Onderwerp
Automatisering & ICT/IT
Communicatie
Financieel
HR
Inkoop & logistiek
Management
Secretarieel & Administratief
Marketing
Opleiding & Onderwijs
Persoonlijke Effectiviteit
Productie, techniek & bouw
Kwaliteit- & Projectmanagement
Sales
Vitaliteit & Gezondheid
Taalcursus
Zorg & Verzorging
Juridisch
Internet & Media
Arbo & Veiligheid
Hobby & Vrije Tijd
Vastgoed & Makelaardij
Abonnementen
Locatie
Niveau
Type
Keurmerk

Opleidingen

58.382 resultaten

Implementing Secure Solutions with Virtual Private Networks (SVPN) - CPLL [SVPN-CPLL]

OVERVIEW The Implementing Secure Solutions with Virtual Private Networks (SVPN) course teaches you how to implement, configure, monitor, and support enterprise Virtual Private Network (VPN) solutions. Through a combination of lessons and hands-on experiences you will acquire the knowledge and skills to deploy and troubleshoot traditional Internet Protocol Security (IPsec), Dynamic Multipoint Virtual Private Network (DMVPN), FlexVPN, and remote access VPN to create secure and encrypted data, remote accessibility, and increased privacy. This course is worth 40 Continuing Education (CE) Credits OBJECTIVES After completing this course you should be able to: Introduce site-to-site VPN options available on Cisco router and firewalls Introduce remote access VPN options available on Cisco router and firewalls Review site-to-site and remote access VPN design options Review troubleshooting processes for various VPN options available on Cisco router and firewalls   CONTENT Introducing VPN Technology Fundamentals Role of VPNs in Network Security VPNs and Cryptography Implementing Site-to-Site VPN Solutions Site-to-Site VPN Solutions Overview Cisco IOS VPN Point-to-Point Solutions Cisco ASA VPN Point-to-Point Solutions Cisco IOS VTI Point-to-Point Solutions Cisco DMVPN Solutions Implementing Cisco Internetwork Operating System (Cisco IOS®) Site-to-Site FlexVPN Solutions Overview of the Cisco FlexVPN Solution Point-to-Point FlexVPN Hub-and-Spoke FlexVPN Spoke-to-Spoke FlexVPN Implement Cisco IOS Group Encrypted Transport (GET) VPN Solutions Overview of Cisco GET VPN Solution Configure GET VPN Implementing Cisco AnyConnect VPNs Remote Access Overview Design Remote Access Solutions Basic Cisco AnyConnect VPN on Cisco ASA Advanced Cisco AnyConnect TLS VPN on Cisco ASA Advanced AAA in Cisco AnyConnect VPNs Cisco AnyConnect IKEv2 VPNs Implementing Clientless VPNs Remote Access Overview Design Remote Access Solutions Clientless TLS VPN Overview Basic Cisco AnyConnect TLS VPN on Cisco ASA Application Access in Cisco ASA Clientless VPN Advanced AAA in Clientless VPN Labs Discovery Lab 1: Explore IPsec Technologies Discovery Lab 2: Implement and Verify Cisco IOS Point-to-Point VPN Discovery Lab 3: Implement and Verify Cisco ASA Point-to-Point VPN Discovery Lab 4: Implement and Verify Cisco IOS VTI VPN Discovery Lab 5: Implement and Verify DMVPN Discovery Lab 6: Troubleshoot DMVPN Discovery Lab 7: Implement and Verify FlexVPN with Smart Defaults Discovery Lab 8: Implement and Verify Point-to-Point FlexVPN Discovery Lab 9: Implement and Verify Hub and Spoke FlexVPN Discovery Lab 10: Implement and Verify Spoke-to-Spoke FlexVPN Discovery Lab 11: Troubleshoot Cisco IOS FlexVPN Discovery Lab 12: Implement and Verify AnyConnect TLS VPN on ASA Discovery Lab 13: Implement and Verify AAA on AnyConnect VPN Discovery Lab 14: Implement and Verify Clientless VPN on ASA
€455
E-Learning

Securing the Web with Cisco Web Security Appliance - CPLL [SWSA-CPLL]

