This course is a 2 day Instructor Led training which focuses on the advanced features in Identity Services Engine and Cisco Stealthwatch. Cisco ISE is now equipped with better dashboards that make it very easy to see the different kinds of endpoints, users, devices, and Operating Systems in the network and the ability to create customized dashboards. Cisco StealthWatch leverages the Network as a Sensor (NaaS) to deliver context-aware threat alerts and when integrated with NetFlow and ISE to monitor the network and detect suspicious network activity generated by users and devices on the network. Cisco ISE uses the Network as an Enforcer (NaaE) to dynamically enforce security policies with software-defined segmentation designed to reduce the overall attack surface, contain attacks by preventing the lateral movement of threats across the network, and minimize the time needed to isolate threats when detected. Stealthwatch with ISE integration can provide administrators context behind the IP address, including the user, device, and location.
-
The course also provides an overview of IPv6 technologies; covers IPv6 design and implementation; describes IPv6 operations, addressing, routing, services, and transition; and describes deployment of IPv6 in enterprise networks as well as in service provider networks. The course also includes case studies that are useful for deployment scenarios and remote labs.
-
The Securing WAN and SD-WAN 1-day workshop provides what is available from Cisco’s portfolio of solution to secure the Branch office and Software Defined WAN. Attendees will have the opportunity to go through preliminary design and implementation guidance for organizations looking to deploy an enterprise network that delivers an uncompromised secured user experience over any WAN connection. There is a plethora of security solutions that Cisco offers to have a secure WAN connectivity like DMVPN, Zone-based Firewall, Stealth watch, Cisco Umbrella, Snort IPS, FirePOWER and Introduction to Software Defined WAN. The course is focused on real world use cases which attendees can easily understand and relate.
-
Security being critical component on today’s digitally disrupted workspace. Visibility is extremely important parameter to see, identify, mitigate, and quarantine threats and anomalies to protect the network and its resources. The workshop educates the participants on how to tighten the security at the access level of the network using various solution offerings from Cisco. Features like mGig, TrustSec, Flexible Netflow, FRA, Fastlane and products like Stealthwatch, CMX Cloud, their primary advantages and features that would help the IT to see, improvise and act based on the traffic pattern in the network. At the end of the workshop, the participants will be able to understand and decide on the feature-sets which would make their workspace transformation into Digital era.
-
The Securing Cloud Deployments with Cisco Technologies (SECCLD) v1.0 course shows you how to implement Cisco® cloud security solutions to secure access to the cloud, workloads in the cloud, and Software as a Service (SaaS) user accounts, applications, and data. Through expert instruction and hands-on labs, you’ll learn a comprehensive set of skills and technologies including: how to use key Cisco cloud security solutions; detect suspicious traffic flows, policy violations, and compromised devices; implement security controls for cloud environments; and implement cloud security management. This course covers usage of Cisco Cloudlock, Cisco Umbrella™, Cisco Cloud Email Security, Cisco Advanced Malware Protection (AMP) for Endpoints, Cisco Stealthwatch® Cloud and Enterprise, Cisco Firepower® NGFW (next-generation firewall), and more.
-
The ECSA is a security credential like no other! The ECSA course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.
The ECSA program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in CEH by utilizing EC-Council’s published penetration testing methodologies.
It is a highly interactive, comprehensive, standards-based and methodology intensive 5-day security training program 5-day which teaches information security professionals to conduct real life penetration tests.
This course is part of the Information Security Track of EC-Council. This is a “Professional” level course, with the Certified Ethical Hacker being the “Core” and the Licensed Penetration Tester being the “Master” level certification.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
This course broadens the skills of the student who are required to implement and manage a Kubernetes-based Platform as a Service (PaaS) environment based on Red Hat OpenShift Container Platform on Power Systems. The course covers basic administration and configuration of Red Hat OpenShift Container Platform within a POWER processor-based server configured with IBM PowerVC. Hands-on exercises reinforce the lecture material, and allow students to use the Red Hat OpenShift Container Platform to work with images, applications, and manage a cluster.
-
This course covers the steps to follow to update a Red Hat OpenShift Container Platform 4.3.18 environment on Power Systems to 4.3.23. Lessons learned, and hints and tips will be provided to help you perform the update successfully.
-
This course is designed to introduce students to IBM Data Science Experience. The course covers how to create and set up a project and to be familiar with how to create, code, collaborate, and share notebooks while working with a variety of data sources to analyze data.
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.
-
This course teaches developers, database administrators, and system programmers various features of SQL, including column functions, grouping, unions, subqueries, and maintaining data.
Note: Guided eLearning is a self-paced offering which includes web-based content for self-study and videos (including audio) that demonstrate activities.
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.
-
This offering teaches cloud database support staff how to manage access of users and privileges to a dashDB for Analytics or dashDB for Transactions database.
Note: Guided eLearning is a self-paced offering which includes web-based content for self study and videos (including audio) that demonstrate the hands-on activity.
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms
-
This course is intended for Developers, Database Administrators, and System Programmers who require further insight into the SQL language.
Note: Guided eLearning is a self-paced offering which includes web-based content for self-study and videos (including audio) that demonstrate activities.
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.