• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

36582 Courses

Cisco Implementing Cisco Service Provider Advanced Routing Solutions v1.0 (SPRI)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for professionals who need knowledge about implementing various Service Provider core technologies and advanced routing technologies. Network administrators System engineers Project managers Network designers Overview After taking this course, you should be able to: Describe the main characteristics of routing protocols that are used in Service provider environments Implement advanced features of multiarea Open Shortest Path First (OSPFv2) running in Service Provider networks Implement advanced features of multilevel Intermediate System to Intermediate System (ISIS) running in Service Provider networks Configure route redistribution Configure Border Gateway Protocol (BGP) in order to successfully connect the Service Provider network to the customer or upstream Service Provider Configure BGP scalability in Service Provider networks Implement BGP security options Implement advanced features in order to improve convergence in BGP networks Troubleshoot OSPF, ISIS, and BGP Implement and verify MPLS Implement and troubleshoot MPLS traffic engineering Implement and verify segment routing technology within an interior gateway protocol Describe how traffic engineering is used in segment routing networks Implement IPv6 tunneling mechanisms Describe and compare core multicast concepts Implement and verifying the PIM-SM protocol Implement enhanced Protocol-Independent Multicast - Sparse Mode (PIM-SM) features Implement Multicast Source Discovery Protocol (MSDP) in the interdomain environment Implement mechanisms for dynamic Rendezvous Point (RP) distribution The Implementing Cisco Service Provider Advanced Routing Solutions (SPRI) 5-day course teaches you theories and practices to integrate advanced routing technologies including routing protocols, multicast routing, policy language, Multiprotocol Label Switching (MPLS), and segment routing, expanding your knowledge and skills in service provider core networks. This course prepares you for the 300-510 Implementing Cisco© Service Provider Advanced Routing Solutions (SPRI) exam. The course qualifies for 40 Cisco Continuing Education credits (CE) towards recertification. This course will help you: Gain the high-demand skills to maintain and operate advanced technologies related to Service Provider core networks Increase your knowledge and skills for implementing Service Provider core advanced technologies though hands-on application and practical instruction Prepare to take the 300-510 SPRI exam Course Outline Implementing and Verifying Open Shortest Path First Multiarea Networks Implementing and Verifying Intermediate System to Intermediate System Multilevel Networks Introducing Routing Protocol Tools, Route Maps, and Routing Policy Language Implementing Route Redistribution Influencing Border Gateway Protocol Route Selection Scaling BGP in Service Provider Networks Securing BGP in Service Provider Networks Improving BGP Convergence and Implementing Advanced Operations Troubleshooting Routing Protocols Implementing and Verifying MPLS Implementing Cisco MPLS Traffic Engineering Implementing Segment Routing Describing Segment Routing Traffic Engineering (SR TE) Deploying IPv6 Tunneling Mechanisms Implementing IP Multicast Concepts and Technologies Implementing PIM-SM Protocol Implementing PIM-SM Enhancements Implementing Interdomain IP Multicast Implementing Distributed Rendezvous Point Solution in Multicast Network

Cisco Implementing Cisco Service Provider Advanced Routing Solutions v1.0 (SPRI)
Delivered OnlineFlexible Dates
Price on Enquiry

CCCS Check Point Certified Cloud Specialist-Administrator

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Technical professionals who support, install, deploy, or administer Check Point products in Cloud Environments. Overview Explain the nature of the cloud environment. Describe the five pillars of cloud architecture. Explain the Basics of Cloud Infrastructure. Explain the Basics of Cloud Automation. Explain Check Point Security Management and How it Applies to CloudGuard. Describe CloudGuard Security Gateway offerings. Describe Cloud Load Balancers. Explain CloudGuard Licensing. Explain the different Deployment options and architectures for CloudGuard. Explain how and why CloudGuard is automated. Describe the functions of CloudGuard that can be automated. Describe the tools used to automate CloudGuard. Explain CloudGuard Automation Requirements. Explain basic troubleshooting techniques specific to Check Point Security Management Servers and Security Gateways. Describe the steps for Troubleshooting CloudGuard Network Installation. Explain the tools and techniques used to troubleshoot CloudGuard Network Automation. Explain the need for Cloud Security Posture Management. Describe the posture management tools available in CloudGuard. Explain methods for correcting Cloud Security Posture Management issues. Learn basic concepts and develop skills necessary to administer Check Point CloudGuard security solutions Course Outline Deploy a Security Management Server in the Cloud. Install a Security Gateway Image. Create Virtual Networks. Deploy Internal and External Load Balancers Deploy a Security Gateway Using Templates. Assign Public IP Addresses to Cloud Devices Create Web Servers in the Cloud. Configure North-South Traffic Policy. Configure East-West Traffic Policy and Routes. Troubleshoot North-South Traffic Issues. Troubleshoot East-West Traffic Issues.

