• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

232 Courses

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

SEO and Marketing Strategies at QLS Level 4

By Imperial Academy

Level 4 -Two Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 5 CPD Courses | Lifetime Access

SEO and Marketing Strategies at QLS Level 4
Delivered Online On Demand
£300

Business Marketing Training

4.9(27)

By Apex Learning

Tired of browsing and searching for a Business Marketing Training course you are looking for? Can't find the complete package that fulfils all your needs? Then don't worry as you have just found the solution. Take a minute and look through this extensive bundle that has everything you need to succeed. After surveying thousands of learners just like you and considering their valuable feedback, this all-in-one Business Marketing Training bundle has been designed by industry experts. We prioritised what learners were looking for in a complete package and developed this in-demand Business Marketing Training course that will enhance your skills and prepare you for the competitive job market. Also, our experts are available for answering your queries on Business Marketing Training and help you along your learning journey. Advanced audio-visual learning modules of these Business Marketing Training courses are broken down into little chunks so that you can learn at your own pace without being overwhelmed by too much material at once. Furthermore, to help you showcase your expertise in Business Marketing Training, we have prepared a special gift of 1 hardcopy certificate and 1 PDF certificate for the title course completely free of cost. These certificates will enhance your credibility and encourage possible employers to pick you over the rest. This Business Marketing Training Bundle Consists of the following Premium courses: Course 01: Strategic Planning and Analysis for Marketing Course 02: Sales and Marketing Skills Level 3 Course 03: Marketing Online Course Course 04: Lead Generation with Attraction Marketing for Business Course 05: Digital Marketing and Advertising Level 3 Course 06: Digital Marketing Business Tips Course 07: Social Media Marketing Training Course 08: Business Plan for Entrepreneours Course 09: Business Strategy Planning Course 10: Branding Fundamentals for New Business Course 11: Business Administration Level 3 Course 12: Start Your Own Business - Level 2 Certificate Course 13: Business Development Course 14: Business Law Enrol now in Business Marketing Training to advance your career, and use the premium study materials from Apex Learning. The bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your Business Marketing Training expertise and essential knowledge, which will assist you in reaching your goal. Curriculum: Module 1: An Introduction to Strategic Planning Module 2: Development of a Strategic Plan Module 3: Strategic Planning for Marketing Module 4: Strategic and Marketing Analysis Module 5: Internal Analysis Module 6: External Analysis Module 7: Market Segmentation, Targeting and Positioning Module 8: Approaches to Customer Analysis Module 9: Approaches to Competitor Analysis CPD 170 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Business Marketing Training bundle. Requirements Our Business Marketing Training course is fully compatible with PCs, Macs, laptops, tablets and Smartphone devices. Career path Having this Business Marketing Training expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included You will get the PDF Certificate for the title course (Strategic Planning and Analysis for Marketing) absolutely Free! Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (Strategic Planning and Analysis for Marketing) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

Business Marketing Training
Delivered Online On Demand
£79

Strategic Marketing and Business Law - Endorsed Training

By Imperial Academy

Level 4 & 5 Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 5 CPD Courses | Lifetime Access

Strategic Marketing and Business Law - Endorsed Training
Delivered Online On Demand
£300

IT Security for IT Professionals

4.3(43)

By John Academy

Explore the world of cybersecurity with our "IT Security for IT Professionals" course. Gain expertise in fundamental areas such as network security, cryptography, web security, and emerging trends. Equip yourself with the skills needed to protect against evolving cyber threats. Enroll now for a comprehensive journey into IT security and fortify your role as a vigilant IT professional.

IT Security for IT Professionals
Delivered Online On Demand
£23.99

Cloud Computing / CompTIA Cloud+ (CV0-002)

4.9(27)

