Tenable Enterprise Product Training

Size: px
Start display at page:

Download "Tenable Enterprise Product Training"

Transcription

1 Tenable Enterprise Product Training

2 Tenable Unified Security Monitoring for Analysts (5MD) This hands-on instructor led course provides security analysts with the skills and knowledge necessary to discover and report relevant information using the complete suite of Tenable products. Participants will learn to initiate active scans, evaluate vulnerabilities, monitor system compliance, analyze event trends and anomalies and customize reports to detail their findings. These techniques are intended to facilitate an organization's information assurance efforts through implementation of the Unified Security Monitoring strategy. IT Security Analysts that currently (or plan to) use Tenable SecurityCenter to perform security monitoring and vulnerability scanning of their networks. Introduction to Tenable's Unified Security Monitoring Approach Using Tenable's Online Resources Understanding Event, Vulnerability and Compliance Data The SecurityCenter User Interface Vulnerability and Compliance Scan Automation Data Analysis and Queries Workflow - Alerting and Ticketing The SecurityCenter Dashboard Custom Reporting This course provides security professionals with the necessary information to prepare for the Tenable Certified Security Analyst (TCSA) exam. Separate per exam attempt charge involved, please ask. Students should possess a basic understanding of TCP/IP networking, operating systems security and common client/server applications. Students should possess a basic understanding of TCP/IP networking, operating systems security and common client/server applications. Related Coursework Tenable SecurityCenter users that wish to get more advanced knowledge on creating custom scan policies and.audit policies should also attend Tenable Nessus Vulnerability & Compliance Auditing.

3 Tenable Unified Security Monitoring for Managers (5MD) This hands-on instructor led course provides security managers with the skills and knowledge necessary to effectively plan and implement an organizational structure using the complete suite of Tenable Network Security products. Participants will learn the building blocks of SecurityCenter management, evaluate role-based responsibilities within a security organization, organize systems and network segments into logical groups, construct a hypothetical organization optimized to monitor system security and compliance, analyze event trends and anomalies, and customize reports to detail findings. These techniques are intended to facilitate effective management, oversight and delegation of duties within a security organization. IT Security Managers that currently (or plan to) use Tenable SecurityCenter to perform security monitoring and vulnerability scanning of their networks. Introduction to Tenable's Unified Security Monitoring Approach Understanding the SecurityCenter Structure Planning the Organizational Structure Asset Management Account Management - Roles and Access Information Management Workflow - Alerting and Ticketing SecurityCenter Dashboard Custom Reporting This course provides security professionals with the necessary information to prepare for the Tenable Certified Security Manager (TCSM) exam. Separate per exam attempt charge involved, please ask. Students should possess a basic understanding of standard security best practices and their internal security and compliance policies. Students should have a basic understanding of TCP/IP networking, operating systems security and common client/server applications.

4 Tenable Unified Security Monitoring for Administrators (5MD) This course is designed to prepare system administrators of the Tenable Unified Security Monitoring solution to optimally plan and deliver a physical deployment of the Tenable Unified Security Monitoring components. This hands-on instructor led course allows administrators to walk through a physical deployment in a lab environment while receiving detailed explanations of the technologies involved with each component. This includes command line installation and both command line and GUI configuration of Tenable SecurityCenter, Tenable Nessus, the Tenable Log Correlation Engine (LCE) and the Tenable Passive Vulnerability Scanner (PVS). IT Security Administrators that currently (or plan to) deploy and maintain Tenable's Enterprise security products (SecurityCenter, Log Correlation Engine, Passive Vulnerability Scanner and Nessus) within their organization. Introduction to Tenable's Unified Security Monitoring Approach Pre-installation Planning Software Installation Organizational Planning and Data Management SecurityCenter User Interface Scan Zones Repositories Organizations LCE PVS Maintenance and Upgrades This course provides security professionals with the necessary information to prepare for the Tenable Certified Product Administrator (TCPA) exam. Separate per exam attempt charge involved, please ask. Students should have experience with Unix/Linux command line administration and common TCP/IP network protocols. Students should possess a basic understanding of TCP/IP networking, operating systems security and common client/server applications.

