Duration 4 Days 24 CPD hours This course is intended for This course is geared for experienced skilled Java developers, software developers, data scientists, machine learning experts or others who wish to transtion their coding skills to Scala, learning how to code in Scala and apply it in a practical way. This is not a basic class. Overview Working in a hands-on learning environment led by our expert instructor you'll: Get comfortable with Scala's core principles and unique features, helping you navigate the language confidently and boosting your programming skills. Discover the power of functional programming and learn techniques that will make your code more efficient, maintainable, and enjoyable to write. Become proficient in creating dynamic web applications using the Play Framework, and easily connect to databases with the user-friendly Slick library. Master concurrency programming with Akka, empowering you to build scalable and fault-tolerant applications that excel in performance. Enhance your testing skills using ScalaTest and ScalaCheck, ensuring the reliability and quality of your Scala applications, while having fun in the process. Explore the fascinating world of generative AI and GPT technologies, and learn how to integrate them into your projects, adding a touch of innovation and intelligence to your Scala solutions. If your team requires different topics, additional skills or a custom approach, our team will collaborate with you to adjust the course to focus on your specific learning objectives and goals. Discover the power of Scala programming in our comprehensive, hands-on technical training course designed specifically for experienced object-oriented (OO) developers. Scala is a versatile programming language that combines the best of both OO and functional programming paradigms, making it ideal for a wide range of projects, from web applications to big data processing and machine learning. By mastering Scala, you'll be able to develop more efficient, scalable, and maintainable applications. Fast Track to Scala Programming for OO / Java Developers is a four day hands-on course covers the core principles of Scala, functional programming, web application development, database connectivity, concurrency programming, testing, and interoperability between Scala and Java. Additionally, you'll explore cutting-edge generative AI and GPT technologies, learning how to integrate them into your Scala applications for intelligent suggestions or automation. Throughout the course you?ll explore the latest tools and best practices in the Scala ecosystem, gaining valuable knowledge and experience that can be directly applied to your day-to-day work. With 50% of the course content dedicated to hands-on labs, you'll gain practical experience applying the concepts you've learned across various projects, such as building functional web applications, connecting to databases, designing modular components, and implementing concurrency. Upon completing the course, you'll have a solid understanding of the language and its features, empowering you to confidently apply your new skills in data science and machine learning projects. You'll exit well-prepared to create efficient, scalable, and maintainable Scala applications, regardless of the complexity of your projects. Introduction to Scala Scala features and benefits Comparing Scala with Java and other OO languages Installing Scala and setting up the development environment Object-Oriented Programming in Scala Classes and objects Traits, mixins, and inheritance Companion objects and factories Encapsulation and polymorphism Functional Programming Basics Pure functions and referential transparency Higher-order functions and currying Immutability and persistent data structures Pattern matching and recursion Having Fun with Functional Data Structures Lists, sets, and maps in Scala Folding and reducing operations Stream processing and lazy evaluation For-comprehensions Building Web Applications in Functional Style Introduction to Play Framework Functional web routing and request handling JSON handling with Play-JSON Middleware and functional composition Connecting to a Database Introduction to Slick library Database configuration and setup Querying and updating with Slick Transactions and error handling Building Scalable and Extensible Components Modular architecture and design patterns Dependency injection with MacWire Type classes and type-level programming Implicit parameters and conversions Concurrency Programming & Akka Introduction to Akka framework and Actor model Actor systems and message passing Futures and Promises Supervision and fault tolerance Building Confidence with Testing Introduction to ScalaTest and ScalaCheck Unit testing and property-based testing Test-driven development in Scala Mocking and integration testing Interoperability between Scala and Java Calling Java code from Scala Using Java libraries in Scala projects Converting Java collections to Scala collections Writing Scala code that can be called from Java Using Generative AI and GPT Technologies in Scala Programming Overview of GPT and generative AI Integrating GPT with Scala applications Use cases and practical examples Additional course details: Nexus Humans Fast Track to Scala Programming Essentials for OO / Java Developers (TTSCL2104) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Fast Track to Scala Programming Essentials for OO / Java Developers (TTSCL2104) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Cloud architects, systems engineers, data center administrators, and cloud administrators with experience in a service provider or managed services environment. Overview By the end of the course, you should be able to meet the following objectives: Describe how VMware Integrated OpenStack fits into the VMware SDDC and its use cases List the