By Apex Learning

Overview Cloud computing has become the backbone of businesses and organisations across the globe. Our 'Cloud Computing / CompTIA Cloud+ (CV0-002)' course will equip you with the knowledge and skills needed to excel in this burgeoning industry. The demand for cloud computing professionals is soaring, with an estimated 61% of companies already using cloud-based applications. This dynamic field offers lucrative opportunities and a wide salary range, making it a wise career choice.  Cloud computing professionals are in high demand worldwide, and this course empowers you to join their ranks. With a focus on CompTIA Cloud+ (CV0-002), you'll gain a comprehensive understanding of cloud technologies, deployment models, security protocols, and much more.  This course is your ticket to your career in cloud computing. Enrol today! How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Cloud Computing / CompTIA Cloud+ (CV0-002). It is available to all students, of all academic backgrounds. Requirements Our Cloud Computing / CompTIA Cloud+ (CV0-002) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 11 sections • 100 lectures • 10:39:00 total length •Introduction to the Cloud: 00:04:00 •Cloud+ Exam Info: 00:08:00 •What Can Cloud+ Do For You?: 00:03:00 •Preparing for the Cloud+ Exam: 00:06:00 •Setting up Your Cloud Accounts: 00:06:00 •Defining the Cloud: 00:08:00 •Deployment Models: 00:05:00 •Public Cloud (Demo): 00:08:00 •Private Cloud (Demo): 00:06:00 •Community Cloud (Demo): 00:06:00 •Hybrid Cloud (Demo): 00:05:00 •Additional Models: 00:05:00 •Cloud Architectures: 00:06:00 •Capacity, Elasticity, and Support Agreements: 00:08:00 •Resource Balancing: 00:07:00 •Change Management: 00:07:00 •Deployment Exam Objectives Explained: 00:06:00 •Cloud Component Interactions, Part 1: 00:07:00 •Cloud Component Interaction, Part 2: 00:08:00 •Non-Cloud Component Interactions: 00:09:00 •Platforms and Applications: 00:05:00 •Baselines (Lab): 00:07:00 •Target Hosts: 00:05:00 •Existing Systems (Lab): 00:09:00 •Architecting for Elements and Targets (Demo): 00:07:00 •Selecting Deployment Tools (Demo): 00:07:00 •Executing a Deployment Plan (Demo): 00:09:00 •Evaluating Testing Plans: 00:05:00 •Testing Techniques: 00:05:00 •Analyzing Testing Results: 00:04:00 •Baseline Confirmation (Lab): 00:08:00 •Deployment Problem Resolution (Lab): 00:08:00 •Cloud Storage Types: 00:06:00 •Provisioning Storage: 00:06:00 •Storage Protection Capabilities: 00:09:00 •Storage Features: 00:06:00 •Access Protocols: 00:06:00 •Storage Management (Demo): 00:06:00 •Storage Security (Lab): 00:05:00 •Disaster Recovery Capabilities (Demo): 00:07:00 •Disaster Recovery Considerations: 00:05:00 •Business Continuity Plan (Lab): 00:07:00 •Compute Introduction: 00:06:00 •CPU Capabilities: 00:08:00 •Memory Requirements: 00:07:00 •Performance Considerations: 00:07:00 •Cost Considerations (Lab): 00:07:00 •Energy Savings: 00:05:00 •Dedicated vs. Shared Compute: 00:04:00 •High Availability and Disaster Recovery for Compute: 00:05:00 •Monitoring (Lab): 00:08:00 •Forecasting: 00:05:00 •Policies: 00:03:00 •Network Components (Demo): 00:09:00 •Network Protocols: 00:04:00 •Network Ports (Lab): 00:05:00 •Virtual Private Networks (VPNs): 00:08:00 •IDS/IPS: 00:07:00 •Segmentation: 00:09:00 •Network SLAs and Change Management: 00:04:00 •Networking in Different Models: 00:05:00 •Security Policies: 00:06:00 •Standards and Compliance (Demo): 00:05:00 •Identity, Authentication, and Authorization: 00:08:00 •Multi-Factor Authentication (Lab): 00:05:00 •Authorization (Lab): 00:08:00 •Encryption (Demo): 00:08:00 •Compute Security (Demo): 00:07:00 •Account Management (Lab): 00:07:00 •Segmentation (Lab): 00:05:00 •Security Tools (Demo): 00:07:00 •Security Services: 00:05:00 •Security Automation and Orchestration: 00:06:00 •Models and Security: 00:06:00 •Migration Types: 00:07:00 •Workload Management: 00:05:00 •Virtualizing Physical Systems: 00:06:00 •Migrating Security: 00:07:00 •Protocols and Services: 00:08:00 •Environmental Constraints: 00:07:00 •Planning Patch Management: 00:07:00 •Manual Patch Management: 00:04:00 •Automated Patch Management (Lab): 00:03:00 •Update Types: 00:08:00 •Automated Workflows (Lab): 00:07:00 •Backup Types (Lab): 00:10:00 •Backup Targets and Options: 00:07:00 •Maintenance Automation Techniques: 00:05:00 •Maintenance Automation Tasks: 00:07:00 •Provisioning and Deprovisioning: 00:07:00 •Application Life Cycle: 00:03:00 •Monitoring and Reporting (Lab): 00:07:00 •Monitoring Metrics: 00:06:00 •Troubleshooting Methodology: 00:08:00 •Troubleshooting Deployment: 00:07:00 •Troubleshooting Capacity: 00:08:00 •Troubleshooting Automation and Orchestration: 00:07:00 •Troubleshooting Connectivity: 00:10:00 •Troubleshooting Security: 00:09:00 •Resource - Cloud Computing / CompTIA Cloud+ (CV0-002): 00:00:00

