• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

65 ESC courses delivered Live Online

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Managing Conflict

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for any business professional who encounters conflict in the workplace. Overview Recognize the impact of conflict in the workplace by identifying your personal reaction and developing a healthy attitude toward conflict. Analyze conflict by assessing the situation and identifying the source of the conflict. Utilize effective communication techniques to manage conflict in a proactive manner. Resolve conflict by evaluating approaches, and determining and implementing an action plan with the best solution. An organization improves its likelihood of success by effectively managing conflict. As a leader within your organization, you share in that responsibility. This course will help you cultivate the skills necessary to help manage conflict and ultimately to decrease the presence of conflict in the workplace. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. RECOGNIZING THE IMPACT OF CONFLICT * Identify Your Personal Reaction to Conflict * Develop a Healthy Attitude Toward Conflict 2. ANALYZING CONFLICT * Assess the Situation * Identify the Source of the Conflict 3. DEALING WITH CONFLICT * Listen Actively * Communicate Effectively * Respond to Negative Tactics * Avoid Conflict Escalation 4. RESOLVING CONFLICT * Evaluate Approaches to Conflict Resolution * Determine the Best Solution * Implement an Action Plan ADDITIONAL COURSE DETAILS: Nexus Humans Managing Conflict (Second Edition) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing Conflict (Second Edition) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Managing Conflict
Delivered OnlineTwo days, Jun 4th, 13:00
£435

Interpreting Blood Results

By BBO Training

Interpreting Blood Results BBO Training has been inundated with requests for courses following the success of our previous offerings, such as NMP Update, Minor Illness, and Diabetes. In response to this demand, we are delighted to introduce a full-day course on the crucial topic of 'Interpreting Blood Results within Primary Care.' This comprehensive program is tailored for experienced Practice Nurses, ANP's, ENP's, Paramedics, and Pharmacists who seek to enhance their proficiency in this vital area. Course Details: Course Schedule: - 09:15 - Coffee and Registration - 09:30 - Introduction and Course Objectives - 09:45 - The 'Full Blood Count,' Including Anemias and B12 - 11:30 - Coffee Break - 11:50 - The 'LFT' - How to Recognize and Manage Deranged LFTs - 12:30 - Lunch - 13:30 - U&E (Urea and Electrolytes) - 14:15 - Acute Kidney Injury (AKI) - 15:00 - Lipids - 15:45 - Evaluations and Course Conclusion Learning Outcomes: By the end of this course, participants will have achieved the following learning outcomes: 1. Understanding of FBC: Develop the ability to interpret a Full Blood Count (FBC), including knowing when to repeat, escalate, and manage simple anemias effectively. 2.Organ-Blood Test Link: Gain insight into the connections between various organs and their relevant blood tests, fostering a holistic understanding of patient health. 3. Medication-Test Relationship: Review the links between different drug groups and the necessary monitoring required for safe practice and prescribing. 4. Chronic Disease Relevance: Develop an awareness of why specific tests are appropriate within various chronic disease groups, improving patient care. 5. National Guidance Awareness: Examine the connections between national guidance (e.g., NICE) and professional judgment, ensuring adherence to best practices. 6. Professional Development: Enhance your awareness of ongoing development within your practice and uphold professional accountability in this specialized field. Our course is designed to provide valuable Continuing Professional Development (CPD) for GPs, nurses, and pharmacists. It's ideal for professional revalidation, with reflective discussions seamlessly integrated into the program. We look forward to welcoming you to this engaging and informative training session. Join us in advancing your knowledge and expertise in interpreting blood results within the primary care setting.

