Duration 5 Days 30 CPD hours This course is intended for This course is intended for Cisco Unified Communications system channel partners and resellers who are responsible for deployment and application engineering for Cisco Unified Contact Center Express customers, System and technical support engineers, Day 1 and Day 2 support personnel, and Customers deploying and maintaining Cisco Unified CCX Overview Upon successful completion of this course, students will be able to create utilize advanced techniques in scripting and Cisco Unified CCX functionality The student will explore advanced techniques in scripting and Cisco Unified CCX functionality. During this five day class students will use advanced scripting to implement features that extend the functionality of Cisco Unified CCX. Cisco Unified CCX Overview Components of the Cisco Unified CCX Environment. Gateways. Routers. Cisco Unified Communications Manager. Cisco Unified CCX. Script Editor. Cisco Finesse. Cisco Unified Intelligence Center. Cisco Unified CCX Agent. External Servers. Cisco Unified CCX System Cluster Components. Engine. Database Server. Call Flow Terms. The Call Flow. The Debug Process Reactive. Non-Reactive Prompt Recording Utilities Prompt Recorder Emergency Message Recorder Basic ACD Routing Review Script Steps used in a Simple ACD Routing Script. Resource Group Routing. Defining the Contact Service Queue. Create a Simple ACD routing script Common Scripting Concepts Prompt Management. Using the Default Script. Terminating a Call and Ending a Script. Abandon Rates. Exception Handling. Script Interruptions. Check Agent Availability before and after entering queue. Using Java Methods for Holiday and Time of Day routing Accessing an External Database Database architecture and supported databases. Setting up the Database Subsystem. Using Database script steps Skills Based Routing Appling skills to agents. Defining the Contact Service Queue. Specifying the CSQ in the Script Advanced ACD Routing Overflow Routing. When to Overflow. How to get the Data Needed for Making Decisions. Describe Methods of Overflowing Basic ACD Callback Options Setup the Email Subsystem. Script for Email Notification. Script for Leaving a Recorded Message. Script for Callback when Queue Times have Decreased Enterprise Data and Session Management Define Enterprise Data in Cisco Finesse. Define a Call Variable Layout in Cisco Finesse. Define ECC Variables in the script editor. Set Enterprise Data in the script. Define Session Management. Setup Session Management. Use Session Management to Pass Variable Information Between Scripts Advanced ACD Callback Options Leave Queued Message with an Option for Callback. Scheduled Callback
Duration 2 Days 12 CPD hours This course is intended for IT professionals interested in understanding the capabilities of the MDS 9000 Series using Cisco DCNM. IT professionals seeking a deeper knowledge of SAN operations using both CLI and DCNM may take the alternative 4-day course, Configuring Cisco MDS 9000 Series Switches (DCMDS). Much of the hands-on work in DCNMS is also covered in DCMDS. This course is also designed for professionals in the following roles including: Consulting systems engineer Data center engineers Data center operators Data center network management engineers Storage network administrator Network administrator Network engineer Sales engineer Technical solutions architect Overview After taking this course, you should be able to: Describe Cisco DCNM SAN components, licensing, high availability, and security features Describe Cisco DCNM SAN reports, alerts, event forwarding, and troubleshooting tools, including Cisco DCNM SAN Insights and SAN Analytics features The Managing SAN Infrastructure with Cisco© Data Center Network Manager (DCNMS) v1.0 course provides product training that that teaches you to deploy, operate, and maintain the Cisco Data Center Network Manager (DCNM) SAN solutions. You will learn to configure, monitor, and troubleshoot Cisco storage networking infrastructure using Cisco DCNM. Cisco DCNM provides management, automation, visualization, and troubleshooting across Cisco Nexus© and Cisco Multilayer Distributed Switching (MDS) solutions.You will learn how the DCNM serves as a Storage Area Network (SAN) solution for managing and troubleshooting Cisco storage architecture. Implementing Cisco DCNM SAN Cisco DCNM Solution Overview Implement Cisco DCNM SAN Integrate Cisco DCNM SAN with VMware vCenter Cisco DCNM SAN Licensing Monitoring and Troubleshooting SAN Infrastructure Using Cisco DCNM SAN Cisco DCNM SAN Alerts and Reports Dashboards in Cisco DCNM SAN SAN Troubleshooting with the Cisco DCNM SAN Analytics and Telemetry Streaming Additional course details: Nexus Humans Cisco Managing SAN Infrastructure with Cisco Data Center Network Manager v1.0 (DCNMS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Managing SAN Infrastructure with Cisco Data Center Network Manager v1.0 (DCNMS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is for technical professionals to gain skills in writing rules for Snort-based Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). The primary audience includes: Security administrators Security consultants Network administrators System engineers Technical support personnel using open source IDS and IPS Channel partners and resellers Overview After taking this course, you should be able to: Describe the Snort rule development process Describe the Snort basic rule syntax and usage Describe how traffic is processed by Snort Describe several advanced rule options used by Snort Describe OpenAppID features and functionality Describe how to monitor the performance of Snort and how to tune rules The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.1 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules. Course Outline Introduction to Snort Rule Development Snort Rule Syntax and Usage Traffic Flow Through Snort Rules Advanced Rule Options OpenAppID Detection Tuning Snort
