Welcome to a complete and in-depth JavaScript course. This is an all-in-one package that will take you from the very fundamentals of JavaScript, all the way to building a fully functional typing test app. You will learn modern JavaScript from the very beginning, step-by-step through practical and fun code examples, with the important theory about how JavaScript works behind the scenes.
Overview The Level 3 Certificate in Assessing Vocational Achievement (RQF) is intended to help you acquire an RQF Assessing Vocational Achievement certificate. You will learn the principles and practices that support assessment, which will be shown by a written account proving your knowledge and comprehension, as well as the completion of a workbook that demonstrates research into assessment practice and associated legal requirements. You will also have the ability to conduct performance evaluations in an individual's work setting. You'll also learn how to evaluate your performance in terms of occupational skills, knowledge, and understanding in settings other than the workplace. This might take place in workshops, classrooms, or other training settings. So buckle up and sign up now! Benefits you will gain: Top-notch e-learning materials Modules availability 24/7 An easy-to-use online learning platform Flexible learning hours Level 3 Certificate in Assessing Vocational Achievement (RQF) (Regulated qualification) Exquisite customer service Qualification Focus Awards Level 3 Certificate in Assessing Vocational Achievement (RQF). Description Learners must complete all 3 mandatory units to achieve a total credit of 15In this course, you will: Understand the principles and requirements of assessment. Learn more about different types of assessment methods, manage information, make assessment decisions, and assure quality. Maintain legal and good practice requirements when assessing occupational competence. Plan the assessment of occupational competence. Be able to prepare and carry out assessments of vocational skills, knowledge and understanding. Qualification Purpose This comprehensive Level 3 Certificate in Assessing Vocational Achievement (RQF) course is designed to help students master the knowledge and skills they'll need to effectively assess occupational competence in the workplace and outside the workplace. Who is this course for? The Level 3 Certificate in Assessing Vocational Achievement (RQF) course is for individuals wanting to serve as fully qualified assessors in the educational sector. Individuals who wish to achieve a sought-after assessment certificate will benefit from its excellent training. Entry Requirements There are no specific entry requirements for this qualification. This qualification is accredited for learners who are at least 19 years old or older. Progression Learners wishing to progress from this qualification can undertake the following qualifications: Focus Awards Level 3 Award in Assessing Competence in the Work Environment Focus Awards Level 4 in Understanding the Internal Quality Assurance of Assessment Processes and Practices Focus Awards Level 4 in the Internal Quality Assurance of Assessment Processes and Practices Focus Awards Level 4 Certificate in Leading the Internal Quality Assurance of Assessment Processes and Practices Total Qualification Time Total Qualification Time consists of GLH and an estimate of the number of hours a learner is likely to spend in preparation, study or any other learning, including assessment, which takes place as directed by but not under the supervision of a lecturer, supervisor or tutor.Total Qualification Time for this qualification is 234 hours.Guided Learning HoursThese hours are made up of all contact time, guidance, or supervision of a learner by a lecturer, supervisor, tutor, trainer, or other appropriate education or training providers. Guided Learning Hours for this qualification are 84. Method of Assessment: The Level 3 Certificate in Assessing Vocational Achievement (RQF) is internally assessed and externally assured by Focus Awards. Each learner is required to create a portfolio of evidence that demonstrates the achievement of all the learning outcomes and the assessment criteria associated with each unit. The main pieces of evidence for the portfolio could include: Assessor observation - completed observational checklists on related action plans Witness testimony Learner product Worksheets Assignments / projects / reports Record of oral and written questioning Learner and peer reports Recognition of prior learning (RPL) Evidence may be drawn from actual or simulated situations where appropriate and permitted by the relevant Sector Skills Council or Sector Skills Body. Career path After receiving the Level 3 Certificate in Assessing Vocational Achievement (RQF) certification, you would be eligible to function as a competent professional as: Assessor Professional Trainer Coach Professional Verifier Course Curriculum 32 sections • 89 lectures • 00:40:00 total length •Induction Form: 00:00:00 •Registration Entry Form: 00:00:00 •Unit 1 Understanding The Principles And Practices Of Assessment Guidance For Achieving The Unit: 00:00:00 •Unit 2 Assess Occupational Competence In The Work Environment Guidance For Achieving The Unit: 00:00:00 •Unit 3 Assess Vocational Skills, Knowledge And Understanding Guidance For Achieving The Unit: 00:00:00 •Assessment Guidelines: 00:00:00 •1. Functions of Assessment in Learning and Development: 00:00:00 •2. Key Concepts and Principles of Assessment: 00:00:00 •3. Responsibilities of an Assessor: 00:00:00 •4. Regulations and Requirements Relevant to the Assessment: 00:00:00 •1. Strengths and Limitations of Various Assessment Methods: 00:00:00 •1. Key Factors to Consider When Planning Assessment: 00:00:00 •2. Benefits of Using A Holistic Approach to Assessment: 00:00:00 •3. How to Plan A Holistic Approach to Assessment: 00:00:00 •4. Types of Risks Involved in Assessment: 00:00:00 •5. How to Minimise Risks Through the Planning Process: 00:00:00 •1. Importance of Involving Learner and Others in The Assessment Process: 00:00:00 •2. Information That Should Be Made Available to Learners and Others: 00:00:00 •3. How to Use Peer and Self-Assessment Effectively: 00:00:00 •4. Assessment Arrangements to Meet the Needs of Individual Learners: 00:00:00 •1. Assessment Decisions and Judging Evidence: 00:00:00 •1. Importance of Quality Assurance in The Assessment Process: 00:00:00 •2. Quality Assurance and Standardisation Procedures: 00:00:00 •3. Appeals, Complaints & Disputes Procedures Concerning Assessment in Own Area of Practice: 00:00:00 •1. Importance of Following Procedures for The Management of Information Relating to Assessment: 00:00:00 •2. How Feedback and Questioning Contribute to the Assessment Process: 00:00:00 •1. Legal Issues, Policies and Procedures Relevant to Assessment: 00:00:00 •2. Contribution of Technology in the Assessment Process: 00:00:00 •3. Evaluation of Requirements for Equality, Diversity: 00:00:00 •4. Reflective Practice and Continual Professional Development: 00:00:00 •1. Assessment Planning of Occupational Competence: 00:00:00 •2. Communicating the Process of Assessing Occupational Competence to The Learner: 00:00:00 •3. Planning the Assessment of Occupational Competence to Address Learner Needs and Current Achievements: 00:00:00 •4. Opportunities for Holistic Assessment: 00:00:00 •1. Valid, Fair and Reliable Assessment Method: 00:00:00 •2. Making Assessment Decisions of Occupational Competence: 00:00:00 •3. Following Standardisation Procedures: 00:00:00 •4. Providing Feedback to Learners: 00:00:00 •1. Maintaining Records of the Related Information of the Assessment of Occupational Competence: 00:00:00 •2. Sharing Assessment Information with Authorised Colleagues and Procedures to Maintain the Confidentiality: 00:00:00 •1. Relevant Policies, Procedures and Legislation for the Assessment of Occupational Competence: 00:00:00 •2. Application of Requirements for Equality and Diversity and Bilingualism in Assessing Occupational Competence: 00:00:00 •3. Evaluation of Own Work in Carrying Out Assessments: 00:00:00 •4. Maintaining the Currency of Own Expertise and Competence: 00:00:00 •1. Methods of Assessing Vocational Skills, Knowledge and Understanding to Meet Requirements and Needs: 00:00:00 •2. Preparing Resources and Conditions for The Assessment: 00:00:00 •3. Communicating the Purpose, Requirements and Processes of Assessment to Learners: 00:00:00 •1. Assessment Management to Meet Assessment Requirements: 00:00:00 •2. Providing Support to Learners Within Agreed Limitations: 00:00:00 •3. Analysing Evidence of Learner Achievement: 00:00:00 •4. Making Assessment Decisions Related to Vocational Skills, Knowledge and Understanding: 00:00:00 •5. Standardisation Procedures: 00:00:00 •6. Feedback on Learners' Achievement: 00:00:00 •1. Maintaining Records