• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1297 Network & Security courses

Palo Alto Networks : Cortex XSOAR 6.8: Automation and Orchestration (EDU-380)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security-operations (SecOps), or security, orchestration, automation, and response (SOAR) engineers, managed security service providers (MSSPs), service delivery partners, system integrators, and professional services engineers Overview This training is designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow.The course includes coverage of a complete playbook-development process for automating a typical analyst workflow to address phishing incidents. This end-to-end view of the development process provides a framework for more focused discussions of individual topics that are covered in the course. The Cortex? XSOAR 6.2: Automation and Orchestration (EDU-380) course is four days of instructor-led training that will help you: Configure integrations, create tasks, and develop playbooks.Build incident layouts that enable analysts to triage and investigate incidents efficientlyIdentify how to categorize event information and map that information to display fields.Develop automations, manage content, indicator data, and artifact stores, schedule jobs, organize users and user roles, oversee case management, and foster collaboration COURSE OUTLINE * 1 - Core functionality and Feature Sets * 2 - Enabling and Configuring Integrations * 3 - Playbook Development * 4 - Classification and Mapping * 5 - Layout Builder * 6 - Solution Architecture - Docker * 8 - Automation Development & Debugging * 9 - Content Management * 10 - Indicators * 11 - Jobs and Job Scheduling * 12 - Users and Role Management * 13 - Integration Development ADDITIONAL COURSE DETAILS: Nexus Humans Palo Alto Networks : Cortex XSOAR 6.8: Automation and Orchestration (EDU-380) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Cortex XSOAR 6.8: Automation and Orchestration (EDU-380) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks : Cortex XSOAR 6.8: Automation and Orchestration (EDU-380)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180)

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for Security EngineersNetwork Engineers Overview This course is intended to provide a top-level overview of Palo Alto Networks© Traps? Endpoint protection product. Upon completion of the class the student will be able to understand these principles: Explain the core technologies of Traps? and how it differs from traditional signature recognition technologies. Understand the advantages of these technologies over existing solutions. Understand Traps? product architecture and deployment requirements. Installation requirements for Traps? installations. Deploy Exploit Prevention Module defenses to endpoints with Policies. Deploy Malware Protection defenses to endpoints. Provide Application Execution Control in conjunction with WildFire?. Understand deployment strategies and tactics for Workstations, VDI and Server endpoints. Gather and analyze Security Event reports and forensics. Foundation classes are just introductory trainings, NOT a full technical training. Compromise isn?t inevitable, or, at least, it shouldn?t be. Traditional endpoint protection simply cannot keep up with the rapidly evolving threat landscape, leaving organizations vulnerable to advanced attacks. A new approach is needed, one that can rebuild confidence in endpoint security. This new approach needs to prevent advanced attacks originating from executables, data files or network-based exploits ? known and unknown ? before any malicious activity could successfully run. Palo Alto Networks© call this ?advanced endpoint protection.? By focusing on the attacker?s core techniques and putting up barriers to mitigate them, the attacker?s path for exploitation becomes known, even when the attack isn?t. Traps? focuses on the core techniques leveraged by exploits in advanced cyberattacks and renders these techniques ineffective by breaking the exploit sequence and blocking the technique the moment it is attempted. INTRODUCTION THE TRAPS? TECHNOLOGY ALTERNATIVE TO ENDPOINT DEFENSE TRAPS? EXPLOIT AND MALWARE PROTECTION TRAPS? PRODUCT ARCHITECTURE TRAPS? DEPLOYMENT TRAPS? EXPLOIT POLICY MANAGEMENT TRAPS? MALWARE PROTECTION POLICIES TRAPS? FORENSICS PRACTICAL TRAPS? IMPLEMENTATION CONSIDERATIONS ADDITIONAL COURSE DETAILS: Nexus Humans Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180)
Delivered on-request, onlineDelivered Online
Price on Enquiry