deployment options and how to install VMware Integrated OpenStack Describe the architecture of VMware Integrated OpenStack and its components Configure tenancy and manage user authentication Integrate the OpenStack Neutron Networking service with VMware NSX-T⢠Data Center networking platform Deploy and manage virtual machine instances Monitor VMware Integrated OpenStack with OpenStack monitoring services Design an auto-scale, multitier application using built-in automation tools Manage a VMware Integrated OpenStack control plane using Kubernetes Use the HTML5 Web UI and CLI commands to view and edit the configuration, monitor log files, and view database tables used by VMware Integrated OpenStack components This five-day course provides you with the skills to build a private cloud using VMware© Integrated OpenStack on a proven VMware SDDC. Through a combination of lecture and hands-on labs, this course builds your skills in installing, configuring, and managing VMware Integrated OpenStack. You learn how to offer IaaS and PaaS with advanced networking and security features to end users using VMware Integrated OpenStack. Course Introduction Introductions and course logistics Course objectives References and resources Introduction to VMware Integrated OpenStack Describe what an OpenStack is Describe the services that make up VMware Integrated OpenStack Describe what VMware Integrated OpenStack is Describe what is NFV and how does VIO fit in Understand the licensing model of VIO Understand the use cases of VMware Integrated OpenStack VMware Integrated OpenStack Deployment Understand the role of Kubernetes in the VIO control plane List the VMware Integrated OpenStack deployment models How to perform VIO high-availability deployment How to perform VIO compact installation Pre-requisites for installing VMware Integrated OpenStack How to use the HTML5 web UI / VIOCLI to check the deployment configurations and deployment running status Explain steps involved in patching VIO high availability setup VMware Integrated OpenStack Architecture List the VMs deployed after a VMware Integrated OpenStack high-availability installation Describe the overall architecture of the VIO HA setup List the VIO services running within Kubernetes pods Describe the role of each service Understand ssl certificates in VIO Keystone Authentication Understand keystone use cases and services List the features offered by keystone in VIO How to integrate keystone with LDAP List the configuration, view logs, and database tables related to keystone Glance Images Understand Glance use case and its services List the features offered by Glance in VIO Explain how to create flavors and images Describe how to set up metadata, for example SPBM storage policy List the custom resources/logs and database tables related to Glance Networking with Neutron Understand the Neutron use case and its services Integrate Neutron with NSX-T Data Center List the custom resources, logs, and database tables related to Neutron Managing Instances with Nova Understand Nova use cases and services Understand regions, availability zones, and host aggregates Understand the concept of tenant VDC Nova support for multiple vCenter instances How to deploy an instance using Nova How to resize an instance and view the console logs Configuration and logs related to Nova service Cinder Block Storage Understand Cinder use cases and services List the features offered by Cinder Adding a persistent volume to an instance Explain the Snapshot of a Cinder volume and attach it to another instance List the custom resources, log files, and database tables related to Cinder Monitoring with Ceilometer List the Telemetry use cases and services How to enable Ceilometer in VIO How to monitor the VIO environment using Ceilometer Configuration and log files related to Ceilometer service Automating with Heat Define Heat use cases templates and services Describe use cases of Heat Troubleshooting Concepts List common issues in VMware Integrated OpenStack Use troubleshooting tools Describe simple troubleshooting procedures List and explain Day-2 operations Advanced Features Describe Load Balancer as a Service (Octavia) Explain Firewall as a Service Describe Designate (DNS as a Service) Demonstrate automating scaling Describe selective vCPU pinning Explain SRIOV network redundancy support Describe network trunk services support Describe Live resize Describe hardware passthrough (GPU pass through) Describe external REST API Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Integrated Openstack: Install, Configure, Manage [V7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Integrated Openstack: Install, Configure, Manage [V7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This is an incredibly practical programme which has been developed to enable participants to improve their memory skills. The session focuses on specific techniques that can be used to improve retention of information. It also introduces the principles of mind-mapping By the end of this programme participants will be able to: Explain how our brain processes and stores information Describe the difference between short-term and long-term memory Use specific techniques to improve retention Explain the principles of mind mapping Be able to use mind maps to plan and order information Each participant, no matter how poor they believe their memory to be, will by the close of the session have learnt techniques that enable them to memorise 53 items in a prescriptive order - a massive boost to their confidence in their memory skills. 1 An introduction to the brain's functions Introductory brain-training How the brain works Left / right brain function Short-term and long-term memory Barriers to a good memory 2 Memory techniques Tips and techniques for improving memory Basic word association Chaining and linking Touchstone techniques Use of mnemonics Memory hooks Remembering names 3 Maximising memory Minimising barriers The importance of sleep and diet Supplements which may affect memory 4 Mind-mapping Purpose and principles Creating a mind map Use of colour to delight the eye and tickle the brain How to use the output from a map
