India:+91-8143-111-555
USA: +1-703-445-4802
UK:+44 20 3287 2021
WhatsApp: +91-8143-110-555
FortiNet Training in Hyderabad

FortiNet Training in Hyderabad

FortiNet

The Fortinet online training course offers Industry-Standard training on all the Fortinet’s security technologies and products. Whether you are a Fortinet end-user customer, partner or employee, our training will prepare you for success in operation and administration of Fortinet products.

Duration: 30hrs

Course Content:

FortiAuthenticator
  • Introduction to FortiAuthenticator 
  • Deploying and Configuring FortiAuthenticator 
  • Administering and Authenticating Users 
  • Captive Portal 
  • Two-factor Authentication 
  • Certificate Management 
  • Fortinet Single Sign-On 
  • 802.1X Authentication 
  • Troubleshooting
FortiMail
  • Email Concepts
  • Basic Setup
  • Server Mode
  • Access Control
  • SSL/TLS
  • Session Monitoring
  • Antivirus & Content Inspection
  • Antispam
  • IBE
  • High Availability
  • Gateway & Transparent Mode
  • Diagnostics
FortiWeb
  • WAF Concepts 
  • Basic Setup 
  • Integrating External SIEM 
  • Integrating Front-End SNAT & Load Balancers 
  • DoS & Defacement 
  • Signatures, Sanitization & Auto-learning 
  • SSL/TLS 
  • Authentication & Access Control 
  • PCI DSS 3.0 Compliance 
  • Caching & Compression 
  • Rewriting & Redirects 
  • Troubleshooting
FortiAnalyzer
  • Overview
  • Configuring & Administration
  • Device Registration
  • Working With logs & Achieves
  • Reports
FortiGate I
  • Introduction to fortinet
  • Firewall Policies
  • Authentication
  • SSL VPN
  • Basic IPSEC VPN
  • Antivirus
  • Explicit Proxy
  • Webfilter
  • Application Control
  • Logging & Monitoring
FortiGate II
  • Routing
  • Virtual Domains
  • Transparent Mode
  • High Availability
  • Advance IPSEC VPN
  • Intrusion Prevention system
  • FSSO
  • Certificate Operations
  • Data Leakage Prevention
  • Diagnostics
  • Hardware Acceleration
  • IPv6
FortiManager
  • Introduction to FortiManager
  • System Settings
  • Device Manager
  • Policy & Objects
  • Additional System Operations

Workfusion Robotic Process Automation (RPA) Training in Hyderabad

Workfusion Robotic Process Automation (RPA) Training in Hyderabad

Workfusion Robotic Process Automation (RPA)


Online Web based Training is a practical strategy for adapting new innovation,development and different abilities from the comfort of your location.Experts need to continually overhaul their skill set to remain competitive in today’s quick evolving world. Benefit from our huge library of training programs. Ecorptrainings is a famous supplier of Online IT Training (OIT) provider from beginner to advance level courses offered worldwide.

Duration: 30hrs

Course Content:

