Facebook

`Live Courses by Vendor Courses

Most popular
Trending

All `Live Courses by Vendor Courses



We found 45 courses available for you
See
-19%

AZ-204T00-A: Developing solutions for Microsoft Azure

42 Lessons
Intermediate

Course Description: This course teaches developers how to create end-to-end …

CNSE-AWS Cloud Network Security Expert for AWS

26 Lessons
Intermediate

Course Description: Learn advanced concepts and develop skills needed to …

What you'll learn
Discuss AWS Platform Components and their relationship to Check Point CloudGuard Network Security.
Explain how to maintain a secure, efficient, and stable cloud environment.
Describe the components and constraints of a hub and spoke security environment.
Describe the function of the Cloud Management Extension.
Explain the purpose of identity and access controls and constraints in different cloud platforms.
Explain the steps required to configure Identity and Access controls in AWS.
Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature.
Explain how to design and configure Cloud Adaptive Policies.
Discuss the purpose and function of Data Center Objects.
Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployments.
Explain how CSP templates can be used for maintenance tasks in the cloud environment.
Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them.
Discuss Scaling Solutions and Options for Cloud Environments.
Explain the Scaling Options in AWS.
Describe the workflow for configuring scaling solutions in AWS.
Discuss how ClusterXL operates and what elements work together to permit traffic failover.
Explain how ClusterXL functions differently in a Cloud Environment.
Describe how clusters are created and function in AWS.
Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved.
Explain the nature of a “Greenfield” deployment, the advantages of it, and the constraints involved.
Describe the components and constraint involved in deploying a Disaster Recovery Site in the cloud.
Discuss the steps required for troubleshooting automation in AWS.
Explain the steps required for troubleshooting Scaling Solution issues in AWS.
Describe the steps required for troubleshooting clusters in AWS.

CNSE-AZURE: Cloud Network Security Expert for Azure

27 Lessons
Intermediate

Course Description: Learn advanced concepts and develop skills needed to …

What you'll learn
Discuss Azure Platform Components and their relationship to Check Point CloudGuard Network Security.
Explain how to maintain a secure, efficient, and stable cloud environment.
Describe the components and constraints of a hub and spoke cloud security environment.
Describe the function of the Cloud Management Extension
Explain the purpose of identity and access controls and constraints in different cloud platforms.
Explain the steps required to configure Identity and Access controls in Azure.
Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature.
Explain how to design and configure Cloud Adaptive Policies.
Discuss the purpose and function of Data Center Objects.
Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployment.
Explain how CSP templates can be used for maintenance tasks in the cloud environment.
Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them.
Discuss Scaling Solutions and Options for Cloud Environments.
Explain the Scaling Options in Azure.
Describe the workflow for configuring scaling solutions in Azure.
Discuss how ClusterXL operates and what elements work together to permit traffic failover.
Explain how ClusterXL functions differently in a Cloud Environment.
Describe how clusters are created and function in Azure.
Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved.
Explain the nature of a “Greenfield” deployment, the advantages of it, and the constraints involved.
Describe the components and constraint involved in deploying a Disaster
Recovery Site in the cloud.
Discuss the steps required for troubleshooting automation in Azure.
Explain the steps required for troubleshooting Scaling Solution issues in Azure.
Describe the steps required for troubleshooting clusters in Azure.

SISE: Implementing and Configuring Cisco Identity Services Engine v3.x

47 Lessons
Intermediate

Course Description: Learn to install, configure, and deploy ISE with …

What you'll learn
Describe Cisco ISE architecture, installation, and distributed deployment options
Configure Network Access Devices (NADs), policy components, and basic authentication and authorization policies in Cisco ISE
Implement Cisco ISE web authentication and guest services
Deploy Cisco ISE profiling, posture, and client provisioning services
Describe administration, monitoring, troubleshooting, and TrustSec SGA security
Configure device administration using TACACS+ in Cisco ISE