Did you know 1 in 4 people in the UK are likely to experience mental health problems each year? Mental health is just as important as physical health, yet whilst we know how to take care of our own physical health, many people do not know how to support relatives, friends and even colleagues who are experiencing poor mental health. By developing a greater understanding of common mental health issues, as well as how best to support and guide someone to professional help, you can help further reduce the stigma associated with mental health in the UK. The QA Level 3 Award in Mental Health First Aid in the Workplace (RQF) is a regulated and nationally recognised qualification that has been specifically designed for those who would like to raise their awareness of mental health, develop an understanding on how best to support, reassure and signpost colleagues to professional support. What’s more, candidates will develop the knowledge, skills and confidence to actively promote positive mental health within their workplace, making it an ideal qualification for mental health champions/first aiders, human resources, managers, supervisors and team leaders. What’s Covered? Understanding mental health and its importance The roles and responsibilities for mental health in the workplace Importance of own wellbeing as a mental health first aider Common mental health conditions, including: Characteristics and features Work-related stress Anxiety Eating disorders Depression Post-traumatic stress disorder (PTSD) Obsessive compulsive disorder (OCD) Phobias Bipolar Self-harm Psychosis Suicide Promoting positive mental health first aid in the workplace Best practice for employers Mental health first aid at work action plan Appropriate coping strategies How employers can provide support to employees in the workplace Assisting those off work or returning to work Procedures to support employees who are off work whilst experiencing poor mental health Types of support available both locally and nationally
Duration 1 Days 6 CPD hours This course is intended for Cybersecurity Essentials provides foundational knowledge in cybersecurity and is recommended for all non-technical professionals who wish to develop an understanding of cyber safety. Overview After completing this course, students will be able to: Identify and reduce human errors that put organizations at risk for a cyber-attacks. Define Ransomware, Phishing, and Data Breaches to understand the differences. Identify the motives of hackers. Assess how data breaches occur. Develop a plan on how to protect accounts and privacy. Create a strong and secure password. Work in a secure manner while using remote Wi-Fi access. Safely use Virtual Private Networks (VPN). Identify vulnerabilities in home networks to keep them secure. Identity different social engineering techniques e.g. phishing, vishing. Detect social engineering attempts and prevent potential breaches. Prevent hackers from accessing a Mobile phone. Cybersecurity Essentials was developed using unparalleled learning methodology that prepares cadets for the Israeli Cyber and Intelligence Unit. It is designed to tackle human error by helping develop an advanced understanding and skills to protect individuals and organizations against the most common cyber threats. INTRODUCTION TO CYBERSECURITY Introduction to the world of cybersecurity; basic terminology, and why cybersecurity is so important. Review of famous cyber-attacks. ACCOUNTS & CREDENTIALS SECURITY One of the most common elements linking cyber-attacks is compromised or weak credentials. Learn different ways hackers can acquire passwords, and what to do when accounts have been compromised. How to prevent such attacks including best protection methods and password management and introduction to tools for testing and creating strong passwords. REMOTE SECURITY: WI-FI & VPN Evaluate main risks that arise when using public and non-protected Wi-Fi networks. Differentiate between private and public Wi-Fi networks, define what a VPN is and how to use it, and how to browse safely in remote environments. SOCIAL ENGINEERING How hackers take advantage of ?human-based vulnerabilities?. Define social engineering and the different types of attacks that can leverage social engineering, such as phishing or vishing. Learn how to detect social engineering attempts and prevent future breaches. MOBILE SECURITY Minimize the risk of an attack on mobile device and understand basic security principles for mobile applications. Learn how to protect photos, browsing history, text messages, and confidential business information such as emails, documents, access permission and more. Additional course details: Nexus Humans Cybersecurity Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cybersecurity Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is intended for: System engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe Cisco DWDM platform basics Describe DWDM network topologies Describe the management software used for managing Cisco DWDM networks List the different hardware components of the Cisco ONS and Cisco NCS DWDM systems Provision nodes and circuits in a Cisco DWDM network Perform node and multishelf configurations Implement SMR-based rings Provision optical circuit protection mechanisms Configure Any Rate cards Describe the function of Raman amplifiers Perform basic maintenance and troubleshooting of a Cisco DWDM network The Cisco Optical Technology Intermediate (OPT200) v3.0 course is designed to teach you the skills