• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

642 Courses

Palo Alto Networks: Prisma Access SASE Security: Design and Operation EDU-318 (3.2)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security Engineers Security Administrators Security Operations Specialists Security Analysts Network Engineers Overview Successful completion of this four-day, instructor-led course will help enhance your understanding of how to better protect your applications, remote networks, and mobile users using a SASE implementation. You will get hands-on experience configuring, managing, and troubleshooting Prisma Access in a lab environment. The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and network security services from the cloud. This course is intended for people in the fields of public cloud security and cybersecurity, or for anyone who wants to learn how to secure remote networks and mobile users. Course Outline 1 - Prisma Access Overview and Definitions 2 - Planning and Design Architecture 3 - Routing SD-WAN Design and CloudGenix 4 - Activate and Configure Service Connections 5 - Rule Enforcement in Prisma Access and SSL Decrypt 6 - Panorama Operations for Prisma Access and Fawkes Overview 7 - Remote Networks 8 - Mobile Users 9- Cloud Secure Web Gateway 10 - Tune, Optimize and Troubleshoot 11 - Manage Multiple Tenants 12 - What?s New in v2.1 13 - Next Steps Additional course details: Nexus Humans Palo Alto Networks: Prisma Access SASE Security: Design and Operation EDU-318 (3.2) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks: Prisma Access SASE Security: Design and Operation EDU-318 (3.2) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks: Prisma Access SASE Security: Design and Operation EDU-318 (3.2)
Delivered OnlineFlexible Dates
Price on Enquiry

Basic NetApp Configuration and Administration (BNCA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for NetApp Customers, IT Generalists, Academic Alliance Students Overview Explain ONTAP operation system, Use the CLI and OnCommand System Manager to identify storage components, configure storage systems and storage virtual machines for NAS and SAN client access, create FlexVol volumes, qtrees, and LUNs, manage snapshot copies Introduces introductory concepts covered through instructor led discussions and hands-on labs are how to create aggregates, virtual interfaces, snapshots, volumes, qtrees, and storage virtual machines. Getting Started with Data ONTAP List basic storage concepts such as aggregates, RAID groups, volumes, qtrees, and LUNs Describe Data ONTAP features such as Snapshot copies, unified storage, and storage efficiency Describe the similarities and differences between the 7-Mode and clustered Data ONTAP operating systems Use the CLI and GUI for administrative purposes Hardware Basics Describe the NetApp storage system hardware platforms and the types of disks that they support Describe the hardware components of NetApp storage controllers Use OnCommand System Manager or the CLI to identify hardware components in Data ONTAP operating in 7-Mode and the clustered Data ONTAP operating system Creating & Managing Aggregates Describe aggregates and RAID groups Create aggregates in Data ONTAP operating in 7-Mode Create aggregates in the clustered Data ONTAP operating system Manage aggregates Managing NAS Client Access Configure NAS client access in Data ONTAP operating in 7-Mode Configure data storage virtual machines (SVMs*) for NAS client access in clustered Data ONTAP Create FlexVol volumes and qtrees Managing SAN Client Connections Describe SAN protocol implementation in Data ONTAP operating in 7-Mode and the clustered Data ONTAP operating system Use OnCommand System Manager to create iSCSI-attached LUNs Use NetApp SnapDrive for Windows to create and format iSCSI-attached LUNs Access and manage a LUN from a Windows host Managing Volumes Explain the relationship between space guarantees, volumes, and aggregates Define thin provisioning and explain how it is used Define deduplication and describe the benefits that it provides Use OnCommand System Manager to set quotas Managing Snapshot Copies Define the function of Snapshot copies Create and delete a Snapshot copy Create Snapshot policies in the clustered Data ONTAP operating system Restore a volume from a Snapshot copy Create FlexClone volume clones that are backed by Snapshot copies Steps to Certification Recall the steps to NetApp Certification

Basic NetApp Configuration and Administration (BNCA)
Delivered OnlineFlexible Dates
Price on Enquiry

