Duration 5 Days 30 CPD hours This course is intended for Network security engineers ISE administrators Wireless network security engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages. Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization. Describe third-party Network Access Devices (NADs), Cisco TrustSec, and Easy Connect. Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios. Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment. Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution. Describe the value of the My Devices portal and how to configure this portal. Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE. Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols. Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool. The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco© Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the exam, Implementing and Configuring Cisco Identity Services Engine (300-715 SISE), which leads to CCNP© Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. Introducing Cisco ISE Architecture and Deployment Using Cisco ISE as a Network Access Policy Engine Cisco ISE Use Cases Describing Cisco ISE Functions Cisco ISE Deployment Models Context Visibility Cisco ISE Policy Enforcement Using 802.1X for Wired and Wireless Access Using MAC Authentication Bypass for Wired and Wireless Access Introducing Identity Management Configuring Certificate Services Introducing Cisco ISE Policy Implementing Third-Party Network Access Device Support Introducing Cisco TrustSec Cisco TrustSec Configuration Easy Connect Web Authentication and Guest Services Introducing Web Access with Cisco ISE Introducing Guest Access Components Configuring Guest Access Settings Configuring Sponsor and Guest Portals Cisco ISE Profiler Introducing Cisco ISE Profiler Profiling Deployment and Best Practices Cisco ISE BYOD Introducing the Cisco ISE BYOD Process Describing BYOD Flow Configuring the My Devices Portal Configuring Certificates in BYOD Scenarios Cisco ISE Endpoint Compliance Services Introducing Endpoint Compliance Services Configuring Client Posture Services and Provisioning in Cisco ISE Working with Network Access Devices Review TACACS+ Cisco ISE TACACS+ Device Administration Configure TACACS+ Device Administration TACACS+ Device Administration Guidelines and Best Practices Migrating from Cisco ACS to Cisco ISE Lab outline Access the SISE Lab and Install ISE 2.4 Configure Initial Cisco ISE Setup, GUI Familiarization, and System Certificate Usage Integrate Cisco ISE with Active Directory Configure Basic Policy on Cisco ISE Configure Policy Sets Configure Access Policy for Easy Connect Configure Guest Access Configure Guest Access Operations Create Guest Reports Configure Profiling Customize the Cisco ISE Profiling Configuration Create Cisco ISE Profiling Reports Configure BYOD Blacklisting a Device Configure Cisco ISE Compliance Services Configure Client Provisioning Configure Posture Policies Test and Monitor Compliance-Based Access Test Compliance Policy Configure Cisco ISE for Basic Device Administration Configure TACACS+ Command Authorization Additional course details: Nexus Humans Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for business users and knowledge workers in a variety of roles and fields who have competence in a desktop-based installation of Microsoft Office, and who are now extending Microsoft 365 to a collaborative cloud-based environment. Overview In this course, you will work productively in the Microsoft 365 cloud-based environment. You will: Navigate Microsoft 365 and integrate the online apps. Use Microsoft Outlook on the Web. Use Microsoft Teams on the web. Store documents in SharePoint, OneDrive, and Teams. Work with files online. This course is an introduction to Microsoft 365 in a cloud-based environment. Using the Microsoft 365 suite of productivity apps online, users can easily communicate and collaborate through Microsoft Teams messaging and meeting functionality and Outlook email. When you create a team, the Microsoft SharePoint team site provides a central storage location for accessing and modifying shared documents. Each user also receives individual document storage through OneDrive for Business. Teams can provide a central hub for working with shared documents in the familiar apps?Word, PowerPoint, and Excel?as an alternative to installing the Microsoft 365 Desktop applications. Getting Started with Microsoft 365 for the Web Topic A:ÿSign In to Microsoft 365 Online Topic B:ÿNavigate the Microsoft 365 Web Environment Topic C:ÿIntegrate the Microsoft 365 Web Apps Using Outlook on the Web Topic A:ÿSend and Receive Email on the Web Topic B:ÿAccess the Outlook Calendar Online Using Teams on the Web Topic A:ÿAccess Teams Features Topic B:ÿCreate and Configure Teams and Channels Topic C:ÿChat and Post in Teams Topic D:ÿCall and Meet in Teams Storing Documents on the Web Topic A:ÿOrganize Documents in SharePoint Topic B:ÿOrganize Documents in OneDrive Topic C:ÿWork with Documents in Teams Topic D:ÿSelect a File Storage Location Working with Files Online Topic A:ÿEdit Documents in Microsoft 365 Online Topic B:ÿCollaborate on Files Online Topic C:ÿFind Shared Resources Online Additional course details: Nexus Humans Microsoft 365 for the Web (with Teams, SharePoint, and OneDrive) v3.