• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

955 Courses

Your guide to Passwords

4.4(5)

By The Security Company (International) Limited

Information on the risks and practical advice to address them TSC's eBooks, whitepapers, and reports cover some of the most important risks in information and cyber security — risks that constantly challenge information and cyber security professionals who work tirelessly to reduce them across their organisations and home users alike.

Your guide to Passwords
Delivered Online On Demand20 minutes
FREE

Your digital footprint

4.4(5)

By The Security Company (International) Limited

Information on the risks and practical advice to address them TSC's eBooks, whitepapers, and reports cover some of the most important risks in information and cyber security — risks that constantly challenge information and cyber security professionals who work tirelessly to reduce them across their organisations and home users alike.

Your digital footprint
Delivered Online On Demand20 minutes
FREE

CCAS Check Point Certified Automation Specialist

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who automate, orchestrate, and troubleshoot Check Point secured environments. Overview Explain how automation and orchestration work together Understand the key drivers for incorporating automation and orchestration into security management Execute a shell script that demonstrates how to build a comprehensive Security Policy. Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions Demonstrate how to define new objects and modify existing ones by using the Check Point API The goal of this course is to provide an understanding of the advanced concepts and skills necessary to automate and orchestrate tasks relating to managing Check Point Security Policies Course Ouline Explain how automation and orchestration work together Understand the key drivers for incorporating automation and orchestration into security management Execute a shell script that demonstrates how to build a comprehensive Security Policy. Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions Demonstrate how to define new objects and modify existing ones by using the Check Point API Demonstrate how to create API commands to efficiently maintain the Check Point Security Management Server database Demonstrate how to use different methods to update the database with API commands Become familiar with client-side and server-side scripting and scripting languages Understand how to use the Bash shell to develop APIs Recognize and describe many of the open source tools that are available to assist with API development Demonstrate how to use a custom REST application to update the database of a Security Management Server Demonstrate how to use Postman to manage the Security Policy database through the Check Point API Understand what steps to take to troubleshoot and debug API scripts Demonstrate basic troubleshooting techniques by reviewing debugging messages in various forms Understand how to use self-service portal capabilities to provide general IT services Recognize how automation tools work with Check Point APIs to automate security management tasks and orchestrate workflow behind service portals Demonstrate common tasks that are automated in a Web portal to manage the Security Policy LAB Exercises Demonstrate Check Point automation and orchestration Manage objects using the Check Point API Create a management API shell script Use a variety of methods to execute API commands Use a custom REST tool for API calls Use Postman for API calls Debug the Check Point management API Automate tasks using a Check Point API enabled Web portal Additional course details: Nexus Humans CCAS Check Point Certified Automation Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCAS Check Point Certified Automation Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCAS Check Point Certified Automation Specialist
Delivered OnlineFlexible Dates
Price on Enquiry

