Duration 5 Days 30 CPD hours This course is intended for This course is designed for professionals in job roles such as: Communication engineers Project managers Network engineers Software engineers System architects The Developing Applications for Cisco Webex and Webex Devices (DEVWBX) v1.1 course prepares you to use the programmability features of Webex©, Cisco© enterprise solution for video conferencing, online meetings, online training, webinars, web conferencing, cloud calling, and collaboration. Through a combination of lessons and hands-on labs, you will learn about Webex Application Programming Interface (API) Foundation, meetings, devices, teams, messaging, embedding Cisco Webex, administration, and compliance. You will learn how to leverage Webex APIs to extend the functionalities of teams, meetings, and devices, and explore how these APIs can help automate, administer, and enforce compliance. This course prepares you for the 300-920 Developing Applications for Cisco Webex and Webex Devices (DEVWBX) exam. Introducing Webex APIs Foundations Webex as an Extensible Platform Building Cisco Webex Teams Applications Introduction to Webex Messaging Developing with Webex Meetings XML API Describe the Capabilities of Cisco Webex Meetings APIs Automating and Extending Cisco Collaboration Devices with xAPI Overview, Capabilities and Transport Methods for Cisco Endpoint Device Programmability Embedding Cisco Webex Benefits of Embedding Cisco Webex into Other Applications Managing Administration and Compliance with Cisco Webex APIs Administer a Cisco Webex Organization
Duration 5 Days 30 CPD hours This course is intended for This course will help you: Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Overview Upon completing this course, students will be able to meet these objectives: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers. Compare and contrast the various hardware and software switching mechanisms and operation, while defining the TCAM and CAM, along with process switching, fast switching, and Cisco Express Forwarding concepts. Troubleshoot layer 2 connectivity using VLANs, trunking. Implementation of redundant switched networks using spanning tree protocol. Troubleshooting link aggregation using Etherchannel. Describe the features, metrics, and path selection concepts of EIGRP. Implementation and optimization of OSPFv2 and OSPFv3, including adjacencies, packet types, and areas, summarization and route filtering for IPv4 and IPv6. Implementing EBGP interdomain routing, path selection and single and dual-homed networking. Implementing network redundacy using protocols like HSRP and VRRP. Implementing internet connectivity within Enterprise using static and dynamic NAT. Describe the virtualization technology of servers, switches, and the various network devices and components. Implementing overlay technologies like VRF, GRE, VPN and LISP. Describe the components and concepts of wireless networking including RF, antenna characteristics, and define the specific wireless standards. Describe the various wireless deployment models available, include autonomous AP deployments and cloud-based designs within the centralized Cisco WLC architecture. Describe wireless roaming and location services. Describe how APs communicate with WLCs to obtain software, configurations, and centralized management. Configure and verify EAP, WebAuth, and PSK wireless client authentication on a WLC. Troubleshoot wireless client connectivity issues using various tools available. Troubleshooting Enterprise networks using services like NTP, SNMP , Cisco IOS IP SLAs, NetFlow and Cisco IOS Embedded Event Manager. Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.2 course provides the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You?ll learn to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN Course Outline Examining Cisco Enterprise Network Architecture Understanding Cisco Switching Paths Implementing Campus Lan Connectivity Building Redundant Switched Topology Implementing Layer 2 Port Aggregation Understanding EIGRP Implementing OSPF Optimizing OSPF Exploring EBGP Implementing Network Redundancy Implementing NAT Introducing Virtualization Protocols And Techniques Understanding Virtual Private Networks And Interfaces Understanding Wireless Principles Examining Wireless Deployment Options Understanding Wireless Roaming And Location Services Examining Wireless AP Operation Understanding Wireless Client Authentication Troubleshooting Wireless Client Connectivity Introducing Multicast Protocols Introducing QoS Implementing Network Services Using Network Analysis Tools Implementing Infrastructure Security Implementing Secure Access Control Understanding Enterprise Network Security Architecture Exploring Automation and Assurance Using Cisco DNA Center Examining the Cisco SD-Access Solution Understanding the Working Principles of the Cisco SD-WAN Solution Understanding the Basics of Python Programming Introducing Network Programmability Protocols Introducing APIs in Cisco DNA Center and vManage