of Assessment, Its Outcome and Learners Progress: 00:00:00 •2. Making Assessment Information Available to Authorised Colleagues as Required and Maintaining Confidentiality: 00:00:00 •1. Relevant Policies, Procedures and Legislation Relating to The Assessment of Vocational Skills, Knowledge and Understanding: 00:00:00 •2. Applying Requirements for Equality and Diversity and Bilingualism: 00:00:00 •3. Evaluation and CPD: 00:00:00 •Equality and Diversity - Glossary of Terms: 00:00:00 •Equality and Diversity, and The Equality Act 2010: 00:00:00 •Key Feedback Words for Use During Feedback: 00:00:00 •Table of Assessment Methods & Activities: Strengths and Limitations: 00:40:00 •Table of Assessment Types: 00:00:00 •Table of Example Assessment Records: 00:00:00 •Table of Example Assessment Requirements: 00:00:00 •Table of Objectives: 00:00:00 •Table of Potential Learner Needs and Points of Referral: 00:00:00 •Table of Resources Which Could be Used for Teaching, Learning and Assessment: 00:00:00 •Using Questions: 00:00:00 •Unit One Understanding The Principles And Practices Of Assessment - Self-Assessment Grid: 00:00:00 •Unit Two Assess Occupational Competence In The Work Environment - Self-Assessment Grid: 00:00:00 •Unit Three Assess Vocational Skills, Knowledge And Understanding - Self-Assessment Grid: 00:00:00 •Unit 1 Understanding The Principles And Practices Of Assessment Assessment Plan: 00:00:00 •Unit 2 Assess Occupational Competence In The Work Environment Assessment Plan: 00:00:00 •Unit 3 Assess Vocational Skills, Knowledge And Understanding Assessment Plan: 00:00:00 •OBSERV 1: 00:00:00 •OBSERV 2: 00:00:00 •Template - Continuing Professional Development Record: 00:00:00 •Template - Personal Development Plan: 00:00:00 •Template - Reflective Learning Journal: 00:00:00 •Template - Standardisation Record for Assessed Work: 00:00:00 •Templates - A Full Set of Assessment Records: 00:00:00 •Completed Example of A Continuing Professional Development Record: 00:00:00 •Completed Example of A Full Set Of Assessment Records: 00:00:00 •Completed Example of A Personal Development Plan: 00:00:00 •Completed Example of A Reflective Learning Journal: 00:00:00 •Completed Example of A Standardisation Record For Assessed Work: 00:00:00 •Submit Your Assignments: 00:00:00 •Resubmit Your Assignments - Level 3 Certificate in Assessing Vocational Achievement (RQF): 00:00:00
Duration 3 Days 18 CPD hours This course is intended for This course is geared for anyone needing to interface with an Oracle database such as end users, business analysts, application developers and database administrators / DBAs. Overview Working within in a hands-on learning environment, guided by our expert team, attendees will develop a practical approach to Oracle Database Technology. Throughout the course participants will explore: Using PL/SQL programming language for database applications and development incorporating PL/SQL modules within the application architecture from the initial design and planning phase The essentials of building executable PL/SQL program units Each of the major segments of a working program and how these interact with each other during program execution Important error or exception handling capabilities of the language. How database-resident program units can be used as part of the overall database application architecture Applying these new skills to the development of PL/SQL packages. Advanced database programming capabilities and benefits How database triggers can be used as part of an advanced database application design Oracle 19c PL/SQL Fundamentals is a three-day, hands-on course that introduces Oracle database programming using the PL/SQL programming language. Throughout the course students will explore the core syntax, structure and features of the language. This course will also lay the foundation for the entire Oracle PL/SQL programming series, allowing one to progress from introductory topics to advanced application design and programming and finally onto writing complex high-performance applications. The course also explores applying the newly learned skills to the development of database applications. Participants will learn how to use database-resident stored program units such as procedures, functions, packages and database triggers. Students will also learn about the latest features in Oracle 19c. Selection & Setup of the Database Interface Considering Available Tools Selecting the