top of page

Résultats de recherche

Résultats trouvés pour «  »

  • Ethical Hacking | Sita IT Solutions | Dubai, UEA, Middle East

    Ethical Haching Duration 5 days ​ ​ Public Price On demand ​ ​ Place Genève (Suisse) ​ ​ Dates 18 - 22 december 📌 ​ 📴 complet 📌 date confirmée 💻 distanciel 🚩 date presque garantie ⏱ décalage horaire 🇬🇧 langue anglaise Who should attend Prerequisite Objectives Outline Course Overview Maîtrisez les technologies du piratage en réfléchissant comme un hacker éthique Le programme Ethical Haching est le programme de formation en sécurité de l’information le plus désiré qu’un professionnel de la sécurité de l’information puisse jamais vouloir suivre. Pour maîtriser les technologies de piratage, il vous faudra en devenir un, mais éthique ! Le cours accrédité fournit les outils et techniques de piratage informatique avancés utilisés par les pirates et les professionnels de la sécurité de l’information pour s’introduire dans une organisation. Comme nous l’avons dit, “Pour battre un hacker, il faut réfléchir comme un hacker”. Découvrez les outils et les techniques avancés de piratage informatique Cette formation vous donnera toutes les connaissances et compétences pour maîtriser une méthodologie de piratage éthique et pour vous préparer à la Certification. ​ ​ Who should attend Responsables sécurité Auditeurs Professionnels de la sécurité Administrateurs de sites Toute personne concernée par la stabilité des systèmes d’information ​ ​ Prerequisite Connaissances de TCP/IP, Linux et Windows Server ​ ​ Objectives Maîtriser une méthodologie de piratage éthique qui pourra être utilisée lors d’un test d’intrusion Maîtriser les compétences de piratage éthique ​ ​ Ou tline Module 01 : Introduction au piratage éthique Module 02 : Empreinte et reconnaissance Module 03 : Analyse des réseaux Module 04 : Dénombrement Module 05 : Analyse de vulnérabilité Module 06 : Piratage du système Module 07 : Menaces liées aux logiciels malveillants Module 08 : Renifler Module 09 : Ingénierie sociale Module 10 : Déni de service Module 11 : Détournement de session Module 12 : Éviter les IDS, les pare-feu et les pots de miel Module 13 : Piratage de serveurs Web Module 14 : Piratage d’applications Web Module 15 : Injection SQL Module 16 : Piratage de réseaux sans fil Module 17 : Piratage de plates-formes mobiles Module 18 : Piratage d e IoT Module 19 : Informatique Cloud Module 20 : Cryptographie ​ ​ ​ ​ Inclus dans ce cours Un voucher d’examen Formation dispensée par un formateur certifié Accès aux labs officiels Documentation officielle au format digital ​ prerequis contenu Objectifs Dates public

  • A propos - SITA IT Solutions - Dubai, Abu Dhabi, Riyadh, Kuwait City, Doha

    À propos de nous Dotée d'un réseau de partenaires et de consultants à travers le monde, SITA IT Solutions intervient dans des domaines d’expertise rares afin de soutenir les activités IT des entreprises. Afin de vous adapter aux évolutions du secteur de l'IT et d'engager un processus de transformation digitale, SITA IT Solutions saura répondre à vos besoins en termes de formations et conseils IT, ressources humaines ou encore de solutions innovantes ou de travail hybride. Notre Histoire SITA IT Solutions est le fruit d'une collaboration existante en France depuis 2006 au travers d'une société commune. Après plus de 25 ans d'expérience dans le monde de l'IT (networks & telecoms, data centers, cloud computing, sécurité) et dans la formation, Sandra Bocciolini et François Pedrosa ont consolidé un vaste réseau de sociétés partenaires et de consultants, chacun expert dans leur domaine et en lien avec les métiers des Technologies Numériques. Forts de ces expériences, les deux associés ont décidé de constituer leurs propres agences "Iberys Telecom" en 2006 et "Dig-IT" en 2016, à Sophia Antipolis (France). Après un développement au niveau national, et la croissance de l'équipe, SITA IT SOLUTIONS a été crée afin de pouvoir répondre aux attentes des marchés internationaux. La mission de SITA IT SOLUTIONS est d'accompagner les entreprises en termes de Solutions IT, afin de faciliter leur développement. Basés à Dubaï, nous intervenons sur l'ensemble du Moyen Orient, mais aussi dans les zones internationales francophones. ​ Notre valeur ajoutée ? ​ Expertise - Sur Mesure - Disponibilité Une équipe à votre écoute Sandra Bocciolini Co-Founder & Sales/Marketing Director sandra@sita-it.ae Gwenola Eveno Executive Assistant gwenola@sita-it.ae François Pedrosa Co-Founder francois@sita-it.io José Perez Gabarron Community Manager Alexandre FASQUEL Cisco Technical Referent / CCIE RS & CCSI Team Nos partenaires