Interpreting Blood Results
Delivered Online6 hours 30 minutes, Jun 5th, 08:30
£180

5th June Florence Rees #Agent121. Looking for: ADULT FICTION, NON-FICTION

5.0(1)

By I Am In Print

LOOKING FOR: ADULT FICTION, NON-FICTION Florence has been at A M Heath for five years and represents a range of commercial fiction and non-fiction. The authors she represents include Jaspreet Kaur, Salma El-Wardany, Rachel Thompson, Annie Lord, Angelica Malin and Phil Ellis. Their books range from the heart-breaking and profound to the inspirational, funny and wise, with almost everything in between. She’s keen to find non-fiction and fiction writers who speak to a millennial and younger audience, be that a journalist who is looking to expand an idea, a screenwriter who is looking to try their hand at fiction or perhaps an activist with a social media platform.  She’s actively looking for writers who are under-represented in the publishing world, through non-traditional channels, as well as her submissions, and is interested in environmental and social issues. For fiction, she always loves comforting, funny and warm reads, as well as gripping page-turners. She’d love to see any of the above but her favourite thing is to escape with a story she can’t put down. If you think your book fits with that, then do send it to her.  In fiction, books that have really left Florence wanting one more chapter include Marian Keyes’s character, Rachel, from Rachel’s Holiday gifted Florence with a compassion for addiction that only the most skilled of writers can conjure. Florence finds Catherine Newman to be a genuis for making hospice care so funny in We All Want Impossible Things. Smart page turners such as Anatomy of a Scandal, Such a Fun Age and Tomorrow, and Tomorrow, and Tomorrow wowed Florence with clever, gripping prose and complicated, flawed characters she hadn't met before. She also loves older classics like the Cazalet Chronicles and Georgette Heyer’s Regency novels – comforting, funny and warm reads will always her cup of tea. Florence does not wish to receive, YA, Fantasy or Sci-fi.  Florence would like you to submit a covering letter, 1 page synopsis and the first 5,000 words of your manuscript in a single word document.  (In addition to the paid sessions, Florence is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk [agent121@iaminprint.co.uk] to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Friday 31 May 2024

5th June Florence Rees #Agent121. Looking for: ADULT FICTION, NON-FICTION
Delivered Online15 minutes, Jun 5th, 08:20 + 5 more
£72

SOLD OUT! 12th June Becky Bagnell #Agent121. Looking for: MG, YA

5.0(1)

By I Am In Print

LOOKING FOR: MG, YA Becky Bagnell is the founder of the Lindsay Literary Agency and has been in publishing for over 25 years. She worked as a commissioning editor at Macmillan before becoming a literary agent in 2008. Becky's clients have been published in multiple languages across the world and include the multi-award winning authors, Pamela Butchart, Sue Wallman, Sam Gayton, Larry Hayes and J. M. Joseph. Becky is currently looking for escapist middle grade stories that take the reader on a crazy adventure either real world or fantastical. The ideal story has strong characters, an emotional storyline with an ending that's hopeful but doesn't need to be totally resolved. Diverse fiction would be great and YA with a quirky love story - think Wes Anderson meets John Green. Becky would like you to submit a covering letter, one page synopsis and the first three chapters of your completed manuscript in a single word document. (In addition to the paid sessions, Becky is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk [agent121@iaminprint.co.uk] to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Thursday 30 May 2024

SOLD OUT! 12th June Becky Bagnell #Agent121. Looking for: MG, YA
Delivered Online15 minutes, Jun 12th, 14:00 + 5 more
£72

