• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1293 Network & Security courses

CompTIA Network+ Certification Professional Training

By Alpha Academy

Nowadays, there's a great demand for CompTIA Network+ certified professionals worldwide. This CompTIA Network+ Certification Professional Training confirms the essential knowledge and skills needed to confidently design, configure, manage and troubleshoot any wired and wireless networks. The course also includes Network Theory including OSI layers, LANs and WANs, network types and transmissions. Moreover, understand the Network Security System, Remote Networking, Networking Management and more. To sum up, this course is designed to prepare you for the job related to networking career. COURSE HIGHLIGHTS * The price is for the whole course including final exam - no hidden fees * Accredited Certificate upon successful completion * Efficient exam system with instant results * Track progress within own personal learning portal * 24/7 customer support via live chat This valuable course is suitable for anyone interested in working in this sector or who simply wants to learn more about the topic. If you're an individual looking to excel within this field then CompTIA Network+ Certification Professional Training is for you. We've taken this comprehensive course and broken it down into several manageable modules which we believe will assist you to easily grasp each concept - from the fundamental to the most advanced aspects of the course. It really is a sure pathway to success. All our courses offer 12 months access and are designed to be studied at your own pace so you can take as much or as little time as you need to complete and gain the accredited qualification. We pride ourselves on having friendly and experienced instructors who provide full weekday support and are ready to help with any of your queries. So, if you need help, just drop them an email and await a speedy response. Furthermore, you can check the validity of your qualification and verify your certification on our website at anytime. So, why not improve your chances of gaining professional skills and better earning potential. ASSESSMENT AND CERTIFICATION At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. After you have successfully passed the final exam, you will be able to order an Accredited Certificate of Achievement at an additional cost of £19 for a PDF copy and £29 for an original print copy sent to you by post or for both £39. CAREER PATH Not only does our accredited course look good on your CV, setting you apart from the competition, it can be used as a stepping stone to greater things. Further advance your learning, launch a new career or reinvigorate an existing one. On successful completion of this course, you have the potential to achieve an estimated salary of £50,700. The sky really is the limit. COURSE CURRICULUM Network Theory OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Bounded Network Media Cables 00:41:00 Fiber Optics 00:16:00 Converters and Connectors 00:26:00 Unbounded Network Media 802.11 Standard 00:20:00 Wireless 00:11:00 Wireless Options 00:19:00 Network Implementations Topologies 00:39:00 Ethernet 00:50:00 Switches 01:48:00 VLANs 00:52:00 TCP/IP Addressing and Data Delivery Network Communication Protocols 00:37:00 IPv4 00:26:00 Special Addresses 00:13:00 CIDR 00:11:00 IPv6 00:31:00 Routing Routes 00:59:00 Routing Types 00:18:00 TCP/IP Services TCP and IP 00:40:00 FQDN and DNS 00:28:00 Transport-layer Protocols 00:05:00 UDP 00:06:00 WAN Infrastructure Wide Area Networks 00:18:00 QoS 00:39:00 Voice-over-Data Systems 00:06:00 Cloud and Virtualization Technologies Types of Server Virtualization 00:27:00 Fibre Channel 00:05:00 Cloud Concepts 00:24:00 Network Security Basics Wireless Security 00:15:00 Authentication 00:21:00 Wireless Security Threats 00:30:00 TACACS+ 00:10:00 Keys 00:26:00 Preventing Security Breaches Security Factors 00:15:00 Vulnerabilities 00:16:00 Attacks 00:58:00 Authentication 00:25:00 Honeypots 00:04:00 Education and Awareness 00:03:00 Responding to Security Incidents Response Policy 00:04:00 Remote Networking RADIUS 00:06:00 VPN Technologies 00:16:00 Tunneling Protocols 00:05:00 Network Management Acceptable Use 00:59:00 Troubleshooting Network Issues Common Problems 00:32:00 Troubleshooting 00:27:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Planning and Implementing a SOHO Network SOHO Network 00:15:00 Mock Exam Mock Exam - CompTIA Network+ Certification Professional Training 00:20:00 Final Exam Final Exam - CompTIA Network+ Certification Professional Training 00:20:00

CompTIA Network+ Certification Professional Training
Delivered Online On Demand
£10.99