  • Services et Conseils Informatiques à Dubai, Abu Dhabi, Riyadh, Kuwait City, Doha - SITA IT Solutions

    25 ans D'EXPÉRIENCE Un savoir faire unique, mis à votre service Voir plus Solutions & Conseils IT Soucieuse de votre réussite, SITA IT Solutions vous propose un accompagnement sur mesure afin de mener au mieux vos projets. En mettant à profit notre expérience et notre réseau d'experts, notre mission est de vous donner toutes les cartes en main pour atteindre vos objectifs. ​ ​ Une intervention possible à tous les stades de votre projet, tant d'un point de vue pédagogique, que sur le terrain au travers de missions de Conseil, Expertise, Audit, Formation ou encore de Communication. Avant-Vente Un accompagnement à plusieurs niveaux : ​ ​ - Assistance à maîtrise d'ouvrage SI - Architecture - Design - Veille technologique - Rédaction de cahiers des charges Services Des services assurés par notre pool de consultants experts dans des domaines tels que : ​ - Audit - Workshop - POC (Proof Of Concept) - Aide à l'intégration - Transfert de compétences Communication Accompagnement dans vos démarches de communication au travers de : ​ - Organisation d'events IT - Animation technique et/ou commerciale - Campagne de communication auprès de son réseau RH as A Service #RHaAS L'humain étant au coeur de nos activités , trouvons ensemble les compétences dont vous avez besoin : - Recherche de consultants - Mise à disposition de profils pour missions - Recrutement - Assistance technique La satisfaction client, notre priorité