Appropriate Tool Oracle Net Database Connections Oracle PAAS Database Connections Setup SQL Developer Setup SQL *Plus Setup JDeveloper About BIND and Substitution Variables Using SQL Developer Using SQL *Plus Choosing a Database Programming Language What is Database Programming PL/SQL Programming PL/SQL Performance Advantages Integration with Other Languages PL/SQL Language Essentials PL/SQL Program Structure Language Syntax Rules Embedding SQL Writing Readable Code Generating Readable Code Generating Database Output SQL * Plus Input of Program Block DECLARE Section About the Declare Section Declare Primitive Types Declaration Options Not Null Constant Data Dictionary Integration % Type Declare Simple User-Defined Types Type ? Table Type ? Record Extended User Defined Types BEGIN Section About the Begin Section Manipulating Program Data Logic Control & Braching GOTO LOOP IF-THEN-ELSE CASE EXCEPTION Section About the Exception Section Isolating the Specific Exception Pragma Exception_INIT SQLCODE &SQLERRM Example SQL%ROWCOUNT & Select ? Into Beyond the Basics : Explicit Cursors About Explicit Cursors Extend Cursor Techniques For Update of Clause Where Current of Clause Using for ? Loop Cursors Introduction Database Resident Programming Units About Database ? Resident Programs Physical Storage & Execution Types of Stored Program Units Stored Program Unit Advantages Modular Design Principles Creating Stored Procedures and Functions Stored Procedures & Functions Create Procedure / Create Function Creating Procedures & Functions Raise_Salary() Procedure Salary_Valid() function The Parameter Specification Default Clause System & Object Privileges Using the Development Tools Executing Stored Procedures and Functions Calling Procedures & Functions Unit Testing with Execute Anonymous Block Unit Testing Specifying a Parameter Notation SQL Worksheet Unit Testing Calling Functions from SQL Maintaining Stored Programming Units Recompiling Programs Mass Recompilation Using UTL_RECOMP() Dropping Procedures & Functions Drop Procedures & Functions Drop Procedure / Function Data Dictionary Metadata Using USER_OBJECTS Using USER_SOURCE Using USER_ERRORS Using USER_OBJECT_SIZE Using USER_DEPENDENCIES Managing Dependencies Dependency Internals Tracking Dependencies The Dependency Tracking Utility SQL Developer Dependency Info Dependency Strategy Checklists Creating & Maintaining About Packages Creating Packages Maintaining Packages Performance Considerations Advanced Package Capabilities Definer & Invoker Rights White Lists & Accessible By Persistent Global Objects Defining Initilization Logic Object Orientation Support Advanced Cursor Techniques Using Cursor Variables Using SYS_REFCURSOR Using Cursor Expressions Using System Supplied Packages DBMS_OUTPUT() UTL_FILE() FOPEN() Example Database Trigger Concepts About Database Triggers DML Event Trigger Sub-Types Database Trigger Scenario Trigger Exhaustion Mechanisms Trigger within SQL Worksheet Creating Database Triggers Statement Level Triggers Using Raise Application_Error() Row-Level Triggers Examples of Triggers Employee_Salary_Check Example Employee_Journal Example Budget_Event Example Instead of Triggers Triggers within and Application Maintaining Database Triggers Call Syntax Trigger Maintenance Tasks Show Errors Trigger Drop Trigger Alter Trigger Multiple Triggers for a Table Handling Mutating Table Issues Implementing System Event Triggers What are System Event Triggers Defining the Scope Available System Events System Event Attributes
Duration 5 Days 30 CPD hours This course is intended for Data center administrators Data center engineers Systems engineers Server administrators Network managers Cisco integrators and partners Data center designers Technical solutions architects Network architects Overview After taking this course, you should be able to: Describe the foundations of data center networking Describe Cisco Nexus products and explain the basic Cisco NX-OS functionalities and tools Describe Layer 3 first-hop redundancy Describe Cisco FEX connectivity Describe Ethernet port channels and vPCs Introduce switch virtualization, machine virtualization, and describe network virtualization Compare storage connectivity options in the data center Describe Fibre Channel communication between the initiator server and the target storage Describe Fibre Channel zone types and their uses Describe NPV and NPIV Describe data center Ethernet