Duration 5 Days 30 CPD hours This course is intended for Network designers Network administrators Network engineers Systems engineers Data center engineers Consulting systems engineers Technical solutions architects Field engineers Cisco integrators and partners Server administrator Network manager Overview After taking this course, you should be able to: Implement routing and switching protocols in Data Center environment Implement overlay networks in data center Introduce high-level Cisco Application Centric Infrastructure (Cisco ACIâ¢) concepts and Cisco Virtual Machine manager (VMM) domain integration Describe Cisco Cloud Service and deployment models Implement Fibre Channel fabric Implement Fibre Channel over Ethernet (FCoE) unified fabric Implement security features in data center Implement software management and infrastructure monitoring Implement Cisco UCS Fabric Interconnect and Server abstraction Implement SAN connectivity for Cisco Unified Computing System⢠(Cisco UCS) Describe Cisco HyperFlex⢠infrastructure concepts and benefits Implement Cisco automation and scripting tools in data center Evaluate automation and orchestration technologies This course helps you prepare for the CiscoÿCCNPÿData Center and CCIEÿData Center certifications. In this course, you will master the skills and technologies you need to implement data center compute, LAN and SAN infrastructure. You will also learn the essentials of automation and security in data centers. You will gain hands-on experience deploying, securing, operating, and maintaining Cisco data center. Implementing Data Center Switching Protocols* Spanning Tree Protocol Port Channels Overview Implementing First-Hop Redundancy Protocols* Hot Standby Router Protocol (HSRP) Overview Virtual Router Redundancy Protocol (VRRP) Overview Implementing Routing in Data Center* Open Shortest Path First (OSPF) v2 and Open Settlement Protocol (OSP) v3 Border Gateway Protocol Implementing Multicast in Data Center* IP Multicast in Data Center Networks Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Implementing Data Center Overlay Protocols Cisco Overlay Transport Virtualization Virtual Extensible LAN Implementing Network Infrastructure Security* User Accounts and Role Based Access Control (RBAC) Authentication, Authorization, and Accounting (AAA) and SSH on Cisco NX-OS Describing Cisco Application-Centric Infrastructure Cisco ACI Overview, Initialization, and Discovery Cisco ACI Management Describing Cisco ACI Building Blocks and VMM Domain Integration Tenant-Based Components Cisco ACI Endpoints and Endpoint Groups (EPG) Describing Packet Flow in Data Center Network* Data Center Traffic Flows Packet Flow in Cisco Nexus Switches Describing Cisco Cloud Service and Deployment Models Cloud Architectures Cloud Deployment Models Describing Data Center Network Infrastructure Management, Maintenance, and Operations* Time Synchronization Network Configuration Management Explaining Cisco Network Assurance Concepts* Need for Network Assurance Cisco Streaming Telemetry Overview Implementing Fibre Channel Fabric Fibre Channel Basics Virtual Storage Area Network (VSAN) Overview Implementing Storage Infrastructure Services Distributed Device Aliases Zoning Implementing FCoE Unified Fabric Fibre Channel over Ethernet Describing FCoE Implementing Storage Infrastructure Security* User Accounts and RBAC Authentication, Authorization, and Accounting Describing Data Center Storage Infrastructure Maintenance and Operations* Time Synchronization Software Installation and Upgrade Describing Cisco UCS Server Form Factors* Cisco UCS B-Series Blade Servers Cisco UCS C-Series Rack Servers Implementing Cisco Unified Computing Network Connectivity Cisco UCS Fabric Interconnect Cisco UCS B-Series Connectivity Implementing Cisco Unified Computing Server Abstraction Identity Abstraction Service Profile Templates Implementing Cisco Unified Computing SAN Connectivity iSCSI Overview Fibre Channel Overview Implementing Unified Computing Security User Accounts and RBAC Options for Authentication Introducing Cisco HyperFlex Systems* Hyper converged and Integrated Systems Overview Cisco HyperFlex Solution Describing Data Center Unified Computing Management, Maintenance, and Operations* Compute Configuration Management Software Updates Implementing Cisco Data Center Automation and Scripting Tools* Cisco NX-OS Additional course details: Nexus Humans Cisco Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles: Consulting systems engineer IoT Designer Network administrator Network engineer Network manager Sales engineer Systems engineer Technical solutions architect Overview After taking this course, you should be able to: Explain the fundamentals of Cisco IoT and list common devices involved List the common protocols, standards, and data flows of IoT Explain the Cisco IoT, common needs, and the corresponding solutions Explain