  • Cisco ENARSI | Sita IT Solutions | Dubai, UEA, Middle East

    Implementing Cisco Enterprise Advanced Routing and Services ENARSI Duration 5 days ​ ​ Public Price On demand ​ ​ Place Show all places ​ ​ Dates Show all dates ​ ​ Who should attend Prerequisites Objectives Outline Course Overview The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. This course covers advanced routing and infrastructure technologies, expanding on the topics covered in the Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) course. This course helps prepare you to take the exam, Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI), which leads to the new CCNP® Enterprise and Cisco Certified Specialist – Enterprise Advanced Infrastructure Implementation certifications. ​ ​ ​ Who should attend Enterprise network engineers System engineers System administrators Network administrators ​ ​ Prerequisites Before taking this course, you should have: General understanding of network fundamentals Basic knowledge of how to implement LANs General understanding of how to manage network devices General understanding of how to secure network devices Basic knowledge of network automation These Cisco courses are recommended to help you meet these prerequisites: Implementing and Administering Cisco Solutions (CCNA) Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) ​ ​ Objectives After taking this course, you should be able to: Configure classic EIGRP and named EIGRP for IPv4 and IPv6 Optimize classic EIGRP and named EIGRP for IPv4 and IPv6 Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6 Configure OSPFv2 and OSPFv3 in IPv4 and IPv6 environments Optimize OSPFv2 and OSPFv3 behavior Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6 Implement route redistribution using filtering mechanisms Troubleshoot redistribution Implement path control using PBR and IP SLA Configure MP-BGP in IPv4 and IPv6 environments Optimize MP-BGP in IPv4 and IPv6 environments Troubleshoot MP-BGP for IPv4 and IPv6 Describe the features of MPLS Describe the major architectural components of an MPLS VPN Identify the routing and packet forwarding functionalities for MPLS VPNs Explain how packets are forwarded in an MPLS VPN environment Implement Cisco IOS DMVPNs Implement DHCP Describe the tools available to secure the IPV6 first hop Troubleshoot Cisco router security features Troubleshoot infrastructure security and services This course will help you: Gain the knowledge you need to install, configure, operate, and troubleshoot an enterprise network Qualify for professional-level job roles in advance routing and services Prepare for the Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI) exam ​ ​ Outline Implementing EIGRP Optimizing EIGRP Troubleshooting EIGRP Implementing OSPF Optimizing OSPF Troubleshooting OSPF Configuring Redistribution Troubleshooting Redistribution Implementing Path Control Implementing Internal Border Gateway Protocol (IBGP) Optimizing BGP Implementing MP-BGP Troubleshooting BGP Exploring MPLS Introducing MPLS L3 VPN Architecture Introducing MPLS L3 VPN Routing Configuring Virtual Routing and Forwarding (VRF)-Lite Implementing DMVPN Implementing DHCP Introducing IPv6 First Hop Security Securing Cisco Routers Troubleshooting Infrastructure Security and Services Troubleshooting with DNA Center Assurance Lab outline Configure EIGRP Using Classic Mode and Named Mode for IPv4 and IPv6 Verify the EIGRP Topology Table Configure EIGRP Stub Routing, Summarization, and Default Routing Configure EIGRP Load Balancing and Authentication Troubleshoot EIGRP Issues Configure OSPFv3 for IPv4 and IPv6 Verify the Link-State Database Configure OSPF Stub Areas and Summarization Configure OSPF Authentication Troubleshoot OSPF Issues Implement Routing Protocol Redistribution Manipulate Redistribution Manipulate Redistribution Using Route Maps Troubleshoot Redistribution Issues Implement PBR Configure IBGP and External Border Gateway Protocol (EBGP) Implement BGP Path Selection Configure BGP Advanced Features Configure BGP Route Reflectors Configure MP-BGP for IPv4 and IPv6 Troubleshoot BGP Issues Configure Routing with VRF-Lite Implement Cisco IOS DMVPN Obtain IPv6 Addresses Dynamically Troubleshoot DHCPv4 and DHCPv6 Issues Troubleshoot IPv4 and IPv6 Access Control List (ACL) Issues Configure and Verify Unicast Reverse Path Forwarding (uRPF) Troubleshoot Network Management Protocol Issues: Lab 1 Troubleshoot Network Management Protocol Issues: Lab 2 ​ ​ ​ ​ Dates and Booking UAE, Dubai Jan 9-13 , 2023 Fev 27-Mar 3, 2023 May 1-5, 2023 Jul 3-7, 2023 Aug 28-Sep 1, 2023 Oct 30-Nov 3, 2023 Egypt, Cairo Dec 4-8, 2022 ​ Kuwait, Kuwait City Aug 28-Sep 1, 2023 ​ Oman, Muscat Fev 27-Mar 3, 2023 ​ Qatar, Doha Fev 27-Mar 3, 2023 Jul 3-7, 2023 Oct 30-Nov 3, 2023 Saudi Arabia, Riyadh Jan 9-13, 2023 May 1-5, 2023 Aug 28-Sep 1, 2023 Booking prerequis contenu Objectifs public Dates

  • SITA IT Solutions - Formations et Solutions IT à Dubai, Abu Dhabi, Riyadh, Kuwait City, Doha

    FORMATIONS & SOLUTIONS IT FORMATIONS IT Un large éventail de formations IT officielles en présentiel , à distance ou en e-learning . Des offres 100% personnalisables selon vos besoins (formation sur mesure, intra ou inter-entreprises). Voir plus SOLUTIONS IT Un accompagnement sur mesure tout au long de vos projets. Nous mettons à disposition notre savoir-faire et l'expertise de nos consultants afin d'intervenir en termes d'avant-vente , de conseils IT ou encore de communication . Voir plus RH AS A SERVICE #RHaAS Spécialistes du recrutement de talents dans les métiers de l'informatique, nous intervenons sur le Moyen Orient et à l'international afin d'identifier les talents et de favoriser le meilleur matching entre candidats et entreprises. Voir plus “ Notre mission est de contribuer à faire de vos projets des succès, en apportant les compétences et les ressources humaines dont vous avez besoin. " Sandra Bocciolini, Co-Founder & Directrice Marketing & Commerciale Une intervention étendue sur l'ensemble du Moyen Orient... mais pas seulement ! Nous répondons également à vos besoins sur les zones Francophones - Europe - Afrique Emirats Arabes Unis Arabie Saoudite Koweit Qatar Événements CABSAT - Dubai World Trade Centre L'événement se tiendra du 17 au 19 mai 2022 au Dubai World Trade Centre. French Tuesday - Dubaï CCI FRANCE UAE a organisé le 11 janvier 2022 le French Tuesday. Expo 2020 DUBAI UAE L'expo Dubai 2020 se déroule du 1er octobre 2021 au 31 mars 2022.