enhancements that provide a lossless fabric Describe FCoE Describe data center server connectivity Describe Cisco UCS Manager Describe the purpose and advantages of APIs Describe Cisco ACI Describe the basic concepts of cloud computing The Understanding Cisco Data Center Foundations (DCFNDU) v1.1 course helps you prepare for entry-level data center roles. In this course, you will learn the foundational knowledge and skills you need to configure Cisco© data center technologies including networking, virtualization, storage area networking, and unified computing. You will get an introduction to Cisco Application Centric Infrastructure (Cisco ACI), automation and cloud computing. You will get hands-on experience with configuring features on Cisco Nexus Operating System (Cisco NX-OS) and Cisco Unified Computing System (Cisco UCS). This course does not lead directly to a certification exam, but it does cover foundational knowledge that can help you prepare for several CCNP and other professional-level data center courses and exams. Describing the Data Center Network Architectures Cisco Data Center Architecture Overview Three-Tier Network: Core, Aggregation, and Access Spine-and-Leaf Network Two-Tier Storage Network Describing the Cisco Nexus Family and Cisco NX-OS Software Cisco Nexus Data Center Product Overview Cisco NX-OS Software Architecture Cisco NX-OS Software CLI Tools Cisco NX-OS Virtual Routing and Forwarding Describing Layer 3 First-Hop Redundancy Default Gateway Redundancy Hot Standby Router Protocol Virtual Router Redundancy Protocol Gateway Load Balancing Protocol Describing Cisco FEX Server Deployment Models Cisco FEX Technology Cisco FEX Traffic Forwarding Cisco Adapter FEX Describing Port Channels and vPCs Ethernet Port Channels Virtual Port Channels Supported vPC Topologies Describing Switch Virtualization Cisco Nexus Switch Basic Components Virtual Routing and Forwarding Cisco Nexus 7000 VDCs VDC Types VDC Resource Allocation VDC Management Describing Machine Virtualization Virtual Machines Hypervisor VM Manager Describing Network Virtualization Overlay Network Protocols VXLAN Overlay VXLAN BGP EVPN Control Plane VXLAN Data Plane Cisco Nexus 1000VE Series Virtual Switch VMware vSphere Virtual Switches Introducing Basic Data Center Storage Concepts Storage Connectivity Options in the Data Center Fibre Channel Storage Networking VSAN Configuration and Verification Describing Fibre Channel Communication Between the Initiator Server and the Target Storage Fibre Channel Layered Model FLOGI Process Fibre Channel Flow Control Describing Fibre Channel Zone Types and Their Uses Fibre Channel Zoning Zoning Configuration Zoning Management Describing Cisco NPV Mode and NPIV Cisco NPV Mode NPIV Mode Describing Data Center Ethernet Enhancements IEEE Data Center Bridging Priority Flow Control Enhanced Transmission Selection DCBX Protocol Congestion Notification Describing FCoE Cisco Unified Fabric FCoE Architecture FCoE Initialization Protocol FCoE Adapters Describing Cisco UCS Components Physical Cisco UCS Components Cisco Fabric Interconnect Product Overview Cisco IOM Product Overview Cisco UCS Mini Cisco IMC Supervisor Cisco Intersight Describing Cisco UCS Manager Cisco UCS Manager Overview Identity and Resource Pools for Hardware Abstraction Service Profiles and Service Profile Templates Cisco UCS Central Overview Cisco HyperFlex Overview Using APIs Common Programmability Protocols and Methods How to Choose Models and Processes Describing Cisco ACI Cisco ACI Overview Multitier Applications in Cisco ACI Cisco ACI Features VXLAN in Cisco ACI Unicast Traffic in Cisco ACI Multicast Traffic in Cisco ACI Cisco ACI Programmability Common Programming Tools and Orchestration Options Describing Cloud Computing Cloud Computing Overview Cloud Deployment Models Cloud Computing Services Lab outline Explore the Cisco NX-OS CLI Explore Topology Discovery Configure HSRP Configure vPCs Configure VRF Explore the VDC Elements Install ESXi and vCenter Configure VSANs Validate FLOGI and FCNS Configure Zoning Configure Unified Ports on a Cisco Nexus Switch and Implement FCoE Explore the Cisco UCS Server Environment Configure a Cisco UCS Service Profile Configure Cisco NX-OS with APIs Explore the Cisco UCS Manager XML API Management Information Tree Explore Cisco ACI
