Laserfiche WebLink
Microsoft Azure <br />Description <br />Navigate the move from an on -premises environment into Citrix Cloud and learn to deploy resource locations onto <br />Microsoft Azure. Learn the architecture, communications, and management of Citrix Cloud and the Citrix Virtual <br />Apps and Desktops Service and then migrate existing infrastructure and settings into Citrix Cloud. If you are <br />planning a move to Citrix Cloud or starting out anew, this course is a necessary step in enabling you with the right <br />training and skills to understand, manage, and deliver successfully. Plan machine catalog and virtual machine <br />design based in Microsoft's public cloud and deploy those machines using Machine Creation Services. Learn to <br />configure the access layer as a service within Citrix Cloud, as managed machines in your datacenter, or on the <br />Azure platform. <br />Acquired Skills <br />How to install, configure, and manage Citrix Cloud Connectors <br />Deploy and manage Virtual Delivery Agent machines to on -premises resource locations as well as in Microsoft <br />Azure using MCS <br />Integrate Citrix Cloud and Citrix Virtual Apps and Desktops with Microsoft Azure Active Directory <br />Cyber Secure Coder <br />Description <br />This course presents an approach for dealing with security and privacy throughout the entire software development <br />lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your <br />own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design <br />software to deal with the human element in security, and how to incorporate security into all phases of <br />development. <br />Acquired Skills <br />Identify the need for security in your software projects. <br />Eliminate vulnerabilities within software. <br />Use a Security by Design approach to design a secure architecture for your software. <br />Implement common protections to protect users and data. <br />Apply various testing methods to find and correct security defects in your software. <br />Maintain deployed software to ensure ongoing security. <br />CvberSec First Responder (Exam CFR-310) <br />Description <br />This course covers the duties of those who are responsible for monitoring and detecting security incidents in <br />information systems and networks, and for executing a proper response to such incidents. Depending on the size of <br />the organization, this individual may act alone or may be a member of a cybersecurity incident response team <br />(CSIRT). The course introduces tools and tactics to manage cybersecurity risks, identify various types of common <br />threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as <br />they occur. Ultimately, the course promotes a comprehensive approach to security aimed toward those on the front <br />lines of defense. <br />Acquired Skills <br />Assess information security risk in computing and network environments. <br />Analyze the cybersecurity threat landscape. <br />Analyze reconnaissance threats to computing and network environments. <br />Analyze attacks on computing and network environments. <br />Analyze post -attack techniques on computing and network environments. <br />Implement a vulnerability management program. <br />Evaluate the organization's security through penetration testing. <br />Collect cybersecurity intelligence. <br />Analyze data collected from security and event logs. <br />Perform active analysis on assets and networks. <br />Respond to cybersecurity incidents. <br />Investigate cybersecurity incidents. <br />Data Analysis using Excel 2016 — Level 1 <br />