Facebook

Courses

We found 227 courses available for you
See

ENSLD: Designing Cisco Enterprise Networks

31 Lessons
40 hours
Intermediate

In this 5-day course, Designing Cisco Enterprise Networks (ENSLD), students will …

What you'll learn
Design EIGRP internal routing for the enterprise network
Design OSPF internal routing for the enterprise network
Design IS-IS internal routing for the enterprise network
Design a network based on customer requirements
Design BGP routing for the enterprise network
Describe the different types and uses of MP-BGP address families
Describe BGP load sharing
Design a BGP network based on customer requirements
Decide where L2/L3 boundary will be in your Campus network and make design decisions
Describe layer 2 design considerations for Enterprise Campus networks
Design a LAN network based on customer requirements
Describe layer 3 design considerations in an Enterprise Campus network
Examine Cisco SD-Access fundamental concepts
Describe Cisco SD-Access Fabric Design
Design an SD-Access Campus Fabric based on customer requirements
Design service provider-managed VPNs
Design enterprise-managed VPNs
Design a resilient WAN
Design a resilient WAN network based on customer requirements
Examine the Cisco SD-WAN architecture
Describe Cisco SD-WAN deployment options
Design Cisco SD-WAN redundancy
Explain the basic principles of QoS
Design QoS for the WAN
Design QoS for enterprise network based on customer requirements
Explain the basic principles of multicast
Designing rendezvous point distribution solutions
Describe high-level considerations when doing IP addressing design
Create an IPv6 addressing plan
Plan an IPv6 deployment in an existing enterprise IPv4 network
Describe the challenges that you might encounter when transitioning to IPv6
Design an IPv6 addressing plan based on customer requirements
Describe Network APIs and protocols
Describe YANG, NETCONF and RESTCON

ENAUI: Implementing Automation for Cisco Enterprise Solutions

24 Lessons
24 hours
Intermediate

Implementing Automation for Cisco Enterprise Solutions (ENAUI) is a 3-day …

What you'll learn
Describe the various models and APIs of the Cisco IOS-XE platform to perform Day 0 operations, improve troubleshooting methodologies with custom tools, augment the Command-Line Interface (CLI) using scripts, and integrate various workflows using Ansible and Python
Explain the paradigm shift of model-driven telemetry and the building blocks of a working solution
Control the tools and APIs to automate Cisco DNA infrastructure managed by Cisco DNA Center™
Demonstrate workflows (configuration, verification, health checking, and monitoring) using Python, Ansible, and Postman
Explain Cisco SD-WAN solution components, implement a Python library that works with the Cisco SD-WAN APIs to perform configuration, inventory management, and monitoring tasks, and implement reusable Ansible roles to automate provisioning new branch sites on an existing Cisco SD-WAN infrastructure
Manage the tools and APIs to automate Cisco Meraki managed infrastructure and demonstrate workflows (configuration, verification, health checking, monitoring) using Python, Ansible, and Postman

SSNGFW: Securing Networks with Cisco Firepower Next Generation Firewall

25 Lessons
40 hours
Intermediate

Course Description: This lab-intensive 5-day course introduces the student to …

What you'll learn
Describe the Cisco Firepower Threat Defense system and key concepts of NGIPS and NGFW technology
Describe how to perform the configurations tasks required for implementing a Cisco Firepower Threat Defense device
Describe how to implement quality of service (QoS) and Network Address Translation (NAT) by using Cisco Firepower Threat Defense
Perform an initial network discovery using Cisco Firepower to identify hosts, applications, and services
Identify and create the objects required as prerequisites to implementing access control policies
Describe the behavior, usage, and implementation procedure for access control policies
Describe the concepts and implementation procedure of security intelligence features
Describe Cisco Advanced Malware Protection (AMP) for Networks and the implementation procedure of file control and advanced malware protection
Implement and manage intrusion policies
Explain the use of network analysis policies and the role of preprocessor technology in processing network traffic for NGIPS inspection
Describe and demonstrate the detailed analysis techniques and reporting features provided by the Cisco Firepower Management Center
Describe key Cisco Firepower Management Center system administration and user account management features
Describe the processes that can be used to troubleshoot Cisco Firepower Threat Defense systems