AN220 IBM AIX Network Installation Management - Concepts and Configuration

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This intermediate course is appropriate for anyone with system administrative duties installing and managing an AIX operating system in a multiuser POWER (System p) environment. Overview Explain key NIM concepts and terminology Display NIM-related information Set up a NIM master Perform a base AIX (RTE) install Define and use several types of NIM objects Perform an automated install Create and use mksysb resources Maintain lpp_source and SPOT resources Update NIM clients In this course you will learn the fundamental capabilities of the Network Installation Management (NIM) facility of the AIX 6 operating system DAY 1 * NIM overview * Setting up the master * RTE installation * Customizing install operations DAY 2 * NIM backups and restores * Managing key NIM resources * Client updates

AN220 IBM AIX Network Installation Management - Concepts and Configuration
Delivered on-request, onlineDelivered Online
Price on Enquiry

Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Those who will provide container orchestration management in the AWS Cloud including: DevOps engineers Systems administrators Overview In this course, you will learn to: Review and examine containers, Kubernetes and Amazon EKS fundamentals and the impact of containers on workflows. Build an Amazon EKS cluster by selecting the correct compute resources to support worker nodes. Secure your environment with AWS Identity and Access Management (IAM) authentication by creating an Amazon EKS service role for your cluster Deploy an application on the cluster. Publish container images to ECR and secure access via IAM policy. Automate and deploy applications, examine automation tools and pipelines. Create a GitOps pipeline using WeaveFlux. Collect monitoring data through metrics, logs, tracing with AWS X-Ray and identify metrics for performance tuning. Review scenarios where bottlenecks require the best scaling approach using horizontal or vertical scaling. Assess the tradeoffs between efficiency, resiliency, and cost and impact for tuning one over the other. Describe and outline a holistic, iterative approach to optimizing your environment. Design for cost, efficiency, and resiliency. Configure the AWS networking services to support the cluster. Describe how EKS/Amazon Virtual Private Cloud (VPC) functions and simplifies inter-node communications. Describe the function of VPC Container Network Interface (CNI). Review the benefits of a service mesh. Upgrade your Kubernetes, Amazon EKS, and third party tools Amazon EKS makes it easy for you to run Kubernetes on AWS without needing to install, operate, and maintain your own Kubernetes control plane. In this course, you will learn container management and orchestration for Kubernetes using Amazon EKS. You will build an Amazon EKS cluster, configure the environment, deploy the cluster, and then add applications to your cluster. You will manage container images using Amazon Elastic Container Registry (ECR) and learn how to automate application deployment. You will deploy applications using CI/CD tools. You will learn how to monitor and scale your environment by using metrics, logging, tracing, and horizontal/vertical scaling. You will learn how to design and manage a large container environment by designing for efficiency, cost, and resiliency. You will configure AWS networking services to support the cluster and learn how to secure your Amazon EKS environment. MODULE 0: COURSE INTRODUCTION * Course preparation activities and agenda MODULE 1: CONTAINER FUNDAMENTALS * Best practices for building applications Container fundamentals Components of a container MODULE 2: KUBERNETES FUNDAMENTALS * Container orchestration Kubernetes objects Kubernetes internals Preparing for Lab 1: Deploying Kubernetes Pods MODULE 3: AMAZON EKS FUNDAMENTALS * Introduction to Amazon EKS Amazon EKS control plane Amazon EKS data plane Fundamentals of Amazon EKS security Amazon EKS API MODULE 4: BUILDING AN AMAZON EKS CLUSTER * Configuring your environment Creating an Amazon EKS cluster Demo: Configuring and deploying clusters in the AWS Management Console Working with eksctl Preparing for Lab 2: Building an Amazon EKS Cluster MODULE 5: DEPLOYING APPLICATIONS TO YOUR AMAZON EKS CLUSTER * Configuring Amazon Elastic Container Registry (Amazon ECR) Demo: Configuring Amazon ECR Deploying applications with Helm Demo: Deploying applications with Helm Continuous deployment in Amazon EKS GitOps and Amazon EKS Preparing for Lab 3: Deploying