NECA: Nutanix Enterprise Cloud Administration

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Administrators, architects, and business leaders who manage Nutanix clusters in the datacenter Managers and technical staff seeking information to drive purchase decisions Anyone who is seeking the Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) certification Overview During this program, attendees will: Develop a working knowledge of the Nutanix product family. Understand the requirements and considerations involved in setting up a Nutanix cluster. Familiarize themselves with cluster management and monitoring via the Prism web console. Learn how to create, manage, and migrate VMs, set up data protection services, and plan for business continuity. Understand how to plan and handle upgrades, assess future requirements, and create what-if scenarios to adress scaling for business needs. The Nutanix Enterprise Cloud Administration (ECA) course enables administrators (system, network, and storage) to successfully configure and manage Nutanix in the datacenter. The course covers many of the tasks Nutanix administrators perform through the use of graphical user interfaces (GUIs) and command line interfaces (CLIs). It also provides insight into a Nutanix cluster?s failover and self-healing capabilities, offers tips for solving common problems, and provides guidelines for collecting information when interacting with Nutanix Support Introduction The section describes the Nutanix HCI solution, walks you through the components of the Nutanix Enterprise Cloud, and explains the relationship between physical and logical cluster components. Managing the Nutanix Cluster In this section, you will use the Prism console to monitor a cluster, configure a cluster using various interfaces, use the REST API Explorer to manage the cluster, and learn how to deploy Nutanix-specific PowerShell cmdlets. Securing the Nutanix Cluster This section shows how to secure a Nutanix cluster through user authentication, SSL certificate installation, and cluster access control. Acropolils Networking This section explains how to configure managed and unmanaged Acropolis networks and describes the use of Open vSwitch (OVS) in Acropolis. You will learn how to display and manage network details, differentiate between supported OVS bond modes, and gain insight into default network configuration. VM Management This section shows you how to upload images, and how to create and manage virtual machines. Health Monitoring and Alerts In this section, you will use the Health Dashboard to monitor a cluster?s health and performance. You will also use Analysis Dashboard to create charts that you can export with detailed information on a variety of components and metrics. Distributed Storage Fabric This section discusses creating and configuring storage containers, including the storage optimization features: deduplication, compression, and erasure coding. AHV Workload Migration Using Nutanix Move, this section shows how to migrate workloads to a cluster running AHV. This is followed by a lab where a VM running on a Nutanix cluster configured with ESXi is migrated to a Nutanix cluster running AHV. File and Volumes This section gives you detailed information on Nutanix Volumes, which provides highly available, high-performance block storage through a few easy configuration steps. It also discusses Nutanix Files. Understanding Infrastructure Resiliency This section shows how Nutanix provides comprehensive data protection at all levels of the virtual datacenter: logical and physical. Data Protection Data can be replicated between Nutanix clusters, synchronously and asynchronously. This section shows how to configure a Protection Domain (PD) and Remote Sites, recover a VM from a PD, and perform a planned failover of a PD. Prism Central Having discussed and used Prism Element earlier, this section looks at the capabilities of Prism Central. With the added functionality provided by a Pro license, the focus is on features related to monitoring and managing multiple activities across a set of clusters. Monitoring the Nutanix Cluster This section shows you where to locate and how to interpret cluster-related log files. In addition, you will take a closer look at the Nutanix Support Portal and online help. Cluster Management and Expansion This section outlines essential life-cycle operations, including starting/stopping a Nutanix cluster, as well as starting/shutting down a node. You will also learn how to expand a cluster, manage licenses, and upgrade the cluster?s software and firmware. Remote Office Branch Office (ROBO) Deployments In this section, you will understand various configurations and requirements specific to a ROBO site. This includes hardware/software, Witness VM, networking, failure and recovery scenarios for two-node clusters, and the seeding process. Additional course details: Nexus Humans NECA: Nutanix Enterprise Cloud Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the NECA: Nutanix Enterprise Cloud Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

NECA: Nutanix Enterprise Cloud Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Cybersecurity Specialist