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft 365 for the Web (with Teams, SharePoint, and OneDrive) v3.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Enterprise network engineers System engineers System administrators Network administrators Overview After taking this course, you should be able to: Configure classic Enhanced Interior Gateway Routing Protocol (EIGRP) and named EIGRP for IPv4 and IPv6 Optimize classic EIGRP and named EIGRP for IPv4 and IPv6 Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6 Configure Open Shortest Path First (OSPF)v2 and OSPFv3 in IPv4 and IPv6 environments Optimize OSPFv2 and OSPFv3 behavior Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6 Implement route redistribution using filtering mechanisms Troubleshoot redistribution Implement path control using Policy-Based Routing (PBR) and IP service level agreement (SLA) Configure Multiprotocol-Border Gateway Protocol (MP-BGP) in IPv4 and IPv6 environments Optimize MP-BGP in IPv4 and IPv6 environments Troubleshoot MP-BGP for IPv4 and IPv6 Describe the features of Multiprotocol Label Switching (MPLS) Describe the major architectural components of an MPLS VPN Identify the routing and packet forwarding functionalities for MPLS VPNs Explain how packets are forwarded in an MPLS VPN environment Implement Cisco Internetwork Operating System (IOS) Dynamic Multipoint VPNs (DMVPNs) Implement Dynamic Host Configuration Protocol (DHCP) Describe the tools available to secure the IPV6 first hop Troubleshoot Cisco router security features Troubleshoot infrastructure security and services The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. This course covers advanced routing and infrastructure technologies, expanding on the topics covered in the Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 course. This course may earn a Credly Badge Course Outline Implementing EIGRP Optimizing EIGRP Troubleshooting EIGRP Implementing OSPF Optimizing OSPF Troubleshooting OSPF Implementing Internal Border Gateway Protocol (IBGP) Optimizing BGP Implementing MP-BGP Troubleshooting BGP Configuring Redistribution Troubleshooting Redistribution Implementing Path Control Exploring MPLS Introducing MPLS L3 VPN Architecture Introducing MPLS L3 VPN Routing Configuring Virtual Routing and Forwarding (VRF)-Lite Implementing DMVPN Implementing DHCP Troubleshooting DHCP Introducing IPv6 First Hop Security Securing Cisco Routers Troubleshooting Infrastructure Security and Services Lab Outline Configure EIGRP Using Classic Mode and Named Mode for IPv4 and IPv6 Verify the EIGRP Topology Table Configure EIGRP Stub Routing, Summarization, and Default Routing Configure EIGRP Load Balancing and Authentication LAB: Troubleshoot EIGRP Issues Configure OSPFv3 for IPv4 and IPv6 Verify the Link-State Database Configure OSPF Stub Areas and Summarization Configure OSPF Authentication Troubleshoot OSPF Implement Routing Protocol Redistribution Manipulate Redistribution Manipulate Redistribution Using Route Maps Troubleshoot Redistribution Issues Implement PBR Configure IBGP and External Border Gateway Protocol (EBGP) Implement BGP Path Selection Configure BGP Advanced Features Configure BGP Route Reflectors Configure MP-BGP for IPv4 and IPv6 Troubleshoot BGP Issues Implement PBR Configure Routing with VRF-Lite Implement Cisco IOS DMVPN Obtain IPv6 Addresses Dynamically Troubleshoot DHCPv4 and DHCPv6 Issues Troubleshoot IPv4 and IPv6 Access Control List (ACL) Issues Configure and Verify Control Plane Policing Configure and Verify Unicast Reverse Path Forwarding (uRPF) Troubleshoot Network Management Protocol Issues: Lab 1 Troubleshoot Network Management Protocol Issues: Lab 2
