Duration 4.375 Days 26.25 CPD hours This course is intended for This course provides a jump start on learning material that relates to the CMMC program, and to the planned Certified Professional (CP) certification in particular. It discusses the CMMC program, the current CMMC Model, and other CMMC materials as they exist today. The course may be of interest to individuals who wish to pursue the CMMC-CP certification when it is released. It may also be useful to stakeholders in organizations who will be involved in CMMC assessments, and who wish to gain a general understanding of the program and its requirements for their business planning purposes Overview In this course, you will examine the current CMMC model (Version 1.02), framework, context, and application within the DoD, as well as the expectations and requirements that will be imposed upon organizations that do business with the DoD. It will also help you to identify threats to cybersecurity and privacy within an IoT ecosystem and implement appropriate countermeasures. You will gain the skills to: · Identify risks within the defense supply chain and the established standards for managing them. · Describe how the CMMC model ensures compliance with federal acquisition regulations. · Identify responsibilities of the CMMC Certified Professional, including appropriate ethics and behavior. · Identify regulated information and establish the Certification and Assessment scope boundaries for evaluating the systems that protect that regulated information. · Evaluate OSC readiness and determine the objective evidence you intend to present to the assessor. · Use the NIST 800-171A and CMMC Assessment Guide to assess objective evidence for processes and practices. · Implement and evaluate practices required to meet CMMC maturity level 1. · Implement and evaluate processes and practices required to meet CMMC maturity level 2. · Implement and evaluate processes and practices required to meet CMMC maturity level 3. · Identify processes and practices required to meet CMMC maturity levels 4 and 5. · Work through the logistics of a CMMC assessment, including planning for and conducting the assessment, as well as any follow-up processes, such as remediation and adjudication. The Cybersecurity Maturity Model Certification (CMMC), managed by the CMMC Accreditation Body (CMMC-AB), is a program through which an organization's cybersecurity program is measured by their initial and ongoing compliance with applicable cybersecurity practices as well as their integration of corresponding policies and plans into their overall business operations. By Fiscal Year 2026, all organizations providing products or services to the United States Department of Defense (DoD) must obtain at least a Maturity Level 1 certification under this program. Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses Against Threats Ensuring Compliance through CMMC Topic A: Identify Limitations of Self-Certification Topic B: Identify Benefits of CMMC Topic C: Describe the CMMC Model Architecture Performing the General Responsibilities of a CMMC CP Topic A: Identify Responsibilities of the CMMC CP Topic B: Demonstrate Appropriate Ethics and Behavior Identifying and Scoping Regulated Information Topic A: Identify Regulated Information Topic B: Establish the Certification and Assessment Scope Boundaries Initiating the Assessment Process Topic A: Evaluate Readiness Topic B: Determine Objective Evidence Assessing Objective Evidence Topic A: Assess the Practices Using the CMMC Assessment Guides Topic B: Assess the Processes Using the CMMC Assessment Guide Level 3 Implementing and Evaluating CMMC Level 1 TTopic A: Maturity Level 1 Domains and Practices Topic B: Determine Scope Boundaries at Maturity Level 1 Topic C: Perform a Maturity Level 1 Gap Analysis Topic D: Perform a Maturity Level 1 Evidence Validation Implementing and Evaluating CMMC Levels 2 and 3 Topic A: Process Maturity Requirements for CMMC Levels 2 and 3 Topic B: Maturity Level 2 Practices Topic C: Maturity Level 3 Practices Identifying CMMC Levels 4 and 5 Topic A: Maturity Level 4 Processes and Practices Topic B: Maturity Level 5 Processes and Practices Working Through a CMMC Assessment Topic A: Define the Assessment Logistics Topic B: Resolve Assessment Related Issues Appendix A: Additional Documentation the CP Should Study