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - INTRODUCTION TO ETHICAL HACKING * Information Security Overview * Cyber Kill Chain Concepts * Hacking Concepts * Ethical Hacking Concepts * Information Security Controls * Information Security Laws and Standards 2 - 2 - FOOT-PRINTING AND RECONNAISSANCE * Footprinting Concepts * Footprinting through Search Engines * Footprinting through Web Services * Footprinting through Social Networking Sites * Website Footprinting * Email Footprinting * Who is Footprinting * DNS Footprinting * Network Footprinting * Footprinting through Social Engineering * Footprinting Tools * Footprinting Countermeasures 3 - SCANNING NETWORKS * Network Scanning Concepts * Scanning Tools * Host Discovery * Port and Service Discovery * OS Discovery (Banner Grabbing/OS Fingerprinting) * Scanning Beyond IDS and Firewall * Draw Network Diagrams 4 - ENUMERATION * Enumeration Concepts * NetBIOS Enumeration * SNMP Enumeration * LDAP Enumeration * NTP and NFS Enumeration * SMTP and DNS Enumeration * Other Enumeration Techniques * Enumeration Countermeasures 5 - VULNERABILITY ANALYSIS * Vulnerability Assessment Concepts * Vulnerability Classification and Assessment Types * Vulnerability Assessment Solutions and Tools * Vulnerability Assessment Reports 6 - SYSTEM HACKING * System Hacking Concepts * Gaining Access * Escalating Privileges * Maintaining Access * Clearing Logs 7 - MALWARE THREATS * Malware Concepts * APT Concepts * Trojan Concepts * Virus and Worm Concepts * Fileless Malware Concepts * Malware Analysis * Countermeasures * Anti-Malware Software 8 - SNIFFING * Sniffing Concepts * Sniffing Technique: MAC Attacks * Sniffing Technique: DHCP Attacks * Sniffing Technique: ARP Poisoning * Sniffing Technique: Spoofing Attacks * Sniffing Technique: DNS Poisoning * Sniffing Tools * Countermeasures * Sniffing Detection Techniques 9 - SOCIAL ENGINEERING * Social Engineering Concepts * Social Engineering Techniques * Insider Threats * Impersonation on Social Networking Sites * Identity Theft * Countermeasures 10 - DENIAL-OF-SERVICE * DoS/DDoS Concepts * DoS/DDoS Attack Techniques * BotnetsDDoS Case Study * DoS/DDoS Attack Tools * Countermeasures * DoS/DDoS Protection Tools 11 - SESSION HIJACKING * Session Hijacking Concepts * Application Level Session Hijacking * Network Level Session Hijacking * Session Hijacking Tools * Countermeasures 12 - EVADING IDS, FIREWALLS, AND HONEYPOTS * IDS, IPS, Firewall, and Honeypot Concepts * IDS, IPS, Firewall, and Honeypot Solutions * Evading IDS * Evading Firewalls * IDS/Firewall Evading Tools * Detecting Honeypots * IDS/Firewall Evasion Countermeasures 13 - HACKING WEB SERVERS * Web Server Concepts * Web Server Attacks * Web Server Attack Methodology * Web Server Attack Tools * Countermeasures * Patch Management * Web Server Security Tools 14 - HACKING WEB APPLICATIONS * Web Application Concepts * Web Application Threats * Web Application Hacking Methodology * Web API, Webhooks, and Web Shell * Web Application Security 15 - SQL INJECTION * SQL Injection Concepts * Types of SQL Injection * SQL Injection Methodology * SQL Injection Tools * Evasion Techniques * Countermeasures 16 - HACKING WIRELESS NETWORKS * Wireless Concepts * Wireless Encryption * Wireless Threats * Wireless Hacking Methodology * Wireless Hacking Tools * Bluetooth Hacking * Countermeasures * Wireless Security Tools 17 - HACKING MOBILE PLATFORMS * Mobile Platform Attack Vectors * Hacking Android OS * Hacking iOS * Mobile Device Management * Mobile Security Guidelines and Tools 18 - IOT AND OT HACKING * IoT Hacking * IoT Concepts * IoT Attacks * IoT Hacking Methodology * IoT Hacking Tools * Countermeasures * OT Hacking * OT Concepts * OT Attacks * OT Hacking Methodology * OT Hacking Tools * Countermeasures 19 - CLOUD COMPUTING * Cloud Computing Concepts * Container Technology * Serverless Computing * Cloud Computing Threats * Cloud Hacking * Cloud Security 20 - CRYPTOGRAPHY * Cryptography Concepts * Encryption Algorithms * Cryptography Tools * Public Key Infrastructure (PKI) * Email Encryption * Disk Encryption * Cryptanalysis * Countermeasures ADDITIONAL COURSE DETAILS: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online6 days, Jun 17th, 13:00 + 5 more
£3495

