• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

11 Event Management courses delivered Live Online

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

SC-300T00 Microsoft Identity and Access Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites * SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals * AZ-104T00 - Microsoft Azure Administrator 1 - EXPLORE IDENTITY IN MICROSOFT ENTRA ID * Explain the identity landscape * Explore zero trust with identity * Discuss identity as a control plane * Explore why we have identity * Define identity administration * Contrast decentralized identity with central identity systems * Discuss identity management solutions * Explain Microsoft Entra Business to Business * Compare Microsoft identity providers * Define identity licensing * Explore authentication * Discuss authorization * Explain auditing in identity 2 - IMPLEMENT INITIAL CONFIGURATION OF MICROSOFT ENTRA ID * Configure company brand * Configure and manage Microsoft Entra roles * Configure delegation by using administrative units * Analyze Microsoft Entra role permissions * Configure and manage custom domains * Configure tenant-wide setting 3 - CREATE, CONFIGURE, AND MANAGE IDENTITIES * Create, configure, and manage users * Create, configure, and manage groups * Configure and manage device registration * Manage licenses * Create custom security attributes * Explore automatic user creation 4 - IMPLEMENT AND MANAGE EXTERNAL IDENTITIES * Describe guest access and Business to Business accounts * Manage external collaboration * Invite external users - individually and in bulk * Demo - manage guest users in Microsoft Entra ID * Manage external user accounts in Microsoft Entra ID * Manage external users in Microsoft 365 workloads * Implement and manage Microsoft Entra Verified ID * Configure identity providers * Implement cross-tenant access controls 5 - IMPLEMENT AND MANAGE HYBRID IDENTITY * Plan, design, and implement Microsoft Entra Connect * Implement manage password hash synchronization (PHS) * Implement manage pass-through authentication (PTA) * Demo - Manage pass-through authentication and seamless single sign-on (SSO) * Implement and manage federation * Trouble-shoot synchronization errors * Implement Microsoft Entra Connect Health * Manage Microsoft Entra Health 6 - SECURE MICROSOFT ENTRA USERS WITH MULTIFACTOR AUTHENTICATION * What is Microsoft Entra multifactor authentication? * Plan your multifactor authentication deployment * Configure multi-factor authentication methods 7 - MANAGE USER AUTHENTICATION * Administer FIDO2 and passwordless authentication methods * Explore Authenticator app and OATH tokens * Implement an authentication solution based on Windows Hello for Business * Deploy and manage password protection * Configure smart lockout thresholds * Implement Kerberos and certificate-based authentication in Microsoft Entra ID * Configure Microsoft Entra user authentication for virtual machines 8 - PLAN, IMPLEMENT, AND ADMINISTER CONDITIONAL ACCESS * Plan security defaults * Plan Conditional Access policies * Implement Conditional Access policy controls and assignments * Test and troubleshoot Conditional Access policies * Implement application controls * Implement session management * Implement continuous access evaluation 9 - MANAGE MICROSOFT ENTRA IDENTITY PROTECTION * Review identity protection basics * Implement and manage user risk policy * Monitor, investigate, and remediate elevated risky users * Implement security for workload identities * Explore Microsoft Defender for Identity 10 - IMPLEMENT ACCESS MANAGEMENT FOR AZURE RESOURCES * Assign Azure roles * Configure custom Azure roles * Create and configure managed identities * Access Azure resources with managed identities * Analyze Azure role permissions * Configure Azure Key Vault RBAC policies * Retrieve objects from Azure Key Vault * Explore Microsoft Entra Permissions Management 11 - PLAN AND DESIGN THE INTEGRATION OF ENTERPRISE APPS FOR SSO * Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report * Configure connectors to apps * Design and implement app management roles * Configure preintegrated gallery SaaS apps * Implement and manage policies for OAuth apps 12 - IMPLEMENT AND MONITOR THE INTEGRATION OF ENTERPRISE APPS FOR SSO * Implement token customizations * Implement and configure consent settings * Integrate on-premises apps with Microsoft Entra application proxy * Integrate custom SaaS apps for single sign-on * Implement application-based user provisioning * Monitor and audit access to Microsoft Entra integrated enterprise applications * Create and manage application collections 13 - IMPLEMENT APP REGISTRATION * Plan your line of business application registration strategy * Implement application registration * Register an application * Configure permission for an application * Grant tenant-wide admin consent to applications * Implement application authorization * Manage and monitor application by using app governance 14 - PLAN AND IMPLEMENT ENTITLEMENT MANAGEMENT * Define access packages * Configure entitlement management * Configure and manage connected organizations * Review per-user entitlements 15 - PLAN, IMPLEMENT, AND MANAGE ACCESS REVIEW * Plan for access reviews * Create access reviews for groups and apps * Create and configure access review programs * Monitor access review findings * Automate access review management tasks * Configure recurring access reviews 16 - PLAN AND IMPLEMENT PRIVILEGED ACCESS * Define a privileged access strategy for administrative users * Configure Privileged Identity Management for Azure resources * Plan and configure Privileged Access Groups * Analyze Privileged Identity Management audit history and reports * Create and manage emergency access accounts 17 - MONITOR AND MAINTAIN MICROSOFT ENTRA ID * Analyze and investigate sign-in logs to troubleshoot access issues * Review and monitor Microsoft Entra audit logs * Export logs to third-party security information and event management system * Analyze Microsoft Entra workbooks and reporting * Monitor security posture with Identity Secure Score