Cloud Computing / CompTIA Cloud+ (CV0-002)
Delivered Online On Demand10 hours 39 minutes
£12

Retail and Customer Management

By Compete High

🎉 Unlock the Secrets to Retail Success with Our Text Course: 'Retail and Customer Management'! 🎉 Are you ready to elevate your career in the dynamic world of retail? Look no further! Our comprehensive text course, 'Retail and Customer Management,' is designed to equip you with the essential skills and strategies needed to thrive in the competitive retail landscape.   🌟 Why Choose Our Course? 🌟 In today's fast-paced retail environment, the ability to effectively manage customers and operations is crucial for success. Our course offers a holistic approach to retail management, covering key topics such as customer service techniques, inventory management, sales strategies, and employee supervision. Whether you're a seasoned retail professional looking to sharpen your skills or a newcomer eager to break into the industry, our course has something for everyone. Here are just a few reasons why our course stands out: Comprehensive Curriculum: Our course covers all aspects of retail and customer management, providing you with a solid foundation of knowledge and practical skills. Expert Insights: Learn from industry experts who have years of experience in the retail sector. Gain valuable insights and best practices that you can apply to your own career. Flexible Learning: Access course materials anytime, anywhere, and at your own pace. Whether you prefer to study on your lunch break or during your commute, our text-based format allows for convenient learning. Interactive Assignments: Put your knowledge into practice with engaging assignments and case studies. Learn through hands-on activities that simulate real-world retail scenarios. Networking Opportunities: Connect with fellow students and industry professionals through our online community. Share ideas, ask questions, and build valuable relationships that can enhance your career prospects.   👩‍💼 Who is this for? 👨‍💼 Our course is suitable for a wide range of individuals, including: Retail managers and supervisors looking to enhance their leadership skills. Frontline retail employees seeking to improve their customer service abilities. Entrepreneurs interested in starting their own retail business. Students and recent graduates aspiring to pursue a career in retail management. Anyone passionate about delivering exceptional customer experiences in the retail sector. No matter your background or experience level, our course is designed to help you succeed in the dynamic world of retail.   🚀 Career Path 🚀 Upon completing our course, you'll be equipped with the knowledge and skills needed to pursue various career opportunities in the retail industry. Here are just a few potential career paths: Retail Manager: Take on leadership roles in retail stores, overseeing day-to-day operations, managing staff, and optimizing sales performance. Customer Service Manager: Specialize in providing exceptional customer service, resolving issues, and implementing strategies to enhance customer satisfaction. Visual Merchandiser: Use your creativity to design visually appealing store layouts and displays that attract customers and drive sales. Inventory Control Specialist: Manage inventory levels, track product movements, and implement strategies to minimize stock shortages and overages. Retail Buyer: Source and purchase merchandise for retail stores, analyzing market trends and negotiating with suppliers to ensure a profitable product assortment. By mastering the principles of retail and customer management, you'll be well-positioned to pursue a rewarding career in this dynamic industry.   📚 FAQs (Frequently Asked Questions) 📚 Q: Is this course suitable for beginners? A: Yes! Our course is designed to accommodate learners of all levels, from beginners to seasoned professionals. Whether you're just starting out in retail or looking to advance your career, you'll find valuable insights and practical guidance to help you succeed. Q: How long does it take to complete the course? A: The duration of the course varies depending on your individual pace and schedule. On average, most students complete the course within a few weeks to a few months. However, since our course is self-paced, you have the flexibility to study at your own speed. Q: Are there any prerequisites for enrolling in the course? A: There are no specific prerequisites for enrolling in our course. Whether you're a seasoned retail professional or a newcomer to the industry, you're welcome to join us and elevate your skills in retail and customer management. Q: Can I access the course materials on my mobile device? A: Absolutely! Our course platform is mobile-friendly, allowing you to access all course materials from your smartphone or tablet. Study on the go and learn at your convenience, whenever and wherever you choose. Q: Is there a certificate of completion available? A: Yes, upon successfully completing the course requirements, you will receive a certificate of completion. This certificate serves as a testament to your newfound skills and can be a valuable addition to your resume or LinkedIn profile.   Don't miss out on this opportunity to supercharge your career in retail! Enroll in our 'Retail and Customer Management' course today and take the first step towards achieving your professional goals. Unlock the secrets to retail success and embark on a journey to a brighter future! 🌟 Course Curriculum Module 1 Introduction to Retail and Customer Management Introduction to Retail and Customer Management 00:00 Module 2 Customer Behavior and Market Segmentation Customer Behavior and Market Segmentation 00:00 Module 3 Understanding Customer Behavior and Preferences Understanding Customer Behavior and Preferences 00:00 Module 4 Marketing Strategies for Retail Success Marketing Strategies for Retail Success 00:00 Module 5 Operational Excellence in Retail Management Operational Excellence in Retail Management 00:00 Module 6 Enhancing Customer Experience through Employee Engagement Enhancing Customer Experience through Employee Engagement 00:00 Module 7 Effective Customer Relationship Management Strategies Effective Customer Relationship Management Strategies 00:00