Introduction to ECG Course (GPT009)

4.6(39)

By Geopace Training

Learn how to perform and read an ECG ... Nationally Recognised Qualification OCN Accredited - Level 3 (advanced level) CPD Accredited - The CPD Certification Service Introduces you to the fundamentals of setting up and operating an ECG machine Includes patient preparation Produce a valid (error free) ECG Learn and understand ECG traces Recognise recordings that require urgent attention Basic understanding of English language required OPEN TO ALL APPLICANTS VIRTUAL CLASSROOM OPTION INCLUDES COMPREHENSIVE PRACTISE@HOME ECG TRAINING KIT Final interpretation of all ECG recordings is the responsibility of a medical professional.

Introduction to ECG Course (GPT009)
Delivered Online or in Milton Keynes + 10 more locations3 hours, Jun 15th, 16:30 + 18 more
£195

Cisco Network Services Orchestrator Advanced Design (NSO300)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is system installers, system integrators, system administrators, network administrators, and solutions designers. Overview At the end of this course, you will be able to: Describe the NSO's transactional application framework and mapping model options Describe the Reactive Fastmap design pattern and the NSO Configuration Database (CDB) subscriber in the NSO Transaction model Simplify packages to remove the need for subscriber applications, scale orchestration solutions, and integrate NSO with external systems (east-west integration)Describe the Cisco ESC architecture and integration with NSO, and how the NSO VNF Orchestration (VNFO) Release 2 bundle interacts with ESC for orchestration This course explores how to create advanced services using the NSO application framework and Python scripting with both new and existing Layer 3 Multiprotocol Label Switching (MPLS) VPN services. Students will also learn how to manage and scale these services, and how to use NSO Network Functions Virtualization (NFV) orchestration features and Cisco Elastic Services Controller (ESC) to manage Virtualized Network Functions (VNFs). CISCO NSO PROGRAMMABILITY * NSO Application Framework * NSO Python Scripting * NSO Python and Template-Based Services * Resources AUGMENTING CISCO NSO SERVICE * Service Lifecycle and Integration Options Overview * Greenfield Layer 3 MPLS VPN Service * Brownfield Layer 3 MPLS VPN Service MANAGED SERVICES * Managed Services Overview * Stacked Service Design Overview * Design-Managed Network Services * Scaling Service Orchestration CISCO NSO NETWORK FUNCTIONS VIRTUALIZATION (NFV) ORCHESTRATION * ETSI MANO * Cisco ESC * Cisco NSO Orchestration ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Network Services Orchestrator Advanced Design (NSO300) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Network Services Orchestrator Advanced Design (NSO300) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Network Services Orchestrator Advanced Design (NSO300)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Service