how programmability can be used to automate and make operations, deployment, and support of Cisco IoT more effective Describe common Cisco IoT applications and how they apply to Cisco IoT use cases Explain the functions and use cases for Cisco security applications and Cisco IoT This course prepares you to develop Internet of Things (IoT) applications for Cisco© IoT edge compute and network architecture. Through a combination of lessons and hands-on experience, you will learn to implement and deploy Cisco IOx applications using Cisco Field Network Director and Cisco Kinetic. This course covers designing, deploying, and troubleshooting edge applications, and understanding the use of management tools, so you can control your industrial network and connected devices at scale. This course will prepare you for the certification exam 300-915 Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT), a concentration in the CCNP DevNet track. Course Outlines DEFINING CISCO IOT IOT NETWORKING AND OTHER DEVICES EXAMINING IOT PROTOCOLS EXAMINING IOT STANDARDS RECOGNIZING CISCO IOT NEEDS AND SOLUTIONS USING PROGRAMMABILITY WITH CISCO IOT DESCRIBING CISCO IOT APPLICATIONS: CISCO IOX DESCRIBING CISCO IOT APPLICATIONS: CISCO KINETIC AND CISCO FIELD NETWORK DIRECTOR DEFINING CISCO SECURITY APPLICATIONS Lab outline Use an MQTT Consumer to Subscribe to Sensor Data Use Cisco IOx Applications to Receive and Process Sensor Data Troubleshoot a Sensor Connection Use and Interpret Freeboard Data Use and Interpret Grafana Data Use and Interpret Kibana Data Cisco IOx Familiarity Lab Develop and Deploy a Cisco IOx Application Troubleshoot Cisco IOx Navigate Cisco Field Network Director Explore Cisco Field Network Director API Additional course details: Nexus Humans Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the NSX Advanced Load Balancer architecture, components, and main functions Explain the key features and benefits of NSX Advanced Load Balancer Explain and configure local load-balancing constructs such as virtual services, pools, health monitors, and related components Recognize web application breaches and threats Recognize multiple attack vectors such as web scraping, Layer 7 Denial of Service, brute force, and code injections Explain the components of NSX Advanced Load Balancer WAF that build a security pipeline to protect a web application from being attacked Describe how to configure the NSX Advanced Load Balancer WAF components Describe an NSX Advanced Load Balancer WAF operational task such as setting up an application with WAF, tuning the WAF Policy, and working with logs and analytics Explain the NSX Advanced Load Balancer WAF best practices for on-boarding a web application; configuring WAF settings for effective application security Explain how to size the NSX Advanced Load Balancer WAF data plane Explain the WAF Application learning feature, configuration of Application learning, Virtual Patching concepts, common caveats, and troubleshooting while deploying in any environment Recognize NSX Advanced Load Balancer Cloud Services that include threat Intelligence services Describe the Threat Intelligence service provided by NSX Advanced Load Balancer WAF and how the NSX Advanced Load Balancer WAF Threat Intelligence service receives live security threat feed for multiple attack vectors from Cloud Services (formerly Avi Pulse) Describe the NSX Advanced Load Balancer DataScript capabilities for detecting and defending against advance and zero-day attacks. Discuss the relevant NSX Advanced Load Balancer WAF logs and perform basic troubleshooting of applications that are protected by NSX Advanced Load Balancer WAF Explain the NSX Advanced Load Balancer WAF capability to protect Personally Identifiable Information (PII) This three-day course provides comprehensive training to install, configure, and manage a VMware NSX Advanced Load Balancer Web Application Firewall (WAF) solution. This course covers key NSX Advanced Load Balancer WAF features and functionality offered in the NSX Advanced Load Balancer 22.1.3 release for web security and application attack protection. Features include security pipeline, application learning, policy tuning, false positive mitigation, virtual patching, threat intelligence, troubleshooting, logs, analytics, and solution monitoring. Hands-on labs provide access to an NSX Advanced Load Balancer environment to reinforce the skills and concepts presented in the course. Course Introduction Introduction and course logistics Course objectives Introduction to NSX Advanced Load Balancer Illustrate NSX Advanced Load Balancer Explain NSX Advanced Load Balancer architecture and components Describe control plane clustering and high availability Describe data plane high availability mode Understand the common terminologies used with NSX Advanced Load Balancer Explain the NSX Advanced Load Balancer service elements Explain virtual service components and how to configure a virtual service Explain