CompTIA Network+ Certification Professional Training

By Alpha Academy

Nowadays, there's a great demand for CompTIA Network+ certified professionals worldwide. This CompTIA Network+ Certification Professional Training confirms the essential knowledge and skills needed to confidently design, configure, manage and troubleshoot any wired and wireless networks. The course also includes Network Theory including OSI layers, LANs and WANs, network types and transmissions. Moreover, understand the Network Security System, Remote Networking, Networking Management and more. To sum up, this course is designed to prepare you for the job related to networking career. COURSE HIGHLIGHTS * The price is for the whole course including final exam - no hidden fees * Accredited Certificate upon successful completion * Efficient exam system with instant results * Track progress within own personal learning portal * 24/7 customer support via live chat This valuable course is suitable for anyone interested in working in this sector or who simply wants to learn more about the topic. If you're an individual looking to excel within this field then CompTIA Network+ Certification Professional Training is for you. We've taken this comprehensive course and broken it down into several manageable modules which we believe will assist you to easily grasp each concept - from the fundamental to the most advanced aspects of the course. It really is a sure pathway to success. All our courses offer 12 months access and are designed to be studied at your own pace so you can take as much or as little time as you need to complete and gain the accredited qualification. We pride ourselves on having friendly and experienced instructors who provide full weekday support and are ready to help with any of your queries. So, if you need help, just drop them an email and await a speedy response. Furthermore, you can check the validity of your qualification and verify your certification on our website at anytime. So, why not improve your chances of gaining professional skills and better earning potential. ASSESSMENT AND CERTIFICATION At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. After you have successfully passed the final exam, you will be able to order an Accredited Certificate of Achievement at an additional cost of £19 for a PDF copy and £29 for an original print copy sent to you by post or for both £39. CAREER PATH Not only does our accredited course look good on your CV, setting you apart from the competition, it can be used as a stepping stone to greater things. Further advance your learning, launch a new career or reinvigorate an existing one. On successful completion of this course, you have the potential to achieve an estimated salary of £50,700. The sky really is the limit. COURSE CURRICULUM Network Theory OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Bounded Network Media Cables 00:41:00 Fiber Optics 00:16:00 Converters and Connectors 00:26:00 Unbounded Network Media 802.11 Standard 00:20:00 Wireless 00:11:00 Wireless Options 00:19:00 Network Implementations Topologies 00:39:00 Ethernet 00:50:00 Switches 01:48:00 VLANs 00:52:00 TCP/IP Addressing and Data Delivery Network Communication Protocols 00:37:00 IPv4 00:26:00 Special Addresses 00:13:00 CIDR 00:11:00 IPv6 00:31:00 Routing Routes 00:59:00 Routing Types 00:18:00 TCP/IP Services TCP and IP 00:40:00 FQDN and DNS 00:28:00 Transport-layer Protocols 00:05:00 UDP 00:06:00 WAN Infrastructure Wide Area Networks 00:18:00 QoS 00:39:00 Voice-over-Data Systems 00:06:00 Cloud and Virtualization Technologies Types of Server Virtualization 00:27:00 Fibre Channel 00:05:00 Cloud Concepts 00:24:00 Network Security Basics Wireless Security 00:15:00 Authentication 00:21:00 Wireless Security Threats 00:30:00 TACACS+ 00:10:00 Keys 00:26:00 Preventing Security Breaches Security Factors 00:15:00 Vulnerabilities 00:16:00 Attacks 00:58:00 Authentication 00:25:00 Honeypots 00:04:00 Education and Awareness 00:03:00 Responding to Security Incidents Response Policy 00:04:00 Remote Networking RADIUS 00:06:00 VPN Technologies 00:16:00 Tunneling Protocols 00:05:00 Network Management Acceptable Use 00:59:00 Troubleshooting Network Issues Common Problems 00:32:00 Troubleshooting 00:27:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Planning and Implementing a SOHO Network SOHO Network 00:15:00 Mock Exam Mock Exam - CompTIA Network+ Certification Professional Training 00:20:00 Final Exam Final Exam - CompTIA Network+ Certification Professional Training 00:20:00

CompTIA Network+ Certification Professional Training
Delivered Online On Demand
£10.99

