Resultados para " Windows "

Búsqueda de instructores

Implementing and Configuring Cisco Identity Services Engine

The Implementing and Configuring Cisco Identity Services Engine course shows you how to deploy and use Cisco Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless and VPN connections. This hands-on course provides you with the knowledge and skills required to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management and contribute to operational efficiency.

Delegates will be expected to work in groups and share lab equipment, If you are attending virtually you may also be required to work in virtual breakout rooms. Extended hours may also be required to cover all of the content included in this class.

Implementing and Operating Cisco Security Core Technologies

The Implementing and Operating Cisco Security Core Technologies (SCOR) course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements. You will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features.

Please note that this course is a combination of Instructor-Led and Self-Paced Study – 5 days in the classroom and approx 3 days of self study. The self-study content will be provided as part of the digital courseware that you will recieve at the beginning of the course and should be part of your preparation for the exam.

Implementing Forefront Unified Access Gateway 2010

Este curso de tres días dirigido por un instructor te prepara para diseñar e implementar soluciones de acceso remoto utilizando Microsoft Forefront Unified Access Gateway 2010 (UAG). Forefront UAG proporciona a las organizaciones flexibilidad para proporcionar acceso a los recursos de la red (como sitios web y aplicaciones internas) con control de acceso granular, protección de contenido personalizado y validación de puntos finales. Forefront UAG también se integra con DirectAccess, una nueva tecnología de Windows 7 que proporciona un acceso remoto sin problemas a todos los recursos corporativos sin necesidad de conectarse a una red privada virtual. Este curso está dirigido a arquitectos, consultores, administradores de redes y profesionales de ventas técnicas que son responsables de vender, diseñar e implementar soluciones de acceso de borde para empresas.

Juniper Cloud Networking with AWS and Azure

This four-day course is designed to provide students with the knowledge required to implement Juniper Networks vSRX in AWS and Azure environments. Though demonstrations and hands-on labs, students will gain in-depth knowledge about the manual and automated methods used to deploy the vSRX in multicloud environments. This course uses various releases of the vSRX as well as Junos Space, Security Director, Policy Enforcer, and Sky ATP.

Managing Enterprise Security with Cisco Security Manager

The Managing Enterprise Security with Cisco Security Manager (SSECMGT) 4.0 course is a five-day instructor-led course aimed at providing network security engineers with the knowledge and skills needed to configure and deploy Cisco Security Manager.

Masterclass: Advanced Active Directory Attacks

This is a deep dive workshop on Active Directory services security, a must-go for administrators, security officers and architects. It is delivered by one of the best people in the market in the security field – with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions.

This workshop will present you the critical tasks performed by skilled attacker or pentester against Active Directory and its key components. The course focuses on attacks and security of Windows identity solutions.

Exploits are not the only way to get to the systems! We will go through the operating systems’ builtin problems and explore how they can be beneficial for hackers! One of the most important things to conduct a successful attack is to understand how the targets work. To the bones! Afterwards everything is clear and the tool is just a matter of our need.

The workshop covers all aspects of Active Directory identity security from the hacker’s mind perspective! Our goal is to show and teach you what kind of mechanisms are allowing to get inside the infrastructure and how to get into organization. You will gain penetration tester’s knowledge and tools.

The course is an intense workshop! During these 3 days you will not need your caffeine candies – this workshop is really intense and it will keep you awake all the time!

Masterclass: Advanced Malware Hunting

This course teaches the ways of identifying how malware looks like, what malicious activities you should look out for and the ways of removing it. You will also learn how to implement and manage preventive solutions both for small and medium sized for enterprises and organizations. During this course you learn what makes piece of code malicious, go through historic examples and get familiar with different kinds of malware and how to identify various cases. Once we have sufficient understanding of techniques and capabilities of malware, we will start system and network hardening – you will implement security in depth solutions, such as whitelisting or virtualization, in order to protect assets.

