Duration 5 Days 30 CPD hours This course is intended for Network and security architects and consultants who design the enterprise and data center networks and NSX environments Overview By the end of the course, you should be able to meet the following objectives: Describe and apply a design framework Apply a design process for gathering requirements, constraints, assumptions, and risks Design a VMware vSphere virtual data center to support NSX requirements Create a VMware NSX Manager⢠cluster design Create a VMware NSX Edge⢠cluster design to support traffic and service requirements in NSX Design logical switching and routing Recognize NSX security best practices Design logical network services Design a physical network to support network virtualization in a software-defined data center Create a design to support the NSX infrastructure across multiple sites Describe the factors that drive performance in NSX This five-day course provides comprehensive training on considerations and practices to design a VMware NSX© environment as part of a software-defined data center strategy. This course prepares the student with the skills to lead the design of an NSX environment, including design principles, processes, and frameworks. The student gains a deeper understanding of the NSX architecture and how it can be used to create solutions to address the customer?s business needs. Course Introduction Introduction and course logistics Course objectives NSX Design Concepts Identify design terms Describe framework and project methodology Describe the role of VMware Cloud Foundation? in NSX design Identify customers? requirements, assumptions, constraints, and risks Explain the conceptual design Explain the logical design Explain the physical design NSX Architecture and Components Recognize the main elements in the NSX architecture Describe the NSX management cluster and the management plane Identify the functions and components of management, control, and data planes Describe the NSX Manager sizing options Recognize the justification and implication of NSX Manager cluster design decisions Identify the NSX management cluster design options NSX Edge Design Explain the leading practices for edge design Describe the NSX Edge VM reference designs Describe the bare-metal NSX Edge reference designs Explain the leading practices for edge cluster design Explain the effect of stateful services placement Explain the growth patterns for edge clusters Identify design considerations when using L2 bridging services NSX Logical Switching Design Describe concepts and terminology in logical switching Identify segment and transport zone design considerations Identify virtual switch design considerations Identify uplink profile and transport node profile design considerations Identify Geneve tunneling design considerations Identify BUM replication mode design considerations NSX Logical Routing Design Explain the function and features of logical routing Describe the NSX single-tier and multitier routing architectures Identify guidelines when selecting a routing topology Describe the BGP and OSPF routing protocol configuration options Explain gateway high availability modes of operation and failure detection mechanisms Identify how multitier architectures provide control over stateful service location Identify EVPN requirements and design considerations Identify VRF Lite requirements and considerations Identify the typical NSX scalable architectures NSX Security Design Identify different security features available in NSX Describe the advantages of an NSX Distributed Firewall Describe the use of NSX Gateway Firewall as a perimeter firewall and as an intertenant firewall Determine a security policy methodology Recognize the NSX security best practices NSX Network Services Identify the stateful services available in different edge cluster high availability modes Describe failover detection mechanisms Compare NSX NAT solutions Explain how to select DHCP and DNS services Compare policy-based and route-based IPSec VPN Describe an L2 VPN topology that can be used to interconnect data centers Explain the design considerations for integrating VMware NSX© Advanced Load Balancer? with NSX Physical Infrastructure Design Identify the components of a switch fabric design Assess Layer 2 and Layer 3 switch fabric design implications Review guidelines when designing top-of-rack switches Review options for connecting transport hosts to the switch fabric Describe typical designs for VMware ESXi? compute hypervisors with two pNICs Describe typical designs for ESXi compute hypervisors with four or more pNICs Differentiate dedicated and collapsed cluster approaches to SDDC design NSX Multilocation Design Explain scale considerations in an NSX multisite design Describe the main components of the NSX Federation architecture Describe the stretched networking capability in Federation Describe stretched security use cases in Federation Compare the Federation disaster recovery designs NSX Optimization and DPU-Based Acceleration Describe Geneve Offload Describe the benefits of Receive Side Scaling and Geneve Rx Filters Explain the benefits of SSL Offload Describe the effect of Multi-TEP, MTU size, and NIC speed on throughput Explain the available enhanced datapath modes and use cases List the key performance factors for compute nodes and NSX Edge nodes Describe DPU-Based Acceleration Define the NSX features supported by DPUs Describe the hardware and networking configurations supported with DPUs
We supply Fire Marshal, Warden, Awareness training at your location and tailor it to your work sector, as such your staff will have no travelling or subsistence expenses minimising disruption for your organisation. Our trainer will bring all materials so you only need to provide a room with a plug socket. There is a practical element with extinguishers outside using our propane burners, which are fully insured and environmentally friendly. We require approximately 4 car parking spaces for this, if you do not have enough space we provide extinguisher discharge only. The training is accredited by the Institute of Fire Safety Managers, all attendees will receive individual Electronic Certificates and our Fire Warden Quick Guide, in addition a Group Certificate will be sent with all names on for audit purposes and your central records.
Level 1 Certificate in Effective Communication Skills Dive into the basics of Communication, navigate through behavior styles, and break down communication barriers. Learn the art of asking questions and master the skill of assertive communication for success. Learning Outcomes: Recall fundamental principles of communication. Comprehend how behavior styles affect communication. Apply strategies to overcome communication barriers. Analyze the art of effective questioning in communication. Assess the impact of assertive communication in various contexts. Develop advanced communication skills for diverse situations. Recall key principles of behavior styles in communication. Comprehend common barriers and solutions in communication. Evaluate the effectiveness of assertive communication strategies. More Benefits: LIFETIME access Device Compatibility Free Workplace Management Toolkit Level 1 Certificate in Effective Communication Skills Course Syllabus Communication Skills Basics: Gain foundational understanding and importance of effective communication in personal and professional contexts. Behaviour Styles for Communication: Explore how behavior styles influence communication dynamics for better relationships. Overcoming Communication Barriers: Learn to identify and overcome common communication barriers for clear and productive interactions. Effective Questioning: Master the art of asking questions to enhance your communication skills. Assertive Communication: Develop the ability to communicate assertively for various situations.
Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Health and Safety in the Workplace: HSE Working at Confined Space In our "Health and Safety in the Workplace: HSE Working at Confined Space" course, delve into the essentials of health and safety. Begin with the fundamentals of working in confined spaces, understand the laws and regulations governing these environments, and master risk assessment techniques. Explore effective control measures, learn emergency procedures for accidents, and ensure training and competency in confined spaces. Elevate workplace safety with this comprehensive course on health and safety. Learning Outcomes: Understand the Health and Safety principles governing confined space work. Analyse the Health and Safety regulations applicable to confined space operations. Conduct comprehensive risk assessments for Health and Safety in confined spaces. Implement effective control measures to ensure Health and Safety during confined space work. Respond promptly and confidently to Health and Safety emergencies in confined spaces. Ensure comprehensive training and competency in Health and Safety procedures for confined spaces. More Benefits: LIFETIME access Device Compatibility Free Workplace Management Toolkit Health and Safety in the Workplace: HSE Working at Confined Space Course Syllabus Health and Safety in Confined Spaces Basics: Develop a solid understanding of what "Health and Safety" entails within confined spaces, including their characteristics and associated "Health and Safety" hazards, ensuring you are aware of potential "Health and Safety" risks. Laws and Regulations in Confined Spaces: Familiarize yourself with the legal framework and regulations governing "Health and Safety" in confined spaces, ensuring compliance with "Health and Safety" standards. Risk Assessment for in Confined Spaces: Learn how to conduct thorough risk assessments specific to confined spaces, identifying potential "Health and Safety" hazards and assessing their severity. Control Measures for Ensuring "Health and Safety" in Confined Spaces: Discover effective "Health and Safety" control measures and safety protocols that mitigate "Health and Safety" risks within confined spaces, prioritizing the well-being of workers. Emergency Procedures in Case of an Accident: Gain the knowledge and skills required to respond swiftly and appropriately to "Health and Safety" accidents or emergencies that may occur in confined spaces. Training and Competency in Confined Spaces: Ensure you and your team are adequately trained and competent to work safely in confined spaces, promoting a culture of "Health and Safety" within the workplace.
Step into the realm of Security Management with our comprehensive course. Master risk analysis, physical and information security, legal frameworks, and the use of technology in security. Elevate your skills for a robust career in security management.
This course starts with data transformation strategies, exploring capabilities in the Power Query Editor, and data-cleansing practices. It looks at the Advanced Query Editor to view the M language code. This course focuses on advanced DAX measures that include filtering conditions, with a deep dive into time intelligence measures. Like the M query language, DAX is a rich functional language that supports variables and expression references. This course also looks at the creation of dynamic dashboards and incorporates a range of visualisations available in Power BI Desktop and online in the AppSource. The course finishes with a look at setting up end user level security in tables. 1 The query editor Split by row delimiter AddDays to determine deadlines Advanced query editor 2 Fuzzy matching joins Matching inconsistencies by percentage Matching with transformation table 3 Logical column functions Logical functions IF, AND, OR Using multiple conditions Including FIND in functions 4 Editing DAX measures Make DAX easier to read Add comments to a measure Using quick measures 5 The anatomy of CALCULATE Understanding CALCULATE context filters Adding context to CALCULATE with FILTER Using CALCULATE with a threshold 6 The ALL measure Anatomy of ALL Create an ALL measure Using ALL as a filter Use ALL for percentage 7 DAX iterators Anatomy of iterators A closer look at SUMX Using RELATED in SUMX Create a RANKX RANKX with ALL 8 Date and time functions Overview of functions Create a DATEDIFF function 9 Time intelligent measures Compare historical monthly data Create a DATEADD measure Creating cumulative totals Creating cumulative measures Visualising cumulative totals 10 Visualisations in-depth Utilising report themes Create a heatmap Comparing proportions View trends with sparklines Group numbers using bins Setting up a histogram 11 Comparing variables Visualising trendlines as KPI Forecasting with trendlines Creating a scatter plot Creating dynamic labels Customised visualisation tooltips Export reports to SharePoint 12 User level security Setting up row level security Testing user security
Manual Handling with Working at Confined Space Safety Diploma Level up your safety skills with our Manual Handling with Working at Confined Space Safety Diploma. Achieve Manual Handling mastery for confined spaces. Navigate work risks like a pro in Manual Handling. Learning Outcomes: Comprehend the fundamentals of Manual Handling. Interpret Manual Handling Operations Legislation. Assess risks associated with Manual Handling at work. Execute proper Manual Handling techniques. Apply Manual Handling principles in confined spaces. More Benefits: LIFETIME access Device Compatibility Free Workplace Management Toolkit Key Modules from Manual Handling with Working at Confined Space Safety Diploma: Introduction to Manual Handling: Grasp essential Manual Handling concepts for a safer work environment. Manual Handling Operations Legislation: Understand the legislative framework that governs Manual Handling practices. Manual Handling Risk at Work: Evaluate and mitigate Manual Handling risks in various work settings. Manual Handling Technique: Master techniques to perform Manual Handling tasks safely and effectively. Manual Handling in Confined Spaces: Adapt Manual Handling best practices for confined space work scenarios. Risk Assessment for Confined Spaces: Conduct risk assessments for confined spaces, integrating Manual Handling protocols.
Elevate workplace safety with our Fire Safety at Work course. Learn essential fire science, identify hazards, master fire prevention techniques, and understand legal requirements. Ideal for ensuring a safe and compliant workplace environment.