SC-300T00 Microsoft Identity and Access Administrator
Delivered Online5 days, Jun 18th, 13:00 + 3 more
£2380

EA/PA Excellence Workshop Virtual

5.0(1)

By Own Your Success

Discover how to elevate your career as an executive assistant or personal assistant with our comprehensive EA Mastery Workshop. Gain new skills, strategies, and tools to maximize your impact and achieve success.

EA/PA Excellence Workshop Virtual
Delivered Online4 hours, Jun 27th, 12:00
£290 to £345

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - INTRODUCTION TO ZERO TRUST AND BEST PRACTICE FRAMEWORKS * Zero Trust initiatives * Zero Trust technology pillars part 1 * Zero Trust technology pillars part 2 2 - DESIGN SOLUTIONS THAT ALIGN WITH THE CLOUD ADOPTION FRAMEWORK (CAF) AND WELL-ARCHITECTED FRAMEWORK (WAF) * Define a security strategy * Cloud Adoption Framework secure methodology * Design security with Azure Landing Zones * The Well-Architected Framework security pillar 3 - DESIGN SOLUTIONS THAT ALIGN WITH THE MICROSOFT CYBERSECURITY REFERENCE ARCHITECTURE (MCRA) AND MICROSOFT CLOUD SECURITY BENCHMARK (MCSB) * Design solutions with best practices for capabilities and controls * Design solutions with best practices for attack protection 4 - DESIGN A RESILIENCY STRATEGY FOR COMMON CYBERTHREATS LIKE RANSOMWARE * Common cyberthreats and attack patterns * Support business resiliency * Ransomware protection * Configurations for secure backup and restore * Security updates 5 - CASE STUDY: DESIGN SOLUTIONS THAT ALIGN WITH SECURITY BEST PRACTICES AND PRIORITIES * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 6 - DESIGN SOLUTIONS FOR REGULATORY COMPLIANCE * Translate compliance requirements into a security solution * Address compliance requirements with Microsoft Purview * Address privacy requirements with Microsoft Priva * Address security and compliance requirements with Azure policy * Evaluate infrastructure compliance with Defender for Cloud 7 - DESIGN SOLUTIONS FOR IDENTITY AND ACCESS MANAGEMENT * Design cloud, hybrid and multicloud access strategies (including Azure AD) * Design a solution for external identities * Design modern authentication and authorization strategies * Align conditional access and Zero Trust * Specify requirements to secure Active Directory Domain Services (AD DS) * Design a solution to manage secrets, keys, and certificates 8 - DESIGN SOLUTIONS FOR SECURING PRIVILEGED ACCESS * The enterprise access model * Design identity governance solutions * Design a solution to secure tenant administration * Design a solution for cloud infrastructure entitlement management (CIEM) * Design a solution for privileged access workstations and bastion services 9 - DESIGN SOLUTIONS FOR SECURITY OPERATIONS * Design security operations capabilities in hybrid and multicloud environments * Design centralized logging and auditing * Design security information and event management (SIEM) solutions * Design solutions for detection and response * Design a solution for security orchestration, automation, and