Filter Keyword to...

Category: IT Professionals

Results Per Page :
Law, Regulation, Compliance, & Investigations is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep...
[READ MORE]
Law, Regulation, Compliance, & Investigations is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon helps you become familiar with principles of computer law and crime, incident handling, evidence, investigation and ethics. At the conclusion of this course, you will be familiar with the issues and concepts of the Law, Regulation, Compliance, & Investigations domain required to pass the CISSP exam.
Law, Regulation, Compliance, & Investigations is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon helps you become familiar with principles of computer law and crime, incident handling, evidence, investigation and ethics. At the conclusion of this course, you will be familiar with the issues and concepts of the Law, Regulation, Compliance, & Investigations domain required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Operations Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey,...
[READ MORE]
Operations Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon goes over security administration, intrusion detection, auditing, threats and countermeasures. At the conclusion of this course, you will be familiar with the issues and concepts of the Operations Security domain required to pass the CISSP exam.
Operations Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon goes over security administration, intrusion detection, auditing, threats and countermeasures. At the conclusion of this course, you will be familiar with the issues and concepts of the Operations Security domain required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Physical (Environmental) Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from...
[READ MORE]
Physical (Environmental) Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon reviews common threats, security controls, facility requirements and environmental issues. At the conclusion of this course, you will be familiar with the issues and concepts of the Physical Security domain required to pass the CISSP exam.
Physical (Environmental) Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon reviews common threats, security controls, facility requirements and environmental issues. At the conclusion of this course, you will be familiar with the issues and concepts of the Physical Security domain required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Security Architecture & Design is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from...
[READ MORE]
Security Architecture & Design is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon discusses Bell-LaPadula, Clark-Wilson and other security models, as well as common security flaws. At the conclusion of this course, you will be familiar with the issues and concepts of the Security Architecture & Design domain required to pass the CISSP exam.
Security Architecture & Design is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon discusses Bell-LaPadula, Clark-Wilson and other security models, as well as common security flaws. At the conclusion of this course, you will be familiar with the issues and concepts of the Security Architecture & Design domain required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
Telecommunications & Network Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course...
[READ MORE]
Telecommunications & Network Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon discusses LAN technologies, devices and architectures, as well as network security techniques, protocols and common attacks. At the conclusion of this course, you'll be familiar with the issues and concepts required to pass the CISSP exam.
Telecommunications & Network Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon discusses LAN technologies, devices and architectures, as well as network security techniques, protocols and common attacks. At the conclusion of this course, you'll be familiar with the issues and concepts required to pass the CISSP exam.
[READ LESS]
Produced by: LearnKey
The substantial increase in the amount of digitized data over the past few years requires an equal response in attention to the security of that data. In this course, you'll learn about asset security best...
[READ MORE]
The substantial increase in the amount of digitized data over the past few years requires an equal response in attention to the security of that data. In this course, you'll learn about asset security best practices including classification techniques and asset security ownership. This course also covers privacy protection considerations, including data remanence and collection limitations. Finally, you'll explore best practices for media, hardware and personnel retention, and techniques for determining the most appropriate data security controls like scoping, tailoring and cryptography. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
The substantial increase in the amount of digitized data over the past few years requires an equal response in attention to the security of that data. In this course, you'll learn about asset security best practices including classification techniques and asset security ownership. This course also covers privacy protection considerations, including data remanence and collection limitations. Finally, you'll explore best practices for media, hardware and personnel retention, and techniques for determining the most appropriate data security controls like scoping, tailoring and cryptography. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
Securing network communications is a key activity in managing the security of any IT system, and the network is a common and potent vector for attack. In this course, you'll learn about the design and...
[READ MORE]
Securing network communications is a key activity in managing the security of any IT system, and the network is a common and potent vector for attack. In this course, you'll learn about the design and components of network systems, how to implement secure systems, and how to mitigate common attacks. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
Securing network communications is a key activity in managing the security of any IT system, and the network is a common and potent vector for attack. In this course, you'll learn about the design and components of network systems, how to implement secure systems, and how to mitigate common attacks. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
Identity and access management is at the heart of security management and is key to the CISSP examination. Compromising identity is the main aim of most attacks on data confidentiality. In this course, you'll...