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Cisco Unified Communications system channel partners and resellers who are responsible for deployment and application engineering for Cisco Unified Contact Center Express customers. System and technical support engineers. Day 1 and Day 2 support personnel. Customers deploying and maintaining Cisco Unified CCX Overview Upon completing this course, the learner will be able to meet these overall objectives: Review Cisco Unified CCX environment components Create prompt recording tools Create a helpdesk script Apply common sense principles for scripting and system management, such as: Prompt, document, and grammar management Using the default script Scripting for proper call termination and ending a script Abandon rates Exception handling Check Agent Availability before and after entering queue Using Java Methods for Holiday and Time of Day routing Setup access and use an external database Define and use skills Script for conditional routing Script for basic callback scenarios Setup and use enterprise data and session management Script for queuing and scheduled callback scenarios Building on the knowledge base and scripting experience learned in the UCCXD class, the student will explore advanced techniques in scripting and overall Cisco Unified CCX functionality. During this five day class the students will use advanced scripting to implement features that extend the functionality of Cisco Unified CCX using many of the tools that are already available in the premium version of the product. Students should expect to spend time using the script editor and other tools to create developer tools and enhanced scripts to provide for a more functional and user-friendly customer experience. Activities include creating prompt recording tools, applying common sense scripting principles, creating simple and complex ACD routing scripts, holiday routing, external database access, various callback scenarios such as non-queuing, queuing, and scheduled callbacks, defining and using enterprise data, passing data from one script to another using session management, and much more. Additionally, since this class focuses on complex scripting concepts, it requires the student to learn more about fundamental scripting requirements such as data manipulation and formatting, using variables and array variables, and using Java programming methods. Course Introduction Learner Prerequisite Skills and Knowledge Course Goal Course Objectives Course Flow General Administration Lab Diagram Please Introduce Yourself Lesson 1: Cisco Unified CCX Overview Components of the Cisco Unified CCX Environment Gateways Routers Cisco Unified Communications Manager Cisco Unified CCX Script Editor Cisco Finesse Cisco Unified Intelligence Center Cisco Unified CCX Agent External Servers Cisco Unified CCX System Cluster Components Engine Database Server Call Flow Terms The Call Flow The Debug Process Reactive Non-Reactive Lesson 2: Prompt Recording Utilities Prompt Recorder Emergency Message Recorder Lesson 3: Basic ACD Routing Review Script Steps used in a Simple ACD Routing Script Resource Group Routing Defining the Contact Service Queue Create a Simple ACD routing script Lesson 4: Common Scripting Concepts Prompt Management Using the Default Script Terminating a Call and Ending a Script Abandon Rates Exception Handling Script Interruptions Check Agent Availability before and after entering queue Using Java Methods for Holiday and Time of Day routing Lesson 5: Accessing an External Database Database architecture and supported databases Setting up the Database Subsystem Using Database script steps Lesson 6: Skills Based Routing Appling skills to agents Defining the Contact Service Queue Specifying the CSQ in the Script Lesson 7: Advanced ACD Routing Overflow Routing When to Overflow How to get the Data Needed for Making Decisions Describe Methods of Overflowing Lesson 8: Basic ACD Callback Options Setup the Email Subsystem Script for Email Notification Script for Leaving a Recorded Message Script for Callback when Queue Times have Decreased Lesson 9: Enterprise Data and Session Management Define Enterprise Data in Cisco Finesse Define a Call Variable Layout in Cisco Finesse Define ECC Variables in the script editor Set Enterprise Data in the script Define Session Management Setup Session Management Use Session Management to Pass Variable Information Between Scripts Lesson 10: Advanced ACD Callback Options Leave Queued Message with an Option for Callback Scheduled Callback