5 Tenable Nessus Vulnerability and Compliance Auditing (5MD) This instructor-led or On Demand hands-on course provides security professionals with the skills and knowledge necessary to perform vulnerability and compliance scanning of supported operating systems, devices and applications. Students will construct custom scan policies for topology discovery, network vulnerability detection, credentialed patch audits and compliance benchmarks and discuss the underlying technologies utilized by the Nessus scanner. IT security analysts, security consultants or auditors that wish to use all of the features available as part of the Nessus ProfessionalFeed. Tenable SecurityCenter users that wish to gain an in depth understanding of Tenable Nessus vulnerability scanning and how to create custom scan policies and.audit files to perform configuration auditing. Introduction to Tenable Nessus and Vulnerability Scanning Nessus Installation and Administration Basic Nessus Scan Operation Nessus Scan Configuration and Policy Creation Vulnerability Analysis and Reporting with Nessus Advanced Scan Configuration and Policy Creation Introduction to Compliance and Auditing Nessus Auditing Features Windows System Auditing Unix System Auditing Cisco IOS Auditing Nessus Database Auditing Nessus Content Auditing Auditing to Industry Guidelines Auditing to Federal Guidelines This course provides students with the necessary information to prepare for the Tenable Certified Nessus Auditor (TCNA) exam. Separate per exam attempt charge involved, please ask. Students should possess a basic understanding of TCP/IP networking, operating systems security and common client/server applications. Students should have administrative access to their laptop and possess a basic understanding of TCP/IP networking, operating systems security and common client/server applications.

6

eeye Digital Security Product Training

eeye Digital Security Product Training eeye Digital Security Product Training Retina CS for System Administration (4MD) This hands-on instructor led course provides security system administration/analysts with the skills and knowledge necessary

More information

VULNERABILITY MANAGEMENT

VULNERABILITY MANAGEMENT Vulnerability Management (VM) software differ in the richness of reporting, and the capabilities for application and security configuration assessment. Companies must consider how a VM technology will

More information

June 19, 2012. (Revision 1)

June 19, 2012. (Revision 1) Boosting Your Network Defenses with Tenable s Integral Attack Path Analytics June 19, 2012 (Revision 1) Copyright 2002-2012 Tenable Network Security, Inc. Tenable Network Security, Nessus and ProfessionalFeed

More information

WHITEPAPER. Nessus Exploit Integration

WHITEPAPER. Nessus Exploit Integration Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information

More information

Unified Security Monitoring Best Practices

Unified Security Monitoring Best Practices Unified Security Monitoring Best Practices This white paper outlines several best practices when deploying and optimizing a USM platform to perform security and compliance monitoring for enterprise networks.

More information

June 8, 2011. (Revision 1)

June 8, 2011. (Revision 1) Unified Security Monitoring Best Practices June 8, 2011 (Revision 1) Copyright 2011. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of

More information

February 22, 2011. (Revision 2)

February 22, 2011. (Revision 2) Real-Time Massachusetts Data Security Law Monitoring Leveraging Asset-Based Configuration and Vulnerability Analysis with Real-Time Event Management February 22, 2011 (Revision 2) Copyright 2011. Tenable

More information

Patch Management Integration

Patch Management Integration Patch Management Integration January 10, 2012 (Revision 5) Copyright 2002-2012 Tenable Network Security, Inc. Tenable Network Security, Nessus and ProfessionalFeed are registered trademarks of Tenable

More information

Using the Tenable Solution to Audit and Protect Firewalls, Routers, and Other Network Devices May 14, 2013 (Revision 1)

Using the Tenable Solution to Audit and Protect Firewalls, Routers, and Other Network Devices May 14, 2013 (Revision 1) Network Infrastructure Is Not Immune Using the Tenable Solution to Audit and Protect Firewalls, Routers, and Other Network Devices May 14, 2013 (Revision 1) Table of Contents Executive Summary... 3 Network

More information

April 11, 2011. (Revision 2)

April 11, 2011. (Revision 2) Passive Vulnerability Scanning Overview April 11, 2011 (Revision 2) Copyright 2011. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of