  • Module 1 – Introduction to Automation – Part 1
    Welcome to the Introduction to Automation modules. There is a lot to become familiar with, so we have divided this introduction into two parts.
Part 1 provides definitions of Automation, and reviews relevant aspects of Business Operations Automation, including Robotic Process Automation, Cognitive Automation, and Front and Back Office Automation.This course will inform and enable automation professionals to speak confidently and compellingly about Intelligent Automation. This course includes multiple modules, including:
Introduction to Automation – Part 1
Introduction to Automation – Part 2
Automation Market
Automation Drivers
Automation Economics
Automation Challenges
Automation Strategy
Automation Implementation
  • Module 2 – Introduction to Automation – Part 2
    Part 2 discusses IT Automation, and Application Development Automation. In addition, a series of comparisons highlight the differences between commonly used Automation terms and other adjacent technologies.Introduction to Automation Part 2 Learning Objectives
    Define IT and Application Development Automation and contrast them with Business Automation.Compare and contrast Business Process Management and Automation.Compare and contrast Automation and Analytics.Compare and contrast Automation and Macros.Welcome to the Market module of the Automation Essentials course. This Market module examines the size of the Automation market, the size and industries of organizations implementing Automation solutions, and the key use cases that drive Automation adoption.
  • Module 3 – Automation Market
    Welcome to the Market module of the Automation Essentials course. This Market module examines the size of the Automation market, the size and industries of organizations implementing Automation solutions, and the key use cases that drive Automation adoption.
  • Module 4 – Automation Drivers
    Welcome to the Automation Drivers module. This module examines what factors trigger the interest in Automation, what are the key drivers of adoption, and what are the challenges that can be encountered in Intelligent Automation initiatives.
  • Module 5 – Automation Economics
    Welcome to the Automation Economics module. This module examines how Automation has a positive influence on cost and revenue in service-oriented enterprises. Automation reduces FTE headcount, and a host of related costs. At the same time, Automation allows businesses to handle a greater volume of business, with improved quality, governance, and compliance.
Economics Module – Learning Objectives
Estimate the range of cost savings Automation brings to operations in low-cost locales
Estimate the range of cost savings Automation brings to onshore operations
Identify the typical payback period for an investment in Automation
Drivers Module – Learning Objectives
Rank and characterize the drivers for Intelligent Automation adoption
Recognize the circumstances that trigger Intelligent Automation adoption
Identify impediments to Intelligent Automation adoption
  • Module 6 – Automation Challenges
    Welcome to the Automation Challenges module. This module examines the challenges organizations face when integrating Intelligent Automation technology into their business. Rapid evolution of technology means that operations teams can quickly improve their performance and set their organizations on the digital journey. It also means that organizations face a number of challenges in adopting Intelligent Automation.Challenges Module – Learning Objectives
    List the challenges to effective governance of Intelligent Automation
    Explain the change management process for Intelligent Automation
    Describe the skills necessary to implement Intelligent Automation successfully
    Highlight primary issues that the Information Technology (IT) organizations face in adopting IA capabilities
  • Module 7 – Automation Strategy
    Welcome to the Automation Strategy module. This module examines Automation strategy, the game plan that addresses critical Automation success factors including process excellence, governance, technical skills, and sustainable deployment.
  • Strategy Module – Learning Objectives
    List the critical elements of Automation strategy
    Describe the balance of Automation Strategy control and autonomy
    Compare and contrast the four models of Automation Center of Excellence (CoE)
  • Module 8 – Automation Implementation
    Welcome to the Automation Strategy module. This module examines Automation implementation, the approach by which Automation projects are delivered quickly and correctly using an Agile approach. An agile implementation life-cycle works best for implementing Intelligent Automation projects. Experience implementing combined Cognitive and Robotic Process Automation (RPA) projects reveals a 12-week agile implementation approach delivers sound results.
  • Implementation Module – Learning Objectives
    List the stages of an Automation implementation
    Identify the key deliverables of the Agile Kick-off
    List the key activities of the Processing work track
Adeptia Online Training in hyderabad

Adeptia Online Training in hyderabad

Adeptia

Adeptia provides practical training solutions to help you get the maximum value from your investment in Integration. Our training courses are designed by IT professionals and subject matter experts with extensive Integration consulting experience. With a focus on real-life scenarios, our instructor-led, hands-on training is geared toward leveraging Adeptia Integration for your important business needs.