  • Formulaire d'Inscription Formations Informatiques à Dubai, Abu Dhabi, Riyadh, Kuwait City, Doha - SITA IT Solutions

    Bulletin de pré-inscription formation * Champ obligatoire Formation souhaitée Date souhaitée Nom et Prénom E-mail Téléphone Commentaires Envoyer Votre pré-inscription a bien été transmise.

  • Formation Cybersécurité à Dubai, Abu Dhabi, Riyadh, Kuwait City, Doha - SITA IT Solutions

    Formations cybersécurité et sécurité informatique SITA IT Solutions propose une large gamme de formations en cybersécurité et sécurité informatique pour répondre aux besoins croissants des entreprises confrontées au développement des risques et menaces informatiques. ​ Notre offre de formation dans les domaines de la sécurité informatique et de la cybersécurité s'adresse aux salariés, juristes, ingénieurs informaticiens, responsables de la sécurité des systèmes d'information (ISSM), responsables informatiques et chefs d'entreprise. Son objectif est de former tous les acteurs de l'entreprise à la mise à jour et à l'acquisition des compétences nécessaires pour lutter de manière coordonnée contre les nouveaux risques de sécurité informatique. Face à la demande croissante de formation dans ce domaine, SITA IT Solutions s'est entourée d'experts en sécurité, de consultants, de cabinets de conseil spécialisés, ou de partenaires en formation professionnelle et continue en cybersécurité et sécurité informatique pour répondre aux enjeux de la sécurité des systèmes informatiques et réseaux, sécurité de l'information et gestion des données personnelles. Aujourd'hui, les cybermenaces prennent diverses formes et impactent tous les domaines d'activité des entreprises. La lutte contre les risques cyber nécessite donc un large éventail de compétences afin d'anticiper et de répondre efficacement à l'explosion des menaces. L'ensemble des formations cybersécurité & sécurité informatique couvrent les domaines suivants : ​ Cybersécurité | Sécurité juridique | Sécurité Organisationnelle | Sécurité Technique | Continuité d'Activité nos formations "best-seller" EBIOS2018 RISK MANAGER COBIT 2019 FOUNDATION Cybersécurité des Systèmes Industriels Droits de la cybersécurité Toutes nos formations en CYBERSÉCURITÉ ET SÉCURITÉ INFORMATIQUE Cybersécurité ​ CompTIA Security+ - 5 jours ELASTICSEARCH - 5 jours ESSCYBER - Cybersecurity Technical Essentials - 2 jours SPLUNK - 3 jours SELINUX - Understand SELinux and know how to modify the security policy - 2 jours ​ Sécurité Juridique ​ ​ ​ ISO 27701 - PIMS - 5 jours PIA - ISO 29134 - 3 jours ​ Sécurité Organisationnelle ​ ​ CCSP - Certified Cloud Security Professional - 5 jours CISA - CISA Preparation - 5 jours CISSP - Certified Information Systems Security Professional - 5 jours EBIOS 2010 - Risk Manager - 3 jours EBIOS 2018 - Risk Manager - 3 jours ISO27LA - ISO 27001 - Lead Auditor - 5 jours ISO27LI - ISO 27001- Lead Implementer - 5 jours ISO27RM - ISO 27005 Risk Manager - 3 jours ISO27004 - Cybersecurity indicators and dashboards - 1 jours ISO27035 - Security incident management - 1 jours RSSI - Become an Information Systems Security Manager - 5 jours ​ Sécurité Technique ​ ​ ALGOSEC Firewall Analyzer and FireFlow Training - CASA - 3 jours INFOBLOX Lead SCADA Security Manager - PECB Certified - 5 jours ​ ​​ Continuité d'Activité ​ ​ ISO 22301 Lead Auditor - 5 jours ISO 22301 Lead Implementer - 5 jours RPCA- Business Continuity Plan Manager - 5 jours Cybersecurity Legal security Sécurité technique Sécurité organisationnelle Continuité d'activité