Overview The objective of this course is to equip professionals with comprehensive knowledge and practical skills in WEB 3 technologies and crypto assets. Participants will gain a deep understanding of the underlying principles of blockchain, the operational mechanics of cryptocurrencies, the potential impact of these technologies on the banking sector and the latest trends. Who the course is for Consultants Analysts Managers C-Level executives People in need of knowledge to develop a blockchain strategy People working with blockchain projects Regulators Course Content To learn more about the day by day course content please request a brochure To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now
BIM: BIM - Building Information Modelling Are you willing to start a prestigious career at BIM? We have an excellent BIM: BIM - Building Information Modelling to fulfil your desire. This BIM: BIM - Building Information Modelling offers a comprehensive introduction to Building Information Modelling, relevant software and tools. Also, this BIM: BIM - Building Information Modelling explains BIM fundamentals. Throughout this BIM: BIM - Building Information Modelling, you will learn about construction law and contracts. Furthermore, this BIM: BIM - Building Information Modelling describes how to make innovative building technologies, including cost planning and control. Take this BIM: BIM - Building Information Modelling to enhance your knowledge on advanced BIM topics. Learning outcome of BIM Course (Building Information Modelling) This BIM: BIM - Building Information Modelling will teach you about: Introduction to Building Information Modelling BIM: BIM - Building Information Modelling and various software and tools. BIM fundamentals are also described in this BIM: BIM - Building Information Modelling. Throughout this BIM: BIM - Building Information Modelling, you will learn about construction law and contracts. This BIM: BIM - Building Information Modelling explains innovations in building technology. Cost planning and control are included in our BIM: BIM - Building Information Modelling. Also, this BIM: BIM - Building Information Modelling course teaches project management and diagnosing building pathology. Overall, this BIM: BIM - Building Information Modelling) is helpful to learn advanced BIM topics. Special Offers of this BIM: BIM - Building Information Modelling Course This BIM: BIM - Building Information Modelling Course includes a FREE PDF Certificate. Lifetime access to this BIM: BIM - Building Information Modelling Course Instant access to this BIM: BIM - Building Information Modelling Course Get FREE Tutor Support to this BIM: BIM - Building Information Modelling Course BIM: BIM - Building Information Modelling Begin your journey to a successful career with our detailed BIM: BIM - Building Information Modelling. This BIM: BIM - Building Information Modelling introduces you to BIM fundamentals and essential software tools. Our BIM: BIM - Building Information Modelling covers critical topics like principles, contracts, and construction law. Enhance your skills in cost planning, control, project management, and building pathology diagnosis through our BIM: BIM - Building Information Modelling. With advanced BIM subjects included, this BIM: BIM - Building Information Modelling keeps you abreast of the latest building technology advancements. Enroll in our BIM: BIM - Building Information Modelling and transform your career potential. Who is this course for? BIM: BIM - Building Information Modelling This BIM: BIM - Building Information Modelling is designed for people from a variety of backgrounds and prospective students who want to learn more about BIM: BIM - Building Information Modelling. Requirements BIM: BIM - Building Information Modelling To enroll in this BIM: BIM - Building Information Modelling Course, students must fulfil the following requirements. To join in our BIM: BIM - Building Information Modelling Course, you must have a strong command of the English language. To successfully complete our BIM: BIM - Building Information Modelling Course, you must be vivacious and self driven. To complete our BIM: BIM - Building Information Modelling Course, you must have a basic understanding of computers. A minimum age limit of 15 is required to enroll in this BIM: BIM - Building Information Modelling Course. Career path BIM: BIM - Building Information Modelling Through this BIM: BIM - Building Information Modelling, you will be able to jumpstart your career in BIM: BIM - Building Information Modelling.