App MODULE 6: CONFIGURING OBSERVABILITY IN AMAZON EKS * Configuring observability in an Amazon EKS cluster Collecting metrics Using metrics for automatic scaling Managing logs Application tracing in Amazon EKS Gaining and applying insight from observability Preparing for Lab 4: Monitoring Amazon EKS MODULE 7: BALANCING EFFICIENCY, RESILIENCE, AND COST OPTIMIZATION IN AMAZON EKS * The high level overview Designing for resilience Designing for cost optimization Designing for efficiency MODULE 8: MANAGING NETWORKING IN AMAZON EKS * Review: Networking in AWS Communicating in Amazon EKS Managing your IP space Deploying a service mesh Preparing for Lab 5: Exploring Amazon EKS Communication MODULE 9: MANAGING AUTHENTICATION AND AUTHORIZATION IN AMAZON EKS * Understanding the AWS shared responsibility model Authentication and authorization Managing IAM and RBAC Demo: Customizing RBAC roles Managing pod permissions using RBAC service accounts MODULE 10: IMPLEMENTING SECURE WORKFLOWS * Securing cluster endpoint access Improving the security of your workflows Improving host and network security Managing secrets Preparing for Lab 6: Securing Amazon EKS MODULE 11: MANAGING UPGRADES IN AMAZON EKS * Planning for an upgrade Upgrading your Kubernetes version Amazon EKS platform versions ADDITIONAL COURSE DETAILS: Nexus Humans Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Information Privacy Professional (CIPP/US)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.This course will provide you with a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. INTRODUCTION TO PRIVACY * Modern history of privacy * Introduction to personal information * Overview of data protection roles * Summary of modern privacy frameworks STRUCTURE OF U.S. LAW * Structure and sources of U.S. law and relevant terms * Governmental bodies having privacy and information security authority GENERAL DATA PROTECTION REGULATION OVERVIEW (GDPR) * High-level overview of the GDPR * Significance of the GDPR to U.S. organizations * Roles and responsibilities outlined in the law CALIFORNIA CONSUMER PRIVACY ACT OF 2018 (CCPA) * High-level overview of the newly passed California Consumer Privacy Act of 2018 * Scope * Consumer rights * Business obligations * Enforcement ENFORCEMENT OF U.S. PRIVACY AND SECURITY LAWS * Distinguishing between criminal and civil liability * Comparing federal and state authority * Theories of legal liability * Enforcement powers and responsibilities of government bodies, such as the FTC and state attorneys general INFORMATION MANAGEMENT FROM A U.S. PERSPECTIVE * Developing a privacy program * Role of privacy professionals and accountability * Employee training * User preferences * Managing vendors * Data classification FEDERAL VERSUS STATE AUTHORITY * Differences between federal and state authority * Preemption HEALTHCARE * Privacy laws in healthcare * Major components of HIPAA * Development of HITECH * Privacy protections mandated by other significant healthcare laws FINANCIAL PRIVACY * Goals of financial privacy laws * Key concepts of FCRA, FACTA and GLBA * Red Flags Rule, Dodd-Frank and consumer protection laws EDUCATION * Privacy rights and protections under FERPA * Recent amendments provided by PPRA and NCLBA TELECOMMUNICATIONS AND MARKETING * Rules and regulations of telecommunications entities * Laws that govern marketing * Addressing privacy in the digital advertising LAW ENFORCEMENT AND PRIVACY * Privacy laws on intercepting communication * Telecommunications industry and law enforcement * Laws ensuring rights to financial privacy NATIONAL SECURITY AND PRIVACY * Rules and regulations on intercepting communication * Evolution of the law * Collaboration of government agencies and private companies to improve cybersecurity CIVIL LITIGATION AND PRIVACY * Privacy issues related to litigation * Electronic discovery, redaction and protective orders * U.S. discovery rules versus foreign laws LEGAL OVERVIEW OF WORKPLACE PRIVACY * Federal and state laws regulating and protecting employee privacy * Federal laws prohibiting discrimination PRIVACY BEFORE, DURING AND AFTER EMPLOYMENT * Lifecycle of employee privacy * Background screening * Employee monitoring * Investigating misconduct and termination * Antidiscrimination laws * ?Bring your own device? policies STATE DATA SECURITY LAWS * State laws impacting data security * Social Security number use regulation * Laws governing data destruction DATA BREACH NOTIFICATION LAWS * Scope of state data breach notification law * Nine elements of state data breach notification laws * Major differences in state laws