Duration: 30hrs


Course Content:

  • Understand Adeptia Technical Architecture(Solaris based)
  • Understand key concepts, terminology and features
  • Design and Implement processes using Adeptia Design Methodology
  • Usage of Adeptia Process Designer
  • Usage of basic functions and services including integrations and mapping
  • Usage of Web Services
  • Monitor and improve business processes
  • Administration and Operations(Solaris based)
  • Utilizing process variables and sub-processes
  • Design how to implement custom services and extensions
  • Complex Transforms
  • trouble shooting & system maintenance
  • Performance Tuning
  • Web service oriented architecture/API concepts / SOA
  • Server Administration(Solaris based)
PGP Universal Server 3.2 and Desktop 10.2 Administration Training in Hyderabad

PGP Universal Server 3.2 and Desktop 10.2 Administration Training in Hyderabad

PGP UNIVERSAL SERVER 3.2 AND PGP DESKTOP 10.2: ADMINISTRATION

The PGP Universal Ser ver 3.2 and Desktop 10.2 Administration course for PGP Universal Server 3.2 and PGP Desktop 10.2 is designed to provide you with the fundamental knowledge a nd hands-on lab experience to install, administer, and troubleshoot the PGP Universal Management Server and primary client product. The hands-on labs include exercises for installation and configuration of the PGP Universal Server and PGP Desktop products, including policy-based messaging security, manual and directory-style user and group management, and PGP Desktop policy and usage, including for the PGP Whole Disk Encryption product. The course also covers troubleshooting of PGP Desktop, including installation and enrollment problems, PGP Whole Disk Encryption, and common files and services that may need to be manipulated or repaired. Additionally, you are introduced to the following PGP encryption products: Key Management Services, PGP Support Package for BlackBerry, PGP Mobile, PGP iOS Viewer and Endpoint Device Control.

Prerequisites
  • An understanding of information security concepts and terminology helps you succeed in this course. Also, this course requires familiarity with networking and computing concepts. Symantec recommends that students taking this course have at least one year of information technology experience.
Course Content:

Cryptography Essentials

  • Cryptography defined
  • Caesar cipher
  • Symmetric-Key Cryptography
  • Public-Key Cryptography
  • PGP Public-Key Cryptography
  • Digital Signatures
  • Trust Models
  • Keys, Key Signatures and Key properties
  • Verifying keys with key fingerprints
  • Passphrases
  • Certificates

PGP Product Information

  • PGP Universal Server
  • PGP Desktop
  • PGP Command Line
  • PGP Support Package for BlackBerry
  • PGP Mobile
  • PGP iOS Viewer

Installing PGP Un iversal Server

  • PGP Universal Server overview
  • Installation tasks and options
  • Completing the PGP Universal Server Setup Assistant

Administrative Keys

  • A review of trust and verification
  • The Organization Key
  • The Organization Certificate
  • Configuration and usage of the Additional Decryption Key
  • Other certificates used for trust on PGP Universal Server
  • Ignition key types and features

Consumers and Groups

  • Consumers and Groups
  • PGP product user definition
  • Consumer groups
  • Introduction to consumer policy
  • How users, groups, and policy work together

Server Messaging

  • Learn Mode
  • In-depth look at Mail Proxy configuration
  • Description of server mail flow and typical configurations

Monitoring and Reporting

  • Server monitoring and logging
  • Updates, backups, and restoring

Mail Policy

  • Definition of policy chains and rules
  • Rule conditions, actions, and key searches
  • Default mail flow and message policy
  • Adding custom chains to mail flow
  • Overview of various types of policy chains
  • Demonstration and detailed explanation of adding a rule
  • Special messaging actions and dictionaries

Key Not Found

  • Problems that require a Key Not Found policy
  • Introduction to Key Not Found configuration

Web Messenger

  • Definition of Web Messenger
  • Description of functionality
  • Demonstration of end-user inbox creation
  • Inbox and service administration
  • Inbox replication and backup
  • Customization templates

Web Messenger Con't

  • Regular Email option for Web Messenger
  • PDF Messenger statement and certified delivery
  • How the Out of Mail Stream Consumer Policy option functions
  • PGP public key directories
  • Smart Trailer invitation option overview
  • PGP Desktop / S/MIME option overview
  • PGP Universal Satellite overview
  • Preparing Universal Server for PGP Desktop Clients
  • Introduction to directory synchronization
  • High-level overview of LDA P
  • How the server uses a directory to add and assign users to groups
  • Configuring PGP Universal Server Directory Synchronization