Duration 5 Days 30 CPD hours This course is intended for This course is intended primarily for network administrators, network engineers, network managers and systems engineers who would like to implement MPLS and MPLS Traffic Engineering. This course is also intended for network designers and project managers. Overview After completing this course the student should be able to: Describe the features of MPLS Describe how MPLS labels are assigned and distributed Configure and troubleshoot frame-mode MPLS on Cisco IOS platforms Describe the MPLS peer-to-peer architecture and explain the routing and packet-forwarding model in this architecture Configure, monitor, and troubleshoot VPN operations Describe how the MPLS VPN model can be used to implement managed services and Internet access Describe the various Internet access implementations that are available and the benefits and drawbacks of each model Describe the tasks and commands that are necessary to implement MPLS TE This course is designed to help students prepare for MPLS exam. This update to the course reflects the most-recent developments in network design and technologies, using real-world scenarios to help reinforce the learning of key objectives. MPLS Concepts Introducing Basic MPLS Concepts Introducing MPLS Labels and Label Stack Identifying MPLS Applications Label Assignmenet and Distribution Discovering LDP Neighbors Introducing Typical Label Distribution in Frame-Mode MPLS Introducing Convergence in Frame-Mode MPLS Frame-Mode MPLS Implementation on Cisco IOS Platforms Introducing CEF Switching Configuring Frame-Mode MPLS on Cisco IOS Platforms Monitoring Frame-Mode MPLS on Cisco IOS Platforms Troubleshooting Frame-Mode MPLS on Cisco IOS Platforms MPLS Virtual Private Network Technology Introducing Virtual Private Networks Introducing MPLS VPN Architecture Introducing the MPLS VPN Routing Model Forwarding MPLS VPN Packets MPLS VPN Implementation MPLS VPN Implementation Configuring an MP-BGP Session Between PE Routers Configuring VRF Tables Configuring Small-Scale Routing Protocols Between PE and CE Routers Monitoring MPLS VPN Operations Configuring OSPF as the Routing Protocol Between PE and CE Routers Configuring BGP as the Routing Protocol Between PE and CE Routers Troubleshooting MPLS VPNs Complex MPLS VPNs Introducing Overlapping VPNs Introducing Central Services VPNs Introducing the Managed CE Routers Service Internet Access and MPLS VPNs Combining Internet Access with MPLS VPNs Implementing Internet Access in the MPLS VPN Environment MPLS Traffic Engineering Overview Introducing MPLS Traffic Engineering Components MPLS Traffic Engineering Operations Configuring MPLS Traffic Engineering on Cisco IOS Platforms Monitoring Basic MPLS TE on Cisco IOS Platforms
Duration 5 Days 30 CPD hours This course is intended for Students preparing to take the CCNP Collaboration certification Network administrators Network engineers Systems engineers Overview After taking this course, you should be able to: - Define collaboration and describe the main purpose of key devices in a Cisco collaboration on-premise, hybrid, and cloud deployment model - Configure and modify required parameters in Cisco Unified Communications Manager (CM) including service activation, enterprise parameters, CM groups, time settings, and device pool - Deploy and troubleshoot IP phones via auto registration and manual configuration within Cisco Unified CM - Describe the call setup and teardown process for a SIP device including codec negotiation using Session Description Protocol (SDP) and media channel setup - Manage Cisco Unified CM user accounts (local and via Lightweight Directory Access Protocol [LDAP]) including the role/group, service profile, UC service, and credential policy - Configure dial plan elements within a single site Cisco Unified CM deployment including Route Groups, Local Route Group, Route Lists, Route Patterns, Translation Patterns, Transforms, SIP Trunks, and SIP Route Patterns - Configure Class of Control on Cisco Unified CM to control which devices and lines have access to services - Configure Cisco Unified CM for Cisco Jabber and implement common endpoint features including call park, softkeys, shared lines, and pickup groups - Deploy a simple SIP dial plan on a Cisco Integrated Service Routers (ISR) gateway to enable access to the PSTN network - Manage Cisco UCM access to media resources available within Cisco UCM and Cisco ISR gateways - Describe tools for reporting and maintenance including Unified Reports, Cisco Real-Time Monitoring Tool (RTMT), Disaster Recovery System (DRS), and Call Detail Records (CDRs) within Cisco Unified CM - Describe additional considerations for deploying video endpoints in Cisco Unified CM - Describe the integration of Cisco Unity with Cisco Unified CM and the default call handler The Understanding Cisco Collaboration Foundations (CLFNDU) v1.1 course gives you the skills and knowledge needed to administer and support a simple, single-site Cisco© Unified Communications Manager (CM) solution with Session Initiation Protocol (SIP) gateway. The course