[READ MORE]
Identity and access management is at the heart of security management and is key to the CISSP examination. Compromising identity is the main aim of most attacks on data confidentiality. In this course, you'll learn about physical and logical access control, the proper management of identity and identification of the identity lifecycle, and attacks to access control and their mitigation. You'll also learn about the design and components of network systems, how to implement secure systems, and how to mitigate common attacks. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
Identity and access management is at the heart of security management and is key to the CISSP examination. Compromising identity is the main aim of most attacks on data confidentiality. In this course, you'll learn about physical and logical access control, the proper management of identity and identification of the identity lifecycle, and attacks to access control and their mitigation. You'll also learn about the design and components of network systems, how to implement secure systems, and how to mitigate common attacks. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
Risk management is an integral part of overall information systems security. In this course, you'll learn about personnel security best practices, risk management concepts, and risk analysis techniques....
[READ MORE]
Risk management is an integral part of overall information systems security. In this course, you'll learn about personnel security best practices, risk management concepts, and risk analysis techniques. You'll also be introduced to threat modeling best practices, countermeasure selection, and implementing risk controls. Finally, this course covers risk monitoring and reporting best practices. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
Risk management is an integral part of overall information systems security. In this course, you'll learn about personnel security best practices, risk management concepts, and risk analysis techniques. You'll also be introduced to threat modeling best practices, countermeasure selection, and implementing risk controls. Finally, this course covers risk monitoring and reporting best practices. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
The time spent planning and establishing security controls isn't worth much if you don't spend time ensuring that those security designs work. In this course, you'll learn how to design and validate security...
[READ MORE]
The time spent planning and establishing security controls isn't worth much if you don't spend time ensuring that those security designs work. In this course, you'll learn how to design and validate security control assessment and test strategies, and perform vulnerability assessments. This course also covers how to perform log reviews, code reviews and tests, and perform penetration testing to test security controls. Finally, you'll learn about best practices for collecting security test data, and analyzing test outputs so you can identify gaps and implement any further required security controls in the overall security design. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
The time spent planning and establishing security controls isn't worth much if you don't spend time ensuring that those security designs work. In this course, you'll learn how to design and validate security control assessment and test strategies, and perform vulnerability assessments. This course also covers how to perform log reviews, code reviews and tests, and perform penetration testing to test security controls. Finally, you'll learn about best practices for collecting security test data, and analyzing test outputs so you can identify gaps and implement any further required security controls in the overall security design. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
Integrating comprehensive security controls into information systems planning and design activities is vital for establishing IS architecture that has necessary functionality combined with the ability to fend...
[READ MORE]
Integrating comprehensive security controls into information systems planning and design activities is vital for establishing IS architecture that has necessary functionality combined with the ability to fend off both internal and external threats. In this course, you'll learn best practices for implementing and managing secure engineering processes, including applying underlying security principles in IS architecture design. This course also introduces you to systems security evaluation models selecting appropriate controls and countermeasures. Finally, you'll learn about IS security capabilities and vulnerabilities and how to capitalize both for establishing security of the overall IS architecture. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
Integrating comprehensive security controls into information systems planning and design activities is vital for establishing IS architecture that has necessary functionality combined with the ability to fend off both internal and external threats. In this course, you'll learn best practices for implementing and managing secure engineering processes, including applying underlying security principles in IS architecture design. This course also introduces you to systems security evaluation models selecting appropriate controls and countermeasures. Finally, you'll learn about IS security capabilities and vulnerabilities and how to capitalize both for establishing security of the overall IS architecture. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
Even in an age of digitized data, securing the physical environment is still a critical part of security engineering. In this course, you'll learn about security threats, both natural and man-made, and...
[READ MORE]
Even in an age of digitized data, securing the physical environment is still a critical part of security engineering. In this course, you'll learn about security threats, both natural and man-made, and techniques for preventing loss from these threats. You'll also learn about site and facility design considerations, restricted work area security, and best practices for crime prevention through secure design of the physical environment. This course is one of a series in the SkillSoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
Even in an age of digitized data, securing the physical environment is still a critical part of security engineering. In this course, you'll learn about security threats, both natural and man-made, and techniques for preventing loss from these threats. You'll also learn about site and facility design considerations, restricted work area security, and best practices for crime prevention through secure design of the physical environment. This course is one of a series in the SkillSoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
The day to day security activities in an organization are the heart of security operations. In this course, you'll learn techniques for performing general security operations activities such as security...