SSNGFW: Securing Networks with Cisco Firepower Next Generation Firewall

25 Lessons
Intermediate

Course Description: This lab-intensive 5-day course introduces the student to …

What you'll learn
Describe the Cisco Firepower Threat Defense system and key concepts of NGIPS and NGFW technology
Describe how to perform the configurations tasks required for implementing a Cisco Firepower Threat Defense device
Describe how to implement quality of service (QoS) and Network Address Translation (NAT) by using Cisco Firepower Threat Defense
Perform an initial network discovery using Cisco Firepower to identify hosts, applications, and services
Identify and create the objects required as prerequisites to implementing access control policies
Describe the behavior, usage, and implementation procedure for access control policies
Describe the concepts and implementation procedure of security intelligence features
Describe Cisco Advanced Malware Protection (AMP) for Networks and the implementation procedure of file control and advanced malware protection
Implement and manage intrusion policies
Explain the use of network analysis policies and the role of preprocessor technology in processing network traffic for NGIPS inspection
Describe and demonstrate the detailed analysis techniques and reporting features provided by the Cisco Firepower Management Center
Describe key Cisco Firepower Management Center system administration and user account management features
Describe the processes that can be used to troubleshoot Cisco Firepower Threat Defense systems

ENWLSD: Designing Cisco Enterprise Wireless Networks

44 Lessons
Intermediate

Course Description: Designing Cisco Enterprise Wireless Networks Gain the knowledge …

What you'll learn
Describe and implement a Cisco-recommended structured design methodology
Describe and implement industry standards, amendments, certifications, and Requests For Comments (RFCs)
Describe and implement Cisco enhanced wireless features
Describe and implement the wireless design process
Describe and implement specific vertical designs
Describe and implement site survey processes
Describe and implement network validation processes

ENSLD: Designing Cisco Enterprise Networks

31 Lessons
Intermediate

Course Description: In this 5-day course, Designing Cisco Enterprise Networks …

What you'll learn
Design EIGRP internal routing for the enterprise network
Design OSPF internal routing for the enterprise network
Design IS-IS internal routing for the enterprise network
Design a network based on customer requirements
Design BGP routing for the enterprise network
Describe the different types and uses of MP-BGP address families
Describe BGP load sharing
Design a BGP network based on customer requirements
Decide where L2/L3 boundary will be in your Campus network and make design decisions
Describe layer 2 design considerations for Enterprise Campus networks
Design a LAN network based on customer requirements
Describe layer 3 design considerations in an Enterprise Campus network
Examine Cisco SD-Access fundamental concepts
Describe Cisco SD-Access Fabric Design
Design an SD-Access Campus Fabric based on customer requirements
Design service provider-managed VPNs
Design enterprise-managed VPNs
Design a resilient WAN
Design a resilient WAN network based on customer requirements
Examine the Cisco SD-WAN architecture
Describe Cisco SD-WAN deployment options
Design Cisco SD-WAN redundancy
Explain the basic principles of QoS
Design QoS for the WAN
Design QoS for enterprise network based on customer requirements
Explain the basic principles of multicast
Designing rendezvous point distribution solutions
Describe high-level considerations when doing IP addressing design
Create an IPv6 addressing plan
Plan an IPv6 deployment in an existing enterprise IPv4 network
Describe the challenges that you might encounter when transitioning to IPv6
Design an IPv6 addressing plan based on customer requirements
Describe Network APIs and protocols
Describe YANG, NETCONF and RESTCON

ENARSI: Implementing Cisco Enterprise Advanced Routing and Services

53 Lessons
Intermediate

Course Description: Implementing Cisco Enterprise Advanced Routing and Services_x000D_n_x000D_nThe Implementing …

What you'll learn
Configure classic Enhanced Interior Gateway Routing Protocol (EIGRP) and named EIGRP for IPv4 and IPv6
Optimize classic EIGRP and named EIGRP for IPv4 and IPv6
Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6
Configure Open Shortest Path First (OSPF)v2 and OSPFv3 in IPv4 and IPv6 environments
Optimize OSPFv2 and OSPFv3 behavior
Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6
Implement route redistribution using filtering mechanisms
Troubleshoot redistribution
Implement path control using Policy-Based Routing (PBR) and IP service level agreement (SLA)
Configure Multiprotocol-Border Gateway Protocol (MP-BGP) in IPv4 and IPv6 environments
Optimize MP-BGP in IPv4 and IPv6 environments
Troubleshoot MP-BGP for IPv4 and IPv6
Describe the features of Multiprotocol Label Switching (MPLS)
Describe the major architectural components of an MPLS VPN
Identify the routing and packet forwarding functionalities for MPLS VPNs
Explain how packets are forwarded in an MPLS VPN environment
Implement Cisco Internetwork Operating System (IOS®) Dynamic Multipoint VPNs (DMVPNs)
Implement Dynamic Host Configuration Protocol (DHCP)
Describe the tools available to secure the IPV6 first hop
Troubleshoot Cisco router security features
Troubleshoot infrastructure security and services