By SkillWise

Overview Uplift Your Career & Skill Up to Your Dream Job - Learning Simplified From Home! Kickstart your career & boost your employability by helping you discover your skills, talents, and interests with our special Cybersecurity Specialist Course. You'll create a pathway to your ideal job as this course is designed to uplift your career in the relevant industry. It provides the professional training that employers are looking for in today's workplaces. The Cybersecurity Specialist Course is one of the most prestigious training offered at Skillwise and is highly valued by employers for good reason. This Cybersecurity Specialist Course has been designed by industry experts to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Cybersecurity Specialist Course, like every one of Skillwise's courses, is meticulously developed and well-researched. Every one of the topics is divided into elementary modules, allowing our students to grasp each lesson quickly. At Skillwise, we don't just offer courses; we also provide a valuable teaching process. When you buy a course from Skillwise, you get unlimited Lifetime access with 24/7 dedicated tutor support. Why buy this Cybersecurity Specialist? Unlimited access to the course forever Digital Certificate, Transcript, and student ID are all included in the price Absolutely no hidden fees Directly receive CPD Quality Standard-accredited qualifications after course completion Receive one-to-one assistance every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Cybersecurity Specialist there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for free. Original Hard Copy certificates need to be ordered at an additional cost of £8. Who is this course for? This Cybersecurity Specialist course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skills. Prerequisites This Cybersecurity Specialist does not require you to have any prior qualifications or experience. You can just enroll and start learning. This Cybersecurity Specialist was made by professionals and it is compatible with all PCs, Macs, tablets, and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as a bonus, you will be able to pursue multiple occupations. This Cybersecurity Specialist is a great way for you to gain multiple skills from the comfort of your home.   Module 1: Introduction to Cyber Security Introduction to Cyber Security 00:20:00 Module 2: Cyber Security and Data Breaches Cyber Security and Data Breaches 00:15:00 Module 3: Cyber Attacks Cyber Attacks 00:20:00 Module 4: Cybercrimes Cybercrimes 00:20:00 Module 5: Device Management Device Management 00:20:00 Module 6: Internet Browsing Internet Browsing 00:15:00 Module 7: Office and Remote Work Security Office and Remote Work Security 00:15:00 Module 8: Password Management Password Management 00:20:00 Module 9: Preventative Measures Preventative Measures 00:15:00

Cybersecurity Specialist
Delivered Online On Demand
£49

Palo Alto Firewall Training with Step-by-Step Lab Workbook

4.8(9)

By Skill Up

Become a network security expert with comprehensive Palo Alto firewall training. Master configurations and protection techniques.

Palo Alto Firewall Training with Step-by-Step Lab Workbook
Delivered Online On Demand31 hours
£25

Security Intelligence Analyst - 5 Courses Bundle

By NextGen Learning

Imagine yourself as a quiet protector, an unseen hero. You are the person who analyses information deeply to make sure everything stays safe and secure. This Security Intelligence Analyst course bundle comprising of five significant courses is designed to help you become this kind of hero in a theory-focused way. As you delve deeper into this theoretical Security Intelligence Analyst course bundle, you'll unlock the secrets of security management, understanding the vital role a Security Guard plays in maintaining peace and order. You'll understand the concept of close protection and its strategic significance in safeguarding people and assets. With each lesson, you will better understand door supervising and the essence of maintaining order at entrances and exits. Further, you will be exposed to the fascinating field of criminal intelligence analysis. You'll learn to interpret patterns, predict behaviours and make informed decisions that could prevent criminal activities. This course is your gateway into the world of security intelligence, transforming you from a learner into a guardian of peace and security. Master the principles of security and open doors to an exciting career in security intelligence. The five CPD Accredited courses are: Security Management Diploma Security Guard Close Protection Door Supervising Criminal Intelligence Analyst Learning Outcomes: Understand the principles and applications of security management. Acquire knowledge about the roles and responsibilities of a security guard. Gain insights into close protection practices and procedures. Learn about the functions and duties of door supervising. Grasp the core concepts of criminal intelligence analysis. Develop a holistic understanding of the security industry. "Security Management Diploma": Understand the intricate nuances of security management, providing you with a robust foundation. "Security Guard": Dive into the theoretical realm of a security guard's responsibilities and key roles. "Close Protection": Uncover the strategic elements that go into planning and executing close protection operations. "Door Supervising": Learn about the intricacies involved in door supervising, helping maintain optimal security. "Criminal Intelligence Analyst": Decode the fundamentals of criminal intelligence, aiding in threat detection and prevention. "Theoretical Focus": A rigorous theoretical approach ensures you grasp all the concepts with clarity. "Comprehensive Course": This course is designed to cover the broad aspects of security, enhancing your understanding. "Enrol Today": Begin your journey in mastering security intelligence analysis. Your intellectual arsenal awaits. CPD 50 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals aiming for a career in the security industry. Those interested in understanding security management and its associated roles. Aspiring security intelligence analysts seeking theoretical knowledge. Professionals in the field looking to deepen their understanding of security concepts. Career path Security Manager - £30K to £50K/year. Security Guard - £18K to £25K/year. Close Protection Officer - £25K to £50K/year. Door Supervisor - £20K to £30K/year. Criminal Intelligence Analyst - £25K to £45K/year. Security Consultant - £35K to £60K/year. Certificates Certificate Of Completion Digital certificate - Included Certificate Of Completion Hard copy certificate - Included You will get a complimentary Hard Copy Certificate.

Security Intelligence Analyst - 5 Courses Bundle
Delivered Online On Demand25 hours
£39

Palo Alto Firewall V9 & V10 (A to Z) Training Course

4.8(9)

By Skill Up

Venture into the realms of Palo Alto Firewall V9 & V10 with this comprehensive training course, guiding you through its many facets for a secure online presence.