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Cisco integrators, resellers, and partners Network administrators Security administrators Security consultants Systems engineers Technical support personnel Overview After taking this course, you should be able to: Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors. Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0 is a 3-day course that shows you how to deploy and use Cisco© AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. The course qualifies for 24 Cisco Continuing Education credits (CE) towards recertification.This class will help you:Learn how to deploy and manage Cisco AMP for EndpointsSucceed in today?s high-demand security operations roles Course Outline This course will cover the following topics: Introducing to Cisco AMP Technologies Introducing AMP for Endpoints Overview and Architecture Navigating the Console Interface Using Cisco AMP for Endpoints Identifying Attacks Analyzing Malware Managing Outbreak Control Creating Endpoint Policies Working with AMP for Endpoint Groups Using Orbital for Endpoint Visibility Introducing AMP REST API Navigating Accounts
Duration 5 Days 30 CPD hours This course is intended for The audience includes implementers, developers, system administrators, project teams, database administrators and engine project technical teams. The audience also includes consultants that are looking to gain an understanding of Maximo Asset Management 7.6.0.x and the engine. Overview After completing this course, you should be able to perform the following tasks: List the components of Tivoli's process automation engine Understand Maximo modules and applications Understand Tivoli's Process Automation Engine Create the foundation data necessary for Maximo Asset Management Customize the engine database and applications Automate IBM Service Management applications using workflows Use the Maximo Work Centers Use the Integration Framework to import and export data This course is designed for anyone planning to use Maximo Asset Management and Tivoli?s process automation engine with one of the IBM System Management (ISM) products. It is a course that introduces you to the features and functions of both products. IBM Maximo Asset Management Overview This unit focuses on Maximo as an overall product and how Maximo assists companies with their asset management lifecycle. Tivoli Process Automation Engine This unit describes the functions of Tivoli?s process automation engine and introduces the products that are based on the engine. This unit also introduces Start Centers and basic navigation. Architecture and components This unit covers the architecture of Tivoli?s process automation engine. The various components that make up the system are described. The unit will address Java EE servers and the basic use of WebSphere© as it relates to the engine. The unit then covers the organization of the administrative workstation and system properties. The unit briefly describes the setup of the system for using attachments. Foundation Data This unit covers the creation of foundation data for Tivoli?s process automation engine. The foundation data is the software constructs that are necessary in the basic configuration of the product. These constructs include organizations, sites, locations, classifications, and various engine financial configurations. Security Security addresses the need to protect system resources from unauthorized access by unauthenticated users. Resources in the system are protected by Authentication and Authorization. Database architecture This unit illustrates the possible database configurations using the Database Configuration application. It also presents specific command lines that you can run to configure the changes made on the attributes of business objects using the Database Configuration application. Work Management Work Management is a collection of components and products that work together to form a powerful process and work management system. This unit provides a look at work management and focuses on using Work Management to generate, process, and complete work orders. Customizing an application This unit provides an overview of the Application Designer and Migration Manager. You will learn how to change, duplicate and create applications. You will learn the process to move from development, integration testing, user acceptance testing and moving to production. Automation This unit provides a high-level overview of key automation application programs and their functionality. It describes cron tasks, which are used to automate jobs in the system. The unit then discusses various communication tools in the system such as Communication Templates and the E mail Listener application. Finally, automated means of notification using escalations and actions are covered. Workflow This unit focuses on workflow. You learn about the Workflow Designer and its tools. You also learn how to modify an existing workflow and how to manage the included workflows. Reporting This unit provides an overview of the data analysis and reporting options that you can use in the system to analyze data. You create query by example (QBE) reports, result sets, key performance indicators (KPI), and query-based reports (QBRs). Students can optionally review Appendix A to learn how to create a simple enterprise report using Business Intelligence Reporting Tools (BIRT) designer. This report provides an example of how developers create more complex, widely used reports for users. Integration Framework In this unit, a high-level overview of the