response (SOAR) * Design security workflows * Design threat detection coverage 10 - CASE STUDY: DESIGN SECURITY OPERATIONS, IDENTITY AND COMPLIANCE CAPABILITIES * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 11 - DESIGN SOLUTIONS FOR SECURING MICROSOFT 365 * Evaluate security posture for collaboration and productivity workloads * Design a Microsoft 365 Defender solution * Design configurations and operational practices for Microsoft 365 12 - DESIGN SOLUTIONS FOR SECURING APPLICATIONS * Design and implement standards to secure application development * Evaluate security posture of existing application portfolios * Evaluate application threats with threat modeling * Design security lifecycle strategy for applications * Secure access for workload identities * Design a solution for API management and security * Design a solution for secure access to applications 13 - DESIGN SOLUTIONS FOR SECURING AN ORGANIZATION'S DATA * Design a solution for data discovery and classification using Microsoft Purview * Design a solution for data protection * Design data security for Azure workloads * Design security for Azure Storage * Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - CASE STUDY: DESIGN SECURITY SOLUTIONS FOR APPLICATIONS AND DATA * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 15 - SPECIFY REQUIREMENTS FOR SECURING SAAS, PAAS, AND IAAS SERVICES * Specify security baselines for SaaS, PaaS, and IaaS services * Specify security requirements for web workloads * Specify security requirements for containers and container orchestration 16 - DESIGN SOLUTIONS FOR SECURITY POSTURE MANAGEMENT IN HYBRID AND MULTICLOUD ENVIRONMENTS * Evaluate security posture by using Microsoft Cloud Security Benchmark * Design integrated posture management and workload protection * Evaluate security posture by using Microsoft Defender for Cloud * Posture evaluation with Microsoft Defender for Cloud secure score * Design cloud workload protection with Microsoft Defender for Cloud * Integrate hybrid and multicloud environments with Azure Arc * Design a solution for external attack surface management 17 - DESIGN SOLUTIONS FOR SECURING SERVER AND CLIENT ENDPOINTS * Specify server security requirements * Specify requirements for mobile devices and clients * Specify internet of things (IoT) and embedded device security requirements * Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT * Specify security baselines for server and client endpoints * Design a solution for secure remote access 18 - DESIGN SOLUTIONS FOR NETWORK SECURITY * Design solutions for network segmentation * Design solutions for traffic filtering with network security groups * Design solutions for network posture management * Design solutions for network monitoring 19 - CASE STUDY: DESIGN SECURITY SOLUTIONS FOR INFRASTRUCTURE * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough ADDITIONAL COURSE DETAILS: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered Online5 days, Jul 29th, 13:00 + 1 more
£2380