OVERVIEW The Securing the Web with Cisco Web Security Appliance (SWSA) course shows you how to implement, use, and maintain Cisco® Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you’ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution’s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. This course is worth 16 Continuing Education (CE) Credits OBJECTIVES After completing this course you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting CONTENT Cisco WSA Overview Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Proxy Services Explicit Forward Mode vs.Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol WCCP Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Cisco WSA Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface Decryption Policies Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Labs: Discovery Lab 1: Configure the Cisco Web Security Appliance Discovery Lab 2: Configure Proxy Authentication Discovery Lab 3: Configure Reporting Services and Web Tracking Discovery Lab 4: Configure the Cisco Secure Emial and Web Manager for Tracking and Reporting Discovery Lab 5: Configure HTTPS Inspection Discovery Lab 6: Create and Enforce a Time/Date-Based Acceptable Use Policy Discovery Lab 7: Configure Advanced Malware Protection Discovery Lab 8: Configure Referrer Header Exceptions Discovery Lab 9: Utilize Third-Party Security Feeds and MS Office 365 External Feed Discovery Lab 10: Validate an Intermediate Certificate
€455
E-Learning

Fundamentals of IBM Spectrum Protect [TS101DG]

OVERVIEW The IBM Spectrum Protect (formerly Tivoli Storage Manager or TSM) suite of products includes the Spectrum Protect Server and many add-on products and components for providing enterprise class data protection and disaster recovery. In this Fundamentals of Spectrum Protect course we provide a simple, easy-to-understand introduction to many of the components and technologies associated with Spectrum Protect along with a series  of videos to help better understand the content. OBJECTIVES After this course participants should be able to: Understand the core data storage and protection concepts that IBM Spectrum Protect is based on Navigate the main IBM Spectrum Protect command line and GUI interfaces Perform basic data backups and differentiate between backup types, such as incremental backups and complete backups CONTENT Unit 1: Concepts and Components Unit 2: User Interface Introduction Exercise Part 1: Administrative Command Line Exercise 1 Basic Queries Exercise 2 Use the help command Exercise 3 Start a Console Mode window for monitoring Exercise 4 Open the administrative command line using the dsmadmc command Exercise Part 2: Operations Center Exercise 5 Navigating the Operations Center Exercise 6 Use the Operations Center Command Builder Exercise Part 3: Backup-archive client Exercise 7 Backup-archive command line introduction Exercise 8 Backup-archive GUI introduction Exercise 9 Examine current options in the backup-archive GUI Exercise 10 Restore and replace files Exercise 11 Archive selected files Exercise 12 Retrieve files from archive Unit 3: Daily Operations Exercise 1 Perform an incremental, complete backup Exercise 2 Perform a selective backup with client-side compression Exercise 3 Send archive data to the storage pools Exercise 4 Define a container storage pool Exercise 5 Change policy to send backup data to container storage pool  Exercise 6 Back up files to DEDUPCONTAINER using inline deduplication  Exercise 7 Perform storage pool backup Exercise 8 Perform a database backup Exercise 9 Review the configuration of the database and recovery log Exercise 10 Back up the database again using multiple streams and compression Exercise 11 Initiate a storage pool migration Exercise 12 Review the maintenance tasks in the Operations Center Unit 4: Reporting and Monitoring Exercise 1 Review security notification Exercise 2 Configure a mail server for reports Exercise 3 Review the default reports Exercise 4 Create a new report and work with report templates Exercise 5 Review and assign alerts in the Operations Center Exercise 6 Review the default maintenance tasks in the Operations Center Exercise 7 Use the Operations Center to review the completed maintenance
€990
E-Learning

Understanding Cisco Wireless Foundations [WLFNDU-CPLL]