ISO 22301 Lead Implementer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Project managers and consultants involved in business continuity Expert advisors seeking to master the implementation of the business continuity management system Individuals responsible to maintain conformity with BCMS requirements within an organization Members of the BCMS team Overview Understand the concepts, approaches, methods, and techniques used for the implementation and effective management of a BCMS. Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization. Understand the operation of the business continuity management system and its processes based on ISO 22301. Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization. No two disasters in the world cause equal damage. Between the unpredictability of natural disasters, information security breaches, and incidents of different nature, preparedness can make you stand out in the crowd and predict the future of your business. In light of this, proper planning is essential to mitigating risks, avoiding consequences, coping with the negative effects of disasters and incidents, but at the same time, continuing your daily operations so that customer needs do not remain unfulfilled.This training course will prepare its participants to implement a business continuity management system (BCMS) in compliance with the requirements of ISO 22301. Attending this training course allows you to gain a comprehensive understanding of the best practices of the business continuity management system and to be able to establish a framework that allows the organization to continue operating efficiently during disruptive events INTRODUCTION TO ISO 22301 AND INITIATION OF A BCMS * Training course objectives and structure * Standards and regulatory frameworks * Business continuity management system (BCMS) * Fundamental business continuity concepts and principles * Initiation of the BCMS implementation * Understanding the organization and its context * BCMS scope IMPLEMENTATION PLAN OF A BCMS * Leadership and commitment * Business continuity policy * Risks, opportunities, and business continuity objectives * Support for the BCMS * Business impact analysis * Risk assessment IMPLEMENTATION OF A BCMS * Business continuity strategies and solutions * Business continuity plans and procedures * Incident response and emergency response * Crisis management * Exercise programs * Monitoring, measurement, analysis, and evaluation * Internal audit BCMS MONITORING, CONTINUAL IMPROVEMENT, AND PREPARATION FOR THE CERTIFICATION AUDI * Management review * Treatment of nonconformities * Continual improvement * Preparation for the certification audit * Closing of the training course

ISO 22301 Lead Implementer
Delivered on-request, onlineDelivered Online
Price on Enquiry

NECA: Nutanix Enterprise Cloud Administration

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Administrators, architects, and business leaders who manage Nutanix clusters in the datacenter Managers and technical staff seeking information to drive purchase decisions Anyone who is seeking the Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) certification Overview During this program, attendees will: Develop a working knowledge of the Nutanix product family. Understand the requirements and considerations involved in setting up a Nutanix cluster. Familiarize themselves with cluster management and monitoring via the Prism web console. Learn how to create, manage, and migrate VMs, set up data protection services, and plan for business continuity. Understand how to plan and handle upgrades, assess future requirements, and create what-if scenarios to adress scaling for business needs. The Nutanix Enterprise Cloud Administration (ECA) course enables administrators (system, network, and storage) to successfully configure and manage Nutanix in the datacenter. The course covers many of the tasks Nutanix administrators perform through the use of graphical user interfaces (GUIs) and command line interfaces (CLIs). It also provides insight into a Nutanix cluster?s failover and self-healing capabilities, offers tips for solving common problems, and provides guidelines for collecting information when interacting with Nutanix Support INTRODUCTION * The section describes the Nutanix HCI solution, walks you through the components of the Nutanix Enterprise Cloud, and explains the relationship between physical and logical cluster components. MANAGING THE NUTANIX CLUSTER * In this section, you will use the Prism console to monitor a cluster, configure a cluster using various interfaces, use the REST API Explorer to manage the cluster, and learn how to deploy Nutanix-specific PowerShell cmdlets. SECURING THE NUTANIX CLUSTER * This section shows how to secure a Nutanix cluster through user authentication, SSL certificate installation, and cluster access control. ACROPOLILS NETWORKING * This section explains how to configure managed and unmanaged Acropolis networks and describes the use of Open vSwitch (OVS) in Acropolis. You will learn how to display and manage network details, differentiate between supported OVS bond modes, and gain insight into default network configuration. VM MANAGEMENT * This section shows you how to upload images, and how to create and manage virtual machines. HEALTH MONITORING AND ALERTS * In this section, you will use the Health Dashboard to monitor a cluster?s health and performance. You will also use Analysis Dashboard to create charts that you can export with detailed information on a variety of components and metrics. DISTRIBUTED STORAGE FABRIC * This section discusses creating and configuring storage containers, including the storage optimization features: deduplication, compression, and erasure coding. AHV WORKLOAD MIGRATION * Using Nutanix Move, this section shows how to migrate workloads to a cluster running AHV. This is followed by a lab where a VM running on a Nutanix cluster configured with ESXi is migrated to a Nutanix cluster running AHV. FILE AND VOLUMES * This section gives you detailed information on Nutanix Volumes, which provides highly available, high-performance block storage through a few easy configuration steps. It also discusses Nutanix Files. UNDERSTANDING INFRASTRUCTURE RESILIENCY * This section shows how Nutanix provides comprehensive data protection at all levels of the virtual datacenter: logical and physical. DATA PROTECTION * Data can be replicated between Nutanix clusters, synchronously and asynchronously. This section shows how to configure a Protection Domain (PD) and Remote Sites, recover a VM from a PD, and perform a planned failover of a PD. PRISM CENTRAL * Having discussed and used Prism Element earlier, this section looks at the capabilities of Prism Central. With the added functionality provided by a Pro license, the focus is on features related to monitoring and managing multiple activities across a set of clusters. MONITORING THE NUTANIX CLUSTER * This section shows you where to locate and how to interpret cluster-related log files. In addition, you will take a closer look at the Nutanix Support Portal and online help. CLUSTER MANAGEMENT AND EXPANSION * This section outlines essential life-cycle operations, including starting/stopping a Nutanix cluster, as well as starting/shutting down a node. You will also learn how to expand a cluster, manage licenses, and upgrade the cluster?s software and firmware. REMOTE OFFICE BRANCH OFFICE (ROBO) DEPLOYMENTS * In this section, you will understand various configurations and requirements specific to a ROBO site. This includes hardware/software, Witness VM, networking, failure and recovery scenarios for two-node clusters, and the seeding process. ADDITIONAL COURSE DETAILS: Nexus Humans NECA: Nutanix Enterprise Cloud Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the NECA: Nutanix Enterprise Cloud Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