Microsoft Identity and Access Administrator

This course provides IT Identity and Access Professional, along with IT Security Professional, with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and it connected identity technologies. This course includes identity content for Azure AD, enterprise application registration, conditional access, identity governance, and other identity tools.

Microsoft Security Operations Analyst

Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Azure Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.

Palo Alto Networks: Firewall 10.1 Essentials: Configuration and Management (EDU-210)

The Palo Alto Networks Firewall 10.1 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to:

Configure and manage the essential features of Palo Alto Networks next-generation firewalls

Configure and manage Security and NAT policies to enable approved traffic to and from zones

Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs

Monitor network traffic using the interactive web interface and firewall reports

Advanced Python

Python has often been thought of as clean scripting language or a simple language to glue “real” applications together. This view is completely out of sync with the real possibilities of the Python language. This course will show you the true power of the language and the ecosystem. You will see that entire high-performance application stacks can be built in Python.

Performance Tuning and Optimizing SQL Databases

Este curso de cuatro días dirigido por un instructor proporciona a los estudiantes que gestionan y mantienen bases de datos de SQL Server los conocimientos y habilidades para ajustar y optimizar el rendimiento de sus bases de datos.

Safe Migration from IPv4 to IPv6

This class shows you both base and advanced technical knowledge about the internet protocol of the next generation IPv6. The delegates should be prepared for the change to IPv6 based networks soon and because of this they should understand the function and addressing of IPv6.

The content of this class covers the possibilities of addressing, autoconfiguration with DHCP, use of DNS, configuration rules for your enterprise network, the configuration of Cisco Routers, Win7 clients and Win2008R2 Servers for IPv6, IPv6 transition mechanism and the deployment of IPv6 for enterprise networks. The address allocation, a working IPv6 address design, solutions for the Dual Homing problem and the necessary precautions for the migration from IPv4 to IPv6 for your enterprise network are filling the course content. This class supports network system engineers with the configuration and support of Cisco IOS Routers and the Microsoft operating systems Windows 7 and Server 2008R2.

The themes autoconfiguration with SLAAC and DHCP and on top DNS are learned theoretical and with pratical labs, IPv6 routing protocols like OSPF and EIGRP, first hop redundancy protocols like HSRP and GLBP, IPv6 transition mechanisms including Tunnels like ISATAP, TEREDO and 6to4 as well as NAT64 are covered within this class. The most important design aspects of this class covering in detail the IPv6 design for enterprise networks, using of DHCP and DNS, integration von IPv6 in a IPv4 network, addressing examples and much more.

Securing Email with Cisco Email Security Appliance

Learn how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email compromise and ransomware. Help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention.

Securing the Web with Cisco Web Security Applicance

Learn how to implement, use, and maintain a Cisco® Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you’ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution’s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.

This course is worth 16 Credits in the Continuing Education Program

Virtual and Classroom learning – V&C Select™

V&C Select™ is a simple concept and a flexible approach to delivery. You can ‘select’ a course from our public schedule and attend in person or as a virtual delegate. Virtual delegates do not travel to this course, we will send you all the information you need before the start of the course and you can test the logins.

Understanding Cisco Cybersecurity Operations Fundamentals

TheUnderstanding Cybersecurity Operations Fundamentals (CBROPS) course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. You will learn basic information about security concepts, common network application operations and attacks, the Windows and Linux operating systems, and the types of data used to investigate security incidents. After completing this course, you will have the basic knowledge required to perform the job role of an associate-level cybersecurity analyst in a threat-centric security operations center to strengthen network protocol, protect your devices and increase operational efficiency. This course prepares you for the Cisco Certified CyberOps Associate certification.

Please note that this course is a combination of Instructor-Led and Self-Paced Study – 5 days in the classroom and approx 1 day of self study. The self-study content will be provided as part of the digital courseware that you will recieve at the beginning of the course and should be part of your preparation for the exam.