OVERVIEW The Understanding Cisco Wireless Foundations (WLFNDU) v1.0 course gives you the knowledge and skills you need to position, plan, implement, operate, and manage a Cisco Wirless LAN network. This course teaches you how to  design, install, configure, monitor, and conduct basic troubleshooting tasks on a Cisco WLAN network of any size. This course will help you to learn the skills, technologies and best practices needed to manage a Cisco WLAN network, to understand and implement a Cisco wireless network architecture, and to design and implement WLAN maintenance and troubleshooting solutions. OBJECTIVES After Completing this course, you should be able to: Describe and implement foundational wireless theory Describe and implement basic wireless security and client access Describe and implement a Cisco wireless network architecture Configure Cisco centralized wireless networks Describe and implement WLAN maintenance and troubleshooting CONTENT Describing and Implementing Foundational Wireless Theory Describing and Implementing Foundational Wireless Math and Antennas Describing and Implementing Foundational Wireless Operation Describing and Implementing Basic Wireless Security Describing and Implementing 802.1X and EAP Implementing Wireless Guest Access and Configuring Wireless Security Describing and Implementing Cisco Wireless Network Architecture Describing and Implementing Cisco Wireless Network Describing and Implementing Cisco Wireless Network Wired Support Configuring Cisco Centralized Wireless Networks  Labs: Explore the Physics of Wi-Fi Explore the Wi-Fi Environment Analyze Wireless Frames Configure Client Access Configure the Wired Infrastructure Configure a Centralized Cisco WLC Deployment Configure a Centralized WLAN Deployment Configure an IPv6 Operation in a Centralized WLAN Deployment Optimize RF Conditions and Performance for Clients Perform Centralized Controller Maintenance Use Troubleshooting Tools
€730
E-Learning

WebSphere Application Server V9 Administration [ZA590G]

OVERVIEW This course teaches you the skills that are needed to administer IBM WebSphere Application Server V9. This release of IBM WebSphere Application Server provides enhanced support for standards (notably Java 7 EE), emerging technology, and a choice of development frameworks. In this course, you learn how to configure and maintain IBM WebSphere Application Server V9 in a single-server environment. You learn how to deploy enterprise Java applications in a single computer configuration. In addition, you learn how to work with features of WebSphere Application Server V9, such as the wsadmin scripting interface, security, and performance monitoring. Hands-on exercises throughout the course give you practical experience with the skills you develop in the lectures. OBJECTIVES After completing this course, you should be able to: Relate WebSphere Application Server to the WebSphere family of products Describe the features and standards in WebSphere Application Server V9 Describe the use of WebSphere Application Server in cloud, hybrid cloud, and on-premises environments Describe the architectural concepts that are related to WebSphere Application Server Assemble and install server-side Java enterprise applications Use WebSphere administrative tools to configure and manage enterprise applications Use wsadmin scripting Configure WebSphere Application Server security View performance information about server and application components Troubleshoot problems by using problem determination tools and log files       CONTENT Course introduction WebSphere product family overview WebSphere Application Server architecture WebSphere Application Server administrative console Introduction to the PlantsByWebSphere application Application assembly Application installation Problem determination Introduction to wsadmin and scripting WebSphere security Performance monitoring Course summary Exercises Exercise 1: Profile creation Exercise 2: Exploring the administrative console Exercise 3: Assembling an application Exercise 4: Installing an application Exercise 5: Problem determination Exercise 6: Using wsadmin Exercise 7: Configuring WebSphere Application Server security Exercise 8: Configuring application security Exercise 9: Using the performance monitoring tools
€1.150
E-Learning

WebSphere Application Server V9 Administration in a Federated Environment [ZA599G]

OVERVIEW This course teaches you the skills that are needed to administer IBM WebSphere Application Server V9 in a federated environment. This release of IBM WebSphere Application Server provides enhanced support for standards (notably Java 7 EE), emerging technology, and a choice of development frameworks. In this course, you learn how to configure and maintain IBM WebSphere Application Server V9 Network Deployment. You learn how to deploy and create a deployment manager and federate a cell. In addition, you learn how to create a cluster within the federated cell. Throughout the course, hands-on exercises and demonstrations reinforce lecture content. You gain practical experience with WebSphere Application Server V9 by completing tasks such as creating a deployment manager, federating a stand-alone application server, creating a custom profile, and clustering an existing application server.   OBJECTIVES Course introduction WebSphere Application Server architecture: Federated Federating a cell Exercise: Configuring the lab workstation Exercise: Creating a federated cell Workload management Exercise: Clustering and workload management WebSphere security: SSL Exercise: Configuring SSL for WebSphere Overview of Intelligent Management Course summary CONTENT After completing this course, you should be able to: Describe the architectural concepts that are related to WebSphere Application Server Network Deployment Create a deployment manager instance Federate an application server to a cell Add a stand-alone application server to a WebSphere Application Server cell Cluster an application server within a WebSphere Application Server cell Configure WebSphere Application Server SSL security settings Deploy applications in clustered environments Describe the features of Intelligent Management
€810
E-Learning

IBM WebSphere Application Server V8.5.5 Administration [ZA855G]