covers initial parameters, management of devices including phones and video endpoints, management of users, and management of media resources, as well as Cisco Unified Communications solutions maintenance and troubleshooting tools. In addition, you will learn the basics of SIP dial plans including connectivity to Public Switched Telephone Network (PSTN) services, and how to use class-of-service capabilities. Course Outline Exploring The Path To Collaboration Introducing Cisco Unified Communications Manager And Initial Parameters Xploring Endpoints And The Registration Process Exploring Codecs And Call Signaling Managing Users In Cisco Unified Communication Manager Describing A Basic Dial Plan Describing Class Of Service Enabling Endpoints And Features Describing The Cisco Isr As A Voice Gateway Exploring Cisco Unified Communication Manager Media Resources Reporting And Maintenance Exploring Additional Requirements For Video Endpoints Describing Cisco Unity Connection
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Cloud administrators Cloud solution architects Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview After you complete this course the learner will be able to meet these overall objectives: Explain business and technical challenges of going to the cloud Understand benefits of an application-centric hybrid cloud multicloud management platform Navigate Cisco CloudCenter Suite architecture Understand Cisco CloudCenter Suite administrative capabilities including cloud management, multi-tenancy, governance, and policy enforcement Describe application lifecycle management and provisioning in cloud Describe how to use Cisco CloudCenter Suite to manage the workloads in multicloud CLDCCS, Mulitcloud Management with Cisco© CloudCenter Suite is a 3-day intensive training course that teaches you to securely design, automate, and deploy applications across multiple clouds while optimizing cost and compliance with comprehensive reporting, visibility, and policy-enforcement. Through a combination of lessons with hands-on lab exercises, you will learn to simplify the lifecycle management of multicloud applications, workflows, and their infrastructure. This course will help you: Acquire the advanced skills and techniques for API calls, that can deploy and manage workloads in multiple environments without having deep cloud expertise Learn provisioning and orchestration, cost management, and workload optimization by leveraging cloud management Understanding Cloud Transitions Overview of Traditional IT Introducing Cisco CloudCenter Suite Cisco CloudCenter Suite Definition Setting Up Cisco CloudCenter Workload Manager Artifact Repository Overview and Configuration Understanding User Administration and Multitenancy in Cisco CloudCenter Suite Cisco CloudCenter Suite User Roles Grasping Application Modeling in Cisco CloudCenter Workload Manager Model an Application Identifying Resource Placement Callouts and Lifecycle Actions in Cisco CloudCenter Workload Manager Resource Placement and Validation Callout Understanding Application Deployment Framework in Cisco CloudCenter Workload Manager Workload Manager Application Parameters Exploring Application Services in Cisco CloudCenter Workload Manager Application Services Framework Integrating Cisco CloudCenter Workload Manager with Cisco Application-Centric Infrastructure Configure CloudCenter Workload Manager for Cisco ACI Introducing Application Management in Cisco CloudCenter Workload Manager Cisco CloudCenter Workload Manager Actions Library Exploring Advanced Features in CloudCenter Workload Manager Scheduling an Application in Cisco CloudCenter Workload Manager Comprehending Policies and Tagless Governance in CloudCenter Workload Manager Cisco CloudCenter Workload Manager Policies Introducing Action Orchestrator and Cost Optimizer in Cisco CloudCenter Suite Action Orchestrator in Cisco CloudCenter Suite Additional course details: Nexus Humans Cisco Multicloud Management with Cisco CloudCenter Suite (CLDCCS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Multicloud Management with Cisco CloudCenter Suite (CLDCCS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course provides an immersive learning experience for business and technical professionals who need a thorough understanding of the CMMC program. It does this by taking the point of view of a CMMC Certified Professional. Students might consider taking this course to learn more about the overall CMMC program, how DoD contractors are assessed, and how to help their organizations prepare for a CMMC Assessment. Overview In this course, you will learn about the CMMC Model, framework, context, and application within the DoD, as well as the expectations