  • Emploi informatique (IT) à Dubai, Abu Dhabi, Riyadh, Kuwait City, Doha - SITA IT Solutions

    Nous sommes faits pour collaborer ! Vous êtes intéressé(e) par les offres de missions proposées par Dig-IT ! Nous vous proposons de nous faire connaître vos intérêts, disponibilité, et compétences afin d'échanger sur une collaboration éventuelle. * champ obligatoire Nom et Prénom Ville - Pays E-mail Téléphone Certifications en cours Votre CV Télécharger votre CV Taille fichier 15MB max. Profil Linkedin Zones d'intervention souhaitées (Villes, Régions,...) Acceptez-vous les déplacements ? Oui Non Compétences Manufacturers Avaya Check Point Cisco F5 Fortinet IBM Mitel Palo Alto Radware Stormshield Vidyo Autres Editors Ansible Citrix DataCore Software Docker / Kubernetes Java Linux Nutanix Puppet Python Simplivity SolarWinds Spring Windows WhatsUp Gold Autres Cybersecurity CompTIA EC Council Ethical Hacking Autres Methodology ITIL PMI PRINCE2 Méthodes Agiles Autres Sécurité infomatique Sécurité technique Sécurité juridique Sécurité organisationnelle Continuité d'activité Autres Big Data Intelligence Artifiicielle (IA) Big Data Autres Commentaires Situaton actuelle : Microentrepreneur Entreprise Salarié Autres ( à préciser dans commentaires) Tarif HT/ Jour Envoyer Vos informations ont bien été transmises

  • Contactez SITA IT Solutions - Dubai, Abu Dhabi, Riyadh, Kuwait City, Doha

    Contactez-nous Vous avez des questions sur nos formations, une demande spécifique, une proposition de collaboration ? N'hésitez pas à nous contacter, nous sommes à votre écoute ! Adress Shop number 03 owned by Nakeel real estate LLC - Bur Dubai Warsan One - Istidama B, Dubai, UAE Email contact@sita-it.ae Phone +971 44 221 345 +971 52 569 4902 Social Media Prénom Nom Entreprise Email Message Send Nous vous remercions pour votre message ! Notre équipes vous recontactera au plus tôt.

  • INNOVATIONS | Sita IT Solutions

    L'innovation au service de la performance Des solutions innovantes, exclusives et personnalisées pour répondre à vos besoins et plus encore. Sita IT Solutions vous permet d'accélérer le processus de transition numérique de votre entreprise en vous offrant des solutions clés en main et 100% adaptées à vos besoins. PC à projection tactile ​ Innovant , disruptif , mobile et personnalisable , le Project'il est un PC made in France qui permet de réinventer vos interactions grâce à une projection tactile. ​ Contactez-nous pour obtenir le vôtre UNE INTELLIGENCE ARTIFICIELLE UNIQUE SIMPLE SMART STUNNING