Retail and Customer Management
Delivered Online On Demand7 hours
£5

Marketing Strategies

By Compliance Central

Are you looking to enhance your Marketing Strategies skills? If yes, then you have come to the right place. Our comprehensive course on Marketing Strategies will assist you in producing the best possible outcome by mastering the Marketing Strategies skills. The Marketing Strategies is for those who want to be successful. In the Marketing Strategies, you will learn the essential knowledge needed to become well versed in Marketing Strategies. Our Marketing Strategies starts with the basics of Marketing Strategies and gradually progresses towards advanced topics. Therefore, each lesson of this Marketing Strategies is intuitive and easy to understand. Why would you choose the Marketing Strategies from Compliance Central: Lifetime access to Marketing Strategies materials Full tutor support is available from Monday to Friday with the Marketing Strategies Learn Marketing Strategies skills at your own pace from the comfort of your home Gain a complete understanding of Marketing Strategies Accessible, informative Marketing Strategies learning modules designed by expert instructors Get 24/7 help or advice from our email and live chat teams with the Marketing Strategies bundle Study Marketing Strategies in your own time through your computer, tablet or mobile device A 100% learning satisfaction guarantee with your Marketing Strategies course Curriculum Breakdown of the Marketing Strategies Course Module 01: An Introduction to Strategic Planning Module 02: Development of a Strategic Plan Module 03: Strategic Planning for Marketing Module 04: Strategic and Marketing Analysis Module 05: Internal Analysis Module 06: External Analysis Module 07: Market Segmentation, Targeting and Positioning Module 08: Approaches to Customer Analysis Module 09: Approaches to Competitor Analysis CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Marketing Strategies helps aspiring professionals who want to obtain the knowledge and familiarise themselves with the skillsets to pursue a career in Marketing Strategies. It is also great for professionals who are already working in Marketing Strategies and want to get promoted at work. Requirements To enrol in this Marketing Strategies, all you need is a basic understanding of the English Language and an internet connection. Career path The Marketing Strategies will enhance your knowledge and improve your confidence in exploring opportunities in various sectors related to Marketing Strategies. Certificates CPD Accredited PDF Certificate Digital certificate - Included CPD Accredited PDF Certificate CPD Accredited Hard Copy Certificate Hard copy certificate - £10.79 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each