Integration Framework is provided. The Integration Framework architecture and components are described and basic configuration steps are described. The configuration and steps for loading and exporting data to and from the system are covered. You have the opportunity to practice them also. Budget Monitoring This unit provides information on a new feature introduced in Maximo 7.6.0.8, the Budget Monitoring application. In this application, you can create budget records to monitor transactions in a financial period. Inspection Tools and Tasks This unit introduces the new Inspection application. You can use the Inspections tools to create online inspection forms by using your desktop computer or laptop, and you can use the forms to complete an inspection by using your desktop computer, laptop, or tablet. Troubleshooting This unit focuses on troubleshooting as a systematic approach to solving a problem. The goal is to determine why something does not work as expected and to resolve the problem. It discusses the configuration of logging in the application. It also covers basic troubleshooting techniques, some important component logs, and information about obtaining help from Tivoli Support. Additional course details: Nexus Humans U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is for analysts, developers, and administrators of IBM Watson Explorer Deep Analytics Edition oneWEX. Overview Identify oneWEX platformsIdentify the process and data flows of oneWEX projectsExplore the oneWEX user interfaceExplain ingestion and conversionUtilize Content MinerDefine enrichmentIdentify advanced features of oneWEX This course is designed to teach students core concepts of IBM Watson Explorer Deep Analytics Edition oneWEX. Students will learn to identify the oneWEX platforms as well as the process flow and data flow of oneWEX projects. Students will explore oneWEX tools, such as Content Miner and the Admin Console, while gaining hands-on experience in data acquisition and enrichment. Finally, students will be exposed to more advanced topics, such as Application Builder, Content Analytics Studio, and API usage. Overview of oneWEX Introduction to oneWEX Explore oneWEX architecture Identify installation options Navigation in oneWEX Explore the Admin Console Explore navigation using Content Miner The Collection detail view The REST API Data flow Explore the data flow of oneWEX Search and Analytics collection templates Identify data acquisition Data ingestion Work with datasets Work with crawlers Use an importer Explore conversion Data ingestion log files Analysis using oneWEX Content Miner Explore analysis using Content Miner The Guided Analysis Experience The Guided Analysis view Explore Annotators Enrichment using Annotators Annotator types Enrichment using Labeler Identify enrichment Identify document classification Classify using training data Classification versus clustering The document classification process Enrichment using Ranker Identify enrichment using Ranker The ranking process Migrate annotators from Content Analytics Studio Migrate Content Analytics Studio annotators Identify the UIMA pipeline configuration for oneWEX Update annotators Using Application Builder with oneWEX Application Builder and user roles Explore Application Builder Set up a oneWEX data source Functionality for oneWEX data sources Additional course details: Nexus Humans O3201 Fundamentals of IBM Watson Explorer Deep Analytics Edition oneWEX (V12.0.x) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the O3201 Fundamentals of IBM Watson Explorer Deep Analytics Edition oneWEX (V12.0.x) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is ideal for the following professionals: Data Network Engineers and Administrators Data Center Technical Managers Overview After completing the course, you should be able to: Describe the components and functionality of DCNM. Describe the software define network protocols of VXLAN, eVPN and BGP. Deploy a DCNM environment in high-availability environment. Operate the DCNM discovery process to acquire management of all devices. List high lever navigation features of DCNM and utilize the DCNM GUI (Graphical User Interface) to optimize data center topologies. Manage and monitor data center LAN fabric from DCNM. Program RESTful APIs native to DCNM to perform any network management task. Troubleshoot and monitor the network using DCNM troubleshooting tools. Describe the benefits of DCNM Network Insights. The course, Managing LAN Infrastructure with Cisco Data Center Network Manager (DCNML) v1.0 enhances your knowledge of managing LAN Infrastructure with Cisco Data Center Network Manager (DCNM) implementing a spine-and-leaf network fabric using DCNM with Virtual Extensible LAN (VXLAN), Ethernet VPN (EVPN), and Border Gateway Protocol (BGP). You will learn how the integration of spine-and-leaf network fabric with Cisco Data Center Network Manager increases overall data center infrastructure uptime and reliability, thereby improving business continuity. It provides a robust framework and comprehensive feature set that meets the routing, switching, and storage administration needs of data centers. Cisco DCNM streamlines the provisioning for the unified fabric and monitors the SAN (Storage area network) and LAN (Local area network) components. Introducing Cisco DCNM LAN Cisco DCNM Introduction Cisco DCNM LAN Solution Overview Deploying VXLAN EVPN with Cisco DCNM LAN VXLAN Overlays and Underlays Easy Fabric VXLAN EVPN Underlay Model Deploying Cisco DCNM Cisco DCNM High Availability Cisco DCNM Installation Requirements Discovering Existing Network Devices with Cisco DCNM Configure Switches for Discovery Exploring the Data Center with Cisco DCNM Topology Access Topology View in the GUI Navigate the Map Views and Layouts