NECA: Nutanix Enterprise Cloud Administration
Delivered on-request, onlineDelivered Online
Price on Enquiry

Basic NetApp Configuration and Administration (BNCA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for NetApp Customers, IT Generalists, Academic Alliance Students Overview Explain ONTAP operation system, Use the CLI and OnCommand System Manager to identify storage components, configure storage systems and storage virtual machines for NAS and SAN client access, create FlexVol volumes, qtrees, and LUNs, manage snapshot copies Introduces introductory concepts covered through instructor led discussions and hands-on labs are how to create aggregates, virtual interfaces, snapshots, volumes, qtrees, and storage virtual machines. GETTING STARTED WITH DATA ONTAP * List basic storage concepts such as aggregates, RAID groups, volumes, qtrees, and LUNs * Describe Data ONTAP features such as Snapshot copies, unified storage, and storage efficiency * Describe the similarities and differences between the 7-Mode and clustered Data ONTAP operating systems * Use the CLI and GUI for administrative purposes * HARDWARE BASICS * Describe the NetApp storage system hardware platforms and the types of disks that they support * Describe the hardware components of NetApp storage controllers * Use OnCommand System Manager or the CLI to identify hardware components in Data ONTAP operating in 7-Mode and the clustered Data ONTAP operating system CREATING & MANAGING AGGREGATES * Describe aggregates and RAID groups * Create aggregates in Data ONTAP operating in 7-Mode * Create aggregates in the clustered Data ONTAP operating system * Manage aggregates MANAGING NAS CLIENT ACCESS * Configure NAS client access in Data ONTAP operating in 7-Mode * Configure data storage virtual machines (SVMs*) for NAS client access in clustered Data ONTAP * Create FlexVol volumes and qtrees MANAGING SAN CLIENT CONNECTIONS * Describe SAN protocol implementation in Data ONTAP operating in 7-Mode and the clustered Data ONTAP operating system * Use OnCommand System Manager to create iSCSI-attached LUNs * Use NetApp SnapDrive for Windows to create and format iSCSI-attached LUNs * Access and manage a LUN from a Windows host * MANAGING VOLUMES * Explain the relationship between space guarantees, volumes, and aggregates * Define thin provisioning and explain how it is used * Define deduplication and describe the benefits that it provides * Use OnCommand System Manager to set quotas MANAGING SNAPSHOT COPIES * Define the function of Snapshot copies * Create and delete a Snapshot copy * Create Snapshot policies in the clustered Data ONTAP operating system * Restore a volume from a Snapshot copy * Create FlexClone volume clones that are backed by Snapshot copies STEPS TO CERTIFICATION * Recall the steps to NetApp Certification