CCCS Check Point Certified Cloud Specialist-Administrator
Delivered OnlineFlexible Dates
Price on Enquiry

Check Point Software - Check Point Certified Security Expert R80.20 (CCSE)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security Engineers Network Engineers Overview Upon completion of this course, students will be able to: Deploy gateways using the Gaia web interface Configure a Security Policy Learn about managing and monitoring a secure network Upgrade and configure a Security Gateway to implement a virtual private network for both internal and external, remote users The growing frequency and sophistication of security threats makes protecting your organization more difficult every year. Check Point?s integrated products provide end-to-end security from the enterprise to the cloud to your mobile worker?s personal devices. They prevent and mitigate cyberattacks and limit the data theft that often results from these threats. Introduction to Check Point TechnologyDeployment PlatformsIntroduction to the Security PolicyMonitoring Traffic & ConnectionsNetwork Address TranslationUsing SmartUpdateUser Management & AuthenticationIdentity AwarenessIntroduction to Check Point VPNsSmartLog

Check Point Software - Check Point Certified Security Expert R80.20 (CCSE)
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle PeopleSoft Payroll - US Rel 9.2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Implementer Overview Enrolling in this course will help you better understand and leverage PeopleSoft Payroll for North America (USA) payroll requirements and processes. This knowledge will help you create, adjust and troubleshoot your organization's employee payroll. Learn Off-Cycle Payroll Events In addition to typical on-cycle payroll processing, Payroll for North America provides functionality for a variety of off-cycle payroll events and other payroll requirements. This course will illustrate how to reverse a paycheck, record a manual check, produce online checks and final checks and create a gross up check. In addition, you'll also learn the necessary steps to set up and process mid-period job changes and multiple jobs. Finally, you'll set up and processes benefit deductions and garnishments. This PeopleSoft Payroll - US Rel 9.2 training teaches you how to set up and maintain employee tax data, additional pay, general deductions and direct deposits. Expert Oracle University instructors will show you how to use this solution to calculate payroll, review calculation results, identify and correct errors, confirm payroll and more. Setting Up PeopleSoft HRMS Tables for Payroll Processing Identifying HRMS Tables That Impact Payroll Processing Describing Installation Table Setup for PeopleSoft Enterprise Payroll for North America Describing the Role of SetID, Location, and Department in Payroll Processing Describing Company Table Setup Desc Setting Up Payroll Tables Identifying Payroll Setup Tables Setting Up Source Bank Accounts Creating Special Accumulators Setting Up Earnings Codes Setting Up Earnings Programs Describing Shift Pay Setup Creating a Pay Group Creating a Rate Code Setting Up U.S. Payroll Tax Tables Identifying Tax Table Maintenance Responsibility Describing PeopleSoft-Maintained Tax Tables Setting Up Customer-Maintained Tax Tables Setting Up Employee Data Identifying Sources of Employee Data Setting Up an Employee Instance Entering and Viewing Employee Job Data Identifying Employee Pay Data Updating Employee Tax Data Assigning Additional Pay to Employees Assigning General Deductions to Employees Updating P Creating and Updating Paysheets Describing Paysheets in Payroll for North America Describing Balance ID Creation Creating Pay Calendars Setting Up Pay Run IDs Creating Paysheets Viewing and Updating Paysheets and Paylines Describing the Payroll Unsheet Process Calculating Payroll Describing Payroll Calculation Running Preliminary Payroll Calculation Running Final Payroll Calculation Confirming Payroll and Producing Checks and Reports Confirming a Payroll Viewing Confirmed Payroll Results Online Printing Checks and Advices Describing Check Reprinting Describing Direct Deposit Transmittals and Reports Describing Payroll and Tax Reports Identifying Methods of Reversing Payroll Confirmati Processing Off-Cycle Payrolls Identifying Off-Cycle Payroll Processing Reversing a Paycheck Describing Reversal/Adjustment Processing Recording a Manual Check Producing an Online Check Describing Retroactive Processing Setting Up and Processing Additional Payroll Functionality Setting Up a Holiday Schedule Setting Up Advanced Earnings Options Setting Up Multiple Jobs Processing Setting Up and Processing Mid-period Job Changes Processing Gross Ups Setting Up and Processing Benefit Deductions in Payroll Setting Up Deductions and Earnings for Benefits Calculations Updating a Benefit Program and Enrolling Employees Analyzing Benefits-Related Payroll Reports Setting Up and Processing Garnishments Identifying Garnishment Setup Steps Describing PeopleSoft-Maintained Garnishment Tables Setting Up Company-Level Tables for Garnishment Processing Assigning an Employee Garnishment Deduction Setting Up Employee Garnishment Specification Data Reviewing Emp Describing PeopleSoft Enterprise ePay Identifying HRMS Tables That Impact Payroll Processing Describing Installation Table Setup for PeopleSoft Enterprise Payroll for North America Describing the Role of SetID, Location, and Department in Payroll Processing Describing Company Table Setup Desc