More information

Protecting Critical Infrastructure

Protecting Critical Infrastructure Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security

More information

Designing and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led

Designing and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led Designing and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led Course Description Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows

More information

September 2, 2010. (Revision 3)

September 2, 2010. (Revision 3) Web Application Scanning with Nessus Detecting Web Application Vulnerabilities and Environmental Weaknesses September 2, 2010 (Revision 3) Brian Martin Nessus SME Carole Fennelly Director, Content & Documentation

More information

SecurityCenter 4.4 Architecture

SecurityCenter 4.4 Architecture SecurityCenter 4.4 Architecture September 21, 2012 (Revision 2) The newest version of this document is available at the following URL: http://static.tenable.com/prod_docs/securitycenter_4.4_architecture.pdf

More information

Continuous Network Monitoring

Continuous Network Monitoring Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment

More information

Nessus and Mobile Device Scanning. November 7, 2014 (Revision 12)

Nessus and Mobile Device Scanning. November 7, 2014 (Revision 12) Nessus and Mobile Device Scanning November 7, 2014 (Revision 12) Table of Contents Introduction... 3 Standards and Conventions... 3 Overview... 3 Scanning for Mobile Devices with Nessus... 4 Creating a

More information

Tenable Network Security Support Portal. January 12, 2015 (Revision 14)

Tenable Network Security Support Portal. January 12, 2015 (Revision 14) Tenable Network Security Support Portal January 12, 2015 (Revision 14) Table of Contents Introduction... 3 Activate Tenable Support Portal... 3 Locate Your Customer ID... 6 Manage Your Activation Codes...

More information

3D Tool 2.0 Quick Start Guide

3D Tool 2.0 Quick Start Guide www.tenable.com sales@tenable.com 3D Tool 2.0 Quick Start Guide ABOUT THE 3D TOOL Tenable s 3D Tool is a Windows application that is used to query data from a SecurityCenter 4 server and present it in

More information

SecurityCenter 4.2 Administration Guide

SecurityCenter 4.2 Administration Guide SecurityCenter 4.2 Administration Guide January 24, 2012 (Revision 5) The newest version of this document is available at the following URL: http://static.tenable.com/prod_docs/securitycenter_4.2_admin_guide.pdf

More information

Outcome Based Security Monitoring in a Continuous Monitoring World

Outcome Based Security Monitoring in a Continuous Monitoring World Outcome Based Security Monitoring in a Continuous Monitoring World December 2012 Ron Gula Chief Executive Officer / Chief Technology Officer White Paper Copyright 2002-2012 Tenable Network Security, Inc.

More information

January 4, 2011. (Revision 1) The newest version of this document is available at the following URL: http://cgi.tenable.com/lce_3.6_stats.

January 4, 2011. (Revision 1) The newest version of this document is available at the following URL: http://cgi.tenable.com/lce_3.6_stats. Log Correlation Engine 3.6 Statistics Daemon Guide January 4, 2011 (Revision 1) The newest version of this document is available at the following URL: http://cgi.tenable.com/lce_3.6_stats.pdf Copyright

More information

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust

More information

24/7 Visibility into Advanced Malware on Networks and Endpoints

24/7 Visibility into Advanced Malware on Networks and Endpoints WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction

More information

20413C: Designing and Implementing a Server Infrastructure

20413C: Designing and Implementing a Server Infrastructure 20413C: Designing and Implementing a Server Course Details Course Code: Duration: Notes: 20413C 5 days This course syllabus should be used to determine whether the course is appropriate for the students,

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure 3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Course 20413B: Designing and Implementing a Server Infrastructure

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure Course Code: M20413 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Designing and Implementing a Server Infrastructure Overview Get hands-on instruction and practice planning, designing and deploying

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure Course 20413C: Designing and Implementing a Server Infrastructure Page 1 of 7 Designing and Implementing a Server Infrastructure Course 20413: 4 days; Instructor-Led Introduction This 4-day instructor-led

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Planning, Deploying, and Managing an Enterprise Project Management Solution

Planning, Deploying, and Managing an Enterprise Project Management Solution Planning, Deploying, and Managing an Enterprise Project Management Solution Course 2732 Five days Instructor-led Introduction The goal of this five-day, instructor-led course is to provide systems engineers