Basic NetApp Configuration and Administration (BNCA)
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware Carbon Black Cloud:Advanced Operations and Troubleshooting

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced security administrators and security analysts who are already familiar with VMware Carbon Black Cloud Overview By the end of the course, you should be able to meet the following objectives: Describe and determine use cases for integrating with VMware Carbon Black Cloud Configure, automate, and troubleshoot the VMware Carbon Black Cloud Syslog Integration Use VMware Carbon Black Cloud APIs to pull data with Postman Install and use the VMware Carbon Black Cloud Python SDK Automate operations using the VMware Carbon Black Cloud SDK and APIs Identify and troubleshoot VMware Carbon Black Cloud sensor installations Gather troubleshooting data within the browser to remediate or escalate problems Identify and resolve sensor usage, networking, and performance problems with the VMware Carbon Black Cloud sensor This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in performing advanced operations and troubleshooting of VMware Carbon Black Cloud. This course will go into integrating VMware Carbon Black Cloud with other third-party components and utilizing the API and the SDK to automate operations within the product and your security stack. This course will also enable you to troubleshoot common problems during sensor installation, operations, and within the VMware Carbon Black Cloud console with hands-on lab problems. COURSE INTRODUCTION * Introductions and course logistics * Course objectives VMWARE CARBON BLACK CLOUD INTEGRATIONS * Describe the integration capabilities with VMware Carbon Black Cloud * Determine integration use cases for VMware Carbon Black Cloud * Identify required components for integrating VMware Carbon Black Cloud * Differentiate VMware Carbon Black Cloud integration vendors VMWARE CARBON BLACK CLOUD SYSLOG INTEGRATION * Describe the function of the Syslog Connector * Generate API and SIEM keys from the Cloud console * Validate a successful Syslog integration * Describe how to automate the Syslog Connector * Troubleshoot problems with the Syslog integration USING POSTMAN * Explain the concept and purpose of an API * Interpret common REST API Status codes * Recognize the difference between platform and product APIs * Using the Postman Client to initiate API calls * Create a custom access level and respective API key * Create a valid API request USING THE VMWARE CARBON BLACK CLOUD PYTHON SDK * Install the VMware Carbon Black Cloud Python SDK * Describe the different authentication methods * Evaluate the best authentication method for a given task AUTOMATING OPERATIONS * Automate basic Incident Response tasks using the VMware Carbon Black Cloud SDK and API * Automate basic watchlist interactions using the VMware carbon Black Cloud SDK and API SENSOR INSTALLATION TROUBLESHOOTING * Describe sensor install log collection process * Identify sensor install log parameters * Create a detailed sensor install log * Locate sensor install logs on an endpoint * Interpret sensor install success from an install log * Determine likely cause for install failure using sensor logs * Propose resolution steps for a given sensor install failure VMWARE CARBON BLACK CLOUD CONSOLE TROUBLESHOOTING * Identify sensor bypass status reasons * Simplify console data exports using search * Describe differences in Audit Log detail levels * Locate built-in browser tools * Gather console diagnostics logs from a browser * Review console diagnostics logs SENSOR OPERATIONS TROUBLESHOOTING * Identify available types of diagnostic logs * Gather appropriate diagnostic logs for a given issue * Identify steps for resolving software interoperability problems * Identify steps for resolving resource problems * Identify steps for resolving network problems ADDITIONAL COURSE DETAILS: Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud:Advanced Operations and Troubleshooting training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud:Advanced Operations and Troubleshooting course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black Cloud:Advanced Operations and Troubleshooting
Delivered on-request, onlineDelivered Online
Price on Enquiry