Oracle PeopleSoft Payroll - US Rel 9.2
Delivered OnlineFlexible Dates
Price on Enquiry

AJSPR - Advanced Junos Service Provider Routing

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course benefits individuals responsible for implementing, monitoring, and troubleshooting Layer 3 components of a service provider's network. Overview Describe the various OSPF link-state advertisement (LSA) types. Explain the flooding of LSAs in an OSPF network. Describe the shortest-path-first (SPF) algorithm. List key differences between OSPFv2 and OSPFv3. Describe OSPF area types and operations. Configure various OSPF area types. Summarize and restrict routes. Identify some scenarios in a service provider network that can be solved using routing policy or specific configuration options. Use routing policy and specific configuration options to implement solutions for various scenarios. Describe how to troubleshoot OSPF. Explain the concepts and operation of IS-IS. Describe various IS-IS link-state protocol data unit (LSP) types. List IS-IS adjacency rules and troubleshoot common adjacency issues. Configure and monitor IS-IS. Display and interpret the link-state database (LSDB). Perform advanced IS-IS configuration options. Implement IS-IS routing policy. Explain the default operation in multiarea IS-IS. Describe IS-IS address summarization methods. Configure and monitor a multiarea IS-IS network. Describe how to troubleshoot IS-IS. Describe basic BGP operation. List common BGP attributes. Explain the route selection process for BGP. Describe how to alter the route selection process. Configure some advanced options for BGP peers. Describe various BGP attributes in detail and explain the operation of those attributes. Manipulate BGP attributes using routing policy. Explain the causes for route instability. Describe the effect of damping on BGP routing. Explain the default behavior of damping on links. Control damping using routing policy. View damped routes using command-line interface (CLI) commands. Describe the operation of BGP route reflection. Configure a route reflector. Describe the operation of a BGP confederation. Configure confederations. Describe peering relationships in a confederation. Describe how to troubleshoot BGP. Describe how to troubleshoot routing policy. This five-day course is designed to provide students with detailed coverage of OSPF, IS-IS, BGP, and routing policy. Course Outline Course Introduction OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication OSPF Areas Review of OSPF Areas Stub Area Operation Stub Area Configuration NSSA Operation NSSA Configuration Route Summarization OSPF Case Studies and Solutions Virtual Links OSPF Multiarea Adjacencies External Reachability Troubleshooting OSPF Troubleshooting OSPF IS-IS Overview of IS-IS IS-IS PDUs Neighbors and Adjacencies Configuring and Monitoring IS-IS Advanced IS-IS Operations and Configuration Options IS-IS Operations IS-IS Configuration Options IS-IS Routing Policy Multilevel IS-IS Networks Level 1 and Level 2 Operations Multilevel Configuration Troubleshooting IS-IS Troubleshooting IS-IS BGP Review of BGP BGP Operations BGP Path Selection Options Configuration Options BGP Attributes and Policy?Part 1 BGP Policy Next Hop Origin and MED AS Path BGP Attributes and Policy?Part 2 Local Preference Communities Route Reflection and Confederations Route Reflection Operation Configuration and Routing Knowledge BGP Confederations BGP Route Damping Route Flap and Damping Overview Route Damping Parameters Configuring and Monitoring Route Damping Troubleshooting BGP Troubleshooting BGP Troubleshooting Policy Troubleshooting Policy

AJSPR - Advanced Junos Service Provider Routing
Delivered OnlineFlexible Dates
Price on Enquiry

C)PEH/C)PTE Ultimate Boot Camp Mile 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Pen Testers Ethical Hackers Network Auditors Cybersecurity Professionals Vulnerability Assessors Cybersecurity Managers IS Managers Overview A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system. You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system. Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants. In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system.ÿ You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system.ÿ ÿ Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants.ÿ In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. Course Outline Business & Technical Logistics of Pen Testing Information Gathering Reconnaissance ? Passive (External Only) Detecting Live Systems ? Reconnaissance (Active) Banner Grabbing and Enumeration Automated Vulnerability Assessment Hacking Operating Systems Advanced Assessment and Exploitation Techniques Evasion Techniques Hacking with PowerShell Networks and Sniffing Accessing and Hacking Web Techniques Mobile and IoT Hacking Report Writing Basics

