My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
CAREER DEVELOPMENT SOLUTIONS dba NEW HORIZONS
Clerk
>
Contracts / Agreements
>
C
>
CAREER DEVELOPMENT SOLUTIONS dba NEW HORIZONS
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
9/12/2024 9:16:44 AM
Creation date
6/28/2023 3:46:48 PM
Metadata
Fields
Template:
Contracts
Company Name
CAREER DEVELOPMENT SOLUTIONS dba NEW HORIZONS
Contract #
A-2023-069-10
Agency
Community Development
Council Approval Date
5/2/2023
Expiration Date
6/30/2027
Insurance Exp Date
8/1/2024
Destruction Year
2032
Notes
For Insurance Exp. Date see Notice of Compliance
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
447
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
' =con iols foFcFoUd'4nVlfonmBntS antl=implementFcloud sec i'rity management: This course coversA a`ge of Cisco <br />Cloudlock, Cisco UmbrellaT"", Cisco Cloud Email Security, Cisco Advanced Malware Protection (AMP) for <br />Endpoints, Cisco StealthwatchO Cloud and Enterprise, Cisco Firepower® NGFW (next -generation firewall), and <br />more. <br />Acquired Skills <br />Contrast the various cloud service and deployment models. <br />Implement the Cisco Security Solution for SaaS using Cisco Cloudlock Micro Services. <br />Deploy cloud security solutions using Cisco AMP for Endpoints, Cisco Umbrella, and Cisco Cloud Email Security. <br />Define Cisco cloud security solutions for protection and visibility using Cisco virtual appliances and Cisco <br />Stealthwatch Cloud. <br />Describe the network as a sensor and enforcer using Cisco Identity Services Engine (ISE), Cisco Stealthwatch <br />Enterprise, and Cisco TrustSec®. <br />Implement Cisco Firepower NGFW Virtual (NGFWv) and Cisco Stealthwatch Cloud to provide protection and <br />visibility in AWS environments. <br />Explain how to protect the cloud management infrastructure by using specific examples, defined best practices, and <br />AWS reporting capabilities. <br />uescrrptron <br />This course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your <br />email systems against phishing, business email compromise, and ransomware, and to help streamline email <br />security policy management. This hands-on course provides you with the knowledge and skills to implement, <br />troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware <br />protection, spam blocking, anti -virus protection, outbreak filtering, encryption, quarantines, and data loss <br />prevention. <br />Acquired Skills <br />Describe and administer the Cisco Email Security Appliance (ESA) <br />Control sender and recipient domains <br />Control spam with Talos SenderBase and anti-spam <br />Use anti -virus and outbreak filters <br />Use mail policies <br />Use content filters <br />Use message filters to enforce email policies <br />Prevent data loss <br />Perform LDAP queries <br />Authenticate Simple Mail Transfer Protocol (SMTP) sessions <br />Authenticate email <br />Encrypt email <br />Use system quarantines and delivery methods <br />Perform centralized management using clusters <br />Test and troubleshoot <br />Cisco® Securing the Web with Cisco® Web Security Appliance 0.0 (SWSA) <br />Description <br />This course shows you how to implement, use, and maintain Cisco® Web Security Appliance (WSA), powered by <br />Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a <br />combination of expert instruction and hands-on practice, you'll learn how to deploy proxy services, use <br />authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, <br />use the solution's anti-malware features, implement data security and data loss prevention, perform administration <br />of Cisco WSA solution, and more. <br />Acquired Skills <br />Describe Cisco WSA <br />Deploy proxy services <br />Utilize authentication <br />Describe decryption policies to control HTTPS traffic <br />Understand differentiated traffic access policies and identification profiles <br />Enforce acceptable use control settings <br />
The URL can be used to link to this page
Your browser does not support the video tag.