Symantec Management Suite 7.6 - Implementation

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for the professional tasked with implementing, designing, architecting, installing, and configuring Symantec Client Management Suite (CMS) to manage the software and hardware in their company. Overview At the completion of the course, you will be able to: Identify the types of information you need to collect to help determine what type of CMS configuration to implement. Install Client Management Suite. Discover and import computer and user resources that you want to manage. Deploy the Symantec Management Agent and plug-ins. Create Organizational Views and Groups and assign resources to them. Create and configure policies, tasks, and jobs and assign them to targets. Troubleshoot common problems with installation and managing of Client Management Suite. Creating reports and installing and configuring IT Analytics. This course teaches students theory and concepts, and provides technical know-how on implementing Client Management Suite. COURSE INTRODUCTION * Course objectives Course overview Lab environment introduction UNDERSTANDING THE SYMANTEC MANAGEMENT PLATFORM * Introducing the Symantec Management Platform Symantec management Platform components used by Client Management Suite Symantec Management Platform concepts How Client Management Suite works ARCHITECTURE OF CLIENT MANAGEMENT SUITE * Understanding Architecture Hardware Recommendations INSTALLING AND CONFIGURING CLIENT MANAGEMENT SUITE * Installing and using the Symantec Installation Manager Installing the Notification Server, suite and solution software THE SYMANTEC MANAGEMENT CONSOLE * Accessing the Symantec Management Console Getting to know the Symantec Management Console Configuring the Notification Server after installation Getting to know the ITMS Management views DISCOVERING RESOURCES * Introducing resource discovery methods Importing resources from Microsoft Active Directory Discovering computers using domain resource discovery Discovering network resources using Network Discovery CREATING AND MANAGING ORGANIZATIONAL VIEWS AND GROUPS * Learning about organizational views and groups Creating custom organizational views and groups Managing organizational views and groups INSTALLING AND CONFIGURING THE AGENTS AND PLUG-INS * Managing computers with the Symantec Management Agent Installing the Symantec Management Agent Verifying the Symantec Management Agent installation Configuring the Symantec Management Agent settings Introducing solution plug-ins for the Symantec Management Agent Upgrading Client Management Suite Introducing agent, Notification Server and site server communications Introducing Notification Server event queues RESOURCE FILTERS * Introducing resource filters Managing and working with existing filters Creating and modifying filters FILTERS AND TARGETS * Introducing targets Working with targets in the computer management view POLICIES * Getting to know policies Understanding user-based policies Understanding how the Symantec Management Agent receives policies Configuring automation policies Managing shared schedules CREATING AND MANAGING TASKS AND JOBS * Overview of task management Creating and scheduling tasks and jobs Task management communication and processing SECURITY * Learning about security Managing user accounts, security roles, and privileges Managing permissions REPORTING * Introducing reports Using and creating classic reports Configuring and using IT Analytics SITE MANAGEMENT * Introducing site management Managing sites, subnets and site servers Reviewing site server plug-ins to the Symantec Management Agent Configuring site services CLOUD-ENABLED MANAGEMENT (CEM) * Introducing Cloud-enabled Management (CeM) Understanding the cloud-enabled agent Preparing the Notification Server and agents for CeM Configuring site management for CeM Installing and Configuring the SMP Internet Gateway and configuring a CeM Settings policy Configuring the SMP Internet Gateway with the SMP IG Manager Configuring the CeM Settings policy Creating a cloud-enabled agent installation package Installing a cloud-enabled agent from a package REPLICATION * Understanding replication Setting up and configuring replication Running replication HIERARCHY * Understanding hierarchy Setting up a Notification Server hierarchy Configuring hierarchy replication Changing the hierarchy topology MIGRATION * Migrating Symantec Management Platform Agent registration (trust)Post installation checklist Readiness checklist for CMS Migration Post migration checklist for a CMS Migration Migrating from 6.x to 7.6 Migrating from 7.x to 7.6 TROUBLESHOOTING * Learning about Symantec Management Platform troubleshooting tools Using NSConfigurator Using Remote Altiris Agent Diagnostics Introducing Notification Server event queues Troubleshooting Cloud-enabled Management (CeM) BACKING UP THE SERVER AND DATABASE * Symantec Management Platform components needed for recovery Backing up the IIS default web site virtual directories Backing up the Configuration Management Database CUSTOMIZING THE CONSOLE * Customizing the Symantec Management Console Personalizing the Symantec Management Console SQL BASICS * Learning SQL basics OBTAINING TECHNICAL SUPPORT FROM SYMANTEC * Using self-help resources Obtaining customer support ADDITIONAL COURSE DETAILS: Nexus Humans Symantec Management Suite 7.6 - Implementation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Management Suite 7.6 - Implementation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Management Suite 7.6 - Implementation
Delivered on-request, onlineDelivered Online
Price on Enquiry