C)PEH/C)PTE Ultimate Boot Camp Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus Certified Internet of Things Security Practitioner (CIoTSP) v1.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy. This course is also designed for students who are seeking the CertNexus Certified Internet of Things Security Practitioner (CIoTSP) certification and who want to prepare for Exam ITS-110. Overview This program will validate that the candidate has the knowledge, skills, and abilities to secure network environments for IoT devices, analyze vulnerabilities and determine reasonable controls against threats, and effectively monitor IoT devices and respond to incidents. This course is designed for practitioners who are seeking to demonstrate a vendor-neutral, cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem. Managing IoT Risks Map the IoT Attack Surface Build in Security by Design Securing Web and Cloud Interfaces Identify Threats to IoT Web and Cloud Interfaces Prevent Injection Flaws Prevent Session Management Flaws Prevent Cross-Site Scripting Flaws Prevent Cross-Site Request Forgery Flaws Prevent Unvalidated Redirects and Forwards Securing Data Use Cryptography Appropriately Protect Data in Motion Protect Data at Rest Protect Data in Use Controlling Access to IoT Resources Identify the Need to Protect IoT Implement Secure Authentication Implement Secure Authorization Implement Security Monitoring on IoT Systems Securing IoT Networks Ensure the Security of IP Networks Ensure the Security of Wireless Networks Ensure the Security of Mobile Networks Ensure the Security of IoT Edge Networks Ensuring Privacy Improve Data Collection to Reduce Privacy Concerns Protect Sensitive Data Dispose of Sensitive Data Managing Software and Firmware Risks Manage General Software Risks Manage Risks Related to Software Installation and Configuration Manage Risks Related to Software Patches and Updates Manage Risks Related to IoT Device Operating Systems and Firmware Promoting Physical Security Protect Local Memory and Storage Prevent Physical Port Access

CertNexus Certified Internet of Things Security Practitioner (CIoTSP) v1.0
Delivered OnlineFlexible Dates
Price on Enquiry

Excel Pivot Tables in 1 Hour, The Magic Data Cube

4.6(12)

By PCWorkshops

Pivot tables are really very easy to create, but very powerful. By using Excel pivot tables, one can get very interesting and valuable business intelligence from your data in very little time. This short session aims to give you the techniques to use this valuable Excel tool creatively. It is enough time to learn a lot about Excel Pivot Tables, but there is very little time for other questions.

Excel Pivot Tables in 1 Hour, The Magic Data Cube
Delivered Online & In-PersonFlexible Dates
FREE

APMG AgilePM Foundation

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for anyone currently working on Agile-based projects or having experience with other forms of project management experience and want to add Agile PM skills and knowledge to their portfolio. Anyone with any experience in project-based work, either from the customer or supplier side can benefit from this course, including but not limited to: project manager, team leaders and managers or project employees. Overview AgilePM ™ certification is the result of collaboration between APMG-International and the DSDM Consortium. DSDM (Dynamic Systems Development Method) is the longest existing Agile method and the only Agile method aimed at managing Agile projects. It Has evolved over the years into a Project Framework, and AgilePM is a subset tailored to the Agile project manager. Students will be explained how the model is set up, how the different project activities and project roles are connected and how AgilePM handles project management. This course provides preparation for the Foundation exam of APMG. Training Day 1 - AgilePM Foundation Topics What is Agile? Choosing an appropriate Agile approach philosophy, principles and project variables preparing for success The DSDM Process Training Day 2 - AgilePM Foundation Topics The People ? DSDM Roles and Responsibilities The DSDM Products Key practices ? prioritization and timeboxes Training Day 3 - AgilePM Foundation Topics Planning and control throughout the lifecycle Other practices: facilitated workshops, modeling and iterative development

APMG AgilePM Foundation
Delivered OnlineFlexible Dates
Price on Enquiry

CCSE Check Point Certified Security Expert

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance. Articulate how utilizing multiple traffic queues can make traffic handling more efficient. Discuss Site-to-Site VPN basics, deployment and communities. Describe how to analyze and interpret VPN tunnel traffic. Explain Link Selection and ISP Redundancy options. Explain tunnel management features. Discuss Check Point Remote Access solutions and how they differ from each other. Describe how client security can be provided by Remote Access . Explain authentication methods including machine authentication. Explain Multiple Entry Point (MEP). Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. Course Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent

CCSE Check Point Certified Security Expert
Delivered OnlineFlexible Dates
Price on Enquiry