and requirements imposed upon organizations that do business with the DoD. You will: Identify the threats to the Defense Supply Chain and the established regulations and standards for managing the risk. Identify the sensitive information that needs to be protected within the Defense Supply Chain and how to manage it. Describe how the CMMC Model ensures compliance with federal acquisitions regulations. Identify responsibilities of the Certified CMMC Professional, including appropriate ethical behavior. Establish the Certification and Assessment scope boundaries for evaluating the systems that protect regulated information. Prepare the OSC for an Assessment by evaluating readiness. Use the CMMC Assessment Guides to determine and assess the Evidence for practices. Implement and evaluate practices required to meet CMMC Level 1. Identify the practices required to meet CMMC Level 2. Work through the CMMC Assessment process. The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices, as well as their integration of corresponding policies and plans into their overall business operations. Once rule-making has concluded and CMMC 2.0 has been implemented, all organizations providing products or services to the United States Department of Defense (DoD) must comply with the requirements of their applicable CMMC Level. This course provides a complete review of the key elements of this important program. Lesson 1: Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses against Threats Lesson 2: Handling Sensitive Information Topic A: Identify Sensitive Information Topic B: Manage the Sensitive Information Lesson 3: Ensuring Compliance through CMMC Topic A: Describe the CMMC Model Architecture Topic B: Define the CMMC Program and Its Ecosystem Topic C: Define Self-Assessments Lesson 4: Performing CCP Responsibilities Topic A: Identify Responsibilities of the CCP Topic B: Demonstrate Appropriate Ethics and Behavior Lesson 5: Scoping Certification and Assessment Boundaries Topic A: Use the CMMC Assessment Scope Documentation Topic B: Get Oriented to the OSC Environment Topic C: Determine How Sensitive Information Moves Topic D: Identify Systems in Scope Topic E: Limit Scope Lesson 6: Preparing the OSC Topic A: Foster a Mature Cybersecurity Culture Topic B: Evaluate Readiness Lesson 7: Determining and Assessing Evidence Topic A: Determine Evidence Topic B: Assess the Practices Using the CMMC Assessment Guides Lesson 8: Implementing and Evaluating Level 1 Topic A: Identify CMMC Level 1 Domains and Practices Topic B: Perform a CMMC Level 1 Gap Analysis Topic C: Assess CMMC Level 1 Practices Lesson 9: Identifying Level 2 Practices Topic A: Identify CMMC Level 2 Practices Lesson 10: Working through an Assessment Topic A: Identify Assessment Roles and Responsibilities Topic B: Plan and Prepare the Assessment Topic C: Conduct the Assessment Topic D: Report the Assessment Results Topic E: Conduct the CMMC POA&M Close-Out Assessment
Duration 1 Days 6 CPD hours This course is intended for This course provides an introductory overview of the CMMC program for organizational decision makers. Business and IT leaders and IT staff might consider taking this course to learn about the CMMC Model to get a sense of what's required for a successful assessment, and the various ways they can start preparing. Overview In this course, you will identify the key elements and potential impacts of the Cybersecurity Maturity Model Certification (CMMC) program. You will: Identify the crucial elements that are driving the CMMC initiative. Describe the architecture of the CMMC Model and the rationale behind it. Prepare your organization for a successful CMMC Assessment. Identify the roles and responsibilities in the CMMC ecosystem and describe the phases of an Assessment. The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices. This course provides a complete review of the key elements of this important program and will entitle you to a CMMC Trailblazer badge.Important: This curriculum product is not considered CMMC-AB Approved Training Material (CATM). This course is not intended as certification preparation and does not qualify students to sit for the CMMC CP certification exam. Identifying What's at Stake Topic A: Identify the Threats and Regulatory Responses Topic B: Identify Sensitive Information Describing CMMC Topic A: Describe the CMMC Model Architecture Topic B: Describe the CMMC Program Getting Ready for a CMMC Assessment Topic A: Scope Your Environment Topic B: Analyze the CMMC Assessment Guides Topic C: Foster a Mature Cybersecurity Culture Topic D: Identify Helpful Documents Topic E: Evaluate Your Readiness Interacting with the CMMC Ecosystem Topic A: Identify the CMMC Ecosystem Topic B: Describe a CMMC Assessment