CCAS Check Point Certified Automation Specialist

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who automate, orchestrate, and troubleshoot Check Point secured environments. Overview Explain how automation and orchestration work together Understand the key drivers for incorporating automation and orchestration into security management Execute a shell script that demonstrates how to build a comprehensive Security Policy. Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions Demonstrate how to define new objects and modify existing ones by using the Check Point API The goal of this course is to provide an understanding of the advanced concepts and skills necessary to automate and orchestrate tasks relating to managing Check Point Security Policies COURSE OULINE * Explain how automation and orchestration work together * Understand the key drivers for incorporating automation and orchestration into security management * Execute a shell script that demonstrates how to build a comprehensive Security Policy. * Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks * Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions * Demonstrate how to define new objects and modify existing ones by using the Check Point API * Demonstrate how to create API commands to efficiently maintain the Check Point Security Management Server database * Demonstrate how to use different methods to update the database with API commands * Become familiar with client-side and server-side scripting and scripting languages * Understand how to use the Bash shell to develop APIs * Recognize and describe many of the open source tools that are available to assist with API development * Demonstrate how to use a custom REST application to update the database of a Security Management Server * Demonstrate how to use Postman to manage the Security Policy database through the Check Point API * Understand what steps to take to troubleshoot and debug API scripts * Demonstrate basic troubleshooting techniques by reviewing debugging messages in various forms * Understand how to use self-service portal capabilities to provide general IT services * Recognize how automation tools work with Check Point APIs to automate security management tasks and orchestrate workflow behind service portals * Demonstrate common tasks that are automated in a Web portal to manage the Security Policy LAB EXERCISES * Demonstrate Check Point automation and orchestration * Manage objects using the Check Point API * Create a management API shell script * Use a variety of methods to execute API commands * Use a custom REST tool for API calls * Use Postman for API calls * Debug the Check Point management API * Automate tasks using a Check Point API enabled Web portal ADDITIONAL COURSE DETAILS: Nexus Humans CCAS Check Point Certified Automation Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCAS Check Point Certified Automation Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCAS Check Point Certified Automation Specialist
Delivered on-request, onlineDelivered Online
Price on Enquiry

Aruba Networks - Aruba Switching Fundamentals For Mobility, Rev. 16.41 (ASFM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for IT Professionals who deploy small-to- medium scale enterprise network solutions based on Aruba products and technologies Overview Upon completion of this course, you will be able to:Explain how Aruba networking solutions meet customers? requirementsExplain how Aruba AirWave provides unified wireless and wired network managementDescribe in-band management and out-of-band managementComplete the initial setup on ArubaOS switchesControl access to switches for both in-band and out-of-band managementManage software and configuration files on ArubaOS switchesExplain use cases for VLANs and configure port-based VLANs on ArubaOS switchesUnderstand and configure Rapid Spanning Tree Protocol (RSTP)Understand and configure Multiple Spanning Tree Protocol (MSTP)Differentiate between different types of link aggregation and understand the benefits of Link Aggregation Control Protocol (LACP)Configure and troubleshoot link aggregation on ArubaOS switchesConfigure static routes on ArubaOS switches and interpret IP routing tablesConfigure a basic Open Shortest Path First (OSPF) solutionDescribe how Virtual Switching Framework (VSF) works and the advantages that it providesConfigure and verify a simple VSF fabricDescribe the basics of wireless communications and 802.11 standardsDefine a wireless LAN (WLAN) and differentiate between wireless security optionsConfigure basic settings on Aruba Instant APsConfigure AirWave management settings on an IAP clusterConfigure SNMP v2c settings on ArubaOS switchesDiscover ArubaOS switches in AirWave and bring switches and IAPs under monitoring and managementImplement zero touch provisioning (ZTP) for Aruba IAPs and ArubaOS switches This course teaches you the fundamental skills necessary to configure and manage modern, open standards-based networking solutions. This course consists of approximately 20% lecture and 80% hands-on lab exercises to help you learn how to implement and validate small to medium enterprise network solutions. This 3-day course prepares network professionals for the HPE ATP - Aruba Mobile First Solutions V1 certification exam.In this course, participants learn about ArubaOS switch technologies including: VLANs, securing access, redundancy technologies such as MSTP, link aggregation techniques including LACP, and switch virtualization with Aruba?s Virtual Switching Framework (VSF). You also learn about IP Routing including static and dynamic IP routing with OSPF. This course teaches you how to deploy Aruba wireless Access Points and configure Aruba Clustering technology. It also teaches you how to configure, manage and monitor the network with the Aruba AirWave management solution. INTRODUCTION TO ARUBA, A HEWLETT PACKARD ENTERPRISE COMPANY SWITCH CLI (COMMAND LINE INTERFACE) NAVIGATION PROTECTING MANAGEMENT ACCESS MANAGEMENT OF SOFTWARE AND CONFIGURATIONS VLANS SPANNING TREE PROTOCOL (STP) LINK AGGREGATION IP ROUTING VIRTUAL SWITCHING FRAMEWORK (VSF) WIRELESS FOR SMALL-TO-MEDIUM BUSINESSES (SMBS) ARUBA AIRWAVE

