Filter by Topic
Filter by Vendor
Understanding Cisco Collaboration Foundations (CLFNDU) eLearning
Course Description: The Understanding Cisco Collaboration Foundations (CLFNDU) v1.1 course …
What you'll learn
Define collaboration and describe the main purpose of key devices in a Cisco collaboration on-premise, hybrid, and cloud deployment model
Configure and modify required parameters in Cisco Unified CM including service activation, enterprise parameters, CM groups, time settings, and device pool
Deploy and troubleshoot IP phones via auto registration and manual configuration within Cisco Unified CM
Describe the call setup and teardown process for a SIP device including codec negotiation using Session Description Protocol (SDP) and media channel setup
Manage Cisco Unified CM user accounts (local and via Lightweight Directory Access Protocol [LDAP]) including the role/group, service profile, UC service, and credential policy
Configure dial plan elements within a single site Cisco Unified CM deployment including Route Groups, Local Route Group, Route Lists, Route Patterns, Translation Patterns, Transforms, SIP Trunks, and SIP Route Patterns
Configure Class of Control on Cisco Unified CM to control which devices and lines have access to services
Configure Cisco Unified CM for Cisco Jabber and implement common endpoint features including call park, softkeys, shared lines, and pickup groups
Deploy a simple SIP dial plan on a Cisco Integrated Services Router (Cisco ISR) gateway to enable access to the PSTN network
Manage Cisco UCM access to media resources available within Cisco UCM and Cisco ISR gateways
Describe tools for reporting and maintenance including Unified Reports, Cisco Real-Time Monitoring Tool (RTMT), Disaster Recovery System (DRS), and Call Detail Records (CDRs) within Cisco Unified CM
Describe additional considerations for deploying video endpoints in Cisco Unified CM
Describe the integration of Cisco Unity with Cisco Unified CM and the default call handler
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) eLearning
Course Description: The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 …
What you'll learn
Explain how a SOC operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective
Explain Network Security Monitoring (NSM) tools that are available to the network security analyst
Explain the data that is available to the network security analyst
Describe the basic concepts and uses of cryptography
Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts
Understand common endpoint security technologies
Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors
Identify resources for hunting cyber threats
Explain the need for event data normalization and event correlation
Identify the common attack vectors
Identify malicious activities
Identify patterns of suspicious behaviors
Conduct security incident investigations
Explain the use of a typical playbook in the SOC
Explain the use of SOC metrics to measure the effectiveness of the SOC
Explain the use of a workflow management system and automation to improve the effectiveness of the SOC
Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT)
Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format
PECB Certified ISO 22301 Lead Auditor eLearning Training Course
Course Description As the world is moving faster than ever, …
What you'll learn
Explain the fundamental concepts and principles of a Business Continuity Management System (BCMS) based on ISO 22301
Interpret the ISO 22301 requirements for a BCMS from the perspective of an auditor
Evaluate the BCMS conformity to ISO 22301 requirements, in accordance with the fundamental audit concepts and principles
Plan, conduct, and close an ISO 22301 compliance audit, in accordance with ISO/IEC 17021-1 requirements, ISO 19011guidelines, and other best practices of auditing
Manage an ISO 22301 audit program
PECB Certified ISO 22301 Lead Implementer eLearning Training Course
Course Description Technological developments have taken the world by storm, …
What you'll learn
Understand the concepts, approaches, methods, and techniques used for the implementation and effective management of a BCMS
Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization
Understand the operation of the business continuity management system and its processes based on ISO 22301
Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization.
SISE: Implementing and Configuring Cisco Identity Services Engine v3.x
Course Description: Learn to install, configure, and deploy ISE with …
What you'll learn
Describe Cisco ISE architecture, installation, and distributed deployment options
Configure Network Access Devices (NADs), policy components, and basic authentication and authorization policies in Cisco ISE
Implement Cisco ISE web authentication and guest services
Deploy Cisco ISE profiling, posture, and client provisioning services
Describe administration, monitoring, troubleshooting, and TrustSec SGA security
Configure device administration using TACACS+ in Cisco ISE
SSNGFW: Securing Networks with Cisco Firepower Next Generation Firewall
Course Description: This lab-intensive 5-day course introduces the student to …
What you'll learn
Describe the Cisco Firepower Threat Defense system and key concepts of NGIPS and NGFW technology
Describe how to perform the configurations tasks required for implementing a Cisco Firepower Threat Defense device
Describe how to implement quality of service (QoS) and Network Address Translation (NAT) by using Cisco Firepower Threat Defense
Perform an initial network discovery using Cisco Firepower to identify hosts, applications, and services
Identify and create the objects required as prerequisites to implementing access control policies
Describe the behavior, usage, and implementation procedure for access control policies
Describe the concepts and implementation procedure of security intelligence features
Describe Cisco Advanced Malware Protection (AMP) for Networks and the implementation procedure of file control and advanced malware protection
Implement and manage intrusion policies
Explain the use of network analysis policies and the role of preprocessor technology in processing network traffic for NGIPS inspection
Describe and demonstrate the detailed analysis techniques and reporting features provided by the Cisco Firepower Management Center
Describe key Cisco Firepower Management Center system administration and user account management features
Describe the processes that can be used to troubleshoot Cisco Firepower Threat Defense systems
ENWLSD: Designing Cisco Enterprise Wireless Networks
Course Description: Designing Cisco Enterprise Wireless Networks Gain the knowledge …
What you'll learn
Describe and implement a Cisco-recommended structured design methodology
Describe and implement industry standards, amendments, certifications, and Requests For Comments (RFCs)
Describe and implement Cisco enhanced wireless features
Describe and implement the wireless design process
Describe and implement specific vertical designs
Describe and implement site survey processes
Describe and implement network validation processes
ENSLD: Designing Cisco Enterprise Networks
Course Description: In this 5-day course, Designing Cisco Enterprise Networks …
What you'll learn
Design EIGRP internal routing for the enterprise network
Design OSPF internal routing for the enterprise network
Design IS-IS internal routing for the enterprise network
Design a network based on customer requirements
Design BGP routing for the enterprise network
Describe the different types and uses of MP-BGP address families
Describe BGP load sharing
Design a BGP network based on customer requirements
Decide where L2/L3 boundary will be in your Campus network and make design decisions
Describe layer 2 design considerations for Enterprise Campus networks
Design a LAN network based on customer requirements
Describe layer 3 design considerations in an Enterprise Campus network
Examine Cisco SD-Access fundamental concepts
Describe Cisco SD-Access Fabric Design
Design an SD-Access Campus Fabric based on customer requirements
Design service provider-managed VPNs
Design enterprise-managed VPNs
Design a resilient WAN
Design a resilient WAN network based on customer requirements
Examine the Cisco SD-WAN architecture
Describe Cisco SD-WAN deployment options
Design Cisco SD-WAN redundancy
Explain the basic principles of QoS
Design QoS for the WAN
Design QoS for enterprise network based on customer requirements
Explain the basic principles of multicast
Designing rendezvous point distribution solutions
Describe high-level considerations when doing IP addressing design
Create an IPv6 addressing plan
Plan an IPv6 deployment in an existing enterprise IPv4 network
Describe the challenges that you might encounter when transitioning to IPv6
Design an IPv6 addressing plan based on customer requirements
Describe Network APIs and protocols
Describe YANG, NETCONF and RESTCON