OVERVIEW This 5-day instructor-led course teaches you the skills that are needed to install and administer IBM WebSphere Application Server V8.5.5. This release offers users enhanced support for standards, emerging technology, and a choice of development frameworks. In this course, you learn how to install, configure, and maintain IBM WebSphere Application Server V8.5.5 base, Network Deployment (ND), and the Liberty profile. You learn how to deploy enterprise Java applications in a single computer or clustered configuration. In addition, you learn how to work with features of WebSphere Application Server V8.5.5, such as IBM Installation Manager, WebSphere Customization Toolbox, security enhancements, Intelligent Management, and centralized installation. Throughout the course, hands-on exercises and demonstrations reinforce lecture content and give you practical experience with WebSphere Application Server V8.5.5. You complete tasks such as installing and assembling applications, applying problem determination techniques, configuring a clustered environment, and working with fine-grained administrative security. OBJECTIVES Course introduction WebSphere product family overview WebSphere Application Server architecture - stand-alone WebSphere Application Server architecture - federated IBM Installation Manager WebSphere Application Server installation Web server installation Exercise: Installing IBM Installation Manager Exercise: Installing WebSphere Application Server Exercise: Installing IBM HTTP Server WebSphere Application Server administrative console Exercise: Exploring the administrative console Introduction to the PlantsByWebSphere application Application assembly Exercise: Assembling an application Application installation Exercise: Installing an application Problem determination Exercise: Problem determination Introduction to wsadmin and scripting Exercise: Using wsadmin Federating a cell Exercise: Creating a federated cell Workload management Exercise: Clustering and workload management Introduction to WebSphere Messaging Exercise: Configuring the service integration bus Job manager and Centralized Installation Manager Demonstration: Using the job manager Overview of Intelligent Management WebSphere security Exercise: Configuring WebSphere security Exercise: Configuring application security Exercise: Configuring SSL for WebSphere Overview of the Liberty profile Exercise: Working with the Liberty profile Performance monitoring Exercise: Using the performance monitoring tools WebSphere Batch Course summary CONTENT Relate WebSphere Application Server to the WebSphere family of products Describe the features and standards in WebSphere Application Server V8.5.5 Describe the architectural concepts that are related to WebSphere Application Server Install and configure WebSphere Application Server V8.5.5 Install and configure IBM HTTP Server (IHS) Assemble and install server-side Java enterprise applications Use WebSphere administrative tools to configure and manage enterprise applications Use wsadmin scripting Configure WebSphere Application Server security Deploy applications in clustered environments View performance information about server and application components Use problem determination tools and log files to troubleshoot problems Configure messaging with the service integration bus Describe Intelligent Management features Describe WebSphere Batch features Describe the Liberty profile Install and configure the Liberty profile
€2.000
E-Learning

IBM MQ V9 System Administration (using Windows for labs) [ZM153G]

OVERVIEW This course provides technical professionals with the skills that are needed to administer IBM MQ queue managers on distributed operating systems and in the Cloud. In addition to the instructor-led lectures, you participate in hands-on lab exercises that are designed to reinforce lecture content.  The lab exercises use IBM MQ V9.0, giving you practical experience with tasks such as handling queue recovery, implementing security, and problem determination. Note: This course does not cover any of the features of MQ for z/OS or MQ for IBM i. For information about other related courses, see the IBM Training website:http://www.ibm.com/training If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms OBJECTIVES After completing this course, you should be able to: Describe the IBM MQ deployment options Plan for the implementation of IBM MQ on-premises or in the Cloud Use IBM MQ commands and the IBM MQ Explorer to create and manage queue managers, queues, and channels Use the IBM MQ sample programs and utilities to test the IBM MQ network Enable a queue manager to exchange messages with another queue manager Configure client connections to a queue manager Use a trigger message and a trigger monitor to start an application to process messages Implement basic queue manager restart and recovery procedures Use IBM MQ troubleshooting tools to identify the cause of a problem in the IBM MQ network Plan for and implement basic IBM MQ security features Use accounting and statistics messages to monitor the activities of an IBM MQ system Define and administer a simple queue manager cluster CONTENT Course introduction IBM MQ review IBM MQ installation and deployment options Creating a queue manager and queues Exercise: Using commands to create a queue manager and queues Introduction to IBM MQ Explorer Exercise: Using IBM MQ Explorer to create queue managers and queues Testing the IBM MQ implementation Exercise: Using IBM MQ sample programs to test the configuration Implementing distributed queuing Exercise: Connecting queue managers IBM MQ clients Exercise: Connecting an IBM MQ client Implementing trigger messages and monitors Exercise: Implementing a trigger monitor Diagnosing problems Exercise: Running an IBM MQ trace Implementing basic security in IBM MQ Exercise: Controlling access to IBM MQ Backing up and restoring IBM MQ messages and object definitions Exercise: Using a media image to restore a queue Exercise: Backing up and restoring IBM MQ object definitions Introduction to queue manager clusters Exercise: Implementing a basic cluster Monitoring and configuring IBM MQ for performance Exercise: Monitoring IBM MQ for performance Course summary
€1.670
E-Learning