Duration 2 Days 12 CPD hours This course is intended for This course is designed for network and software engineers who hold the following job roles: Network administrators Network operators Overview After taking this course, you should be able to: Explain the benefits of using Cisco DNA Center in a traditional, enterprise network Explain at a detailed level the Cisco DNA Center Assurance system architecture, functional components, features, and data-processing concepts Explain the health scores, metrics, and strategies that you use for monitoring network devices, clients, and applications with Cisco DNA Assurance Describe how Cisco DNA Center Assurance analyzes the streaming telemetry and collected data, correlates the data, performs root cause analysis, and displays detected issues, insights, and trends Describe the Cisco DNA Center Assurance troubleshooting tools, mechanisms, strategies, and scenarios to proactively detect and resolve wireless network, client, and application issues and pinpoint the root cause Deploy and configure Cisco DNA Center to use Assurance features for monitoring and troubleshooting network devices, clients, and applications The Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1 course provides you with the skills to monitor and troubleshoot a traditional brownfield network infrastructure by using Cisco© Digital Network Architecture (Cisco DNA?) Assurance. The course focuses on highlighting issues rather than on monitoring data. The advanced artificial intelligence and machine learning features within Cisco DNA Assurance enable you to isolate the root cause of a problem and to take appropriate actions to quickly resolve issues. Cisco DNA Assurance can be used to perform the work of a Level 3 support engineer. Course Outline Introducing Cisco DNA Center Assurance Monitoring Health and Performance with Cisco DNA Center Assurance Troubleshooting Issues, Observing Insights and Trends Troubleshooting Wireless Issues with Cisco DNA Center Assurance Tools Additional course details: Nexus Humans Cisco Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Data Modelers Overview Please refer to course overview This offering provides participants with introductory to advanced knowledge of metadata modeling concepts, and how to model metadata for predictable reporting and analysis results using IBM Cognos Framework Manager. Participants will learn the full scope of the metadata modeling process, from initial project creation, to publishing of metadata to the web, enabling end users to easily author reports and analyze data. Introduction to IBM Cognos Framework Manager Model data and identifying related data Define requirements and modeling strategies Overview of IBM Cognos Framework Manager Create a baseline project Extend a model Prepare reusable metadata Model for predictable results in IBM Cognos Framework Manager Identify query issues Identify reporting traps Model virtual star schemas Use query subjects, modify relationships, and consolidate metadata using virtual objects Create calculations, filter data, and customize metadata for runtime Implement a time dimension and specify determinants Model for presentation in IBM Cognos Framework Manager Create a presentation view Examine data source query subject types and stored procedure query subject types Specify data security and package security Specify object security and dynamic data security Create analysis objects Manage OLAP data sources Advanced capabilities in IBM Cognos Framework Manager Explore SQL generation and the use of governors Examine the use of IBM Cognos SQL and generated SQL for DMR data Other query considerations Use session parameters, prompt macros, and security macro functions Use materialized views, minimize SQL, and enable Dynamic Query Mode (DQM) DQM, CQM, caching metadata, query processing, aggregate calculation, and other ways to improve performance Extended capabilities in IBM Cognos Framework Manager Perform basic maintenance and management on a model Remap metadata to another source and import and link additional data sources Run scripts to automate or update a model and report on a model Segment a project, link a project, and branch a model Nest packages and specify package languages and functions Explore additional modeling techniques and customize metadata for a multilingual audience Additional course details: Nexus Humans B6252 IBM Cognos Framework Manager: Design Metadata Models v11.1.x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the B6252 IBM Cognos Framework Manager: Design Metadata Models v11.1.x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Security architects Design engineers Network engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco Identity-Based Networking Services (IBNS) for providing access control to corporate networks. Describe Extensible Authentication Protocol (EAP) authentication types and methods, and the role of Remote Authentication Dial-In User Service (RADIUS) in EAP communications. Describe how to configure Cisco