More information

COURSE 20413C: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

COURSE 20413C: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE ABOUT THIS COURSE This 5 day course covers the knowledge and skills needed to provide an enterprise solution that supports manual and automated server installations in a physical and virtual environment

More information

Speed Up Incident Response with Actionable Forensic Analytics

Speed Up Incident Response with Actionable Forensic Analytics WHITEPAPER DATA SHEET Speed Up Incident Response with Actionable Forensic Analytics Close the Gap between Threat Detection and Effective Response with Continuous Monitoring January 15, 2015 Table of Contents

More information

Sample Vulnerability Management Policy

Sample Vulnerability Management Policy Sample Internal Procedures and Policy Guidelines February 2015 Document Control Title: Document Control Number: 1.0.0 Initial Release: Last Updated: February 2015, Manager IT Security February 2015, Director

More information

Security Event Management. February 7, 2007 (Revision 5)

Security Event Management. February 7, 2007 (Revision 5) Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure Page 1 of 7 Overview This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and deploy a physical and logical Windows Server 2012 Active Directory Domain Services

More information

Course 20413: Designing and Implementing a Server Infrastructure

Course 20413: Designing and Implementing a Server Infrastructure Course 20413: Designing and Implementing a Server Infrastructure Overview About this course Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows Server

More information

Cyber Security RFP Template

Cyber Security RFP Template About this document This RFP template was created to help IT security personnel make an informed decision when choosing a cyber security solution. In this template you will find categories for initial

More information

Installing and Configuring Windows Server 2012

Installing and Configuring Windows Server 2012 Course 20410 Installing and Configuring Windows Server 2012 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 200 Technology: Windows Server 2012 Type: Course Delivery Method: Instructor-led

More information

Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)

Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4) Using Nessus to Detect Wireless Access Points March 6, 2015 (Revision 4) Table of Contents Introduction... 3 Why Detect Wireless Access Points?... 3 Wireless Scanning for WAPs... 4 Detecting WAPs using

More information

Build Your Knowledge!

Build Your Knowledge! About this Course This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and deploy a physical and logical Windows Server 2012 Active Directory Domain Services

More information

Desingning and Implementing a Server Infrastructure

Desingning and Implementing a Server Infrastructure About this Course Desingning and Implementing a Server Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows Server 2012 R2 enterprise infrastructure in

More information

How To Monitor Your Entire It Environment

How To Monitor Your Entire It Environment Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................

More information

Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led

Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led Course Description Get expert instruction and hands-on practice configuring and managing clients

More information

Installing and Configuring Windows Server 2012

Installing and Configuring Windows Server 2012 Course 20410D: Installing and Configuring Windows Server 2012 Page 1 of 8 Installing and Configuring Windows Server 2012 Course 20410D: 4 days; Instructor-Led Introduction Get hands-on instruction and

More information

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Effective Threat Management. Building a complete lifecycle to manage enterprise threats. Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive

More information

May 11, 2011. (Revision 10)

May 11, 2011. (Revision 10) Blended Security Assessments Combining Active, Passive and Host Assessment Techniques May 11, 2011 (Revision 10) Renaud Deraison Director of Research Ron Gula Chief Technology Officer Copyright 2011. Tenable

More information

10775 Administering Microsoft SQL Server Databases

10775 Administering Microsoft SQL Server Databases 10775 Administering Microsoft SQL Server Databases Course Number: 10775 Category: Microsoft SQL Server 2012 Duration: 5 days Certification: Exam 70-462 Administering Microsoft SQL Server 2012 Databases

More information

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014 Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability 7 Jul 2014 1 Purpose This document is intended to provide insight on the types of tools and technologies that

More information

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe Intro to QualysGuard IT Compliance SaaS Services Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe QualysGuard ICT Security Management Integrated Suite of ICT Security

More information

Tenable for Google Cloud Platform

Tenable for Google Cloud Platform HOW-TO GUIDE Tenable for Google Cloud Platform Introduction This document describes how to deploy Tenable SecurityCenter Continuous View (Security Center CV ) for integration with Google Cloud Platform.