application profiles and network profiles Explain the pool configuration options and how to configure a pool Explain the available load-balancing algorithms Explain and configure SSL profiles and certificates Explain cloud connectors and cloud connector integration modes Explain multiple health monitor types Understand client logs Introduction to Application Security Understand web application security breaches and the implication of breaches Explain common terminologies related to Web Application Security Understand the different teams involved to secure applications Attacking Web Applications Understand the various web application security testing methodologies Understand the OWASP Top 10 vulnerabilities Understand the tools to generate a web application attack Describe a few types of web application attacks Types of Transport Understand different web traffic transport modes Describe web traffic and API traffic NSX Advanced Load Balancer WAF Components Understand the core design principles of NSX Advanced Load Balancer WAF Describe the NSX Advanced Load Balancer WAF components that build the WAF security pipeline Understand the NSX Advanced Load Balancer WAF configuration objects NSX Advanced Load Balancer WAF Operations Examine how to set up an application with WAF Describe considerations for the WAF policy Work with WAF logs and analytics Describe WAF policy tuning Describe the options available to remediate false positive mitigation NSX Advanced Load Balancer WAF Best Practices Describe technical and application considerations for onboarding an application front ended by WAF Describe best practices to remediate false positive mitigation. Describe how to manage a response from a back-end application server and client upload to the application server Describe the consideration for setting the rigidity of a WAF signature rule set Describe the options available to identify client traffic NSX Advanced Load Balancer WAF Sizing Understand how to do WAF data plane sizing in Greenfield and Brownfield deployments NSX Advanced Load Balancer WAF Custom Rules Understand WAF custom rules Describe the need and recommendation for custom rules Describe ModSecurity rules Understand the ModSecurity rule structure and explain how to construct the rule Analyze a sample custom rule for the use-case scenario for in-depth understanding of a custom rule NSX Advanced Load Balancer WAF Application Learning Understand the significance of Application Learning Explain the Positive Security Model architecture Describe the WAF multifaceted Application Learning technique to build an application model for creating positive security rules Describe how to view the data that is learned by the Application learning module Describe the WAF Virtual Patching technique to construct a WAF policy from Dynamic Application Security Testing (DAST) scanner results Understand the conditions for sharing WAF Learning Data and PSM Group in WAF Policy. Malware Protection Through ICAP in NSX Advanced Load Balancer Understand Malicious File Upload Protection and ICAP workflow Describe ICAP configuration and log analytics NSX Advanced Load Balancer IP Reputation Understand IP Reputation concepts and their integration with NSX Advanced Load Balancer Describe IP Reputation configuration, log analytics, and troubleshooting DataScript for Application Security Describe DataScript events and reference Describe application security using DataScript Explain how to troubleshoot DataScript issues Rate Limiting and DOS Describe and configure the NSX Advanced Load Balancer rate limiter technique Describe protection from denial of service (DoS) attacks and distributed DoS (DDoS) attacks in NSX Advanced Load Balancer Explain the Service Engine general advice and guidance for DDOS Bot Management Understand Bots Describe the Bot Management mechanism in NSX Advanced Load Balancer Describe how to configure NSX Advanced Load Balancer Bot Management Managing Personally Identifiable Information in NSX Advanced Load Balancer Understand Personally Identifiable Information (PII) Understand the scope of managing PII in NSX Advanced Load Balancer Describe how to configure the hidden PII in NSX Advanced Load Balancer logs using profiles and WAF rules. Threat Intelligence Introduce the Threat Intelligence service Describe the Threat Intelligence live security threat feed for multiple attack vectors Describe how to configure Threat Intelligence in NSX Advanced Load Balancer Application Programming Interface Security Define Application Programming Interface (API) Security Understand API authentication and authorization using virtual service authentication mechanisms used for a virtual service such as LDAP, SAML, JSON Web Token, and OAUTH Understand API Rate Limiting in NSX Advanced Load Balancer Understand the NSX Advanced Load Balancer WAF Protection for API Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for application developers. Overview Describe the benefits of implementing a