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: System administrators Technical solutions architects Systems integrators Channel partners Value-added resellers Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview Upon completing this course, the learner will be able to meet these overall objectives: Understand Cisco UCS Management in Cisco Intersight Describe the Cisco UCS Platform including Cisco X-Series Understand Cisco Intersight Workload Optimizer Explain Kubernetes Orchestration with Cisco Intersight Kubernetes Service (IKS) and Cisco UCS Perform Automation Using Cisco Intersight Create Intersight Elements Using Terraform Manage Intersight Using the API Cisco Intersight Overview (DCISO) is a 3-day instructor led course that builds your experience with the administration of Cisco Unified Computing System (UCS) X-Series servers, including using Cisco Intersight for UCS management. This course covers architecture, configuration, and operation of Cisco Intersight©, and is designed to serve the needs of engineers seeking to understand the capabilities of Cisco Intersight for managing data centers from a single management platform.This course will help you:Use SaaS or on-prem version of Cisco Intersight to enable IT organizations to analyze, simplify, and automate their environments in more advanced ways than the prior generations of toolsGain hands-on experience using Cisco IntersightUnderstand the X-Series, B-Series, and C-Series product line similarities and differencesDescribe Cisco Intersight and how it can be used to manage UCS and Cisco Hyperflex©Understand the process for upgrading firmware with Cisco IntersightAdministering server profiles, pools, and policies with Cisco IntersightDescribe how to get started with Cisco Intersight programmability Course Outline Describing Cisco UCS Management in Cisco Intersight Describing the Cisco UCS Platform Describing Cisco Intersight Workloads Describing Automation Options Using Cisco Intersight Additional course details: Nexus Humans Cisco Intersight Overview (DCISO) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Intersight Overview (DCISO) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
The Combined First Aid at Work and Paediatric First Aid course has been specifically designed for those who work in settings that require both First Aiders and Paediatric First Aiders, such as schools, sports clubs, or other childcare settings, and has been perfectly streamlined to avoid the duplication of topics associated with attending both the First Aid at Work and Paediatric First Aid courses separately.
The Combined Emergency First Aid at Work and Emergency Paediatric First Aid course has been specifically designed to avoid the duplication of topics encountered in attending separate Emergency First Aid at Work and Emergency Paediatric First Aid courses. It is tailored for those who work in environments that require both First Aiders and Peadiatric First Aiders, such as schools, sports clubs or childcare facilities. This streamlined approach maximises efficiency and saves time for those seeking both certifications.
Duration 1 Days 6 CPD hours This course is intended for Experienced system administrators or network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Explain and configure Local Load Balancing constructors such as Virtual Services, Pools, Health Monitors and related components During this one-day course, you gain an understanding of the architecture and features of VMware NSX Advanced Load Balancer (Avi Networks) solution. This course provides hands-on labs to provide a solid foundation to load balancing fundamentals and work with most common load balancing functionality offered by VMware NSX Advanced Load Balancer (Avi Networks) solution. Course Introduction Introductions and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Virtual Services Configuration Concepts Explain Virtual Service components Explain Virtual Service types Explain and configure basic virtual services components such as Application Profiles, Network Profiles, Pools and Health Monitors Profiles and Policies Explain and deep dive on Advanced Virtual Service creation Explain and deep dive on Application Profiles and Types such as L4, DNS, Syslog and HTTP Explain and configure advanced application HTTP Profile options Deep dive on Network Profiles and Types Explain and configure SSL Profiles and Certificates Explain and Configure HTTP and DNS policies Pools Configuration Concepts Explain and deep dive on Pools configuration options Describe available Load Balancing algorithms Explain multiple Health Monitor types Explain multiple Persistence Profiles Explain and configure Pool Groups