More information

Course 20410: Installing and Configuring Windows Server 2012

Course 20410: Installing and Configuring Windows Server 2012 Course 20410: Installing and Configuring Windows Server 2012 Type:Course Audience(s):IT Professionals Technology:Windows Server Level:200 This Revision:D Delivery method: Instructor-led (classroom) Length:5

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

Nessus Agents. October 2015

Nessus Agents. October 2015 Nessus Agents October 2015 Table of Contents Introduction... 3 What Are Nessus Agents?... 3 Scanning... 4 Results... 6 Conclusion... 6 About Tenable Network Security... 6 2 Introduction Today s changing

More information

COURSE 20410C: INSTALLING AND CONFIGURING WINDOWS SERVER 2012

COURSE 20410C: INSTALLING AND CONFIGURING WINDOWS SERVER 2012 ABOUT THIS COURSE Get hands-on instruction and practice installing and configuring Windows Server 2012, including Windows Server 2012 R2, in this 5-day Microsoft Official Course. This course is part one

More information

Nessus Cloud User Registration

Nessus Cloud User Registration Nessus Cloud User Registration Create Your Tenable Nessus Cloud Account 1. Click on the provided URL to create your account. If the link does not work, please cut and paste the entire URL into your browser.

More information

Tenable Product Evaluations Application: HIPAA

Tenable Product Evaluations Application: HIPAA Tenable Product Evaluations Application: HIPAA January 23, 2009 (Revision 6) David Breslin Director of Sales Engineering Table of Contents Table Of Contents 2 Introduction 3 Scope 3 Executive Summary 3

More information

MCSA Server (Exam 70-410)

MCSA Server (Exam 70-410) MCSA Server (Exam 70-410) Installing and Configuring Windows Server 2012 Get hands-on instruction and practice installing and configuring Windows Server 2012, including Windows Server 2012 R2, in this

More information

Designing and Implementing a Server Infrastructure Course#20413B

Designing and Implementing a Server Infrastructure Course#20413B Designing and Implementing a Server Infrastructure Course#20413B Overview About this Course This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and deploy

More information

SecurityCenter 4.4 Administration Guide

SecurityCenter 4.4 Administration Guide SecurityCenter 4.4 Administration Guide September 18, 2012 (Revision 3) The newest version of this document is available at the following URL: http://static.tenable.com/prod_docs/securitycenter_4.4_admin_guide.pdf

More information

BSM 9.0 ESSENTIALS. Instructor-Led Training

BSM 9.0 ESSENTIALS. Instructor-Led Training BSM 9.0 ESSENTIALS Instructor-Led Training INTENDED AUDIENCE New users of Business Service Management (BSM) 9.0, including: Database Administrators System Administrators Network Administrators Operations

More information

Course Syllabus. Configuring and Troubleshooting Internet Information Services in Windows Server 2008. Key Data. Audience. At Course Completion

Course Syllabus. Configuring and Troubleshooting Internet Information Services in Windows Server 2008. Key Data. Audience. At Course Completion Key Data Product #: 3728 Course #: 6427A Number of Days: 3 Format: Instructor-Led Certification Exams: 70-643 This course syllabus should be used to determine whether the course is appropriate for the

More information

MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led

MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led Course Description Whether you are looking to learn new technology, gain Server 2008 certification, or simply improve your

More information

Installing and Configuring Windows Server 2012

Installing and Configuring Windows Server 2012 Course Code: M20410 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Installing and Configuring Windows Server 2012 Overview Get hands-on instruction and practice installing and configuring Windows

More information

Administering Microsoft SQL Server 2012 Databases

Administering Microsoft SQL Server 2012 Databases Administering Microsoft SQL Server 2012 Databases MOC 10775 About this Course This five-day instructor-led course provides students with the knowledge and skills to maintain a Microsoft SQL Server 2012

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure MS20413 Length: 5 days Designing and Implementing a Server Infrastructure This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and deploy a physical and logical

More information

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Intel Security Certified Product Specialist Security Information Event Management (SIEM) Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking

More information

Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1)

Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1) Configuring Virtual Switches for Use with PVS February 7, 2014 (Revision 1) Table of Contents Introduction... 3 Basic PVS VM Configuration... 3 Platforms... 3 VMware ESXi 5.5... 3 Configure the ESX Management

More information

Course Outline: Course 20413-Designing and Implementing a Server Infrastructure

Course Outline: Course 20413-Designing and Implementing a Server Infrastructure Course Outline: Course 20413-Designing and Implementing a Server Infrastructure Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: This 5-day instructor-led course

More information

Blended Security Assessments

Blended Security Assessments Blended Security Assessments Combining Active, Passive and Host Assessment Techniques October 12, 2009 (Revision 9) Renaud Deraison Director of Research Ron Gula Chief Technology Officer Table of Contents

More information

250-406. Administration of Clearwell ediscovery Platform 7.x Exam. http://www.examskey.com/250-406.html

250-406. Administration of Clearwell ediscovery Platform 7.x Exam. http://www.examskey.com/250-406.html SYMANTEC 250-406 Administration of Clearwell ediscovery Platform 7.x Exam TYPE: DEMO http://www.examskey.com/250-406.html Examskey SYMANTEC 250-406 exam demo product is here for you to test the quality

More information

Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments

Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments Introduction Server virtualization and private cloud services offer compelling benefits, including hardware consolidation,

More information

Microsoft Official Courseware

Microsoft Official Courseware Microsoft Official Courseware Administering Microsoft SQL Server 2012 Databases Course 10775 This five-day instructor-led course provides students with the knowledge and skills to maintain a Microsoft

More information

10775A Administering Microsoft SQL Server 2012 Databases

10775A Administering Microsoft SQL Server 2012 Databases 10775A Administering Microsoft SQL Server 2012 Databases Five days, instructor-led About this Course This five-day instructor-led course provides students with the knowledge and skills to maintain a Microsoft

More information

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration Module 1: Overview This module provides an overview of the AlienVault Unified Security Management (USM) solution. Upon completing this module, you will meet these objectives: Describe the goal of network

More information

Eliminating Cybersecurity Blind Spots

Eliminating Cybersecurity Blind Spots Eliminating Cybersecurity Blind Spots Challenges for Business April 15, 2015 Table of Contents Introduction... 3 Risk Management... 3 The Risk Blind Spot... 4 Continuous Asset Visibility... 5 Passive Network

More information

NOTE: Labs in this course are based on the General Availability release of Windows Server 2012 R2 and Windows 8.1.

NOTE: Labs in this course are based on the General Availability release of Windows Server 2012 R2 and Windows 8.1. Course 20410C: Installing and Configuring Windows Server 2012 OVERVIEW About this Course Get hands-on instruction and practice installing and configuring Windows Server 2012, including Windows Server 2012

More information

APPLICATION FOR BOARD APPROVAL. Of Locally Developed Course. Cisco CCNA Certification 11/12

APPLICATION FOR BOARD APPROVAL. Of Locally Developed Course. Cisco CCNA Certification 11/12 APPLICATION FOR BOARD APPROVAL Of Locally Developed Course Cisco CCNA Certification 11/12 John Murtha APPLICATION FOR BOARD APPROVAL Of the Locally Developed Cisco CCNA Certification 11/12 PREAMBLE: The

More information

Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements

Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements Analyze the impact of Active Directory on the existing technical environment. Analyze hardware and software

More information

NIIT Education and Training, Doha, Qatar - www.niitqatar.com Contact: +974-44551796/1798; 50656051

NIIT Education and Training, Doha, Qatar - www.niitqatar.com Contact: +974-44551796/1798; 50656051 413: Designing and Implementing a Server Infrastructure Duration: 40 Hours Overview About this Course Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows

More information

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security SIEM Optimization 101 ReliaQuest E-Book Fully Integrated and Optimized IT Security Introduction SIEM solutions are effective security measures that mitigate security breaches and increase the awareness

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

SecurityCenter 5.1 with Nessus Agent Support. October 22, 2015

SecurityCenter 5.1 with Nessus Agent Support. October 22, 2015 SecurityCenter 5.1 with Nessus Agent Support October 22, 2015 Table of Contents Introduction... 3 Adding an Agent Repository... 6 Add Agent Scans and Import Agent Scan Results... 7 Tips and Tricks... 8