decision management solution with Operational Decision Manager.Identify the key user roles that are involved in designing and developing a decision management solution, and the tasks that are associated with each role.Describe the development process of building a business rule application and the collaboration between business and development teams.Set up and customize the Business Object Model (BOM) and vocabulary for rule authoring. Implement the Execution Object Model (XOM) that enables rule execution.Orchestrate rule execution through ruleflows. Author rule artifacts to implement business policies.Debug business rule applications to ensure that the implemented business logic is error-free.Set up and customize testing and simulation for business users.Package and deploy decision services to test and production environments.Integrate decision services for managed execution within an enterprise environment.Monitor and audit execution of decision services.Work with Operational Decision Manager features that support decision governance. This course introduces developers to IBM Operational Decision Manager V8.9.2. It teaches participants the concepts and skills required to design, develop, and integrate a business rule solution with Operational Decision Manager. This course begins with an overview of Operational Decision Manager, which is composed of two main environments: Decision Server for technical users and Decision Center for business users. The course outlines the collaboration between development and business teams during project development. Through instructor-led presentations and hands-on lab exercises, participants learn about the core features of Decision Server, which is the primary working environment for developers. Participants design decision services and work with the object models that are required to author and execute rule artifacts. Participants gain experience with deployment and execution, and work extensively with Rule Execution Server. In addition, students become familiar with rule authoring so that you can support business users to set up and customize the rule authoring and validation environments. Participants also learn how to use Operational Decision Manager features to support decision governance. Introducing IBM Operational Decision Manager Exercise: Operational Decision Manager in action Developing decision services Exercise: Setting up decision services Programming with business rules and developing object models Exercise: Working with the BOM Exercise: Refactoring Orchestrating ruleset execution Exercise: Working with ruleflows Authoring rules Exercise: Exploring action rules Exercise: Authoring action rules Exercise: Authoring decision tables Customizing rule vocabulary with categories and domains Exercise: Working with static domains Exercise: Working with dynamic domains Working with queries Exercise: Working with queries Debugging rules Exercise: Executing rules locally Exercise: Debugging a ruleset Enabling tests and simulations Exercise: Enabling rule validation Managing deployment Exercise: Managing deployment Exercise: Using Build Command to build RuleApps Executing rules with Rule Execution Server Exercise: Exploring the Rule Execution Server console Auditing and monitoring ruleset execution Exercise: Auditing ruleset execution through Decision Warehouse Working with the REST API Exercise: Executing rules as a hosted transparent decision service (HTDS) Additional course details: Nexus Humans WB402 IBM Developing Rule Solutions in IBM Operational Decision Manager V8.9.2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WB402 IBM Developing Rule Solutions in IBM Operational Decision Manager V8.9.2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is for technical professionals to gain skills in writing rules for Snort-based intrusion detection systems (IDS) and intrusion prevention systems (IPS). The primary audience includes: Security administrators Security consultants Network administrators System engineers Technical support personnel using open source IDS and IPS Channel partners and resellers Overview After taking this course, you should be able to: Describe the Snort rule development process Describe the Snort basic rule syntax and usage Describe how traffic is processed by Snort Describe several advanced rule options used by Snort Describe OpenAppID features and functionality Describe how to monitor the performance of Snort and how to tune rules The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.0 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules. Course Outline Introduction to Snort Rule Development Snort Rule Syntax and Usage Traffic Flow Through Snort Rules Advanced Rule Options OpenAppID Detection Tuning Snort Lab outline Connecting to the Lab Environment Introducing Snort Rule Development Basic Rule Syntax and Usage Advanced Rule Options OpenAppID Tuning Snort
Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting This course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA). Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface
Duration 2 Days 12 CPD hours This course is intended for Anyone who works with IBM SPSS Statistics and wants to learn advanced statistical procedures to be able to better answer research questions. Overview Introduction to advanced statistical analysis Group variables: Factor Analysis and Principal Components Analysis Group similar cases: Cluster Analysis Predict categorical targets with Nearest Neighbor Analysis Predict categorical targets with Discriminant Analysis Predict categorical targets with Logistic Regression Predict categorical targets with Decision Trees Introduction to Survival Analysis Introduction to Generalized Linear Models Introduction to Linear Mixed Models This course provides an application-oriented introduction to advanced statistical methods available in IBM SPSS Statistics. Students will review a variety of advanced statistical techniques and discuss situations in which each technique would be used, the assumptions made by each method, how to set up the analysis, and how to interpret the results. This includes a broad range of techniques for predicting variables, as well as methods to cluster variables and cases. Introduction to advanced statistical analysis Taxonomy of models Overview of supervised models Overview of models to create natural groupings Group variables: Factor Analysis and Principal Components Analysis Factor Analysis basics Principal Components basics Assumptions of Factor Analysis Key issues in Factor Analysis Improve the interpretability Use Factor and component scores Group similar cases: Cluster Analysis Cluster Analysis basics Key issues in Cluster Analysis K-Means Cluster Analysis Assumptions of K-Means Cluster Analysis TwoStep Cluster Analysis Assumptions of TwoStep Cluster Analysis Predict categorical targets with Nearest Neighbor Analysis Nearest Neighbor Analysis basics Key issues in Nearest Neighbor Analysis Assess model fit Predict categorical targets with Discriminant Analysis Discriminant Analysis basics The Discriminant Analysis model Core concepts of Discriminant Analysis Classification of cases Assumptions of Discriminant Analysis Validate the solution Predict categorical targets with Logistic Regression Binary Logistic Regression basics The Binary Logistic Regression model Multinomial Logistic Regression basics Assumptions of Logistic Regression procedures Testing hypotheses Predict categorical targets with Decision Trees Decision Trees basics Validate the solution Explore CHAID Explore CRT Comparing Decision Trees methods Introduction to Survival Analysis Survival Analysis basics Kaplan-Meier Analysis Assumptions of Kaplan-Meier Analysis Cox Regression Assumptions of Cox Regression Introduction to Generalized Linear Models Generalized Linear Models basics Available distributions Available link functions Introduction to Linear Mixed Models Linear Mixed Models basics Hierachical Linear Models Modeling strategy Assumptions of Linear Mixed Models Additional course details: Nexus Humans 0G09A IBM Advanced Statistical Analysis Using IBM SPSS Statistics (v25) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 0G09A IBM Advanced Statistical Analysis Using IBM SPSS Statistics (v25) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is ideal for developers, engineers, and others including: Cloud administrators , Cloud solution architects , Customer sales engineers , DevOps engineers , Sales engineers , Systems engineers, Technical solutions architects. Overview After taking this course, you should be able to: Explain business and technical challenges of going to the cloud Understand benefits of an application-centric hybrid cloud multicloud management platform Navigate Cisco CloudCenter Suite architecture Understand Cisco CloudCenter Suite administrative capabilities including cloud management, multi-tenancy, governance, and policy enforcement Describe application lifecycle management and provisioning in cloud Describe how to use Cisco CloudCenter Suite to manage the workloads in multicloud The course, Mulitcloud Automation and Orchestration with Cisco CloudCenter Suite (CLDAO) v1.0 teaches you how to configure simplified orchestration and workflow automation that provides seamless integration within the Cisco© CloudCenter suite. Through lessons and hands-on experiences, you will learn to use the tools of the CloudCenter Suite to streamline business processes, automate tasks, and increase efficiency in business processes. Introducing Cisco CloudCenter Suite Action Orchestrator Cisco CloudCenter Suite Architecture Defining Action Orchestrator User Management and Security Considerations Cisco CloudCenter Suite User Management and Security Defining Cisco CloudCenter Suite Action Orchestrator Adapters Action Orchestrator Adapter Creation Examining Action Orchestrator Integrations and Supported APIs Cisco CloudCenter Suite Action Orchestrator APIs