IBM MQ V9.1 System Administration [ZM156G]

OVERVIEW This course is also available as classroom course IBM MQ V9.1 System Administration (WM156G). This course teaches you how to customize, operate, administer, and monitor IBM MQ on-premises on distributed operating systems. The course covers configuration, day-to-day administration, problem recovery, security management, and performance monitoring. In addition to the recorded lectures, the hands-on exercises provide practical experience with distributed queuing, working with MQ clients, and implementing clusters, publish/subscribe messaging. You also learn how to implement authorization, authentication, and encryption, and you learn how to monitor performance.  Note: This course does not cover any of the features of MQ for z/OS or MQ for IBM i. OBJECTIVES After completing this course, you should be able to: Describe the IBM MQ deployment options Create and manage queue managers, queues, and channels Use the IBM MQ sample programs and utilities to test the IBM MQ network Configure distributed queuing Configure MQ client connections to a queue manager Define and administer a queue manager cluster Administer Java Message Service (JMS) in MQ Implement basic queue manager restart and recovery procedures Use IBM MQ troubleshooting tools to identify the cause of a problem in the IBM MQ network Manage IBM MQ security Monitor the activities and performance of an IBM MQ system CONTENT
€2.000
E-Learning

IBM MQ V9 Advanced System Administration (Distributed) [ZM213G]

OVERVIEW This course is also available as classroom course IBM MQ V9 Advanced System Administration (Distributed) (WM213G). This course expands the basic skill sets that are developed in courses WM103/ZM103, Technical Introduction to IBM MQ, and WM153/ZM153, IBM MQ V9 System Administration (using Windows for labs) or WM154, IBM MQ V9 System Administration (using Linux for labs). The course focuses on advanced features of IBM MQ, such as implementing workload management by using a queue manager cluster, and authenticating connections, channels, and users. It also covers securing channels with Transport Layer Security (TLS), advanced client connection features, event and message monitoring, and publish/subscribe administration. In addition to the instructor-led lectures, you participate in hands-on lab exercises that reinforce lecture content. The lab exercises give you practical experience with tasks such as implementing security, configuring workload management for a queue manager cluster, and advanced troubleshooting techniques. Completing this course can also help you prepare for the appropriate IBM MQ Administrator certifications. For information about other related courses, see the IBM Training website:ibm.com/training OBJECTIVES After this course participants should be able to: Use conversation sharing, read-ahead, and asynchronous put to improve the performance of MQI client connections Use Transport Layer Security (TLS) to secure TCP/IP channels Authenticate IBM MQ channels, connections, and users Manage the workload in an IBM MQ queue manager cluster Implement IBM MQ high availability Monitor application activity, events, and messages Use the IBM MQ dead-letter queue message handler to manage a dead-letter queue Administer distributed publish/subscribe networks Use the IBM MQ Console to administer IBM MQ objects and resource usage Administer Java Message Service (JMS) in MQ CONTENT Course introduction Managing clients and client connections Securing IBM MQ channels with TLS Exercise: Securing channels with TLS Authenticating channels and connections Exercise: Implementing connection authentication Implementing workload management in an IBM MQ cluster Exercise: Implementing workload management in a cluster More troubleshooting tools and techniques Exercise: Tracing message routes Exercise: Handling messages on the dead-letter queue High availability Introduction to distributed publish/subscribe Exercise: Configuring distributed publish/subscribe Supporting JMS with IBM MQ Introduction to the IBM MQ Console Exercise: Getting started with the IBM MQ Console Course summary
€1.670
E-Learning