Marketing Strategies
Delivered Online On Demand3 hours
£12

VMware NSX: Install, Configure, Manage [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture and main components of NSX Explain the features and benefits of NSX Deploy the NSX Management cluster and VMware NSX Edge™ nodes Prepare VMware ESXi™ hosts to participate in NSX networking Create and configure segments for layer 2 forwarding Create and configure Tier-0 and Tier-1 gateways for logical routing Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX Configure Advanced Threat Prevention features Configure network services on NSX Edge nodes Use VMware Identity Manager™ and LDAP to manage users and access Explain the use cases, importance, and architecture of Federation This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX© environment. This course covers key features and functionality offered in the NSX 4.0.0.1 and NSX 4.0.1 releases, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more. Course Introduction Introductions and course logistics Course objectives VMware Virtual Cloud Network and VMware NSX Introduce the VMware Virtual Cloud Network vision Describe the NSX product portfolio Discuss NSX features, use cases, and benefits Explain NSX architecture and components Explain the management, control, data, and consumption planes and their functions. Preparing the NSX Infrastructure Deploy VMware NSX© ManagerTM nodes on ESXi hypervisors Navigate through the NSX UI Explain data plane components such as N-VDS/VDS, transport nodes, transport zones, profiles, and more Perform transport node preparation and configure the data plane infrastructure Verify transport node status and connectivity Explain DPU-based acceleration in NSX Install NSX using DPUs NSX Logical Switching Introduce key components and terminology in logical switching Describe the function and types of L2 segments Explain tunneling and the Geneve encapsulation Configure logical segments and attach hosts using NSX UI Describe the function and types of segment profiles Create segment profiles and apply them to segments and ports Explain the function of MAC, ARP, and TEP tables used in packet forwarding Demonstrate L2 unicast packet flow Explain ARP suppression and BUM traffic handling NSX Logical Routing Describe the logical routing function and use cases Introduce the two-tier routing architecture, topologies, and components Explain the Tier-0 and Tier-1 gateway functions Describe the logical router components: Service Router and Distributed Router Discuss the architecture and function of NSX Edge nodes Discuss deployment options of NSX Edge nodes Configure NSX Edge nodes and create NSX Edge clusters Configure Tier-0 and Tier-1 gateways Examine single-tier and multitier packet flows Configure static routing and dynamic routing, including BGP and OSPF Enable ECMP on a Tier-0 gateway Describe NSX Edge HA, failure detection, and failback modes Configure VRF Lite NSX Bridging Describe the function of logical bridging Discuss the logical bridging use cases Compare routing and bridging solutions Explain the components of logical bridging Create bridge clusters and bridge profiles NSX Firewalls Describe NSX segmentation Identify the steps to enforce Zero-Trust with NSX segmentation Describe the Distributed Firewall architecture, components, and function Configure Distributed Firewall sections and rules Configure the Distributed Firewall on VDS Describe the Gateway Firewall architecture, components, and function Configure Gateway Firewall sections and rules NSX Advanced Threat Prevention Explain NSX IDS/IPS and its use cases Configure NSX IDS/IPS Deploy NSX Application Platform Identify the components and architecture of NSX Malware Prevention Configure NSX Malware Prevention for east-west and north-south traffic Describe the use cases and architecture of VMware NSX© Intelligence? Identify the components and architecture of VMware NSX© Network Detection and Response? Use NSX Network Detection and Response to analyze network traffic events. NSX Services Explain and configure Network Address Translation (NAT) Explain and configure DNS and DHCP services Describe VMware NSX© Advanced Load Balancer? architecture, components, topologies, and use cases. Configure NSX Advanced Load Balancer Discuss the IPSec VPN and L2 VPN function and use cases Configure IPSec VPN and L2 VPN using the NSX UI NSX User and Role Management Describe the function and benefits of VMware Identity Manager? in NSX Integrate VMware Identity Manager with NSX Integrate LDAP with NSX Identify the various types of users, authentication policies, and permissions Use role-based access control to restrict user access Explain object-based access control in NSX NSX Federation Introduce the NSX Federation key concepts, terminology, and use cases. Explain the onboarding process of NSX Federation Describe the NSX Federation switching and routing functions. Describe the NSX Federation security concepts.

VMware NSX: Install, Configure, Manage [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Ransomware Uncovered: Cybersecurity Threats & Solutions

4.3(43)

By John Academy

Explore the intricate world of cyber threats with our course, 'Ransomware Uncovered: Cybersecurity Threats & Solutions.' Gain insights into the evolving threat landscape, the underground economy of cybercriminals, and the cyber kill chain. Understand the mechanics of ransomware, delivery channels, and the psychological tactics employed by criminals. Learn to make informed decisions on whether to pay ransoms. Develop robust defense strategies and incident response plans. Empower yourself in the fight against cyber threats. Enroll now for a comprehensive journey into ransomware defense and cybersecurity resilience.

Ransomware Uncovered: Cybersecurity Threats & Solutions
Delivered Online On Demand2 hours
£23.99