Palo Alto Firewall V9 & V10 (A to Z) Training Course
Delivered Online On Demand36 hours
£25

Advanced Computer Networks Security Course

4.8(9)

By Skill Up

Gain the solid skills and knowledge to kickstart a successful career and learn from the experts with this

Advanced Computer Networks Security Course
Delivered Online On Demand8 hours 8 minutes
£25

Computer Networks Security

4.7(160)

By Janets

Register on the Computer Networks Security today and build the experience, skills and knowledge you need to enhance your expert development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a digital certificate as a proof of your course completion. The Computer Networks Security course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Computer Networks Security course Receive a e-certificate upon successful completion of the course Get taught by experienced, expert instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certificate of Achievement Endorsed Certificate of Achievement from the Quality Licence Scheme Once the course has been completed and the assessment has been passed, all students are entitled to receive an endorsed certificate. This will provide proof that you have completed your training objectives, and each endorsed certificate can be ordered and delivered to your address for only £99.00. Please note that overseas students may be charged an additional £10 for postage. CPD Certificate of Achievement from Janets Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Endorsement This course and/or training programme has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course and/or training programme is not regulated by Ofqual and is not an accredited qualification. Your training provider will be able to advise you on any further recognition, for example progression routes into further and/or higher education. For further information please visit the Learner FAQs on the Quality Licence Scheme website. Method of Assessment In order to ensure the Quality Licensing scheme endorsed and CPD acknowledged certificate, learners need to score at least 60% pass marks on the assessment process. After submitting assignments, our expert tutors will evaluate the assignments and give feedback based on the performance. After passing the assessment, one can apply for a certificate. Who Is This Course For The course is ideal for those who already work in this sector or are an aspiring expert . This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a expert lesson to prove your newly-acquired knowledge. Requirements The online training is open to all students and has no formal entry requirements. To study the Computer Networks Security  course, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Introduction Introduction 1122 00:10:00 Section 01: An Introduction to Computer Networks 1.1 Computer Network 00:11:00 1.2 Computer Network Topologies 00:11:00 1.3 Categories of Computer Network 00:10:00 1.4 Computer Network Devices 00:11:00 1.5 Transmission Media 00:09:00 Section 02: ISO/OSI Model 2.1 ISO/OSI Model 00:10:00 2.2 Application, Presentation, and Session Layers 00:12:00 2.3 Transport and Network Layers 00:11:00 2.4 Data Link and Physical Layers 00:09:00 2.5 ISO/OSI Model in Action 00:10:00 Section 03: TCP/IP Protocols 3.1 Introduction to Computer Networks Protocols 00:11:00 3.2 IP Protocol 00:13:00 3.3 TCP and UDP Protocols 00:12:00 3.4 Application Protocols 00:12:00 3.5 TCP/IP Characteristics and Tools 00:11:00 Section 04: Wireless Networks 4.1 Wireless Networks Benefits 00:09:00 4.2 Types of Wireless Networks 00:12:00 4.3 Wireless Networks Protocol (Wi-Fi) 00:07:00 4.4 Wireless Networks Devices 00:10:00 4.5 Wireless Networks Drawbacks 00:09:00 Section 05: Network Security 5.1 Security Goals 00:09:00 5.2 Securing the Network Design 00:10:00 5.3 TCP/IP Security and Tools 00:12:00 5.4 Port Scanning and Tools 00:12:00 5.5 Sniffing and Tools 00:10:00 Section 06: Firewalls and Honeypots 6.1 Reasons to Use Firewall 00:13:00 6.2 Firewalls Rules 00:11:00 6.3 Firewalls Filtering 00:09:00 6.4 Honeypots 00:07:00 6.5 Bypassing Firewalls 00:08:00 Section 07: Intrusion Detection and Prevention System 7.1 Intrusion Detection System: IDS 00:11:00 7.2 Network IDS: NIDS 00:06:00 7.3 NIDS Challenges 00:09:00 7.4 Snort as NIDS 00:08:00 7.5 Intrusion Prevention Systems: IPS 00:07:00 Section 08: Wireless Network Security 8.1 Wired Equivalent Privacy WEP Attacking 00:11:00 8.2 WPA and AES Protocols 00:09:00 8.3 Wireless Security Misconceptions 00:09:00 8.4 Wireless Attacks and Mitigation 00:09:00 8.5 Secure Network Design with Wireless 00:09:00 Section 09: Physical Security and Incident Handling 9.1 Physical Security Objectives 00:11:00 9.2 Physical Threats and Mitigation 00:11:00 9.3 Defense in Depth (DiD) 00:07:00 9.4 Incident 00:06:00 9.5 Incident Handling 00:14:00 Section 10: Network Security: Conclusion 10.1 Confidentiality, Integrity, and Availability (CIA) 00:06:00 10.2 Assets, Threats, and Vulnerabilities 00:04:00 10.3 Risks and Network Intrusion 00:06:00 10.4 Common Attacks 00:09:00 10.5 Security Recommendations 00:06:00 Assignment Assignment - Computer Networks Security 2 weeks, 1 day Order Your Certificate Order your Certificate QLS 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Computer Networks Security
Delivered Online On Demand3 weeks
£25