Provider 5G Technologies Foundations v1.0 (SPMBL100)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is designed for network and software engineers and hold job roles such as: Network administrator Network engineer Network manager System engineer Project manager Network designer Overview After taking this course, you should be able to: Describe mobile network architecture basics List enabling technologies for 5G and describe 5G key use cases Perform basic operations on a Cisco 5G NSA mobile packet core Describe the Cisco 5G Converged SDN Transport Architecture Describe Cisco NFVI and perform basic operations using Cisco ESC and Cisco Virtualized Infrastructure Manager (VIM) Describe Cisco service provider automation and orchestration solutions to deploy and manage 5G network functions Describe the Cisco Ultra Cloud Core architecture and deploy the Cisco SMI Explain the 5G ready distributed Telco DC with Cisco ACI solution Describe the Cisco 5G security architecture The Cisco Service Provider 5G Technologies Foundations (SPMBL100) v1.0 course introduces mobile network components, basic 5G concepts, and features of 5G technology including faster data speeds, higher device capacity, and improved user experience. You will examine the mobile packet core solutions, 5G transport architecture, and Cisco© automation and orchestration tools used in 5G networks. You will also learn about the Cisco 5G Non-standalone (NSA) and the Cisco Ultra Cloud Core 5G standalone (SA) platform solutions, the Cisco 5G converged Software-Defined Networking (SDN) transport architecture, and Cisco edge computing solutions. You will study the Cisco Network Function Virtualization (NFVI) architecture, Cisco Network Services Orchestrator (NSO), and Cisco Elastic Services Controller (ESC). You will learn how 5G is distributed with Telco Data Center (DC) with Cisco Application Centric Infrastructure (Cisco ACI©). And finally, Zero-Touch Provisioning (ZTP), Cisco Crosswork?, and the Cisco 5G security architecture will also be presented. MOBILE NETWORK FUNDAMENTALS * 5G Key Use Cases * Examining Mobile Network Components ENABLING TECHNOLOGIES FOR 5G * Introduction to 5G NR Characteristics * Cloud Radio Access network (RAN) CISCO 5G NSA SOLUTION * 5G NSA Basics * 5G NSA StarOS Configurations CISCO 5G CONVERGED SDN TRANSPORT ARCHITECTURE * Cisco 5G Transport Ready Devices * Application Awareness and Network Slicing with Segment Routing CISCO NFV INFRASTRUCTURE, CISCO VIRTUALIZED NETWORK FUNCTIONS (VNFS), CISCO VIM, AND CISCO ESC * NFVI and SDN Architecture Overview * Cisco VIM Pod Configurations CISCO SERVICE PROVIDER AUTOMATION AND ORCHESTRATION * Telemetry Basics * ZTP Fundamentals CISCO ULTRA CLOUD CORE * Cisco Ultra Cloud Core Basics * Kubernetes and Docker Fundamentals 5G READY DISTRIBUTED DC WITH CISCO ACI * Cisco ACI in Telco Data Centers * 5GC Deployment MITIGATING THREATS IN 5G * Introduction to 5G Cybersecurity Risks * Mitigating 5G Cybersecurity Risks