Lead Cloud Security Manager

40 hours
Intermediate

The Lead Cloud Security Manager training course enables participants to …

What you'll learn
Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of a cloud security program
Acknowledge the correlation between ISO/IEC 27017, ISO/IEC 27018, and other standards and regulatory frameworks
Gain the ability to interpret the guidelines of ISO/IEC 27017 and ISO/IEC 27018 in the specific context of an organization
Develop the necessary knowledge and competence to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a cloud security program
Acquire the practical knowledge to advise an organization in managing a cloud security program by following best practices

Migrating to AWS

24 hours
Intermediate

This course is for individuals who seek an understanding of …

What you'll learn
Recognize the common business and technical drivers for migrating to the cloud
Summarize the three phases of a migration and associated objectives, tasks, and stakeholders for each
Describe AWS architecture, tools, and migration best practices
Distinguish between the various cloud migration strategies and when each is most appropriate
Determine an organization’s application migration readiness
Discover a portfolio and gather data necessary for migration
Plan and design an application migration strategy
Perform and validate application migration to the cloud
Optimize applications and operations after migrating to the cloud

Security Engineering on AWS

24 hours
Intermediate

Security is a concern for both customers in the cloud, …

What you'll learn
State an understanding of AWS cloud security based on the CIA triad.
Create and analyze authentication and authorizations with IAM.
Manage and provision accounts on AWS with appropriate AWS services.
Identify how to manage secrets using AWS services.
Monitor sensitive information and protect data via encryption and access controls.
Identify AWS services that address attacks from external sources.
Monitor, generate, and collect logs.
Identify indicators of security incidents.
Identify how to investigate threats and mitigate using AWS services.
AWS

Advanced Developing on AWS

24 hours
Intermediate

The Advanced Developing on AWS course uses the real-world scenario …

What you'll learn
Analyze a monolithic application architecture to determine logical or programmatic break points where the application can be broken up across different AWS services
Apply Twelve-Factor Application manifesto concepts and steps while migrating from a monolithic architecture
Recommend the appropriate AWS services to develop a microservices based cloud-native application
Use the AWS API, CLI, and SDKs to monitor and manage AWS services
Migrate a monolithic application to a microservices application using the 6 Rs of migration
Explain the SysOps and DevOps interdependencies necessary to deploy a microservices application in AWS

.Net Secure Coding Camp (TT8320-N)

32 hours
Intermediate

Discover the cutting-edge of cybersecurity and elevate your skills as …

What you'll learn
<b>Understanding Cybersecurity Concepts:</b> Gain a solid foundation in cybersecurity principles, the evolving threat landscape, and the language of the industry to better identify and address security issues in .NET applications.
<b>Ethical Bug Hunting Techniques:</b> Learn safe and appropriate methods for hunting bugs, ensuring responsible and ethical practices while working to uncover and address vulnerabilities in your applications.
<b>Web Application Security:</b> Master the skills required to analyze, identify, and mitigate vulnerabilities in web applications, following best practices and guidelines from organizations such as OWASP, WASC, CWE, and CERT Secure Coding Standard.
<b>Utilizing Industry-Standard Tools and Frameworks:</b> Acquire hands-on experience with widely used tools and frameworks, such as Visual Studio and .NET Cryptography, to effectively and efficiently secure your applications.
<b>Improved Problem Solving and Debugging:</b> Enhance your ability to identify, analyze, and resolve security issues in your applications through real-world case studies, labs, and expert instruction.
<b>Defensive Programming Techniques:</b> Learn and apply defensive programming techniques like securing trust boundaries, input validation, and proper exception handling to create more robust and secure .NET applications.
<b>Cryptography in .NET:</b> Develop a deep understanding of .NET cryptographic services, hash algorithms, symmetric and asymmetric encryption, and gain hands-on experience with a cryptography wrapper for .NET.
<b>Secure Software Development Processes:</b> Gain insight into secure software development processes, including the concept of "shifting left" and the implementation of secure design principles, enabling you to create safer and more reliable .NET applications.