Catalyst switches, Cisco Wireless LAN Controllers (WLCs), and Cisco ISE for 802.1X operation. Describe how to configure access for non-supplicant devices in an 802.1X deployment. Describe how to plan and deploy Cisco IBNS Networks with Cisco ISE and 802.1X. The Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v1.0 shows you how to configure and prepare to deploy Cisco© Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X?based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch. Describing Cisco Identity-Based Networking Services Cisco IBNS Overview Authentication, Authorization, and Accounting (AAA) Role in Cisco IBNS Compare Cisco IBNS and Cisco ISE Solutions Explore Cisco IBNS Architecture Components Explore Cisco TrustSec Describing 802.1X EAP Authentication Explore the IEEE 802.1X Standard Explore 802.1X and EAP Explain EAP Methods Describe the Role of RADIUS in EAP Communications Configuring Devices for 802.1X Operation Identify 802.1X Components and Topologies Configure Cisco Catalyst Switch for 802.1X Compare IBNS 1.0 and 2.0 on Cisco Catalyst Switch Configure Cisco WLC for 802.1X Configure Cisco ISE for 802.1X Configure Supplicants for 802.1X Operation Configuring Access for Non-Supplicant Devices Configure Cisco IBNS for Non-Supplicant Devices Explore IBNS 2.0 for Non-Supplicant Devices Configure Cisco Central Web Authentication for Guests Designing Cisco IBNS Networks with Cisco ISE and 802.1X Cisco ISE Architectural Components Introducing the Cisco ISE Bring Your Own Device (BYOD) Process Identify Cisco ISE Deployment Options Identify Component Compatibilities with 802.1X Review 802.1X Design Considerations
Duration 5 Days 30 CPD hours This course is intended for This course is designed for professionals in job roles such as: Communication engineers Project managers Network engineers Software engineers System architects The Developing Applications for Cisco Webex and Webex Devices (DEVWBX) v1.1 course prepares you to use the programmability features of Webex©, Cisco© enterprise solution for video conferencing, online meetings, online training, webinars, web conferencing, cloud calling, and collaboration. Through a combination of lessons and hands-on labs, you will learn about Webex Application Programming Interface (API) Foundation, meetings, devices, teams, messaging, embedding Cisco Webex, administration, and compliance. You will learn how to leverage Webex APIs to extend the functionalities of teams, meetings, and devices, and explore how these APIs can help automate, administer, and enforce compliance. This course prepares you for the 300-920 Developing Applications for Cisco Webex and Webex Devices (DEVWBX) exam. Introducing Webex APIs Foundations Webex as an Extensible Platform Building Cisco Webex Teams Applications Introduction to Webex Messaging Developing with Webex Meetings XML API Describe the Capabilities of Cisco Webex Meetings APIs Automating and Extending Cisco Collaboration Devices with xAPI Overview, Capabilities and Transport Methods for Cisco Endpoint Device Programmability Embedding Cisco Webex Benefits of Embedding Cisco Webex into Other Applications Managing Administration and Compliance with Cisco Webex APIs Administer a Cisco Webex Organization
Duration 3 Days 18 CPD hours This course is intended for This course is for technical professionals to gain skills in writing rules for Snort-based intrusion detection systems (IDS) and intrusion prevention systems (IPS). The primary audience includes: Security administrators Security consultants Network administrators System engineers Technical support personnel using open source IDS and IPS Channel partners and resellers Overview After taking this course, you should be able to: Describe the Snort rule development process Describe the Snort basic rule syntax and usage Describe how traffic is processed by Snort Describe several advanced rule options used by Snort Describe OpenAppID features and functionality Describe how to monitor the performance of Snort and how to tune rules The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.0 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules. Course Outline Introduction to Snort Rule Development Snort Rule Syntax and Usage Traffic Flow Through Snort Rules Advanced Rule Options OpenAppID Detection Tuning Snort Lab outline Connecting to the Lab Environment Introducing Snort Rule Development Basic Rule Syntax and Usage Advanced Rule Options OpenAppID Tuning Snort
Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting This course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA). Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface