Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of VMware Carbon Black Cloud Audit and Remediation Identify the architecture and data flows for Carbon Black Cloud Audit and Remediation communication Describe the use case and functionality of recommended queries Achieve a basic knowledge of SQL Describe the elements of a SQL query Evaluate the filtering options for queries Perform basic SQL queries on endpoints Describe the different response capabilities available from VMware Carbon Black Cloud This course teaches you how to use the VMware Carbon Black© Cloud Audit and Remediation? product to build queries for IT hygiene, incident response, and vulnerability assessment to support your organization?s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Data Flows and Communication Hardware and software requirements Architecture Data flows Query Basics Osquery Available tables Query scope Running versus scheduling Recommended Queries Use cases Inspecting the SQL query SQL Basics Components Tables Select statements Where clause Creating basic queries Filtering Results Where clause Exporting and filtering Basic SQL Queries Query creation Running queries Viewing results Advanced Search Capabilities Advanced SQL options Threat hunting Response Capabilities Using live response Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud Audit and Remediation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud Audit and Remediation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Solutions architects Developers Cost-optimization leads System administrators Overview In this course, you will learn to: Explain the cost of core AWS services Determine and predict costs associated with current and future cloud workloads Use strategies and best practices to reduce AWS costs Use AWS tools to manage, monitor, alert, and optimize your AWS spend Apply strategies to monitor service costs and usage Implement governance standards, including resource tagging, account structure, provisioning,permissions, and access This course is for individuals who seek an understanding of how to manage, optimize, and predict costs as you run workloads on AWS. You learn how to implement architectural best practices, explore cost optimization strategies, and design patterns to help you architect cost-efficient solutions on AWS. Module 0: Couse Overview Course introduction Module 1: Introduction to Cloud Financial Management Introduction to Cloud Financial Management Four pillars of Cloud Financial Management Module 2: Resource Tagging Tagging resources Hands-On Lab: Cost optimization: Control Resource Consumption Using Tagging and AWS Config Module 3: Pricing and Cost Fundamentals of pricing AWS Free Tier Volume discounts Savings plans and Reserved Instances Demonstration: AWS Pricing Calculator Module 4: AWS Billing, Reporting, and Monitoring Understanding AWS invoices Reporting and planning AWS Cost Explorer AWS Budgets Demonstration: AWS Billing Console Demonstration: AWS Cost Explorer Demonstration: Trusted Advisor Hands-On Lab: Cost optimization: Deploy Ephemeral Environments Using Amazon EC2 Auto Scaling Module 5: Architecting for Cost: Compute Evolution of compute efficiency Amazon EC2 right-sizing Purchasing options Architect for Amazon EC2 Spot Instance Impact of software licensing Demonstration: Compute Optimizer Demonstration: Spot Instance Advisor Hands-On Lab: Cost optimization: Right Size Amazon EC2 Instances Using Amazon CloudWatch Metrics Module 6: Architecting for Cost: Networking Data transfer costs Understand data costs for different services How to triage network costs Hands-On Lab: Cost optimization: Reduce Data Transfer Costs Using Amazon CloudFront and Endpoints Module 7: Architecting for Cost: Storage Amazon EBS cost, pricing, and best practices Amazon S3 cost, pricing, and best practices Amazon EFS cost, pricing, and best practices Hands-On Lab: Cost optimization: Reduce Storage Costs Using Amazon S3 Lifecycle Management Module 8: Architecting for Cost: Databases Amazon RDS cost, pricing, and best practices Amazon Aurora cost, pricing, and best practices Amazon DynamoDB cost, pricing, and best practices Amazon ElastiCache cost, pricing, and best practices Amazon Redshift cost, pricing, and best practices Module 9: Cost Governance Setting up AWS Organizations AWS Systems Manager Hands-On Lab: Cost optimization: Reduce Compute Costs Using AWS Instance Scheduler Module 10: Course Summary Course review
Duration 4 Days 24 CPD hours This course is intended for This course is designed for network administrators, system administrators, network architects, systems engineers, and technical support engineers who are involved with advanced installation, configuration, maintenance, and basic troubleshooting of Ruckus ICX products. Overview Upon successful completion of this course, the student will be able to: Describe Ruckus ICX hardware Configure and implement management protocols on Ruckus equipment Configure and implement monitoring and reporting features on Ruckus equipment including syslogs and sFlow Perform hardware troubleshooting and support functions Perform firmware upgrades Configure, implement, and maintain Layer 2 STP protocols (RSTP, MSTP, PVST) Configure and manage VLANs, Virtual Ethernet routed interfaces, topology groups, and Q-in-Q Configure, deploy and maintain Link Aggregation Groups (LAGS) Describe, configure, and maintain Multi-Chassis Trunking (MCT) Integrate MCT with VRRPe for redundancy Identify PoE-capable products Configure and manage Ruckus ICX switches in a PoE environment Configure, implement, and maintain the OSPF routing protocol Configure, implement, and maintain QoS This course provides an in-depth study of the Ruckus ICX family of products and how they are utilized in an enterprise network. The course covers core competencies of configuration, operations and maintenance of Ruckus ICX products. This course also covers core L2/L3 protocol configurations including STP family, OSPF, QoS, and Ruckus proprietary protocols and technology including MCT, VRRPe and FDP. This course provides an in-depth study of the Ruckus ICX family of products and how they are utilized in an enterprise network. The course covers core competencies of configuration, operations and maintenance of Ruckus ICX products. This course also covers core L2/L3 protocol configurations including STP family, OSPF, QoS, and Ruckus proprietary protocols and technology including MCT, VRRPe and FDP. Additional course details: Nexus Humans Ruckus ICX 200 Administrator Training Course training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Ruckus ICX 200 Administrator Training Course course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles: Network administrators Solutions designers System installers System integrators System administrators Overview After completing this course, you should be able to: Explain the transactional service activation and how it relates to business requirements Explain how Cisco NSO communicates with network devices Understand the NETCONF protocol and be able to read and write simple YANG models Understand the difference between devices that are fully NETCONF capable and those that are less or not NETCONF capable Understand the support for candidate configuration and confirmed commit support Use logs to troubleshoot the Cisco NSO deployment and check NSO communication with network devices Explain the YANG service model structure Design a real-world usable service Explain the mapping logic of service parameters to device models and consequently to device configurations Describe the use of different integration options and APIs Explain how to implement action with use of config-templates in NSO package Explain the use of Reactive FASTMAP in for manipulating and implementing advanced NFV components Describe the use of feature components and function packs Define and explain the ETSI MANO principles and solution Work with the alarm console, and understand the NSO alarm structure and how it conforms to modern network operations procedures Describe Cisco NSO 5.3 new features and changes in NSO The NSO Essentials for Programmers and Network Architects (NSO201) v4.1 course introduces you to Cisco Network Services Orchestrator (NSO). You will learn to install Cisco NSO and use it to manage devices and create services based on YANG templates with XPath. This course provides an overview of NSO as a network automation solution as well as introducing you to NETCONF, YANG, and XPath. You will learn about managing devices and creating device templates, service management and service package creation, network element drivers, interfacing with other systems using APIs, configuring and troubleshooting system settings, managing alarms and reporting, configuring NSO for scalability and performance, and capabilities that can be added to Cisco NSO. Course Outline Introducing Service Orchestration with Cisco NSO Exploring Cisco NSO Architecture Orchestrating Network Solutions Describing Cisco NSO Operation Installing Cisco NSO Exploring the Advantages of NETCONF Managing Devices Using the Device Manager Creating YANG Models Using Services Implementing Services with Model-to-Model Mapping Designing Services in Cisco NSO Managing the Service Lifecycle Programming with Python in Cisco NSO Configuring and Troubleshooting System Settings Discovering Cisco NSO Northbound APIs Managing Alarms and Reporting Configuring Cisco NSO for Scalability and Performance Describing Cisco NSO VNF Manager and Function Packs
Duration 3 Days 18 CPD hours This course is intended for This course is designed for system administrators and implementors interested in learning IBM Security Verify Access. Overview Describe IBM Security Verify Access product and its key features Discuss the architecture and deployment process Configure IBM Security Verify Access users, groups, and domains Introduce concepts of a reverse proxy and how it fits in your web-based infrastructure Describe protected object space and the policy access control model Explain how to set up reverse proxy junctions to handle web requests Discuss and configure authentication mechanisms that are supported by Verify Access Explain and set up logging, auditing, and tracing for Verify Access components IBM Security Verify Access helps you simplify your users' access while more securely adopting web, mobile, IoT, and cloud technologies. It can be deployed on premises, in a virtual or hardware appliance, or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization's migration to identity as a service (IDaaS) at a comfortable pace. Using the skills taught in this course, you learn how to run Verify Access via Docker, configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests. Hands-on exercises reinforce the skills learned. Unit 1 Introduction to IBM Security Verify Access Unit 2 Architecture and deployment Unit 3 Managing users, groups, and domains Unit 4 Reverse Proxy (WebSEAL) concepts Unit 5 Managing access control Unit 6 Configuring junctions for back-end resources Unit 7 Authentication framework and methods Unit 8 Logging, auditing, and tracing Additional course details: Nexus Humans TW108G IBM Security Verify Access Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TW108G IBM Security Verify Access Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for the following technical professionals who need to use advanced features of fiber optics technology: System installers System integrators System administrators Network administrators Solutions designers Overview After taking this course, you should be able to: Perform the ONS 15454 MSTP node turn-up procedure Describe first generation mesh topologies Describe the Optical Channel Network Connection (OCHNC) prerequisite requirements for provisioning circuits in an ONS 15454 MSTP network Describe the ONS MSTP advanced protocols Describe the OCHNC circuit provisioning for Single Module (SM) Reconfigurable Optical Add-Drop Multiplexer (ROADM) rings Describe the Any-Rate Muxponder Crossponder (AR MXP/XP) cards Describe how the Pseudo Command Line can be used to configure muxponder cards Identify the advantages G.709 encapsulation brings to optical transponder cards Install and provision the Any Rate cards Describe the 100-Gbps and 200-Gbps cards Describe the NCS 2000 400-Gbps Xponder line card and how it is configured Describe the SM ROADM (SMR)-based configurations Describe the 10-Gbps transponder and muxponder cards List the 10GE_XP and GE_XP card options Describe ingress policing and basic egress queuing strategies, and implement the customer QoS scheme into the ONS 15454 crossponder network Identify the principles of Ethernet related to the operation of Cisco optical networking products Configure the 10GE_XP/XPE and GE_XP/XPE cards, install Layer 1 circuits, and read the performance counters for Layer 1 Gigabit Ethernet circuits Turn up an encrypted network and test to ensure that information being passed is secure Add a node to an existing DWDM ring Describe problems with interconnecting circuits between rings, the ONS 15454 MSTP 80-channel manual Multiring feature, and hardware components Describe the ONS 15454 MSTP Troubleshooting Guide The Cisco Optical Technology Advanced (OPT300) v2.0 course gives you the skills you need to deploy advanced features of the Cisco© Optical Networking Services (ONS) 15454 Multiservice Transport Platform (MSTP) and Cisco Network Convergence System (NCS) 2000 Series. In this course you?ll learn to how to use the Cisco Transport Planner Design Tool to create network topologies and advanced network topologies. You will learn how to use advanced Dense Wavelength Division Multiplexing (DWDM) features such as G.709 encapsulation, generic framing protocol G.7041, Layer 1 circuits, Quality of Service (QoS), crossponder networks using T1 over Ethernet, and encryption. Course Outline Cisco Transport Planner Design Tool First-Generation Mesh Topologies Ochnc In A Mesh Network Advanced Protocols Any Rate Muxponder And Crossponders 100-Gbps And 200-Gbps Transponders And Muxponders Cisco Ncs 2000 400-Gbps Xponder Line Card Cisco 10G Web Security Essentials (Wse) Network Encryption Card Adding A New Location With Cisco Transport Planner (Ctp) And Cisco Transport Controller (Ctc) Crossponders And Layer 1 Networks Crossponders And Layer 2 Networks Troubleshooting