  • Cisco DCCOR | Sita IT Solutions | Dubai, UEA, Middle East

    Implementing and Operating Cisco Data Center Core Technologies DCCOR Duration 5 days ​ ​ Public Price On demand ​ ​ Place Show all places ​ ​ Dates Show all dates ​ ​ Who should attend Prerequisite Objectives Outline Course Overview The Implementing and Operating Cisco Data Center Core Technologies (DCCOR) course helps you prepare for the Cisco® CCNP® Data Center and CCIE® Data Center certifications for advanced-level data center roles. In this course, you will master the skills and technologies you need to implement data center compute, LAN and SAN infrastructure. You will also learn the essentials of automation and security in data centers. You will gain hands-on experience deploying, securing, operating, and maintaining Cisco data center infrastructure including: Cisco MDS Switches and Cisco Nexus Switches; Cisco Unified Computing System™ (Cisco UCS®) B-Series Blade Servers, and Cisco UCS C-Series Rack Servers. This course has 5 ILT days with 3 additional self-study days (3 days of content to be covered by the student in their own time). This course, including the self-paced material, helps prepare you to take the exam: 350-601 Implementing Cisco Data Center Core Technologies (DCCOR) ​ ​ Who should attend Network designers Network administrators Network engineers Systems engineers Data center engineers Consulting systems engineers Technical solutions architects Field engineers Cisco integrators and partners Server administrator Network manager ​ ​ Prerequisite To fully benefit from this course, you should have the following knowledge and skills: Familiarity with Ethernet and TCP/IP networking Familiarity with SANs Familiarity with Fibre Channel protocol Identify products in the Cisco Data Center Nexus and Cisco MDS families Understanding of Cisco Enterprise Data Center architecture Understanding of server system design and architecture Familiarity with hypervisor technologies (such as VMware) These Cisco courses are recommended to help you meet these prerequisites: Implementing and Administering Cisco Solutions (CCNA) Understanding Cisco Data Center Foundations (DCFNDU) ​ ​ Objectives After taking this course, you should be able to: Implement routing and switching protocols in Data Center environment Implement overlay networks in data center Introduce high-level Cisco Application Centric Infrastructure (Cisco ACI™) concepts and Cisco Virtual Machine manager (VMM) domain integration Describe Cisco Cloud Service and deployment models Implement Fibre Channel fabric Implement Fibre Channel over Ethernet (FCoE) unified fabric Implement security features in data center Implement software management and infrastructure monitoring Implement Cisco UCS Fabric Interconnect and Server abstraction Implement SAN connectivity for Cisco Unified Computing System™ (Cisco UCS®) Describe Cisco HyperFlex™ infrastructure concepts and benefits Implement Cisco automation and scripting tools in data center Evaluate automation and orchestration technologies ​ ​ Outline Implementing Data Center Switching Protocols* Spanning Tree Protocol Port Channels Overview Implementing First-Hop Redundancy Protocols* Hot Standby Router Protocol (HSRP) Overview Virtual Router Redundancy Protocol (VRRP) Overview Implementing Routing in Data Center* Open Shortest Path First (OSPF) v2 and Open Settlement Protocol (OSP) v3 Border Gateway Protocol Implementing Multicast in Data Center* IP Multicast in Data Center Networks Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Implementing Data Center Overlay Protocols Cisco Overlay Transport Virtualization Virtual Extensible LAN Implementing Network Infrastructure Security* User Accounts and Role Based Access