Filter by Topic
Filter by Vendor
Understanding Cisco Collaboration Foundations (CLFNDU) eLearning
Course Description: The Understanding Cisco Collaboration Foundations (CLFNDU) v1.1 course …
What you'll learn
Define collaboration and describe the main purpose of key devices in a Cisco collaboration on-premise, hybrid, and cloud deployment model
Configure and modify required parameters in Cisco Unified CM including service activation, enterprise parameters, CM groups, time settings, and device pool
Deploy and troubleshoot IP phones via auto registration and manual configuration within Cisco Unified CM
Describe the call setup and teardown process for a SIP device including codec negotiation using Session Description Protocol (SDP) and media channel setup
Manage Cisco Unified CM user accounts (local and via Lightweight Directory Access Protocol [LDAP]) including the role/group, service profile, UC service, and credential policy
Configure dial plan elements within a single site Cisco Unified CM deployment including Route Groups, Local Route Group, Route Lists, Route Patterns, Translation Patterns, Transforms, SIP Trunks, and SIP Route Patterns
Configure Class of Control on Cisco Unified CM to control which devices and lines have access to services
Configure Cisco Unified CM for Cisco Jabber and implement common endpoint features including call park, softkeys, shared lines, and pickup groups
Deploy a simple SIP dial plan on a Cisco Integrated Services Router (Cisco ISR) gateway to enable access to the PSTN network
Manage Cisco UCM access to media resources available within Cisco UCM and Cisco ISR gateways
Describe tools for reporting and maintenance including Unified Reports, Cisco Real-Time Monitoring Tool (RTMT), Disaster Recovery System (DRS), and Call Detail Records (CDRs) within Cisco Unified CM
Describe additional considerations for deploying video endpoints in Cisco Unified CM
Describe the integration of Cisco Unity with Cisco Unified CM and the default call handler
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) eLearning
Course Description: The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 …
What you'll learn
Explain how a SOC operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective
Explain Network Security Monitoring (NSM) tools that are available to the network security analyst
Explain the data that is available to the network security analyst
Describe the basic concepts and uses of cryptography
Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts
Understand common endpoint security technologies
Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors
Identify resources for hunting cyber threats
Explain the need for event data normalization and event correlation
Identify the common attack vectors
Identify malicious activities
Identify patterns of suspicious behaviors
Conduct security incident investigations
Explain the use of a typical playbook in the SOC
Explain the use of SOC metrics to measure the effectiveness of the SOC
Explain the use of a workflow management system and automation to improve the effectiveness of the SOC
Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT)
Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format
PECB Certified ISO 22301 Lead Auditor eLearning Training Course
Course Description As the world is moving faster than ever, …
What you'll learn
Explain the fundamental concepts and principles of a Business Continuity Management System (BCMS) based on ISO 22301
Interpret the ISO 22301 requirements for a BCMS from the perspective of an auditor
Evaluate the BCMS conformity to ISO 22301 requirements, in accordance with the fundamental audit concepts and principles
Plan, conduct, and close an ISO 22301 compliance audit, in accordance with ISO/IEC 17021-1 requirements, ISO 19011guidelines, and other best practices of auditing
Manage an ISO 22301 audit program
PECB Certified ISO 22301 Lead Implementer eLearning Training Course
Course Description Technological developments have taken the world by storm, …
What you'll learn
Understand the concepts, approaches, methods, and techniques used for the implementation and effective management of a BCMS
Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization
Understand the operation of the business continuity management system and its processes based on ISO 22301
Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization.
Oracle 19c Database Administration II (Oracle DBA II) (TTOR20619)
Geared for participants experienced with Oracle 19c DBA essentials Oracle …
What you'll learn
Creating CDBs and Regular PDBs
Managing CDBs and PDBs
Backup and Duplicate
Upgrading and Transporting CDBs and Regular PDBs
Backup Strategies and Terminology
Restore and Recovery Concepts
Using Flashback Technologies
Duplicating a Database
Installing Grid Infrastructure and Oracle Database
Patching Grid Infrastructure and Oracle Database
Upgrading to Oracle Grid Infrastructure
Oracle Database 18c: New Features
Using General Overall Database Enhancements
Monitoring and Tuning Database Performance
Managing Application PDBs
Managing Security in Multitenant databases
Recovery and Flashback
Configuring and Using RMAN
Diagnosing Failures
Performing Recovery
Transporting Data
RMAN Troubleshooting and Tuning
Creating an Oracle Database by using DBCA
Oracle Restart
Upgrading the Oracle Database
Installing Grid Infrastructure for a Standalone server
Using Availability Enhancements
Tuning SQL Statements
Advanced Architecting on AWS
Course Description Learn how to build complex solutions that incorporate …
What you'll learn
Apply the AWS Well-Architected Framework
Manage multiple AWS accounts for your organization
Connect an on-premises datacenter to the AWS Cloud
Discuss billing implications of connecting multi-region VPCs
Move large data from an on-premises datacenter to AWS
Design large data stores for the AWS Cloud
Understand different architectural designs for scaling a large website
Protect your infrastructure from distributed denial of service (DDOS) attacks
Secure your data on AWS with encryption
Design protection of data at rest and data in transit
Enhance the performance of your solutions
Select the most appropriate AWS deployment mechanism
Certified Penetration Testing Professional | CPENT
Course Description EC-Council’s Certified Penetration Tester (CPENT) program is all …
AI-102T00: Designing & Implementing An Azure AI Solution
AI-102 Designing and Implementing an Azure AI Solution is intended …
What you'll learn
Describe considerations for AI-enabled application development
Create, configure, deploy, and secure Azure Cognitive Services
Develop applications that analyze text
Develop speech-enabled applications
Create applications with natural language understanding capabilities
Create QnA applications
Create conversational solutions with bots
Use computer vision services to analyze images and videos
Create custom computer vision models
Develop applications that detect, analyze, and recognize faces
Develop applications that read and process text in images and documents
Create intelligent search solutions for knowledge mining.