ITIL© 4 High Velocity IT (HVIT)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Delegates attending this course must have successfully achieved the ITIL 4 Foundation Qualification; your certificate must be presented as documentary evidence to gain admission to this course. Ideally candidates should have at least two years professional experience working in IT Service Management. The ITIL 4 HVIT Qualification would most likely suit the following delegates: Individuals continuing of their journey in service management ITSM managers and aspiring ITSM managers IT managers and practitioners involved in digital services or working in digital transformation projects, working within or towards high velocity environments Existing ITIL qualification holders wishing to develop their knowledge The above list is a suggestion only. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs. Overview This course has been created to help IT service management practitioners working in organizations that are becoming more digitally enabled. The practitioners are familiar with traditional IT service management concepts, and now want to be able to discuss ?digital? with more confidence, to develop practical competences, and to be valued contributors in the digital domain. They want to improve how they and their co-workers: Help get customers? jobs done ? helping customers become who they seek to become Keep raising the bar ? taking things to a significantly higher level Trust and are trusted ? as professional knowledge workers in a healthy workplace Accept ambiguity and uncertainty - not scared of not knowing an answer Commit to continual learning ? all as part of their daily work The scope of the course is the primary activities in the digital value chain. In other words, what the practitioner does and which resources they use across the lifecycle of digital products, in order to: Make the right digital investments Realize and deliver digital products and services quickly Provide digital products and services that are highly resilient to disruption Ensure that the service consumer realizes value from the digital products and services Assure conformance of activities with governance, risk and compliance requirements. Understand and know how to use the key principles and methods of Organizational Change Management to direction, planning and improvement Understand and know how to use the key principles and methods of measurement and reporting in directing, planning and improvement Understand and know how to direct, plan and improve value streams and practices ITIL 4 is a framework for quality IT service management (ITSM) through proven best practice, providing practical and flexible guidance to support your organization on its journey to digital transformation while empowering your IT teams to continue to play a crucial role in the wider business strategy. This course highlights the ways in which digital organizations and digital operating models function in high-velocity environments, including the use of working practices such as Agile and Lean, and technical practices and technologies such as Cloud, Automation, and Automatic Testing. This class includes an exam voucher. Prerequisites * ITIL© 4 Foundation 1 - THE NATURE OF HIGH-VELOCITY IN A DIGITAL WORLD * Overview of the key ITIL 4 high-velocity terminology * Understand when the transformation to high velocity IT is desirable and feasible * Understand the five objectives associated with digital products ? to achieve: * Valuable investments ? strategically innovative and effective application of IT * Fast development - quick realization and delivery of IT services and IT-related products * Resilient operations - highly resilient IT services and IT-related products * Co-created value - effective interaction between service provider and consumer * Assured conformance - to governance, risk and compliance (GRC) requirements. 2 - ITIL OPERATING MODEL ? DIGITAL PRODUCT LIFECYCLE * Understand how high velocity IT relates to: * The four dimensions of service management * The ITIL service value system * The service value chain * The digital product lifecycle 3 - FUNDAMENTAL CONCEPTS FOR DELIVERING HVIT * Understand the following concepts: * Ethics * Safety culture * Toyota Kata * Lean / Agile / Resilient / Continuous * Service-dominant logic * Design thinking * Complexity thinking * Use the principles, models and concepts to contribute to: * Help get customers? jobs done * Trust and be trusted * Commit to performance * Deal with uncertainty * Improve by being inquisitive 4 - ACHIEVING VALUE WITH DIGITAL PRODUCTS * Know how the service provider ensures valuable investments are achieved. * Know how to use the following practices to contribute to achieving valuable investments: * Portfolio management * Relationship management * Know how the service provider ensures fast deployment is achieved * Know how to use the following practices to contribute to achieving fast deployment: * Architecture management * Business analysis * Deployment management * Service validation and testing * Software development and management * Know how the service provider ensures resilient operations are achieved * Know how to use the following practices to contribute to achieving resilient operations: * Availability management * Capacity and performance management * Monitoring and event management * Problem management * Service continuity management * Infrastructure and platform management * Know how the service provider ensures co-created value is achieved * Know how to use the following practices to contribute to achieving co-created value with the service consumer: * Relationship management * Service design * Service desk * Know how the service provider ensures assured conformance is achieved * Know how to use the following practices to contribute to achieving assured conformance: * Information security management * Risk management

ITIL© 4 High Velocity IT (HVIT)
Delivered Online4 days, Aug 19th, 13:00 + 1 more
£2385

How to plan your 2024 wedding like a pro!