Certified Information Privacy Professional (CIPP/US)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Information Privacy Technologist (CIPT)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. FUNDAMENTALS OF INFORMATION PRIVACY * Reviewing the modern history of privacy * Foundational privacy concepts * Data protection roles and fair information practices * Exploring the impacts of privacy and data protection regulations on information management PRIVACY IN THE IT ENVIRONMENT * Compliance requirements * IT risks * Stakeholder privacy expectations * Differentiating between privacy and security CORE PRIVACY CONCEPTS * Foundational elements for embedding privacy in IT * Common privacy principles * Data protection by design and default PRIVACY CONSIDERATIONS IN THE INFORMATION LIFE CYCLE * Privacy considerations throughout the stages of the information life cycle PRIVACY IN SYSTEMS AND APPLICATIONS * Examining the risks inherent in the IT environment and options for addressing them * Identity and access management * Credit card information and processing * Remote access * BYOD and telecommuting * Data encryption * Additional privacy-enhancing technologies in the enterprise environment PRIVACY TECHNIQUES * Strengths and weaknesses of authentication techniques * Using identifiers * Privacy by design ONLINE PRIVACY ISSUES * Unique challenges that come from online privacy issues * Laws and regulations * Online threats * Social media * E-commerce * Tracking technologies * Web security protocols TECHNOLOGIES WITH PRIVACY CONSIDERATIONS * Privacy considerations associated with a variety of technologies * Cloud computing * Wireless IDs * Location-based services * ?Smart? technologies * Video/data/audio surveillance * Biometric recognition

Certified Information Privacy Technologist (CIPT)
Delivered on-request, onlineDelivered Online
Price on Enquiry

ICTMS v1.0-Implementing and Configuring Cisco (TMS) Telepresence Management Server

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer This is a two day instructor-led course that focuses on the skills and knowledge needed to implement and configure a Cisco TelePresence Management Suite and Cisco TelePresence Management Suite Extensions. Students will configure TMS, TMSPE, TMSXE, VCS and UCM for management of endpoints. Students will also learn to Configure and Schedule Conferencing, Administrative Tasks, Set up Microsoft Active Directory Users, Manage Conferences and Provision Devices. INSTALLING CISCO TELEPRESENCE MANAGEMENT SERVER * Windows Server Installation SQL Server Installation Server Pre-requisites and configuration Installing TMS Installing TMS Provisioning Extensions Release and Option Keys Upgrading TMS Backup TMS CONFIGURING CISCO TELEPRESENCE MANAGEMENT SUITE (TMS) * Initial Configuration Endpoint Configuration Adding User Accounts and Profiles Groups and Permissions Active Directory Lookup Configuration Templates Setting Configuration VCS Configuration for TMS Direct Endpoint Management VCS/TMS Direct Managed Endpoint Features CUCM Configuration for TMS Direct Endpoint Management ? CUCM TMS Responsibilities CUCM Responsibilities Findme Configuration Phonebooks & Phonebook Sources BOOKING CONFERENCING * Conference Creation Advanced Conference Settings Booking & Scheduling Conference Monitoring Dial Plans, Configuration Templates Scheduler/Smart Scheduler REPORTING ON TMS * Reporting Basics Creating a Report Using Reporting Templates Bridge Utilization Call Detail Records Billing Code Statistics Conferences System MANAGING AND TROUBLESHOOTING TMS * Using the Logs Cisco TMS Ticketing System Troubleshooting VCS Registrations Troubleshooting CUCM Registrations System Maintenance