Control (RBAC) Authentication, Authorization, and Accounting (AAA) and SSH on Cisco NX-OS Describing Cisco Application-Centric Infrastructure Cisco ACI Overview, Initialization, and Discovery Cisco ACI Management Describing Cisco ACI Building Blocks and VMM Domain Integration Tenant-Based Components Cisco ACI Endpoints and Endpoint Groups (EPG) Describing Packet Flow in Data Center Network* Data Center Traffic Flows Packet Flow in Cisco Nexus Switches Describing Cisco Cloud Service and Deployment Models Cloud Architectures Cloud Deployment Models Describing Data Center Network Infrastructure Management, Maintenance, and Operations* Time Synchronization Network Configuration Management Explaining Cisco Network Assurance Concepts* Need for Network Assurance Cisco Streaming Telemetry Overview Implementing Fibre Channel Fabric Fibre Channel Basics Virtual Storage Area Network (VSAN) Overview Implementing Storage Infrastructure Services Distributed Device Aliases Zoning Implementing FCoE Unified Fabric Fibre Channel over Ethernet Describing FCoE Implementing Storage Infrastructure Security* User Accounts and RBAC Authentication, Authorization, and Accounting Describing Data Center Storage Infrastructure Maintenance and Operations* Time Synchronization Software Installation and Upgrade Describing Cisco UCS Server Form Factors* Cisco UCS B-Series Blade Servers Cisco UCS C-Series Rack Servers Implementing Cisco Unified Computing Network Connectivity Cisco UCS Fabric Interconnect Cisco UCS B-Series Connectivity Implementing Cisco Unified Computing Server Abstraction Identity Abstraction Service Profile Templates Implementing Cisco Unified Computing SAN Connectivity iSCSI Overview Fibre Channel Overview Implementing Unified Computing Security User Accounts and RBAC Options for Authentication Introducing Cisco HyperFlex Systems* Hyper converged and Integrated Systems Overview Cisco HyperFlex Solution Describing Data Center Unified Computing Management, Maintenance, and Operations* Compute Configuration Management Software Updates Implementing Cisco Data Center Automation and Scripting Tools* Cisco NX-OS Programmability Scheduler Overview Describing Cisco Integration with Automation and Orchestration Software Platforms Cisco and Ansible Integration Overview Cisco and Puppet Integration Overview Describing Cisco Data Center Automation and Orchestration Technologies* Power On Auto Provisioning Cisco Data Center Network Manager Overview * This section is self-study material that can be done at your own pace after the instructor-led portion of the course. Lab outline Configure Virtual Extensible LAN (VXLAN) Explore the Cisco ACI Fabric Implement Cisco ACI Access Policies and Out-of-Band Management Implement Cisco ACI Tenant Policies Integrate Cisco ACI with VMware Configure Fibre Channel Configure Device Aliases Configure Zoning Configure NPV Provision Cisco UCS Fabric Interconnect Cluster Configure Server and Uplink Ports Configure VLANs Configure a Cisco UCS Server Profile Using Hardware Identities Configure Basic Identity Pools Configure a Cisco UCS Service Profile Using Pools Configure an Internet Small Computer Systems Interface (iSCSI) Service Profile Configure Cisco UCS Manager to Authenticate Users with Microsoft Active Directory Configure Cisco Nexus Switches with Ansible Program a Cisco Nexus Switch with Python Automate Cisco Application-Centric Infrastructure Configuration ​ ​ ​ ​ Dates and Booking UAE, Dubai Jan 9-13, 2023 Apr 3-7, 2023 Jul 3-7, 2023 Oct 2-6, 2023 Egypt, Cairo On demand ​ Kuwait, Kuwait City On demand ​ Oman, Muscat On demand ​ Qatar, Doha Jan 9-13, 2023 Jul 3-7, 2023 ​ Saudi Arabia, Riyadh Apr 3-7, 2023 Oct 2-6, 2023 Booking prerequis contenu Objectifs public Dates

