and responsibilities of a Web3 project manager, critical considerations when overseeing blockchain initiatives, and strategies for securing employment in the blockchain sector. Learners will explore how to manage complex, decentralised projects, balancing technical requirements with business objectives. The course delivers a structured learning experience that sharpens analytical and organisational abilities, helping participants become confident and competent in blockchain project environments. Delivered in clear UK English, this course prepares learners to contribute effectively within one of the most innovative and fast-growing industries today. Blockchain Project Management Training Curriculum Module 01: Introduction Module 02: Project / Product Management in Web Module 03: Important Things to Remember about being a Web3 PM Module 04: Getting a Job in Web3 Module 05: End Notes (See full curriculum) Who Is This Course For? Individuals seeking to understand blockchain project management fundamentals. Professionals aiming to develop a career in blockchain or Web3 project management. Beginners with an interest in blockchain technology and digital innovation. Project managers transitioning into emerging technologies and decentralised systems. Career Path Blockchain Project Manager Web3 Product Manager Digital Transformation Specialist Decentralised Application (dApp) Coordinator Blockchain Consultant

Blockchain Project Management Training
Delivered OnlineFlexible Dates
£7.99

Hybrid Vehicle Expert Training

By NextGen Learning

Hybrid Vehicle Expert Training Course Overview The Hybrid Vehicle Expert Training course provides an in-depth understanding of hybrid electric vehicles (HEVs), focusing on their design, operation, and technology. Learners will explore various types of hybrids, key components, and the degree of hybridisation, enhancing their technical knowledge for the automotive industry. This course equips participants with essential skills to analyse regenerative systems and other innovative features that improve fuel efficiency and reduce emissions. By the end of the course, learners will be confident in identifying different HEV architectures and understanding their functional principles, preparing them for roles in vehicle maintenance, engineering, and technical consultancy within the evolving green transport sector. Course Description This course offers comprehensive coverage of hybrid vehicle technology, beginning with an introduction to hybrid electric vehicles and their classifications. It delves into the degree of hybridisation, explaining how various systems operate to optimise energy use. Detailed study of HEV components provides insight into powertrains, batteries, and control systems. The course also covers regenerative braking and energy recovery technologies that enhance vehicle efficiency. Learners will gain analytical skills required to evaluate hybrid systems and keep pace with developments in sustainable automotive design. The structured learning experience combines theory and technical knowledge, suitable for those aiming to build expertise in green vehicle technologies and contribute to environmental sustainability within the automotive sector. Hybrid Vehicle Expert Training Curriculum: Module 01: Introduction Module 02: Types of Hybrid Electric Vehicles Module 03: Degree of Hybridisation Module 04: Components of HEVs Module 05: Regenerative Systems (See full curriculum) Who is this course for? Individuals seeking to develop expertise in hybrid vehicle technology. Professionals aiming to advance their careers in the automotive or green transport sectors. Beginners with an interest in sustainable automotive technologies. Technicians and engineers preparing for roles in vehicle systems analysis and maintenance. Career Path Hybrid Vehicle Technician Automotive Engineer specialising in green technologies Vehicle Systems Analyst Technical Consultant for sustainable transport solutions Research and Development Specialist in automotive innovation

Hybrid Vehicle Expert Training
Delivered OnlineFlexible Dates
£7.99

Cisco Securing the Web with Cisco Web Security Applicance v3.0 (SWSA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting This course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA). Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface

Cisco Securing the Web with Cisco Web Security Applicance v3.0 (SWSA)
Delivered OnlineFlexible Dates
Price on Enquiry