ICTMS v1.0-Implementing and Configuring Cisco (TMS) Telepresence Management Server
Delivered on-request, onlineDelivered Online
Price on Enquiry

CCSA Check Point Certified Security Administrator

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is recommended for technical professionals who support, install, deploy or administer Check Point products. Overview Know how to perform periodic administrator tasks. Describe the basic functions of the Gaia operating system. Recognize SmartConsole features, functions, and tools. Understand how SmartConsole is used by administrators to give user access. Learn how Check Point security solutions and products work and how they protect networks. Understand licensing and contract requirements for Check Point security products. Describe the essential elements of a Security Policy. Understand the Check Point policy layer concept. Understand how to enable the Application Control and URL Filtering software. Blades to block access to various applications. Describe how to configure manual and automatic NAT. Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements. Describe different Check Point Threat Prevention solutions for network attacks. Articulate how the Intrusion Prevention System is configured, maintained and tuned. Understand the Infinity Threat Prevention system. Knowledge about Check Point's IoT Protect. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. COURSE OUTLINE * Configure the Security Management Server. * Use the WebUI to run the First Time Wizard. * Install the Smart Console. * Install the Alpha Gateway using the network detailed in the course topology. * Demonstrate how the Security Management Server and Gateway communicate. * Test SIC Status. * Create multiple administrators and apply different roles and permissions for simultaneous administration. * Validate existing licenses for products installed on the network. * Create and configure host, network and group objects. * Create a simplified Security Policy. * Demonstrate how to use Security Zones in policy. * Demonstrate how to share a layer between Security Polices. * Configure Network Address Translation for server and network objects. * Enable Identity Awareness. * Deploy user access roles for more granular control of the security Policy. * Generate network Traffic and use traffic visibility tools to monitor the data. * Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic.

CCSA Check Point Certified Security Administrator
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Deploying Cisco Unified Contact Center Express v6.0 (UCCXD)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Cisco Unified Communications system channel partners and resellers System engineers Customers deploying and maintaining Cisco Unified Contact Center Express products. Overview Upon completing this course, the learner will be able to meet these overall objectives: Provide a comprehensive overview of the Cisco Unified Contact Center Express product suite. This overview will cover descriptions of the product, compatibility, and hardware and software options, architecture, and sizing and ordering tools. Provide a complete description of the Cisco Unified CCX installation process, the configuration required with an overview of most common configuration web pages, and describe the call flow processes needed to establish a call on Cisco Unified CCX. Describe the Cisco Unified CCX script editor, how it is installed and how to implement common IVR scripting techniques. Provide a comprehensive view of Cisco Unified CCX ACD operations to include basic contact center build-up, scripting, agent and supervisor desktop configurations, advanced scripting topics, and reporting. Describe how to install, configure and use features found in Cisco Unified CCX Premium such as, Remote Monitoring, Outbound Dialer, Agent Email, Agent Web Chat, and Automatic Speech Recognition (ASR) and Text-to-Speech (TTS). Understand how to maintain and monitor a Cisco Unified CCX system This course, Deploying Cisco© Unified Contact Center Express (UCCXD) v6.0, provides the student with hands-on experience and knowledge of tasks typically performed during contact center deployment. CISCO UNIFIED CCX PRODUCT OVERVIEW * Cisco Unified CCX Product Packages * Cisco Unified CCX Architecture * Designing Cisco Unified CCX CISCO UNIFIED CCX INSTALLATION AND CONFIGURATION * Installing Cisco Unified CCX * Managing Cisco Unified CCX * Configuring Basic Properties of Cisco Unified CCX CISCO UNIFIED CCX SCRIPTING * Understanding Script Editor Basics * Creating a Basic IVR Script * Prompting and Collecting Information * Accessing an External Database * Making Decisions * Confirming Caller Input CISCO UNIFIED CCX ACD OPERATIONS * Implementing Cisco Unified CCX