necessary to deploy the Cisco© Optical Networking System (ONS), 15454 Multiservice Transport Platform (MSTP), and Cisco Network Convergence System (NCS) 2000 Series Dense Wavelength-Division Multiplexing (DWDM) networks from installation to protection. Through a combination of lecture and hands-on experience, you will learn installation, configuration, circuit protection, maintenance, and basic troubleshooting using the Cisco Transport Controller for the Cisco ONS 15454 M6 and M12 shelves, and for the Cisco NCS 2016 shelf.Additionally, in this course you will review DWDM terminology and components, explore available chassis and cards, and discuss hardware installation. You will learn to use the Cisco Transport Controller server software to connect to the nodes, perform network turn-up and circuit creation, and deploy linear and single-module ROADM (SMR) DWDM multishelf topologies. Using this software, you will also configure Raman amplifiers and Any Rate cards, and configure protected and unprotected circuits. The course covers a variety of card options: controllers, transponders, multiplexer-demultiplexer, add/drop, Raman amplifiers, and Cisco Any Rate muxponder cards. You will use the various cards to configure terminal, amplifier, mesh, split, Optical Service Channel (OSC) regenerator, and Reconfigurable Optical Add/Drop Multiplexing (ROADM) nodes. Finally, you will learn how to use many of the tools and features available with the Cisco Transport Controller to perform maintenance, testing, and basic troubleshooting of your optical network. Course Outline DWDM Optical Platform Foundation Chassis and Cards Hardware Installation Node Turn-Up and Circuit Creation Node and Multishelf Configurations SMR-Based Rings 10Gb Circuit Protection Any Rate Card Configuration Raman Amplifiers Maintenance and Basic Troubleshooting Additional course details: Nexus Humans Cisco Optical Technology Intermediate v3.0 (OPT200) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Optical Technology Intermediate v3.0 (OPT200) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Although there are no mandatory prerequisites, the course is particularly suited for the following audiences: Cybersecurity engineer Cybersecurity investigator Incident manager Incident responder Network engineer SOC analysts currently functioning at entry level with 2+ years of experience Overview After taking this course, you should be able to: Describe the types of service coverage within a SOC and operational responsibilities associated with each. Compare security operations considerations of cloud platforms. Describe the general methodologies of SOC platforms development, management, and automation. Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections. Describe Zero Trust and associated approaches, as part of asset controls and protections. Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC. Use different types of core security technology platforms for security monitoring, investigation, and response. Describe the DevOps and SecDevOps processes. Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, CommaSeparated Values (CSV). Describe API authentication mechanisms. Analyze the approach and strategies of threat detection, during monitoring, investigation, and response. Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs). Interpret the sequence of events during an attack based on analysis of traffic patterns. Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools). Analyze anomalous user and entity behavior (UEBA). Perform proactive threat hunting following best practices. The Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity fundamentals and prepares you for the role of Information Security Analyst on a Security Operations Center team. You?ll learn to automate for security using cloud platforms and how to apply your knowledge to real-world scenarios Course Outline Understanding Risk Management and SOC Operations Understanding Analytical Processes and Playbooks Investigating Packet Captures, Logs, and Traffic Analysis Investigating Endpoint and Appliance Logs Understanding Cloud Service Model Security Responsibilities Understanding Enterprise Environment Assets Threat Tuning Threat Researching and Threat Intelligence Practices Understanding APIs Understanding SOC Development and Deployment Models Performing Security Analytics and Reports in a SOC Malware Forensics Basics Threat Hunting Basics Additional course details: Nexus Humans Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course does not have any technical knowledge prerequisites for the learners, besides being proficient in using a computer and the Internet. IT and/or AI knowledge is a benefit but not a hard requirement. Given the rapid development of AI and the broad range of its applications in everyday life, it is crucial for anyone to attend this course to update their digital skills in an ever-changing world. It is expected that all learners have registered for a free account of OpenAI ChatGPT at https://chat.openai.com. Overview Discover how AI relates to other 4th industrial revolution technologies Learn about AI, ML, and associated cognitive services Overview of AI development frameworks, tools and services Evaluate the OpenAI ChatGPT4 / ChatGPT3.5 model features in more detail The core aim of this ?AI for beginners? course is to introduce its audience to Artificial Intelligence (AI) and Machine Learning (ML) technologies and allow them to understand the practical applications of AI in their everyday personal and professional life. Moreover, the course aims to provide a handful of demos and hands-on exercises to allow the learners to familiarize themselves with usage scenarios of OpenAI ChatGPT and other Generative AI (GenAI) models. The content of this course has been created primarily by using the OpenAI ChatGPT model. AI