JSEC - Junos Security

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audiences for this course are the following: • Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview After successfully completing this course, you should be able to: Identify security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain SRX Series session management. Explain Junos ALG functions and when to use them. Describe policy logging on the SRX series device. Explain security policy scheduling. Describe application security theory. Explain application signature usage in AppID. Describe the AppTrack service. Describe the AppFW service. Describe the AppQoS service. Configure security policies using the AppSecure suite of services. Explain unified security policies. Describe IPS signatures. Configure an IPS policy using pre-defined templates. Describe how to update the IPS attack object database. Describe IPS rules and rule bases. Configure custom attack objects. Describe Junos Space and Security Director. Configure policy management using Security Director. Describe Security Director objects. Explain the different licensing options for Sky ATP List Sky ATP's features and benefits. Configure Sky ATP profiles and enroll an SRX Series device. Configure file scanning on Sky ATP. Configure Sky ATP to scan email Configure GeoIP on Sky ATP. Describe the JATP features and benefits List the JATP device options. Explain the JATP architecture. List 3rd party support options for JATP. Explain JATP SmartCore analytics processes. Describe Policy Enforcer configuration options. Describe Policy Enforcer integration with Sky ATP. Configure Policy Enforcer to block lateral malware movement. Explain Juniper Secure Analytics features and benefits. Describe JSA log collection. Describe JSA network flow collection. Describe the JSA Offense Management workspace. Explain the JSA Risk Manager features. Configure JSA to collect network and log collection. Explain the features of JIMS. Describe JIMS integration into the current AD network. Describe the Sky Enterprise service and how it can save resources. Explain the Sky Enterprise monitoring service. Explain the vSRX Series device benefits. Describe use cases for the vSRX. Explain the cSRX Series device benefits. Describe use cases for the cSRX. Describe SSL Proxy Concepts. Explain Forward and Reverse Proxy and the limitations of each. Configure both Forward and Reverse Proxy. This five-day course uses the Junos J-Web, CLI, Junos Space, and other user interfaces to introduce students to the concept of Juniper Connected Security. Chapter 1: Course Introduction Course Introduction Chapter 2: CLI Overview User Interface Options Command-Line Interface Initial Configuration Interface Configuration Lab 1: CLI Overview Chapter 3: Advanced Security Policy Session Management Junos ALGs Policy Scheduling Policy Logging Lab 2: Advanced Security Policy Chapter 4: Application Security Theory Application ID Application Signatures App Track App Firewall App QoS App QoE Chapter 5: Application Security Implementation AppTrack Implementation AppFW Implementation AppQos Implementation APBR Implementation Lab 3: Application Security Chapter 6: Intrusion Detection and Prevention IPS Overview IPS Policy Attack Objects IPS Configuration IPS Monitoring Lab 4: Implementing IPS Chapter 7: Security Director Overview Security Director Objects Security Director Policy Management Lab 5: Security Director Chapter 8: Sky ATP Implementation Architecture and Key Components Features and Benefits Configuration Compromised Hosts Command and Control File Scanning E-mail Scanning Geo IP Security Policy Integration Troubleshooting Lab 6: Sky ATP Implementation Chapter 9: Policy Enforcer Policy Enforcer Concepts Configuration Options Policy Enforcer Installation Lab 7: Policy Enforcer Chapter 10: JATP Overview Traffic Inspection Threat Detection Threat Analysis JATP Architecture Chapter 11: JATP Implementation Data Collectors Configure SmartCore Analytics Engine Log Ingestion Incident Management SRX Threat Prevention 3rd Party support for Threat Prevention Reporting Lab 8: JATP Chapter 12: Juniper Secure Analytics (JSA) JSA Overview Data Collection Log Analytics Threat Analytics Vulnerability Management Risk Management Lab 9: JSA Chapter 13: JIMS JIMS Overview JIMS Integration Lab 10: JIMS Chapter 14: vSRX and cSRX vSRX Overview vSRX Supported Features vSRX Use Cases cSRX Overview Lab 11: vSRX Installation Chapter 15: SSL Proxy SSL Proxy Overview SSL Concepts SSL Proxy Configurations Troubleshooting Lab 12: SSL Proxy Chapter 16: Cluster Concepts Chassis Cluster Concepts Chassis Cluster Operation Chapter 17: Chassis Cluster Implementation Chassis Cluster Configuration Chassis Cluster Advanced Options Lab 13: Chassis Cluster Implementation Chapter 18: Chassis Cluster Troubleshooting Chassis Cluster Case Studies Troubleshooting Examples Lab 14: Chassis Cluster Troubleshooting Additional course details: Nexus Humans JSEC - Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JSEC - Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

JSEC - Junos Security
Delivered OnlineFlexible Dates
Price on Enquiry

Information on the risks and practical advice to address them TSC's eBooks, whitepapers, and reports cover some of the most important risks in information and cyber security — risks that constantly challenge information and cyber security professionals who work tirelessly to reduce them across their organisations and home users alike.

Your guide to GDPR
Delivered Online On Demand20 minutes
FREE

How to make an impact in your first 90 days as a new CISO

4.4(5)

By The Security Company (International) Limited

Information on the risks and practical advice to address them TSC's eBooks, whitepapers, and reports cover some of the most important risks in information and cyber security — risks that constantly challenge information and cyber security professionals who work tirelessly to reduce them across their organisations and home users alike.

How to make an impact in your first 90 days as a new CISO
Delivered Online On Demand20 minutes
FREE

VMware Carbon Black Cloud:Advanced Operations and Troubleshooting

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced security administrators and security analysts who are already familiar with VMware Carbon Black Cloud Overview By the end of the course, you should be able to meet the following objectives: Describe and determine use cases for integrating with VMware Carbon Black Cloud Configure, automate, and troubleshoot the VMware Carbon Black Cloud Syslog Integration Use VMware Carbon Black Cloud APIs to pull data with Postman Install and use the VMware Carbon Black Cloud Python SDK Automate operations using the VMware Carbon Black Cloud SDK and APIs Identify and troubleshoot VMware Carbon Black Cloud sensor installations Gather troubleshooting data within the browser to remediate or escalate problems Identify and resolve sensor usage, networking, and performance problems with the VMware Carbon Black Cloud sensor This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in performing advanced operations and troubleshooting of VMware Carbon Black Cloud. This course will go into integrating VMware Carbon Black Cloud with other third-party components and utilizing the API and the SDK to automate operations within the product and your security stack. This course will also enable you to troubleshoot common problems during sensor installation, operations, and within the VMware Carbon Black Cloud console with hands-on lab problems. Course Introduction Introductions and course logistics Course objectives VMware Carbon Black Cloud Integrations Describe the integration capabilities with VMware Carbon Black Cloud Determine integration use cases for VMware Carbon Black Cloud Identify required components for integrating VMware Carbon Black Cloud Differentiate VMware Carbon Black Cloud integration vendors VMware Carbon Black Cloud Syslog Integration Describe the function of the Syslog Connector Generate API and SIEM keys from the Cloud console Validate a successful Syslog integration Describe how to automate the Syslog Connector Troubleshoot problems with the Syslog integration Using Postman Explain the concept and purpose of an API Interpret common REST API Status codes Recognize the difference between platform and product APIs Using the Postman Client to initiate API calls Create a custom access level and respective API key Create a valid API request Using the VMware Carbon Black Cloud Python SDK Install the VMware Carbon Black Cloud Python SDK Describe the different authentication methods Evaluate the best authentication method for a given task Automating Operations Automate basic Incident Response tasks using the VMware Carbon Black Cloud SDK and API Automate basic watchlist interactions using the VMware carbon Black Cloud SDK and API Sensor Installation Troubleshooting Describe sensor install log collection process Identify sensor install log parameters Create a detailed sensor install log Locate sensor install logs on an endpoint Interpret sensor install success from an install log Determine likely cause for install failure using sensor logs Propose resolution steps for a given sensor install failure VMware Carbon Black Cloud Console Troubleshooting Identify sensor bypass status reasons Simplify console data exports using search Describe differences in Audit Log detail levels Locate built-in browser tools Gather console diagnostics logs from a browser Review console diagnostics logs Sensor Operations Troubleshooting Identify available types of diagnostic logs Gather appropriate diagnostic logs for a given issue Identify steps for resolving software interoperability problems Identify steps for resolving resource problems Identify steps for resolving network problems Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud:Advanced Operations and Troubleshooting training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud:Advanced Operations and Troubleshooting course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black Cloud:Advanced Operations and Troubleshooting
Delivered OnlineFlexible Dates
Price on Enquiry