Duration 4 Days 24 CPD hours This course is intended for Application Consultants, Developers, System Administrators, and System Architects Overview Understand the need for an enterprise portalLog on to, navigate, and personalize the portalDescribe the components of SAP Enterprise PortalBuild-up a portal navigation structureAdapt the portal user interface to company specificationsExplain and use the main functions of the SAP Enterprise Portal, Knowledge Management and CollaborationExplain and use the community features of the portal add-ons Forums and WikisExplain and use the SAP Fiori Launchpad on Portal' In this course, students will gain knowledge of the basic fundamentals surrounding the SAP Enterprise Portal. Enterprise Portal Explaining Business Motivations for Portals Describing SAP NetWeaver Explaining the Basics of SAP Enterprise Portal The End User's Perspective Logging On and Navigating in SAP Enterprise Portal Personalizing SAP Enterprise Portal Technical Infrastructure Determining System Requirements Outlining SAP Enterprise Portal's Architecture Portal Platform Content Explaining the Object Model for Portal Content Managing iViews Managing Portal Pages Managing Worksets and Portal Roles Explaining Business Packages Outlining Portal Content Development Tools Translating Portal Content Look and Feel of the Portal Managing Portal Themes Managing Framework Pages Managing Portal Desktops Managing Portal Rules (Rule Collections) Security Aspects Identifying Security Aspects Managing Users and Authentication Options Describing Authorization Concepts Describing Single Sign-On (SSO) Evaluating Network Security Knowledge Management (KM) Outlining Knowledge Management (KM) Describing Content Management (CM) Functions Using Web Page Composer (WPC) Describing Search and Classification (TREX) Enterprise Workspaces Explaining Enterprise Workspaces Managing Personal Workspaces Managing Shared Workspaces Collaboration Outlining Collaboration Functions Using Forums Using Wikis Fiori Launchpad on the Portal Outlining SAP Fiori Launchpad on Portal Additional course details: Nexus Humans SAPEP SAP Enterprise Portal - Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SAPEP SAP Enterprise Portal - Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: System administrators Technical solutions architects Systems integrators Channel partners Value-added resellers Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview Upon completing this course, the learner will be able to meet these overall objectives: Understand Cisco UCS Management in Cisco Intersight Describe the Cisco UCS Platform including Cisco X-Series Understand Cisco Intersight Workload Optimizer Explain Kubernetes Orchestration with Cisco Intersight Kubernetes Service (IKS) and Cisco UCS Perform Automation Using Cisco Intersight Create Intersight Elements Using Terraform Manage Intersight Using the API Cisco Intersight Overview (DCISO) is a 3-day instructor led course that builds your experience with the administration of Cisco Unified Computing System (UCS) X-Series servers, including using Cisco Intersight for UCS management. This course covers architecture, configuration, and operation of Cisco Intersight©, and is designed to serve the needs of engineers seeking to understand the capabilities of Cisco Intersight for managing data centers from a single management platform.This course will help you:Use SaaS or on-prem version of Cisco Intersight to enable IT organizations to analyze, simplify, and automate their environments in more advanced ways than the prior generations of toolsGain hands-on experience using Cisco IntersightUnderstand the X-Series, B-Series, and C-Series product line similarities and differencesDescribe Cisco Intersight and how it can be used to manage UCS and Cisco Hyperflex©Understand the process for upgrading firmware with Cisco IntersightAdministering server profiles, pools, and policies with Cisco IntersightDescribe how to get started with Cisco Intersight programmability Course Outline Describing Cisco UCS Management in Cisco Intersight Describing the Cisco UCS Platform Describing Cisco Intersight Workloads Describing Automation