Cisco Deploying Cisco Unified Contact Center Express v6.0 (UCCXD)
Delivered on-request, onlineDelivered Online
Price on Enquiry

CMMC: Organizational Foundations v2.2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course provides an immersive learning experience for business and technical professionals who need a thorough understanding of the CMMC program. It does this by taking the point of view of a CMMC Certified Professional. Students might consider taking this course to learn more about the overall CMMC program, how DoD contractors are assessed, and how to help their organizations prepare for a CMMC Assessment. Overview In this course, you will learn about the CMMC Model, framework, context, and application within the DoD, as well as the expectations and requirements imposed upon organizations that do business with the DoD. You will: Identify the threats to the Defense Supply Chain and the established regulations and standards for managing the risk. Identify the sensitive information that needs to be protected within the Defense Supply Chain and how to manage it. Describe how the CMMC Model ensures compliance with federal acquisitions regulations. Identify responsibilities of the Certified CMMC Professional, including appropriate ethical behavior. Establish the Certification and Assessment scope boundaries for evaluating the systems that protect regulated information. Prepare the OSC for an Assessment by evaluating readiness. Use the CMMC Assessment Guides to determine and assess the Evidence for practices. Implement and evaluate practices required to meet CMMC Level 1. Identify the practices required to meet CMMC Level 2. Work through the CMMC Assessment process. The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices, as well as their integration of corresponding policies and plans into their overall business operations. Once rule-making has concluded and CMMC 2.0 has been implemented, all organizations providing products or services to the United States Department of Defense (DoD) must comply with the requirements of their applicable CMMC Level. This course provides a complete review of the key elements of this important program. LESSON 1: MANAGING RISK WITHIN THE DEFENSE SUPPLY CHAIN * Topic A: Identify Threats to the Defense Supply Chain * Topic B: Identify Regulatory Responses against Threats LESSON 2: HANDLING SENSITIVE INFORMATION * Topic A: Identify Sensitive Information * Topic B: Manage the Sensitive Information LESSON 3: ENSURING COMPLIANCE THROUGH CMMC * Topic A: Describe the CMMC Model Architecture * Topic B: Define the CMMC Program and Its Ecosystem * Topic C: Define Self-Assessments LESSON 4: PERFORMING CCP RESPONSIBILITIES * Topic A: Identify Responsibilities of the CCP * Topic B: Demonstrate Appropriate Ethics and Behavior LESSON 5: SCOPING CERTIFICATION AND ASSESSMENT BOUNDARIES * Topic A: Use the CMMC Assessment Scope Documentation * Topic B: Get Oriented to the OSC Environment * Topic C: Determine How Sensitive Information Moves * Topic D: Identify Systems in Scope * Topic E: Limit Scope LESSON 6: PREPARING THE OSC * Topic A: Foster a Mature Cybersecurity Culture * Topic B: Evaluate Readiness LESSON 7: DETERMINING AND ASSESSING EVIDENCE * Topic A: Determine Evidence * Topic B: Assess the Practices Using the CMMC Assessment Guides LESSON 8: IMPLEMENTING AND EVALUATING LEVEL 1 * Topic A: Identify CMMC Level 1 Domains and Practices * Topic B: Perform a CMMC Level 1 Gap Analysis * Topic C: Assess CMMC Level 1 Practices LESSON 9: IDENTIFYING LEVEL 2 PRACTICES * Topic A: Identify CMMC Level 2 Practices LESSON 10: WORKING THROUGH AN ASSESSMENT * Topic A: Identify Assessment Roles and Responsibilities * Topic B: Plan and Prepare the Assessment * Topic C: Conduct the Assessment * Topic D: Report the Assessment Results * Topic E: Conduct the CMMC POA&M Close-Out Assessment

CMMC: Organizational Foundations v2.2
Delivered on-request, onlineDelivered Online
Price on Enquiry