Aruba Networks - Aruba Switching Fundamentals For Mobility, Rev. 16.41 (ASFM)
Delivered on-request, onlineDelivered Online
Price on Enquiry

AR-AMF: Aruba Mobility Fundamentals (Delivered by Fast Lane)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Typical candidates for this course are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies   Overview After you successfully complete this course, expect to be able to: Explain how Aruba's wireless networking solutions meet customers' requirements Explain fundamental WLAN technologies, RF concepts, and 802.11 Standards Learn to configure the Mobility Master and Mobility Controller to control access to the Employee and Guest WLAN Control secure access to the WLAN using Aruba Firewall Policies and Roles Recognize and explain Radio Frequency Bands and channels, and the standards used to regulate them Describe the concept of radio frequency coverage and interference and successful implementation and diagnosis of WLAN systems Identify and differentiate antenna technology options to ensure optimal coverage in various deployment scenarios Describe RF power technology including, signal strength, how it is measured and why it is critical in designing wireless networks Learn to configure and optimize Aruba ARM and Client Match features Learn how to perform network monitoring functions and troubleshooting   AR-AMF teaches knowledge, skills & practical exp. to set up & config a basic AR WLAN utilizing OS 8.X architecture & features.using lecture & labs,AR-AMF provides tech. & hands-on exp. of config. a single Mobility Master with 1 controller & AP WLAN WLAN FUNDAMENTALS * Describes the fundamentals of 802.11, RF frequencies and channels * Explain RF Patterns and coverage including SNR * Roaming Standards and QOS requirements * MOBILE FIRST ARCHITECTURE * An introduction to Aruba Products including controller types and modes * OS 8.X Architecture and features * License types and distribution * MOBILITY MASTER MOBILITY CONTROLLER CONFIGURATION * Understanding Groups and Subgroups * Different methods to join MC with MM * Understanding Hierarchical Configuration * SECURE WLAN CONFIGURATION * Identifying WLAN requirements such as SSID name, encryption, authentication * Explain AP groups structure and profiles * Configuration of WLAN using the Mobility Master GUI * AP PROVISIONING * Describes the communication between AP and Mobility controller * Explain the AP booting sequence and requirements * Explores the APs controller discovery mechanisms * Explains how to secure AP to controller communication using CPSec * Describes AP provisioning and operations * WLAN SECURITY * Describes the 802.11 discovery, authentication and association * Explores the various authentication methods, 802.1x with WPA/WPA2, Mac auth * Describes the authentication server communication * Explains symmetric vs asymmetric Keys, encryption methods * WIPS is described along with rogue discovery and protection * FIREWALL ROLES AND POLICIES * An introduction into Firewall Roles and policies * Explains Aruba?s Identity based Firewall * Configuration of Policies and Rules including aliases * Explains how to assign Roles to users * DYNAMIC RF MANAGEMENT * Explain how ARM calibrates the network selecting channels and power settings * Explores the new OS 8.X Airmatch to calibrate the network * How Client Match and Client Insight match steers clients to better Aps * DYNAMIC RF MANAGEMENT * Explain how ARM calibrates the network selecting channels and power settings * Explores the new OS 8.X Airmatch to calibrate the network * How Client Match and Client Insight match steers clients to better Aps * GUEST ACCESS * Introduces Aruba?s solutions for Guest Access and the Captive portal process * Configuration of secure guest access using the internal Captive portal * The configuration of Captive portal using Clearpass and its benefits * Creating a guest provisioning account * Troubleshooting guest access * NETWORK MONITORING AND TROUBLESHOOTING * Using the MM dashboard to monitor and diagnose client, WLAN and AP issues * Traffic analysis using APPrf with filtering capabilities * A view of Airwaves capabilities for monitoring and diagnosing client, WLAN and AP * issues *

AR-AMF: Aruba Mobility Fundamentals (Delivered by Fast Lane)
Delivered on-request, onlineDelivered Online
Price on Enquiry