VMware Carbon Black App Control Advanced Administrator

This one-day course teaches you how to configure and scope the rules within VMware Carbon Black® App ControlTM product to maintain the system according to your organization’s security posture and organizational policies. Additionally, this course covers troubleshooting both the server and the agent for Carbon Black App Control and how to identify issues that impact normal operations. This course provides an in-depth, technical understanding of the Carbon Black App Control product through comprehensive coursework and hands-on scenario-based labs.

Product Alignment

VMware Carbon Black App Control

VMware Carbon Black Portfolio: Configure and Manage

This 5-day course teaches you how to install, configure, and manage the VMware Carbon Black® Portfolio suite of products, which include:

VMware Carbon Black® App Control™ Administrator
VMware Carbon Black® EDR™ Administrator
VMware Carbon Black Cloud Endpoint™ Standard
VMware Carbon Black® Cloud Audit and Remediation
VMware Carbon Black® Cloud Enterprise EDR™

You learn how to use the capabilities of the products according to the organization’s security posture and organizational policies. This course provides an in-depth, technical understanding of the Carbon Black Portfolio through comprehensive coursework, hands-on labs, and scenario-based exercises.

Product Alignment

VMware Carbon Black App Control
VMware Carbon Black EDR
VMware Carbon Black Cloud Endpoint Standard
VMware Carbon Black Cloud Endpoint Advanced
VMware Carbon Black Cloud Endpoint Enterprise
VMware Carbon Black Cloud Audit and Remediation

Foundations of C# Programming and the .NET Framework

In this course, you will be introduced to the .NET framework through an overview of languages, libraries, services, and tools. You’ll then learn the foundations of the C# language. From basics to the newer features such as generics, partial classes, static classes, global namespace qualification, and so forth. are integrated throughout the course.

Guerrilla.NET

Guerrilla .NET provides a deep exploration of .NET design philosophy and practical advice. You will learn a myriad of patterns and best practices and get hands-on experience developing applications using Visual Studio and Windows 8. Learn to write code using .NET class libraries like Entity Framework, ASP.NET MVC, and even the new Windows Runtime (WinRT). You will also dive into many of the important technologies used to build the web including ASP.NET Web API, JavaScript, NoSQL databases, and cloud computing.

Introducción a Python | Fundamentos de Programación Python

Este curso práctico de programación en Python te enseña los fundamentos de la programación en Python a un nivel básico. Aprenderás los fundamentos de la escritura y ejecución de scripts en Python hasta características más avanzadas como operaciones de archivos, expresiones regulares, trabajo con datos binarios y el uso de la amplia funcionalidad de los módulos en Python. Se hace especial hincapié en las características exclusivas de Python, como las tuplas, los cortes de matriz y el formato de salida.

Este curso proporciona un excelente punto de partida para los usuarios que se inician en Python y en la elaboración de scripts, permitiéndoles utilizar las habilidades básicas en Python en el trabajo de diversas maneras. Puedes aplicar las habilidades del curso para usar Python en proyectos básicos de desarrollo web o para automatizar o simplificar tareas comunes con el uso de scripts en Python. Este curso también sirve como un sólido curso de iniciación/base para el estudio continuo de Python en apoyo del siguiente nivel de desarrollo web con Python, Python para la ciencia de los datos/aprendizaje automático, o Python para la administración de sistemas o soporte de redes.

Azure Administrator for AWS Sysops

This two-day course is designed for AWS Sysops administrators interested in learning how Azure is different from AWS, and how Azure is administered. The workshops main topics are Azure Administration, Azure Networking, Azure Compute, Azure Storage, and Azure Governance. This workshop combines lecture with hands-on practical exercises and discussion/review. During the workshop students will build an end-to-end architecture that demonstrates the main features discussed in the course.