theoretical concepts. Introduction to AI, ML, and associated cognitive services (Computer vision, Natural language processing, Speech analysis, Decision making). How AI relates to other 4th industrial revolution technologies (cloud computing, edge computing, internet of things, blockchain, metaverse, robotics, quantum computing). AI model classification by utilizing mind maps and the distinctive role of Gen AI models. Introduction to the OpenAI ChatGPT model and alternative generative AI models. Familiarization with the basics of the ChatGPT interface (https://chat.openai.com). Talking about Responsible AI: Security, privacy, compliance, copyright, legal challenges, and ethical implications. AI practical applications Overview of AI development frameworks, tools and services. AI aggregators review. Hand-picked AI tool demos: a.Workplace productivity and the case of Microsoft 365 Copilot. b.The content creation industry. Create text, code, images, audio and video with Gen AI. c.Redefining the education sector with AI-powered learning. Evaluate the OpenAI ChatGPT4 / ChatGPT3.5 model features in more detail: a.Prompting and plugin demos. b.Code interpreter demos. Closing words. Discussion with an AI model on the future of AI. Additional course details: Nexus Humans AI for beginners training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AI for beginners course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles: Consulting systems engineer IoT Designer Network administrator Network engineer Network manager Sales engineer Systems engineer Technical solutions architect Overview After taking this course, you should be able to: Explain the fundamentals of Cisco IoT and list common devices involved List the common protocols, standards, and data flows of IoT Explain the Cisco IoT, common needs, and the corresponding solutions Explain how programmability can be used to automate and make operations, deployment, and support of Cisco IoT more effective Describe common Cisco IoT applications and how they apply to Cisco IoT use cases Explain the functions and use cases for Cisco security applications and Cisco IoT This course prepares you to develop Internet of Things (IoT) applications for Cisco© IoT edge compute and network architecture. Through a combination of lessons and hands-on experience, you will learn to implement and deploy Cisco IOx applications using Cisco Field Network Director and Cisco Kinetic. This course covers designing, deploying, and troubleshooting edge applications, and understanding the use of management tools, so you can control your industrial network and connected devices at scale. This course will prepare you for the certification exam 300-915 Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT), a concentration in the CCNP DevNet track. Course Outlines DEFINING CISCO IOT IOT NETWORKING AND OTHER DEVICES EXAMINING IOT PROTOCOLS EXAMINING IOT STANDARDS RECOGNIZING CISCO IOT NEEDS AND SOLUTIONS USING PROGRAMMABILITY WITH CISCO IOT DESCRIBING CISCO IOT APPLICATIONS: CISCO IOX DESCRIBING CISCO IOT APPLICATIONS: CISCO KINETIC AND CISCO FIELD NETWORK DIRECTOR DEFINING CISCO SECURITY APPLICATIONS Lab outline Use an MQTT Consumer to Subscribe to Sensor Data Use Cisco IOx Applications to Receive and Process Sensor Data Troubleshoot a Sensor Connection Use and Interpret Freeboard Data Use and Interpret Grafana Data Use and Interpret Kibana Data Cisco IOx Familiarity Lab Develop and Deploy a Cisco IOx Application Troubleshoot Cisco IOx Navigate Cisco Field Network Director Explore Cisco Field Network Director API Additional course details: Nexus Humans Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to deploy and manage Endpoint Security within their security environment. Overview Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices. Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management. Identify and describe key elements of the SmartEndpoint Management console. Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console. Explain how to create and assign security policies for Endpoint clients using Endpoint Security. Understand deployment methods and server considerations for Endpoint Security Management installation. Identify the different ways to install and configure Endpoint clients. Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources. Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server. Describe additional server configurations that are available to help manage Endpoint clients. Recognize the different types of data security protections available to deploy on end user machines. Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers. Understand how to secure removable media devices. Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues. Recognize the types of threats that target Endpoint computers. Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment. Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources. Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events. Understand how to troubleshoot and debug issues. The goal of this course is to provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment. Course Topics Introduction to Endpoint Security Endpoint Security Management Deploying Endpoint Security Additional Endpoint Server Configurations Data Security Protection Advanced Threat Prevention Reporting and Troubleshooting LAB EXERCISES Installing the Endpoint Security Management Solution Deploying Endpoint Client Packages Deploying Endpoint Policy Servers Configuring High Availability for Endpoint Security Modifying Client Installations Working with Deployment Rules Working with SandBlast Agent Additional course details: Nexus Humans CCES Check Point Certified Endpoint Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCES Check Point Certified Endpoint Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.