SonicWALL Network Security Administrator - SNSA - NA

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security professionals, System engineers, channel partners, service partners, and end users with one-or-more years of experience in implementing IT security technologies (Network, Applications, and Systems) Overview This course will enable students to configure, monitor, manage, and optimize the SonicWall Next-Gen firewall appliances running SonicOS to effectively defend against evolving and emerging network and cyber security threats. Upon completion of the course, the students will be able to configure the SonicWall firewall for Secure and Remote Connectivity, Network Optimization, and Advanced Threat Protection. The SonicWall Network Security Administration course provides students the required background, knowledge and hand-on experience to begin designing, implementing and troubleshooting SonicWall Network Security Appliances running SonicOS firmware. ÿThe SNSA course and certification replaces the NSBA course and the CSSA certification. The NSBA course will End-of-Life on June 30th, 2018. The CSSA certification will continue to be valid for 2 years after successfully passing the examination. Course Outline The instructor-guided portion of theÿcurriculum provides a suite of intensive ILTÿscenario-based sessions, wherein you learn to configure, manage, and monitor aÿSonicWall Next-Gen firewall in a risk-free lab environment Additional course details: Nexus Humans SonicWALL Network Security Administrator - SNSA - NA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SonicWALL Network Security Administrator - SNSA - NA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SonicWALL Network Security Administrator - SNSA - NA
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Deployment Solution 7.5 - Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for system administrators or anyone who will be installing, configuring, and managing a Deployment Solution system. Overview This course includes practical exercises using your own network by means of virtual computers enabling you to learn and fine tune the skills required to be successful in your working environment. This course is designed for the professional tasked with installing, configuring, and managing a Deployment Solution system. Deployment Solution Overview Symantec software overview Symantec Management Platform overview Installing Deployment Solution and pcAnywhere Installation prerequisites Installing the Symantec Installation Manager Installing Deployment Solution Installing agents and plug-ins Upgrading Deployment Solution Deployment Solution Console Fundamentals Console fundamentals Creating and managing Jobs and Tasks Scheduling Jobs and Tasks Monitoring Jobs and Tasks Searching for Jobs, Tasks, and computers Configuring Deployment Solution Adding configuration files and keys Symantec Network Boot Service Preboot configurations Configuring Network Boot Service (PXE/BSDP) Driver database management Preparing a Computer for Imaging Including agents and plug-ins Installing Software Installing software updates and service packs Creating Images Imaging Tools and Types About Prepare for Image capture tasks Creating Images PC Transplant with Deployment Solution PC Transplant overview Creating a PCT template file PC Transplant tasks Editing Personality Packages Building and editing A2i files Deploying Operating Systems & Performing Computer Migrations Deploying Images & Performing Computer Migrations Deploying computer images Unicast and multicast imaging Advanced options when deploying images Changing a computer?s system configuration Initial Deployment imaging Imaging predefined computers Disk preparations Performing scripted OS installations Jobs to migrate computers Installing and Using Deployment Site Servers Understanding Sites and Site Servers Understanding & Installing Deployment Site Server Components Image Management Advanced Features Using job conditions Custom Ghost imaging and Ghost tools Editing image files Creating bootable media Remote control with pcAnywhere Solution About pcAnywhere Solution Installing Symantec pcAnywhere Solution and plug-in Starting a pcAnywhere session Managing a pcAnywhere session Configuring pcAnywhere settings Additional course details: Nexus Humans Symantec Deployment Solution 7.5 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Deployment Solution 7.5 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Deployment Solution 7.5 - Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Your guide to The Cloud

4.4(5)

By The Security Company (International) Limited

Information on the risks and practical advice to address them TSC's eBooks, whitepapers, and reports cover some of the most important risks in information and cyber security — risks that constantly challenge information and cyber security professionals who work tirelessly to reduce them across their organisations and home users alike.

Your guide to The Cloud
Delivered Online On Demand20 minutes
FREE