Managing and Monitoring the Data Center with Cisco DCNM LAN Manage the Configuration Archive Deploy Changes to the Fabric Automating Cisco DCNM Programmatically Explore APIs for the Network REST API Tool Troubleshooting and Monitoring Cisco DCNM Troubleshoot and Monitor Cisco DCNM Describing Network Insights Network Insights Advisor Additional course details: Nexus Humans Cisco Managing LAN Infrastructure with Cisco Data Center Network Manager v1.1 (DCNML) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Managing LAN Infrastructure with Cisco Data Center Network Manager v1.1 (DCNML) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1.5 Days 9 CPD hours This course is intended for This course is designed for WebSphere administrators who have experience with stand-alone application server environments, and want to learn about creating and managing a federated environment. Overview After completing this course, you should be able to: Describe the architectural concepts that are related to WebSphere Application Server Network Deployment Create a deployment manager instance Federate an application server to a cell Add a stand-alone application server to a WebSphere Application Server cell Cluster an application server within a WebSphere Application Server cell Configure WebSphere Application Server SSL security settings Deploy applications in clustered environments Describe the features of Intelligent Management This course teaches you the skills that are needed to administer IBM WebSphere Application Server V9 in a federated environment.This release of IBM WebSphere Application Server provides enhanced support for standards (notably Java 7 EE), emerging technology, and a choice of development frameworks.In this course, you learn how to configure and maintain IBM WebSphere Application Server V9 Network Deployment. You learn how to deploy and create a deployment manager and federate a cell. In addition, you learn how to create a cluster within the federated cell.Throughout the course, hands-on exercises and demonstrations reinforce lecture content. You gain practicalexperience with WebSphere Application Server V9 by completing tasks such as creating a deployment manager, federating a stand-alone application server, creating a custom profile, and clustering an existing application server. Course Introduction WebSphere Application Server architecture: Federated Federating a cell Exercise: Configuring the lab workstation Exercise: Creating a federated cell Workload management Exercise: Clustering and workload management WebSphere security: SSL Exercise: Configuring SSL for WebSphere Overview of Intelligent Management Course summary
Duration 4 Days 24 CPD hours This course is intended for This course is intended for Network Administrators, Network Engineers, Network Operations Technicians, and students interested in learning about programming. Overview Upon completing this course, the learner will be able to meet these overall objectives:Understand and describe basic and advanced Python terminologiesIdentify and correct Python script errorsPull and reconfigure networking devices using Python scriptsIntroduction to RESTful API utilizing JSON and XML This course focuses on the interoperability of Python programming with Networking to prepare students for Software Defined Networking. This class is designed for students looking to add programming skills in preparation for various ACI & SDN technologies. Basic Constructs Describe and execute strings Describe and execute printing Describe and execute variables Describe and execute built in methods Describe and execute input from users Describe Boolean expressions Advanced Constructs Describe and execute redundant scripts Describe and execute functions Describe and execute classes Scaling Python Describe and execute Reading Files scripts Describe and execute Writing to File scripts Describe and execute substituting strings and integers Describe and execute while loops Describe and execute for loops and lists Describe and execute slicing Updating and edit a list Error checking Dictionaries and Regular Expressions Describe and execute dictionaries Delete dictionaries Describe and execute dictionaries with lists Describe and execute regular expressions (match, search, findall, sub) XML and JSON Describe XML format Describe JSON Format Example of XML Example of JSON What is an XML Schema? Describe SOAP Example of CURL with a Web Based Application Example of a SOAP exchange with a Web based Application Example of REST with a Web based Application Putting It All Together Apply Python principles with a SOAP Client Apply Python principles with REST and WSDL Apply native Python modules Additional course details: Nexus Humans Introducing Python and Web Services Programmability for Network Engineers - v3.0 IPWSP-NE training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introducing Python and Web Services Programmability for Network Engineers - v3.0 IPWSP-NE course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Security administrators Security consultants Network administrators Systems engineers Technical support personnel Cisco integrators, resellers, and partners Overview Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection· Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations This course shows you how to deploy and use Cisco AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. Course Outline Introducing Cisco AMP Technologies Introducing AMP for Endpoints Overview and Architecture Navigating the Console Interface Using Cisco AMP for Endpoints Identifying Attacks Analyzing Malware Managing Outbreak Control Creating Endpoint Policies Working with AMP for Endpoint Groups Using Orbital for Endpoint Visibility Introducing AMP REST API Navigating Accounts