Cisco Service Provider 5G Technologies Foundations v1.0 (SPMBL100)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Implementing Automation for Cisco Service Provider Solutions v1.0 (SPAUI)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for Service Provider networking professionals in job roles such as: Network administrators Network architects Network designers Network engineers Network managers Network Operations Center (NOC) personnel Network supervisors Overview After taking this course, you should be able to: Use NETCONF and RESTCONF programmability protocols on Cisco devices Describe and use tools to validate YANG data models on Cisco devices Describe and configure model-driven telemetry on Cisco devices Describe and configure network traffic automation with Cisco XTC Describe and use network automation tools that utilize SSH Automate service provider network configuration with Cisco NSO Describe how to automate virtualized resources with Cisco ESC Describe how to automate service provider WAN with Cisco WAE This course prepares you to implement and support automation solutions in a Service Provider network infrastructure, using network programmability principles, protocols, tools, and mechanisms. Through a combination of lessons and hands-on labs, you will learn to deploy, configure, monitor, and operate Service Provider network environments using modern data models. These models allow you to represent operational data and new network management protocols in order to administer hundreds or thousands of devices in a single operation, replacing traditional, time-consuming, error prone, device-by-device Command Line Interface (CLI) management. The course also introduces powerful automation solutions that can streamline network operations. This course also prepares you for the CCNP-Service Provider concentration exam 300-535. IMPLEMENTING NETWORK DEVICE PROGRAMMABILITY INTERFACES WITH NETCONF AND RESTCONF * Implement NETCONF Protocol * Implement RESTCONF Protocol IMPLEMENTING MODEL-DRIVEN PROGRAMMABILITY WITH YANG * YANG Data Models * YANG Tools * YANG Development Kit IMPLEMENTING MODEL-DRIVEN TELEMETRY * Implementing Model-Driven Telemetry with gRPC * Implementing Model-Driven Telemetry with gNMI AUTOMATING SERVICE PROVIDER NETWORK TRAFFIC WITH CISCO XTC * Cisco XTC Fundamentals * Configure Cisco XTC AUTOMATING NETWORKS WITH TOOLS THAT UTILIZE SSH * Implement Device Configurations with Python Netmiko Library * Implement Device Configurations with Ansible Playbooks ORCHESTRATING NETWORK SERVICES WITH CISCO NSO * Cisco NSO Fundamentals * Cisco NSO Device Manager * Cisco NSO Services * Implement Device Configurations with Python AUTOMATING VIRTUALIZED RESOURCES WITH CISCO ELASTIC SERVICES CONTROLLER * Cisco ESC Architecture * Cisco ESC Resource Management AUTOMATING THE WAN WITH CISCO WAE * Describe the Cisco WAE Components ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Implementing Automation for Cisco Service Provider Solutions v1.0 (SPAUI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Automation for Cisco Service Provider Solutions v1.0 (SPAUI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Automation for Cisco Service Provider Solutions v1.0 (SPAUI)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Information Security Manager (CISM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification. Overview Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents. In this course, students will establish processes to ensure that information security measures align with established business needs. Prerequisites Information security governance Information risk management Information security program development Information security program management Incident management and response 1 - INFORMATION SECURITY GOVERNANCE * Develop an Information Security Strategy * Align Information Security Strategy with Corporate Governance * Identify Legal and Regulatory Requirements * Justify Investment in Information Security * Identify Drivers Affecting the Organization * Obtain Senior Management Commitment to Information Security * Define Roles and Responsibilities for Information Security * Establish Reporting and Communication Channels 2 - INFORMATION RISK MANAGEMENT * Implement an Information Risk Assessment Process * Determine Information Asset Classification and Ownership * Conduct Ongoing Threat and Vulnerability Evaluations * Conduct Periodic BIAs * Identify and Evaluate Risk Mitigation Strategies * Integrate Risk Management into Business Life Cycle Processes * Report Changes in Information Risk 3 - INFORMATION SECURITY PROGRAM DEVELOPMENT * Develop Plans to Implement an Information Security Strategy * Security Technologies and Controls * Specify Information Security Program Activities * Coordinate Information Security Programs with Business Assurance Functions * Identify Resources Needed for Information Security Program Implementation * Develop Information Security Architectures * Develop Information Security Policies * Develop Information Security Awareness, Training, and Education Programs * Develop Supporting Documentation for Information Security Policies 4 - INFORMATION SECURITY PROGRAM IMPLEMENTATION * Integrate Information Security Requirements into Organizational Processes * Integrate Information Security Controls into Contracts * Create Information Security Program Evaluation Metrics 5 - INFORMATION SECURITY PROGRAM MANAGEMENT * Manage Information Security Program Resources * Enforce Policy and Standards Compliance * Enforce Contractual Information Security Controls * Enforce Information Security During Systems Development * Maintain Information Security Within an Organization * Provide Information Security Advice and Guidance * Provide Information Security Awareness and Training * Analyze the Effectiveness of Information Security Controls * Resolve Noncompliance Issues 6 - INCIDENT MANAGEMENT AND RESPONSE * Develop an Information Security Incident Response Plan * Establish an Escalation Process * Develop a Communication Process * Integrate an IRP * Develop IRTs * Test an IRP * Manage Responses to Information Security Incidents * Perform an Information Security Incident Investigation * Conduct Post-Incident Reviews

Certified Information Security Manager (CISM)
Delivered Online4 days, Jun 24th, 13:00 + 5 more
£1995
123...7

Educators matching "ESC"

Show all 386