  • Cisco SCOR | Sita IT Solutions | Dubai, UEA, Middle East

    Implementing and Operating Cisco Security Core Technologies SCOR Duration 5 days ​ ​ Public Price On demand ​ ​ Place Show all places ​ ​ Dates Show all dates ​ ​ Who should attend Prerequisite Objectives Outline Course Overview The Implementing and Operating Cisco Security Core Technologies (SCOR) course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements. You will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. ​ ​ Who should attend Security Engineer Network Engineer Network Designer Network Administrator Systems Engineer Consulting Systems Engineer Technical Solutions Architect Cisco Integrators/Partners Network Manager Cisco integrators and partners ​ ​ Prerequisite To fully benefit from this course, you should have the following knowledge and skills: Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course Familiarity with Ethernet and TCP/IP networking Working knowledge of the Windows operating system Working knowledge of Cisco IOS networking and concepts Familiarity with basics of networking security concepts ​ ​ Objectives After taking this course, you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco IOS VTI-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco FirePower NGFW Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and EAP authentication Provide basic understanding of endpoint security and describe AMP for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS Software Layer 2 and Layer 3 Data Plane Controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment ​ This course will help you: Gain hands-on experience implementing core security technologies and learn best practices using Cisco security solutions Prepare for the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam Qualify for professional and expert-level security job roles This course will help you prepare to take the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam. This exam tests a candidate's knowledge of implementing and operating core security technologies. ​ ​ Outline Describing Information Security Concepts* Information Security Overview Assets, Vulnerabilities, and Countermeasures Managing Risk Describing Common TCP/IP Attacks* Legacy TCP/IP Vulnerabilities IP Vulnerabilities Internet Control Message Protocol (ICMP) Vulnerabilities Describing Common Network Application Attacks* Password Attacks Domain Name System (DNS)-Based Attacks DNS Tunneling Describing Common Endpoint Attacks* Buffer Overflow Malware Reconnaissance Attack Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Deploying Email Content Security Cisco Email Content Security Overview Simple Mail Transfer Protocol (SMTP) Overview Email Pipeline Overview Deploying Web Content Security Cisco Web Security Appliance (WSA) Overview Deployment Options Network Users Authentication Deploying Cisco Umbrella* Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs Cisco IOS VTIs Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies Secure Sockets Layer (SSL) Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Describing 802.1X Authentication 802.1X and Extensible Authentication Protocol (EAP) EAP Methods Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications Configuring 802.1X Authentication Cisco Catalyst® Switch 802.1X Configuration Cisco Wireless LAN Controller (WLC) 802.1X Configuration Cisco Identity Services Engine (ISE) 802.1X Configuration Describing Endpoint Security Technologies* Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Deploying Cisco Advanced Malware Protection (AMP) for Endpoints* Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Introducing Network Infrastructure Protection* Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Deploying Control Plane Security Controls* Infrastructure ACLs Control Plane Policing Control Plane Protection Deploying Layer 2 Data Plane Security Controls* Overview of Layer 2 Data Plane Security Controls Virtual LAN (VLAN)-Based Attacks Mitigation Spanning Tree Protocol (STP) Attacks Mitigation Deploying Layer 3 Data Plane Security Controls* Infrastructure Antispoofing ACLs Unicast Reverse Path Forwarding IP Source Guard Deploying Management Plane Security Controls* Cisco Secure Management Access Simple Network Management Protocol Version 3 Secure Access to Cisco Devices Deploying Traffic Telemetry Methods* Network Time Protocol Device and Network Events Logging and Export Network Traffic Monitoring Using NetFlow Deploying Cisco Stealthwatch Enterprise* Cisco Stealthwatch Offerings Overview Cisco Stealthwatch Enterprise Required Components Flow Stitching and Deduplication Describing Cloud and Common Cloud Attacks* Evolution of Cloud Computing Cloud Service Models Security Responsibilities in Cloud Securing the Cloud* Cisco Threat-Centric Approach to Network Security Cloud Physical Environment Security Application and Workload Security Deploying Cisco Stealthwatch Cloud* Cisco Stealthwatch Cloud for Public Cloud Monitoring Cisco Stealthwatch Cloud for Private Network Monitoring Cisco Stealthwatch Cloud Operations Describing Software-Defined Networking (SDN*) Software-Defined Networking Concepts Network Programmability and Automation Cisco Platforms and APIs ​ * This section is self-study material that can be done at your own pace after the instructor-led portion of the course. Lab outline Configure Network Settings and NAT on Cisco ASA Configure Cisco ASA Access Control Policies Configure Cisco Firepower NGFW NAT Configure Cisco Firepower NGFW Access Control Policy Configure Cisco Firepower NGFW Discovery and IPS Policy Configure Cisco NGFW Malware and File Policy Configure Listener, Host Access Table (HAT), and Recipient Access Table (RAT) on Cisco Email Security Appliance (ESA) Configure Mail Policies Configure Proxy Services, Authentication, and HTTPS Decryption Enforce Acceptable Use Control and Malware Protection Examine the Umbrella Dashboard Examine Cisco Umbrella Investigate Explore DNS Ransomware Protection by Cisco Umbrella Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel Configure Point-to-Point VPN between the Cisco ASA and Cisco Firepower NGFW Configure Remote Access VPN on the Cisco Firepower NGFW Explore Cisco AMP for Endpoints Perform Endpoint Analysis Using AMP for Endpoints Console Explore File Ransomware Protection by Cisco AMP for Endpoints Console Explore Cisco Stealthwatch Enterprise v6.9.3 Explore Cognitive Threat Analytics (CTA) in Stealthwatch Enterprise v7.0 Explore the Cisco Cloudlock Dashboard and User Security Explore Cisco Cloudlock Application and Data Security Explore Cisco Stealthwatch Cloud Explore Stealthwatch Cloud Alert Settings, Watchlists, and Sensors ​ ​ ​ ​ Dates and Booking UAE, Dubai Feb 6-10, 2023 Apr 3-7, 2023 Jun 5-9, 2023 Aug 7-11, 2023 Oct 9-13, 2023 Dec 4-8, 2023 Egypt, Cairo On demand ​ Kuwait, Kuwait City On demand ​ Oman, Muscat On demand ​ Qatar, Doha Feb 6-10, 2023 Jun 5-9, 2023 Oct 9-13, 2023 ​ Saudi Arabia, Riyadh Apr 3-7, 2023 Aug 7-11, 2023 Dec 4-8, 2023 Booking prerequis contenu Objectifs public Dates

bottom of page