Cisco CCNP Troubleshoot and Maintain Cisco IP Switched Networks (TSHOOT) v2.0 Training

4.3(43)

By John Academy

Description Troubleshooting and Maintaining Cisco IP Switched Networks is a qualifying exam for the Cisco Certified Network Professional CCNP, certification. This Cisco CCNP Troubleshoot and Maintain Cisco IP Switched Networks (TSHOOT) v2.0 Training will help you to be certified successfully with all the important knowledge and skills necessary to (1) plan and perform regular maintenance on complex enterprise routed and switched networks and (2) use technology-based practices and a systematic ITIL-compliant approach to perform network troubleshooting. This Cisco CCNP Troubleshoot and Maintain Cisco IP Switched Networks (TSHOOT) v2.0 Training designed for you, if you are a network engineer with at least one year of professional work experience. You will learn to plan and perform regular maintenance on complex enterprise routed and switched networks and use technology-based practices and a systematic ITIL-compliant approach to perform network troubleshooting. At the end of the course, you will get increased skill level and developed as set of best practices based on your own. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our Cisco CCNP Troubleshoot and Maintain Cisco IP Switched Networks (TSHOOT) v2.0 Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Planning Maintenance for Complex Networks Planning Maintenance for Complex Networks FREE 00:14:00 Network Maintenance Tools, Applications, and Resources 00:32:00 Troubleshooting Processes for Complex Enterprise Networks Troubleshooting Processes for Complex Enterprise Networks 00:09:00 Implementing Troubleshooting Procedures 01:15:00 Using Maintenance and Troubleshooting Tools and Applications Using Maintenance and Troubleshooting Tools and Applications 00:12:00 Collecting Real-time Information Using Cisco IOS debug Commands 00:10:00 Gathering Information with SNMP 00:15:00 Maintaining and Troubleshooting Campus Switched Solutions Maintaining and Troubleshooting Campus Switched Solutions Troubleshooting Tools and Applications 00:12:00 Spanning Tree Failures 00:12:00 Troubleshooting Multi-layer Switches 00:43:00 Maintaining and Troubleshooting Routing Solutions Maintaining and Troubleshooting Routing Solutions 00:25:00 OSPF Review Network Areas and LSAs 00:27:00 OSPF to EIGRP Redistribution Troubleshooting Process 00:32:00 Troubleshooting Addressing Services Troubleshooting Addressing Services 00:24:00 DHCP Overview Client-Server Communication 00:23:00 IPv6 Troubleshooting - show Commands 00:40:00 Troubleshooting Network Performance Issues Troubleshooting Network Performance Issues 00:25:00 AutoQoS Troubleshooting Example 00:24:00 Spanning-Tree Issues 00:44:00 Troubleshooting Converged Networks Troubleshooting Converged Networks 00:16:00 Section 2 Overview 00:16:00 Section 3 Overview 00:26:00 Maintaining and Troubleshooting Network Security Implementations Maintaining and Troubleshooting Network Security Implementations 00:13:00 IOS SPI Example 00:14:00 BORW TSHOOT Example 2 Crypto Map ACL Error 00:10:00 Review and Preparation for Troubleshooting Complex Enterprise Network Review and Preparation for Troubleshooting Complex Enterprise Networks 00:09:00 Section 2 Overview 00:46:00 Mock Exam Mock Exam- Cisco CCNP Troubleshoot and Maintain Cisco IP Switched Networks (TSHOOT) v2.0 Training 00:20:00 Final Exam Final Exam- Cisco CCNP Troubleshoot and Maintain Cisco IP Switched Networks (TSHOOT) v2.0 Training 00:20:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Cisco CCNP Troubleshoot and Maintain Cisco IP Switched Networks (TSHOOT) v2.0 Training
Delivered Online On Demand11 hours 28 minutes
£24