Azure Stack HCI

Este curso de tres días está destinado principalmente a profesionales de la IT que ya tienen una experiencia significativa en la gestión de un entorno de Windows Server en sus instalaciones. Su propósito es cubrir temas avanzados relacionados con el centro de datos definido por el software de Windows Server, Azure Stack HCI y otros productos de Azure Stack. El curso también describe el uso de los productos existentes del Centro de sistemas de Microsoft para implementar y administrar centros de datos definidos por software con Windows Server 2019. Este curso es avanzado y está diseñado para personas que desean ejecutar sus cargas de trabajo virtuales en Windows Server 2019 a mediana y gran escala utilizando un centro de datos definido por software y principios de hiperconvergencia.

Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Hub

This course teaches Azure administrators and Azure Stack Hub operators how to plan, deploy, package, update, and maintain the Azure Stack Hub infrastructure. Lessons include deploying Azure Stack Hub, managing the Azure Stack Hub Marketplace, offering App Services and Event Hub resource providers, managing Azure Stack Hub registration, and maintaining system health.

Designing, Implementing, and Managing IBM MQ V9 Clusters

This course prepares you to plan, design, configure, and administer IBM MQ clusters.

After a review of IBM MQ, the course explains the similarities and differences between administration of a cluster and administration of a distributed message IBM MQ environment. You learn cluster specific commands and procedures, and explore the role of a cluster in a highly available IBM MQ infrastructure. You learn how to do a detailed verification of a new cluster configuration, review and identify all resulting components, and troubleshoot problems.

You also learn about cluster administration, workload balancing, security, and use of publish/subscribe clusters. You learn how to recognize when a problem is due to connection authentication, channel authentication, or object authorizations. You also learn about design options such as overlapping clusters and use of clusters with z/OS queue sharing groups. Many of the considerations in this course are based on actual engagement experiences.

Learning Journeys or Training Paths that reference this course:

IBM MQ
Systems Administrator skills for IBM MQ V9

Developing Rule Solutions in IBM Operational Decision Manager V8.10

This course introduces developers to IBM Operational Decision Manager V8.10. It teaches you the concepts and skills that you need to design, develop, and integrate a business rule solution with Operational Decision Manager.

The course begins with an overview of Operational Decision Manager, which is composed of two main environments: Decision Server for technical users and Decision Center for business users. The course outlines the collaboration between development and business teams during project development.

Through instructor-led presentations and hands-on lab exercises, you learn about the core features of Decision Server, which is the primary working environment for developers. You design decision services and work with the object models that are required to author and execute rule artifacts. You gain experience with deployment and execution, and work extensively with Rule Execution Server. In addition, you become familiar with rule authoring so that you can support business users to set up and customize the rule authoring and validation environments. You also learn how to use Operational Decision Manager features to support decision governance.

The lab environment for this course uses Windows Server 2012 R2 Standard Edition.

Developing Rule Solutions in IBM Operational Decision Manager V8.9.2

This course introduces developers to IBM Operational Decision Manager V8.9.2. It teaches you the concepts and skills that you need to design, develop, and integrate a business rule solution with Operational Decision Manager.

The course begins with an overview of Operational Decision Manager, which is composed of two main environments: Decision Server for technical users and Decision Center for business users. The course outlines the collaboration between development and business teams during project development.

Through instructor-led presentations and hands-on lab exercises, you learn about the core features of Decision Server, which is the primary working environment for developers. You design decision services and work with the object models that are required to author and execute rule artifacts. You gain experience with deployment and execution, and work extensively with Rule Execution Server. In addition, you become familiar with rule authoring so that you can support business users to set up and customize the rule authoring and validation environments. You also learn how to use Operational Decision Manager features to support decision governance.