Duration 2 Days 12 CPD hours This course is intended for This class is primarily intended for the following participants: Technical employees using GCP, including customer companies, partners and system integrators deployment engineers, cloud architects, cloud administrators, system engineers , and SysOps/DevOps engineers. Individuals using GCP to create, integrate, or modernize solutions using secure, scalable microservices architectures in hybrid environments. Overview Connect and manage Anthos GKE clusters from GCP Console whether clusters are part of Anthos on Google Cloud or Anthos deployed on VMware. Understand how service mesh proxies are installed, configured and managed. Configure centralized logging, monitoring, tracing, and service visualizations wherever the Anthos GKE clusters are hosted. Understand and configure fine-grained traffic management. Use service mesh security features for service-service authentication, user authentication, and policy-based service authorization. Install a multi-service application spanning multiple clusters in a hybrid environment. Understand how services communicate across clusters. Migrate services between clusters. Install Anthos Config Management, use it to enforce policies, and explain how it can be used across multiple clusters. This two-day instructor-led course prepares students to modernize, manage, and observe their applications using Kubernetes whether the application is deployed on-premises or on Google Cloud Platform (GCP). Through presentations, and hands-on labs, participants explore and deploy using Kubernetes Engine (GKE), GKE Connect, Istio service mesh and Anthos Config Management capabilities that enable operators to work with modern applications even when split among multiple clusters hosted by multiple providers, or on-premises. Anthos Overview Describe challenges of hybrid cloud Discuss modern solutions Describe the Anthos Technology Stack Managing Hybrid Clusters using Kubernetes Engine Understand Anthos GKE hybrid environments, with Admin and User clusters Register and authenticate remote Anthos GKE clusters in GKE Hub View and manage registered clusters, in cloud and on-premises, using GKE Hub View workloads in all clusters from GKE Hub Lab: Managing Hybrid Clusters using Kubernetes Engine Introduction to Service Mesh Understand service mesh, and problems it solves Understand Istio architecture and components Explain Istio on GKE add on and it's lifecycle, vs OSS Istio Understand request network traffic flow in a service mesh Create a GKE cluster, with a service mesh Configure a multi-service application with service mesh Enable external access using an ingress gateway Explain the multi-service example applications: Hipster Shop, and Bookinfo Lab: Installing Open Source Istio on Kubernetes Engine Lab: Installing the Istio on GKE Add-On with Kubernetes Engine Observing Services using Service Mesh Adapters Understand service mesh flexible adapter model Understand service mesh telemetry processing Explain Stackdriver configurations for logging and monitoring Compare telemetry defaults for cloud and on-premises environments Configure and view custom metrics using service mesh View cluster and service metrics with pre-configured dashboards Trace microservice calls with timing data using service mesh adapters Visualize and discover service attributes with service mesh Lab: Telemetry and Observability with Istio Managing Traffic Routing with Service Mesh Understand the service mesh abstract model for traffic management Understand service mesh service discovery and load balancing Review and compare traffic management use cases and configurations Understand ingress configuration using service mesh Visualize traffic routing with live generated requests Configure a service mesh gateway to allow access to services from outside the mesh Apply virtual services and destination rules for version-specific routing Route traffic based on application-layer configuration Shift traffic from one service version to another, with fine-grained control, like a canary deployment Lab: Managing Traffic Routing with Istio and Envoy Managing Policies and Security with Service Mesh Understand authentication and authorization in service mesh Explain mTLS flow for service to service communication Adopt mutual TLS authentication across the service mesh incrementally Enable end-user authentication for the frontend service Use service mesh access control policies to secure access to the frontend service Lab: Managing Policies and Security with Service Mesh Managing Policies using Anthos Config Management Understand the challenge of managing resources across multiple clusters Understand how a Git repository is as a configuration source of truth Explain the Anthos Config Management components, and object lifecycle Install and configure Anthos Config Management, operators, tools, and related Git repository Verify cluster configuration compliance and drift management Update workload configuration using repo changes Lab: Managing Policies in Kubernetes Engine using Anthos Config Configuring Anthos GKE for Multi-Cluster Operation Understand how multiple clusters work together using DNS, root CA, and service discovery Explain service mesh control-plane architectures for multi-cluster Configure a multi-service application using service mesh across multiple clusters with multiple control-planes Configure a multi-service application using service mesh across multiple clusters with a shared control-plane Configure service naming/discovery between clusters Review ServiceEntries for cross-cluster service discovery Migrate workload from a remote cluster to an Anthos GKE cluster Lab: Configuring GKE for Multi-Cluster Operation with Istio Lab: Configuring GKE for Shared Control Plane Multi-Cluster Operation
Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Master the art of self-hosting WordPress on Linux with our comprehensive video course, designed to empower technical professionals to fully control their web presence.
Gain essential skills in medical office management with the Medical Assistant Diploma. Learn medical terminology, record-keeping, confidentiality, and more. Perfect for aspiring medical assistants and healthcare professionals. Start your career today!