• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

594 Technology courses delivered Live Online

Cisco Securing Networks with Cisco Firepower Next Generation Firewall v1.0 (SSNGFW)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security administrators Security consultants Network administrators System engineers Technical support personnel Cisco integrators and partners Overview After taking this course, you should be able to: Describe key concepts of NGIPS and NGFW technology and the Cisco Firepower Threat Defense system, and identify deployment scenarios Perform initial Cisco Firepower Threat Defense device configuration and setup tasks Describe how to manage traffic and implement Quality of Service (QoS) using Cisco Firepower Threat Defense Describe how to implement NAT by using Cisco Firepower Threat Defense Perform an initial network discovery, using Cisco Firepower to identify hosts, applications, and services Describe the behavior, usage, and implementation procedure for access control policies Describe the concepts and procedures for implementing security intelligence features This course gives you knowledge and skills to use and configure Cisco© Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and Secure Sockets Layer (SSL) decryption before moving on to detailed analysis, system administration, and troubleshooting. Cisco Firepower Threat Defense Overview Examining Firewall and IPS Technology Firepower Threat Defense Features and Components Examining Firepower Platforms Examining Firepower Threat Defense Licensing Cisco Firepower Implementation Use Cases Cisco Firepower NGFW Device Configuration Firepower Threat Defense Device Registration FXOS and Firepower Device Manager Initial Device Setup Managing NGFW Devices Examining Firepower Management Center Policies Examining Objects Examining System Configuration and Health Monitoring Device Management Examining Firepower High Availability Configuring High Availability Cisco ASA to Firepower Migration Migrating from Cisco ASA to Firepower Threat Defense Cisco Firepower NGFW Traffic Control Firepower Threat Defense Packet Processing Implementing QoS Bypassing Traffic Cisco Firepower NGFW Address Translation NAT Basics Implementing NAT NAT Rule Examples Implementing NAT Cisco Firepower Discovery Examining Network Discovery Configuring Network Discovery Implementing Access Control Policies Examining Access Control Policies Examining Access Control Policy Rules and Default Action Implementing Further Inspection Examining Connection Events Access Control Policy Advanced Settings Access Control Policy Considerations Implementing an Access Control Policy Security Intelligence Examining Security Intelligence Examining Security Intelligence Objects Security Intelligence Deployment and Logging Implementing Security Intelligence File Control and Advanced Malware Protection Examining Malware and File Policy Examining Advanced Malware Protection Next-Generation Intrusion Prevention Systems Examining Intrusion Prevention and Snort Rules Examining Variables and Variable Sets Examining Intrusion Policies Site-to-Site VPN Examining IPsec Site-to-Site VPN Configuration Site-to-Site VPN Troubleshooting Implementing Site-to-Site VPN Remote-Access VPN Examining Remote-Access VPN Examining Public-Key Cryptography and Certificates Examining Certificate Enrollment Remote-Access VPN Configuration Implementing Remote-Access VPN SSL Decryption Examining SSL Decryption Configuring SSL Policies SSL Decryption Best Practices and Monitoring Detailed Analysis Techniques Examining Event Analysis Examining Event Types Examining Contextual Data Examining Analysis Tools Threat Analysis System Administration Managing Updates Examining User Account Management Features Configuring User Accounts System Administration Cisco Firepower Troubleshooting Examining Common Misconfigurations Examining Troubleshooting Commands Firepower Troubleshooting

Cisco Securing Networks with Cisco Firepower Next Generation Firewall v1.0 (SSNGFW)
Delivered OnlineFlexible Dates
Price on Enquiry

Teacher Training for ECTs & Student Teachers - Online Tuition

5.0(8)

By GLA Tutors Home or Online

A pioneering provider of independent mentoring services  For adults who are training to be teachers and Early Career Teachers (ECTs), our mission is to support and empower aspiring educators as they navigate their journey towards becoming skilled and confident professionals in the teaching profession. As a mentorship program tailored specifically for adults pursuing a teaching career, we understand the unique challenges and expectations placed upon trainees in the profession. We are committed to providing comprehensive and personalised support to help trainees meet the teaching standards set by the Department for Education in England. The teaching standards and expectations in England Our experienced mentors are well-versed in the teaching standards and expectations in England. We provide guidance and practical assistance to trainees in areas such as lesson planning, classroom management, assessment strategies, and creating inclusive learning environments. Our aim is to help trainees develop a deep understanding of the curriculum, pedagogical approaches, and effective teaching techniques. Planning Planning is a crucial aspect of a teacher's role, and we offer specialised support to trainees in this area. Our mentors work closely with trainees to develop effective lesson plans that align with curriculum requirements and engage students in meaningful learning experiences. We provide guidance on designing differentiated instruction to meet the diverse needs of students, fostering a supportive and inclusive classroom environment. Confidence Confidence is essential for success in the teaching profession, and we are dedicated to helping trainees build their self-assurance. Our mentors provide individualised coaching and feedback, helping trainees develop their teaching skills, classroom presence, communication abilities, and interpersonal skills with other staff. We create a safe and supportive environment where trainees can explore their strengths, identify areas for growth, and gain the confidence needed to deliver impactful lessons and engage with students and the wider school community effectively. High quality resources In addition to planning and confidence-building, GLA Tutorsoffers a range of other support services to trainees. We provide resources and guidance on effective behavior management strategies, assessment and feedback techniques, and effective use of technology in the classroom. Our mentors also offer guidance on professional development opportunities, helping trainees stay updated with the latest educational research and best practices in teaching. A collaborative and ongoing process At GLA Tutors, we believe that mentorship is a collaborative and ongoing process. Our mentors build strong relationships with trainees, offering ongoing support, guidance, and encouragement throughout their training and early career stages. We understand the challenges and triumphs that trainees may encounter, and we are dedicated to helping them navigate their journey towards becoming successful and impactful teachers. ChooseGLA Tutorsas your trusted partner in your teaching journey. With our experienced mentors, personalised support, and comprehensive resources, we are committed to helping you meet the teaching standards, develop as a confident educator, and make a positive impact in the lives of your students.  Invest in your future as a teacher and join us at GLA Tutors today.