5.0(2)

By Etincelle Bespoke Events

🌟 Join Jennifer Toure-Chaibet, Best Hospitality Leader 2023, and Etincelle Bespoke Events, Best Luxury Event Planner London 2023, for a 3-hour masterclass on flawless wedding planning! 🎓 Unlock industry secrets, perfect venue selection, and supplier hiring mastery. Gain confidence, comprehensive knowledge, and attention to detail. London (TBC) or online options. Early bird offer: £99. 🌍 Book your spot now on WhatsApp: 07490 649 435 #WeddingPlanning #Masterclass #JenniferToureChaibet #EtincelleBespokeEvents #LondonEvents 🌸💍

How to plan your 2024 wedding like a pro!
Delivered on-request, onlineDelivered Online
£99 to £350

ONLINE WEDDING CELEBRANT TRAINING COURSE

By Celebrant Training UK

Online celebrant training, Celebrant courses, Celebrant training

ONLINE WEDDING CELEBRANT TRAINING COURSE
Delivered on-request, onlineDelivered Online
£950

Curating the Experience: Psychology of Art and Exhibitions

By AIR Courses, London

A course on Curating and the Psychology of Perception - which are very closely interlinked. -------------------------------------------------------------------------------- CURATING AND THE PSYCHOLOGY OF PERCEPTION ARE VERY CLOSELY INTERLINKED. YET, PSYCHOLOGISTS AND CURATORS ARE RARELY BROUGHT TOGETHER TO EXAMINE THEM TOGETHER. This course has previously ran as part of the rich portfolio of (AIR interdisciplinary courses)[https://www.gold.ac.uk/short-courses/air]. It now runs as part AIR Courses at TechnoTruth. TAUGHT BY LEADING EXPERTS This course is taught by two leading experts. The course combines lectures on the history of the most important exhibitions of modern art with psychology of perception to address several important questions. Read more on the course page. GROUP BOOKINGS AND ENQUIRIES To book this course for a group, please email us at: info(@TechnoTruth.co.uk). REFUNDS: We will be happy to refund the fee, minus the Eventbrite fee, which is not refundable. For cancellations latter than 24 hours ahead of the start of the training, a proportion of the fee (£95) is non-refundable.

Curating the Experience: Psychology of Art and Exhibitions
Delivered Online
Dates arranged on request
£195

YMCA Level 3 Certificate in Leisure Management

5.0(7)

By Platinum Training Institute

This qualification is aimed at individuals who want to work in management roles in the Active Leisure Sector. Learners will cover: Understanding the active leisure sector / Health, safety and welfare / Leading a team / Promoting customer care / Understanding employment rights and responsibilities / Financial procedures / Delivering objectives through the work of an active leisure team / Supervising facility maintenance / Marketing services and products to customers / Operating swimming pool plant

YMCA Level 3 Certificate in Leisure Management
Delivered Online
Dates arranged on request
£495

Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Although there are no mandatory prerequisites, the course is particularly suited for the following audiences: Cybersecurity engineer Cybersecurity investigator Incident manager Incident responder Network engineer SOC analysts currently functioning at entry level with 2+ years of experience Overview After taking this course, you should be able to: Describe the types of service coverage within a SOC and operational responsibilities associated with each. Compare security operations considerations of cloud platforms. Describe the general methodologies of SOC platforms development, management, and automation. Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections. Describe Zero Trust and associated approaches, as part of asset controls and protections. Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC. Use different types of core security technology platforms for security monitoring, investigation, and response. Describe the DevOps and SecDevOps processes. Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, CommaSeparated Values (CSV). Describe API authentication mechanisms. Analyze the approach and strategies of threat detection, during monitoring, investigation, and response. Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs). Interpret the sequence of events during an attack based on analysis of traffic patterns. Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools). Analyze anomalous user and entity behavior (UEBA). Perform proactive threat hunting following best practices. The Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity fundamentals and prepares you for the role of Information Security Analyst on a Security Operations Center team. You?ll learn to automate for security using cloud platforms and how to apply your knowledge to real-world scenarios COURSE OUTLINE * Understanding Risk Management and SOC Operations * Understanding Analytical Processes and Playbooks * Investigating Packet Captures, Logs, and Traffic Analysis * Investigating Endpoint and Appliance Logs * Understanding Cloud Service Model Security Responsibilities * Understanding Enterprise Environment Assets * Threat Tuning * Threat Researching and Threat Intelligence Practices * Understanding APIs * Understanding SOC Development and Deployment Models * Performing Security Analytics and Reports in a SOC * Malware Forensics Basics * Threat Hunting Basics ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0
Delivered on-request, onlineDelivered Online
Price on Enquiry

