Facebook

Courses

We found 244 courses available for you
See
Free

Certified Chief Information Security Officer | CCISO eLearning

16 Lessons
All Levels

Course Description CCISO Certification is an industry-leading program that recognizes …

What you'll learn
Domain 1: Governance and Risk Management
Domain 2: Information Security Controls, Compliance, and Audit Management
Domain 3: Security Program Management & Operations
Domain 4: Information Security Core Competencies
Domain 5: Strategic Planning, Finance, Procurement and Vendor Management
Free

Understanding Cisco Cybersecurity Fundamentals (SECFND) eLearning

Intermediate

Course Description: The Understanding Cisco Cybersecurity Fundamentals (SECFND) course gives …

What you'll learn
Describe network operations and attacks, basic cryptography concepts, and network infrastructure device operations
Describe basic Windows and Linux OS operations, common network applications and attacks, endpoint attacks, and network and endpoint security solutions
Describe security data collection and monitoring, and the common threat models that security operations organizations can reference when performing cybersecurity analysis
Free

Designing Cisco Data Center Infrastructure (DCID) eLearning

Intermediate

Course Description: The Designing Cisco Data Center Infrastructure (DCID) v7.0 …

What you'll learn
Choose the appropriate components and design a scalable, reliable, and intelligent data center
Design data center network connectivity, including Layer 2 switching and Layer 3 forwarding
Design virtual port channel (vPC), Virtual Extensible LAN (VXLAN), and Cisco Overlay Transport Virtualization (OTV) in customer scenarios
Describe management options in the LAN
Describe hardware virtualization and Fabric Extender (FEX) technologies, including data center infrastructure management and automation options
Design a data center storage network, including Redundant Array of Independent Disks (RAID) options, Hyperconvergence, Fibre Channel and Fibre Channel over Ethernet (FCoE)
Describe the Cisco UCS C-Series and B-Series servers and distinguish among system-integrated stack solutions and management options for Cisco UCS domains
Design authentication, authorization, and accounting (AAA), role-based access control (RBAC) and resource parameters for a Cisco UCS domain, including resource pools and policies
Free

Understanding Cisco Data Center Foundations (DCFNDU) eLearning

Intermediate

Course Description: The Understanding Cisco Data Center Foundations (DCFNDU) v1.1 …

What you'll learn
Describe the foundations of data center networking
Describe Cisco Nexus products and explain the basic Cisco NX-OS functionalities and tools
Describe Layer 3 first-hop redundancy
Describe Cisco Fabric Extender (FEX) connectivity
Describe Ethernet port channels and virtual port channels (vPCs)
Introduce switch virtualization, machine virtualization, and describe network virtualization
Compare storage connectivity options in the data center
Describe Fibre Channel communication between the initiator server and the target storage
Describe Fibre Channel zone types and their uses
Describe N-Port Virtualization (NPV) and N-Port Identifier Virtualization (NPIV)
Describe data center Ethernet enhancements that provide a lossless fabric
Describe Fibre Channel over Ethernet (FCoE)
Describe data center server connectivity
Describe Cisco UCS Manager
Describe the purpose and advantages of APIs
Describe Cisco ACI
Describe the basic concepts of cloud computing
Free

Introducing Automation for Cisco Solutions (CSAU) eLearning

Intermediate

Course Description: The Introducing Automation for Cisco Solutions (CSAU) v1.0 …

What you'll learn
Articulate the role network automation and programmability play in the context of end-to-end network management and operations
Define and differentiate between waterfall and agile software development methodologies
Interpret and troubleshoot Python scripts with fundamental programming constructs built for network automation use cases
Describe how DevOps principles, tools, and pipelines can be applied to network operations
Understand the role of network automation development environments and associated technologies such as Python virtual environments, Vagrant, and Docker
Understand and construct HTTP-based API calls to network devices
Articulate the differences among and common use cases for XML, JSON, YAML, and Protobuf
Construct and interpret Python scripts using the Python requests module to automate devices that have HTTP-based APIs
Understand the role YANG plays in network automation
Understand that a number of tools exist to simplify working with YANG models
Describe the functionality of RESTCONF and NETCONF and the differences between them
Construct Ansible playbooks to configure network devices and retrieve operational state data from them
Build Jinja2 templates and YAML data structures to generate desired state configurations
Free

Cisco Prime Performance Manager (CPPERF) eLearning

Intermediate

Course Description The Cisco Prime Performance Manager (CPPERF) Cisco Training …

Free

Understanding Cisco Collaboration Foundations (CLFNDU) eLearning

Intermediate

Course Description: The Understanding Cisco Collaboration Foundations (CLFNDU) v1.1 course …

What you'll learn
Define collaboration and describe the main purpose of key devices in a Cisco collaboration on-premise, hybrid, and cloud deployment model
Configure and modify required parameters in Cisco Unified CM including service activation, enterprise parameters, CM groups, time settings, and device pool
Deploy and troubleshoot IP phones via auto registration and manual configuration within Cisco Unified CM
Describe the call setup and teardown process for a SIP device including codec negotiation using Session Description Protocol (SDP) and media channel setup
Manage Cisco Unified CM user accounts (local and via Lightweight Directory Access Protocol [LDAP]) including the role/group, service profile, UC service, and credential policy
Configure dial plan elements within a single site Cisco Unified CM deployment including Route Groups, Local Route Group, Route Lists, Route Patterns, Translation Patterns, Transforms, SIP Trunks, and SIP Route Patterns
Configure Class of Control on Cisco Unified CM to control which devices and lines have access to services
Configure Cisco Unified CM for Cisco Jabber and implement common endpoint features including call park, softkeys, shared lines, and pickup groups
Deploy a simple SIP dial plan on a Cisco Integrated Services Router (Cisco ISR) gateway to enable access to the PSTN network
Manage Cisco UCM access to media resources available within Cisco UCM and Cisco ISR gateways
Describe tools for reporting and maintenance including Unified Reports, Cisco Real-Time Monitoring Tool (RTMT), Disaster Recovery System (DRS), and Call Detail Records (CDRs) within Cisco Unified CM
Describe additional considerations for deploying video endpoints in Cisco Unified CM
Describe the integration of Cisco Unity with Cisco Unified CM and the default call handler
Free

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) eLearning

Intermediate

Course Description: The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 …

What you'll learn
Explain how a SOC operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective
Explain Network Security Monitoring (NSM) tools that are available to the network security analyst
Explain the data that is available to the network security analyst
Describe the basic concepts and uses of cryptography
Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts
Understand common endpoint security technologies
Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors
Identify resources for hunting cyber threats
Explain the need for event data normalization and event correlation
Identify the common attack vectors
Identify malicious activities
Identify patterns of suspicious behaviors
Conduct security incident investigations
Explain the use of a typical playbook in the SOC
Explain the use of SOC metrics to measure the effectiveness of the SOC
Explain the use of a workflow management system and automation to improve the effectiveness of the SOC
Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT)
Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format
🚀 Get Up to 33% OFF on Top Courses + FREE e-learning subscription (worth $1595)
This is default text for notification bar