Teacher Training for ECTs & Student Teachers - Online Tuition
Delivered OnlineFlexible Dates
£40

TITEE

By justme

TITEE
Delivered OnlineFlexible Dates
£777

Designing conversations with AI: a guide for UX professionals

5.0(5)

By UX Academy

Artificial Intelligence brings exciting new opportunities to the field of Conversational User Interfaces (CUI). Learn key concepts and proven design methods to deliver cutting-edge experiences and reach better business outcomes. Silvia Podesta is a Designer in the Client Engineering Team at IBM Nordics. She leverages design thinking, service and UX design to help clients identify opportunities for innovation and pioneer transformational experiences through IBM technology.

Designing conversations with AI: a guide for UX professionals
Delivered OnlineFlexible Dates
FREE

Certified Kanban System Design – KMP I - 17-19 December

By Tom Reynolds

Attend our world class Kanban University accredited Certified Kanban System Design training course and learn to implement Kanban in your company

Certified Kanban System Design – KMP I - 17-19 December
Delivered OnlineFlexible Dates
£1,074 to £1,194

Certified Kanban System Design – KMP I - 24-26 September

By Tom Reynolds

Attend our world class Kanban University accredited Certified Kanban System Design training course and learn to implement Kanban in your company

Certified Kanban System Design – KMP I - 24-26 September
Delivered OnlineFlexible Dates
£1,074 to £1,194

Certified Kanban System Design – KMP I - 19-21 November

By Tom Reynolds

Attend our world class Kanban University accredited Certified Kanban System Design training course and learn to implement Kanban in your company

Certified Kanban System Design – KMP I - 19-21 November
Delivered OnlineFlexible Dates
£1,074 to £1,194

AI Coaching for Executives: Empowering Leaders in the Age of Generative AI

By AECS

Executive AI Coaching: Boost Your Leadership with Generative AI Unlock the power of AI for your business with personalised executive coaching. Paul Addicott-Evans, founder of AECS, offers bespoke 1-on-1 sessions to transform leaders into AI champions. Enhance productivity, drive innovation, and stay ahead in the AI revolution. 20+ years of tech and business expertise. Tailored for C-suite, senior leaders, and entrepreneurs. Elevate your leadership—master generative AI today!

AI Coaching for Executives: Empowering Leaders in the Age of Generative AI
Delivered OnlineFlexible Dates
FREE to £799

Introduction to Cloud Computing

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for business and IT managers who may need to consider or work within a cloud computing environment. Overview Upon successful completion of this course, students will be able to: - identify the pros and cons of the cloud computing technology and determine its impact on businesses.- differentiate the currently-available cloud services.- differentiate cloud categories and adoption measures.- identify risks involved and risk mitigation measures in cloud computing. In this course, students will define cloud computing technology and describe its impact on IT scenario. Introducing Cloud Computing Impact of the Cloud on Businesses Cloud Computing?An Overview Cloud Components Differentiating Cloud Services Infrastructure as a Service (IaaS)?An Overview Platform as a Service (PaaS)?An Overview Software as a Service (SaaS)?An Overview Integrating Cloud Services Categories of Cloud Deployment Models Migration to the Cloud Identifying Risks and Risk Mitigation Measures Cloud Computing Risks Cloud Computing Risk Mitigation Measures Additional course details: Nexus Humans Introduction to Cloud Computing training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Cloud Computing course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to Cloud Computing
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Digital Learning Security

By Nexus Human

Duration 69 Days 414 CPD hours Cisco Learning Library: Security offers a subscription to all Cisco online cybersecurity and cyber operations training, including extensive sk This comprehensive technical training library offers full-length, interactive certification courses, product and technology training with labs, and thousands of reference materials. Security Library Certification Courses CCNP Security Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) v1.0 Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS) v4.0 Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 Securing Email with Cisco Email Security Appliance (SESA) v3.0 Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 Implementing Secure Solutions with Virtual Private Networks (SVPN) v1.0 Implementing Automation for Cisco Security Solutions (SAUI) v1.0 CCIE Security Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 Product and Technology Training Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 Implementing Automation for Cisco Security Solutions (SAUI) v1.0 Understanding Cisco Cybersecurity Fundamentals (SECFND) v1.0 Implementing Cisco Cybersecurity Operations (SECOPS) v1.0 Implementing Secure Solutions with Virtual Private Networks (SVPN) v1.0 Implementing an Integrated Threat Defense Solution (SECUR201) v1.0 Integrated Threat Defense Investigation and Mitigation (SECUR202) v1.0 Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.0 Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) v1.0 Securing Email with Cisco Email Security Appliance (SESA) v3.0 Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS) v4.0 Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v2.0 Securing Industrial IoT Networks with Cisco Technologies (ISECIN) v1.0 Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v5.0 Introducing Cisco Cloud Consumer Security (SECICC) v1.0 Securing Cloud Deployments with Cisco Technologies (SECCLD) v1.0 Configuring Cisco ISE Essentials for SD-Access (ISESDA) v1.0 Securing Branch Internet and Cloud Access with Cisco SD-WAN (A-SDW-BRSEC)

Cisco Digital Learning Security
Delivered OnlineFlexible Dates
Price on Enquiry