Keys

  • Managed key configuration
  • Key modes
  • Subkeys
  • Key usage flags
  • Smart card
  • Introduction to key management services

Installing PGP Desktop

  • System requirements
  • Citrix and TS compatibility
  • Downloading a custom PGP Desktop installer
  • Modifying installed components

Configuring Client Enrollment

  • Definition of enrollment
  • Email, LDA P, and Silent enrollment type overview

General PGP Desktop Policy

  • General PGP Desktop Policy
  • Options on the General Card of the PGP Desktop settings of a consumer policy
  • Licensing managed PGP Desktop clients
  • Updating settings for managed installations
  • PGP Desktop Messaging
  • How PGP Desktop affects messaging infrastructure
  • Options on the Messaging Card of the PGP Desktop settings of a consumer policy
  • MAPI encrypt and sign buttons and offline mail processing

Configuring PGP Whole Disk Encryption

  • What is Whole Dis k Encryption
  • Configuring WDE
  • PGP Whole Disk Encryption for Windows
  • PGP Whole Disk Encryption for Mac OSX
  • PGP w hole Disk Encryption for Linux

PGP Whole Disk Encryption Management and Recover

  • The pgpwd command-line tool
  • Logon failure and reporting
  • The WDE-ADMIN group for large-scale administration
  • PGP Whole Disk Encryption in the PGP Desktop settings of a consumer policy, including
  • authentication methods and user per missions
  • Recovery options

PGP NetShare

  • Defining PGP NetShare
  • Encrypted folder creation
  • Configuration of the PGP Universal Server Consumer
  • Policy options for NetShare, including automated folder protection and application-based file protection
  • Client-side administration features for PGP NetShare
  • Miscellaneous compatibility and feature information about PGP NetShare
  • Active Directory Group integration and PGP NetShare usage demonstrations

Other PGP Desktop Utilities

  • PGP Zip file and folder protection
  • Securely erasing information using PGP Shredder and the Shred Free Space features
  • PGP Virtual Disk secure volumes
  • Usage cases and PGP Portable definition

Clustering

  • How PGP Universal Server Clustering w orks
  • Using the DMZ Clustering Zone
  • Cluster failover
  • Web Messenger inbox replication
  • Demonstration of cluster creation

PGP Support Tools

  • Introduction to the PGP Support Know ledgebase
  • The quick reference document
  • Using product documentation

PGP Desktop Commands and Services

  • Common PGP Desktop services
  • Policy, preference, logging, and other file locations
  • PGP Desktop debug logging

PGP Desktop Installation and Enrollment

  • Installation of PGP Desktop Fails
  • If PGP Desktop does not enroll
  • Enrollment error messages
  • Credentials problems

PGP Whole Disk Encryption

  • Boot record and user record information
  • If PGP Whole Disk Encryption does not start
  • Using the recovery ISO and Window s PE
  • Authentication problems
  • Policy and single-sign-on issues
  • Disk errors
  • Enrollment problems
  • PGP Universal Server Overview
  • Architecture and services of the server
  • VMWare tools
  • Custom reporting
  • File and folder locations
  • Expanded logging, including debug information

PGP Universal Server Installation

  • PGP Universal Server Installation
  • Server hardware
  • Installation failure troubleshooting
  • Installation disk error
  • Licensing issues

PGP Universal Server General Troubleshooting

  • PGP Universal Server General Troubleshooting
  • Ignition Key errors
  • If the server is not functioning (the datalayer is down)

PGP Universal Server Messaging

  • If messages are not being encrypted
  • Mail queuing
  • Open relay
  • Mail routes
  • Certificate expiring

Web Messenger

  • Web Messenger login issues
  • Web Messenger non-delivery
  • Certificate problems

Clustering

  • Architecture
  • Common problems
Natural    Natural   Natural   Natural   Natural   Natural   Natural   Natural   Natural   Natural   Natural