Course Name |
Hours |
List Price |
Content |
Implementing Automation for Cisco Collaboration Solutions (CLAUI) |
21.00 |
$3,000.00 |
|
Description: In this course you will cover how to implement Cisco Collaboration automated, programmable solutions for voice, video, collaboration, and conferencing on-premises or in the cloud. Through a combination of lessons and hands-on labs, you will combine tools and processes to tackle communication challenges using key platforms including Cisco Unified Communications Manager, Cisco IP Phone Services, Cisco Unity Connection, Cisco Finesse, Cisco Collaboration Endpoints, Cisco Webex Teams, and Cisco Webex Meetings. You will also learn how to use Application Programming Interfaces (APIs) interfaces such as Representational State Transfer (REST) and Simple Object Access Protocol (SOAP), parsing data in Extensible Markup Language (XML) and JavaScript Object Notation (JSON) formats, and leverage frameworks such as Python.
This course prepares you for the 300-835 Automating and Programming Cisco Collaboration Solutions (CLAUTO) certification exam.
# of Days:
Setting:
|
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) |
35.00 |
$4,295.00 |
|
Description: Defining the Security Operations Center Understanding Network Infrastructure and Network Security Monitoring Tools Exploring Data Type Categories Understanding Basic Cryptography Concepts Understanding Common TCP/IP Attacks Understanding Endpoint Security Technologies Understanding Incident Analysis in a Threat-Centric SOC Identifying Resources for Hunting Cyber Threats Understanding Event Correlation and Normalization Identifying Common Attack Vectors Identifying Malicious Activity Identifying Patterns of Suspicious Behavior Conducting Security Incident Investigations Using a Playbook Model to Organize Security Monitoring Understanding SOC Metrics Understanding SOC Workflow and Automation Describing Incident Response Understanding the Use of VERIS Understanding Windows Operating System Basics Understanding Linux Operating System Basics Lab outline Use NSM Tools to Analyze Data Categories Explore Cryptographic Technologies Explore TCP/IP Attacks Explore Endpoint Security Investigate Hacker Methodology Hunt Malicious Traffic Correlate Event Logs, Packet Captures (PCAPs), and Alerts of an Attack Investigate Browser-Based Attacks Analyze Suspicious Domain Name System (DNS) Activity Explore Security Data for Analysis Investigate Suspicious Activity Using Security Onion Investigate Advanced Persistent Threats Explore SOC Playbooks Explore the Windows Operating System Explore the Linux Operating System.
# of Days:
Setting:
|
Implementing and Operating Cisco Security Core Technologies (SCOR) |
35.00 |
$4,295.00 |
|
Description: In this course, Implementing and Operating Cisco Security Core Technologies (SCOR), students will master the skills and technologies needed to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. Students will learn security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements. They will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. Students will also get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features.
|
Implementing Automation for Cisco Collaboration Solutions (CLAUI) |
21.00 |
$3,000.00 |
|
Description: In this course you will cover how to implement Cisco Collaboration automated, programmable solutions for voice, video, collaboration, and conferencing on-premises or in the cloud. Through a combination of lessons and hands-on labs, you will combine tools and processes to tackle communication challenges using key platforms including Cisco Unified Communications Manager, Cisco IP Phone Services, Cisco Unity Connection, Cisco Finesse, Cisco Collaboration Endpoints, Cisco Webex Teams, and Cisco Webex Meetings. You will also learn how to use Application Programming Interfaces (APIs) interfaces such as Representational State Transfer (REST) and Simple Object Access Protocol (SOAP), parsing data in Extensible Markup Language (XML) and JavaScript Object Notation (JSON) formats, and leverage frameworks such as Python.
This course prepares you for the 300-835 Automating and Programming Cisco Collaboration Solutions (CLAUTO) certification exam.
|
Securing Email with Cisco Email Security Appliance (SESA) |
21.00 |
$2,750.00 |
|
Description: Securing Email with Cisco Email Security Appliance (SESA) combines Parts 1 and 2 (SESA1, SESA2) into a single, three-day course. Students who take this SESA training learn to use Cisco Email Security Appliances (ESAs) to manage and troubleshoot email in their networks. Attendees of this SESA course receive in-depth instruction on popular features, emphasizing topics listed below, learn advanced Internet email concepts and receive an overview of how to customize configurations. SESA also teaches advanced configuration and operation of the Cisco ESA (Formerly Cisco IronPort Email Security Appliance). Extensive lab exercises provide critical hands-on experience with advanced features of the ESA. Learn more about Cisco Security training and recommended prerequisites below.
|
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) |
35.00 |
$4,295.00 |
|
Description: Defining the Security Operations Center Understanding Network Infrastructure and Network Security Monitoring Tools Exploring Data Type Categories Understanding Basic Cryptography Concepts Understanding Common TCP/IP Attacks Understanding Endpoint Security Technologies Understanding Incident Analysis in a Threat-Centric SOC Identifying Resources for Hunting Cyber Threats Understanding Event Correlation and Normalization Identifying Common Attack Vectors Identifying Malicious Activity Identifying Patterns of Suspicious Behavior Conducting Security Incident Investigations Using a Playbook Model to Organize Security Monitoring Understanding SOC Metrics Understanding SOC Workflow and Automation Describing Incident Response Understanding the Use of VERIS Understanding Windows Operating System Basics Understanding Linux Operating System Basics Lab outline Use NSM Tools to Analyze Data Categories Explore Cryptographic Technologies Explore TCP/IP Attacks Explore Endpoint Security Investigate Hacker Methodology Hunt Malicious Traffic Correlate Event Logs, Packet Captures (PCAPs), and Alerts of an Attack Investigate Browser-Based Attacks Analyze Suspicious Domain Name System (DNS) Activity Explore Security Data for Analysis Investigate Suspicious Activity Using Security Onion Investigate Advanced Persistent Threats Explore SOC Playbooks Explore the Windows Operating System Explore the Linux Operating System.
|