Symantec Data Center Security - Server Advanced 6.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for information technology professionals, security professionals, network, system managers and administrators tasked with installing, configuring and maintaining Symantec Data Center Security: Server Advanced. Overview At the completion of the course, you will be able to: Describe the major components of Symantec Data Center Security: Server Advanced and how they communicate. Install the management server, console and agent. Define, manage and create assets, policies, events and configurations. Understand policy creation and editing in depth. course is an introduction to implementing and managing a Symantec Data Center Security: Server Advanced 6.0 deployment. INTRODUCTION * Course Overview The Classroom Lab Environment INTRODUCTION TO SECURITY RISKS AND RISK * Security Risks Security Risk Management Managing and Protecting Systems Corporate Security Policies and Security Assessments Host-Based Computer Security Issues SDCS:SERVER ADVANCED OVERVIEW * SDCS: Server Advanced Component Overview Policy Types and Platforms Management Console Overview Agent User Interface Overview DEMO of Management Console INSTALLATION AND DEPLOYMENT * Planning the Installation Deploying SDCS:SA for High Availability Scalability Installing the Management Server Installing the Management Console Installing a Windows Agent Installing a UNIX Agent LAB: Install Manager and Agents CONFIGURING ASSETS * Asset and Agent Overview Viewing Agents and Assets Managing Agents Managing Agents on Assets LAB: Create Asset Groups LAB: Examine Agent Interface POLICY OVERVIEW * Policies Defined Prevention Policy Overview Process Sets Resource Access Policy Options Detection Policy Overview IDS Capabilities Rules Collectors Policy Management Workspace User Interface on Agent Example Use Cases LAB: Paper Based Scenarios LAB: What type of security strategy should be used? DETAILED PREVENTION POLICIES * Policy Editor Policy Structure Global Policy Options Service Options Program Options Policy Processing Order Network Rules File Rules Registry Rules Process Sets Predefined Policies LAB: Deploy Strict policy LAB: Examine Functionality ADVANCED PREVENTION * Profiling Applications Customizing Predefined Policies LAB: Modify Policy Previously Deployed LAB: Re-examine Functionality LAB: Preparing for Policy deployment LAB: Best Practice - Covering Basics LAB: Further Enhance Strict Policy LAB: Create Custom Process Set LAB :Secure an FTP Server LAB: Troubleshoot Policy/pset Assignment Using CLI DETECTION POLICIES * Detection Policies Structure Collectors Rules Predefined Detection Policies Creating a Detection Policy Using the Template Policy LAB: Deploy Baseline Policy LAB: Create Custom Policy EVENT MANAGEMENT * Events Defined Viewing Events Reports and Queries Overview Creating Queries and Reports Creating Alerts LAB: View Monitor Types and Search Events LAB: Create Real Time Monitor AGENT MANAGEMENT AND TROUBLESHOOTING * Configurations Defined Creating and Editing Configurations Common Parameters Prevention Settings Detection Settings Analyzing Agent Log Files Diagnostic Policies Local Agent Tool ? sisipsconfig LAB: Create Custom Configurations LAB: Implement Bulk Logging LAB: Disable Prevention on Agent Using CLI LAB: Use Diagnostic Policy to Gather Logs LAB: Troubleshoot a Policy SYSTEM MANAGEMENT * Managing Users and Roles Server Security Viewing and Managing Server Settings Viewing and Managing Database Settings Viewing and Managing Tomcat Settings LAB: Create a New User LAB: View System Settings

Symantec Data Center Security - Server Advanced 6.0
Delivered on-request, onlineDelivered Online
Price on Enquiry

Educators matching "Event Management"

Show all 1393