The lab environment for this course uses Windows Server 2012 R2 Standard Edition

DevOps Engineering on AWS

Aprenda a utilizar las herramientas, las prácticas y las filosofías de DevOps para desarrollar, entregar y mantener aplicaciones y servicios a gran velocidad en AWS. DevOps Engineering on AWS enseña a utilizar la combinación de herramientas, prácticas y filosofías culturales de DevOps para aumentar la capacidad de su organización para desarrollar, entregar y mantener aplicaciones y servicios a gran velocidad en AWS. El curso abarca temas como la integración continua (CI), la entrega continua (CD), la infraestructura como código ,los microservicios, el monitoreo y el registro, así como la comunicación y la colaboración. Los laboratorios prácticos proporcionan experiencia en la creación e implementación de plantillas de AWS CloudFormation y canalizaciones de integración y entrega continuas que crean e implementan aplicaciones en Amazon Elastic Compute Cloud (Amazon EC2), aplicaciones sin servidor y aplicaciones basadas en contenedores. También se incluyen laboratorios para flujos de trabajo de múltiples canalizaciones y canalizaciones que implementan múltiples entornos.

Administering a SQL Database Infrastructure

Este curso de cinco días dirigido por un instructor proporciona a los estudiantes que administran y mantienen bases de datos de SQL Server los conocimientos y habilidades para administrar una infraestructura de base de datos de SQL Server. Además, será de utilidad para las personas que desarrollan aplicaciones que entregan contenido desde bases de datos de SQL Server

Administering Microsoft® SQL Server® 2014 Databases

Este curso de cinco días dirigido por un instructor proporciona a los estudiantes los conocimientos y habilidades para mantener una base de datos Microsoft SQL Server 2014. El curso se centra en enseñar a las personas cómo utilizar las características de los productos SQL Server 2014 y las herramientas relacionadas con el mantenimiento de una base de datos. Nota: Este curso está diseñado para clientes que estén interesados en aprender SQL Server 2012 o SQL Server 2014. Cubre las nuevas características de SQL Server 2014, pero también las importantes capacidades de la plataforma de datos de SQL Server.

Exam Readiness: AWS Certified DevOps Engineer – Professional

El examen AWS Certified DevOps Engineer – Professional valida la experiencia técnica en el aprovisionamiento, operación y gestión de sistemas de aplicaciones distribuidas en la plataforma AWS. Únete a este curso de un día completo de nivel avanzado para aprender a prepararte para el examen explorando las áreas temáticas del examen y cómo se relacionan con DevOps en AWS y con áreas específicas para estudiar. Revisaremos ejemplos de preguntas de examen en cada área temática y te enseñaremos cómo interpretar los conceptos que se están probando para que puedas eliminar más fácilmente las respuestas incorrectas. Este curso cubre los principios básicos de la metodología DevOps y examina una serie de casos de uso aplicables a la puesta en marcha, las pequeñas y medianas empresas y los escenarios de desarrollo empresarial.

DB2 10 for LUW: Basic Administration for AIX

This course teaches you to perform, basic database administrative tasks using DB2 10.1 for Linux, UNIX, and Windows. These tasks include creating and populating databases and implementing a logical design to support recovery requirements. The access strategies selected by the DB2 Optimizer will be examined using the DB2 Explain tools.

Various diagnostic methods will be presented, including using the db2diag.log file messages to direct your investigation of problems, as well as using the db2pd commands.

Возможности портала для гемблинга Кэт Казино

Кэт Казино – всё лучшее из мира азартных игр в единственном месте! На этом сайте вам доступны фантастические виртуальные игры, к слову, от IgroSoft, Amatic и EGT, безопасный веб-сайт, лицензированный МАГ. Доступен также бонусный раздел с ежедневными предложениями,...

Esta web utiliza cookies propias y de terceros para su correcto funcionamiento y para fines analíticos. Contiene enlaces a sitios web de terceros con políticas de privacidad ajenas que podrás aceptar o no cuando accedas a ellos. Al hacer clic en el botón Aceptar, acepta el uso de estas tecnologías y el procesamiento de tus datos para estos propósitos. Ver Política de cookies
Privacidad