Options Using Cisco Intersight Additional course details: Nexus Humans Cisco Intersight Overview (DCISO) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Intersight Overview (DCISO) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for Software developers, system administrators, and IT professionals who are focused on Microsoft Windows Overview Configuring Microsoft Windows and Microsoft SQL Server in Google Compute Engine. Deploying ASP.NET MVC applications to Google Compute Engine. Deploying .NET Core applications to Google Compute Engine, Google Compute Engine, and Google Container Engine Learn how to create Windows virtual machines on Google Cloud so that you can deploy and run Microsoft Windows applications. In this course, you'll learn how to run SQL Server in Compute Engine, how to deploy instances across Google Cloud zones, and how to get more out of ASP.NET on Compute Engine, Google Container Engine, and App Engine. Introduction to Google Cloud Platform Scope and structure of GCP. Options for Windows deployment on GCP. GCP interfaces. Windows Workloads on Google Compute Engine Google Compute Engine virtual machine options. Integrating Active Directory with Google Compute Engine virtual machines. Options for running SQL Server in Google Compute Engine. Configuring SQL Server for high availability. Developing ASP.NET MVC applications Model-view-controller structure. Using Microsoft Visual Studio?s Web Project template to develop in ASP.NET. Deploying applications to Microsoft Internet Information Server (IIS) in GCE. Configuring Resilient Workloads Deploying instances across GCP zones. Using instance groups to create pools of virtual machines. Load balancing Windows applications. Delivering Next-Generation ASP.NET Core on GCP Understanding .NET Core and EF Core. Options for deploying ASP.NET Core applications on Google Cloud Platform. Deploying ASP.NET Core applications on Google Compute Engine. Deploying ASP.NET Core applications on Google Container Engine. Deploying ASP.NET Core applications on Google App Engine. Additional course details: Nexus Humans Develop and Deploy Windows Applications on Google Cloud Platform training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Develop and Deploy Windows Applications on Google Cloud Platform course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals, Cybersecurity Forensic Analyst, Cyberthreat Analyst, Cloud Security, Analyst Information Security Consultant, Application Security Analyst, Cybersecurity Assurance Engineer, Security Operations Center (SOC) Analyst, Technical Operations Network Engineer, Information Security Engineer, Network Security Penetration Tester, Network Security Engineer, Information Security Architect. Overview Upon successful completion of this course, students will master their Penetration Testing skills, perform the repeatable methodology, become committed to the code of ethics, and present analyzed results through structured reports. The main course outcomes include: 100% mapped with the NICE framework. Maps to the job role of a Penetration Tester and security analyst, based on major job portals. 100% methodology-based Penetration Testing program. Provides strong reporting writing guidance. Blended with both manual and automated Penetration Testing approaches. Gives a real-world experience through an Advanced Penetration Testing Range. Designed based on the most common Penetration Testing services offered by the best service providers in the market. Offers standard templates that can help during a Penetration test. This is a multidisciplinary course with extensive hands-on training in a wide range of crucial skills, including advanced Windows attacks, Internet of Things (IoT) and Operational Technology (OT) systems, filtered network bypass techniques, exploit writing, single and double pivoting, advanced privilege escalation, and binary exploitation. Course Outline Introduction to Penetration Testing Penetration Testing Scoping and Engagement Open Source Intelligence (OSINT) Social Engineering Penetration Testing Network Penetration Testing ? External Network Penetration Testing ? Internal Network Penetration Testing - Perimeter Devices Web Application Penetration Testing Wireless Penetration Testing IoT Penetration Testing OT/SCADA Penetration Testing Cloud Penetration Testing Binary Analysis and Exploitation Report Writing and Post-Testing Actions Additional course details: Nexus Humans Certified Penetration Testing Professional (CPENT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Penetration Testing Professional (CPENT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.