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure WINDOWS 2012 COURSE OUTLINE Visit Our Website to Enroll Now Www.ITBigBang.Com/IT-Training Designing and Implementing a Server Infrastructure Course Title Designing and Implementing a Server Infrastructure

More information

Below are the some of the new features of SQL Server that has been discussed in this course

Below are the some of the new features of SQL Server that has been discussed in this course Course 10775A: Administering Microsoft SQL Server 2012 Databases OVERVIEW About this Course This five-day instructor-led course provides students with the knowledge and skills to maintain a Microsoft SQL

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

MS-10775: Administering Microsoft SQL Server 2012 Databases. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery.

MS-10775: Administering Microsoft SQL Server 2012 Databases. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery. MS-10775: Administering Microsoft SQL Server 2012 Databases This five-day instructor led course provides students with the knowledge and skills to maintain a Microsoft SQL Server 2012 database. The course

More information

Salesforce Certified Force.com Developer Study Guide

Salesforce Certified Force.com Developer Study Guide Salesforce Certified Force.com Developer Study Guide Summer 15 STUDY GUIDE 0 Contents ABOUT THE SALESFORCE CERTIFIED FORCE.COM DEVELOPER PROGRAM... 1 SECTION 1. PURPOSE OF THIS STUDY GUIDE... 1 SECTION

More information

Managing Enterprise Security with Cisco Security Manager

Managing Enterprise Security with Cisco Security Manager Managing Enterprise Security with Cisco Security Manager Course SSECMGT v4.0; 5 Days, Instructor-led Course Description: The Managing Enterprise Security with Cisco Security Manager (SSECMGT) v4.0 course

More information

Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure Course Duration: 5 days Overview: Get hands-on instruction and practice planning, designing and deploying a physical and logical Windows Server 2012 R2 enterprise infrastructure in this 5-day Microsoft

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9) Nessus Enterprise Cloud User Guide October 2, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Enterprise Cloud... 3 Subscription and Activation... 3 Multi Scanner Support... 4 Customer Scanning

More information

Course MS20696A Managing Enterprise Devices and Apps using System Center Configuration Manager

Course MS20696A Managing Enterprise Devices and Apps using System Center Configuration Manager 3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Course MS20696A Managing Enterprise Devices and Apps using

More information

IBM Proventia Network Enterprise Scanner

IBM Proventia Network Enterprise Scanner Protecting corporate data with preemptive risk identification IBM Proventia Network Enterprise Scanner Identifying risk and prioritizing protection IBM Proventia Network Enterprise Scanner * (Enterprise

More information

Administering a Microsoft SQL Server 2000 Database

Administering a Microsoft SQL Server 2000 Database Administering a Microsoft SQL Server 2000 Database Course 2072 - Five days - Instructor-led - Hands-On Introduction This course provides students with the knowledge and skills required to install, configure,

More information

Microsoft SQL Server Beginner course content (3-day)

Microsoft SQL Server Beginner course content (3-day) http://www.multimediacentre.co.za Cape Town: 021 790 3684 Johannesburg: 011 083 8384 Microsoft SQL Server Beginner course content (3-day) Course Description This three-day Microsoft SQL Server Beginners

More information

Real-Time Auditing for SANS Consensus Audit Guidelines

Real-Time Auditing for SANS Consensus Audit Guidelines Real-Time Auditing for SANS Consensus Audit Guidelines Leveraging Asset-Based Configuration and Vulnerability Analysis with Real-Time Event Management July 31, 2012 (Revision 6) Ron Gula Chief Executive

More information

Exadata Database Machine Administration Workshop NEW

Exadata Database Machine Administration Workshop NEW Exadata Database Machine Administration Workshop NEW Duration: 4 Days What you will learn This course introduces students to Oracle Exadata Database Machine. Students learn about the various Exadata Database

More information

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...

More information

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network

More information

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led About this Course Get expert instruction and hands-on practice configuring and managing

More information