[READ MORE]
The day to day security activities in an organization are the heart of security operations. In this course, you'll learn techniques for performing general security operations activities such as security investigations, including best practices and requirements for the types of investigations that security professionals typically take part in. This course also introduces you to techniques for using logging and monitoring activities for security purposes, establishing secure resource provisioning, and applying general security concepts such as least privilege to all security operations activities. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
The day to day security activities in an organization are the heart of security operations. In this course, you'll learn techniques for performing general security operations activities such as security investigations, including best practices and requirements for the types of investigations that security professionals typically take part in. This course also introduces you to techniques for using logging and monitoring activities for security purposes, establishing secure resource provisioning, and applying general security concepts such as least privilege to all security operations activities. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
One of the primary activities within security operations is detecting and responding to security-related incidents. In this course, you'll learn incident management techniques including incident detection,...
[READ MORE]
One of the primary activities within security operations is detecting and responding to security-related incidents. In this course, you'll learn incident management techniques including incident detection, response, mitigation, reporting, and recovery best practices. This course also covers how to use preventative measures such as firewalls, whitelisting and blacklisting, sandboxing, and anti-malware. In addition, you'll be introduced to patch and vulnerability management activities such as patch testing, installation, and deployment. Finally, this course covers change management processes that security professionals regularly take part in as part of security operations, including versioning, baselining, and security impact analyses. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
One of the primary activities within security operations is detecting and responding to security-related incidents. In this course, you'll learn incident management techniques including incident detection, response, mitigation, reporting, and recovery best practices. This course also covers how to use preventative measures such as firewalls, whitelisting and blacklisting, sandboxing, and anti-malware. In addition, you'll be introduced to patch and vulnerability management activities such as patch testing, installation, and deployment. Finally, this course covers change management processes that security professionals regularly take part in as part of security operations, including versioning, baselining, and security impact analyses. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
Security professionals are required to anticipate, plan for, respond to, and recover from security incidents quickly and appropriately as part of security operations for the overall organization. In this...
[READ MORE]
Security professionals are required to anticipate, plan for, respond to, and recover from security incidents quickly and appropriately as part of security operations for the overall organization. In this course, you'll learn how to develop and implement recovery strategies, including specific strategies for backup storage, recovery sites, multiple processing sites, and system resilience and fault tolerance requirements. This course also covers best practices for disaster recovery activities, including response, personnel, communications, assessment, restoration, and training and awareness considerations. Finally, you'll learn about organizational safety measures such as business continuity planning, managing physical security of the premises, and addressing personnel safety concerns like employee monitoring and privacy policies. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
Security professionals are required to anticipate, plan for, respond to, and recover from security incidents quickly and appropriately as part of security operations for the overall organization. In this course, you'll learn how to develop and implement recovery strategies, including specific strategies for backup storage, recovery sites, multiple processing sites, and system resilience and fault tolerance requirements. This course also covers best practices for disaster recovery activities, including response, personnel, communications, assessment, restoration, and training and awareness considerations. Finally, you'll learn about organizational safety measures such as business continuity planning, managing physical security of the premises, and addressing personnel safety concerns like employee monitoring and privacy policies. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
The fundamental security principles of confidentiality, availability, and integrity guide all successful information security best practices. In this course, you'll learn about applying these security...
[READ MORE]
The fundamental security principles of confidentiality, availability, and integrity guide all successful information security best practices. In this course, you'll learn about applying these security principles, as well as best practices for establishing security governance principles. You'll also explore how best to establish and implement comprehensive security guidelines across the organization. This course is one of a series in the SkillSoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
The fundamental security principles of confidentiality, availability, and integrity guide all successful information security best practices. In this course, you'll learn about applying these security principles, as well as best practices for establishing security governance principles. You'll also explore how best to establish and implement comprehensive security guidelines across the organization. This course is one of a series in the SkillSoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
While information systems security professionals are not generally involved in software development, they are responsible to assess and implement security controls on software being used within the...
[READ MORE]
While information systems security professionals are not generally involved in software development, they are responsible to assess and implement security controls on software being used within the organizational environment. In this course you'll learn about best practices for implementing and enforcing software security controls. This course also covers best practices for assessing software security effectiveness, such as using change logs and audits, software security risk analysis, and software security acceptance testing. Finally this course covers best practices for assessing security impacts of acquired or third-party software, and software assurance. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
While information systems security professionals are not generally involved in software development, they are responsible to assess and implement security controls on software being used within the organizational environment. In this course you'll learn about best practices for implementing and enforcing software security controls. This course also covers best practices for assessing software security effectiveness, such as using change logs and audits, software security risk analysis, and software security acceptance testing. Finally this course covers best practices for assessing security impacts of acquired or third-party software, and software assurance. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
Cisco business video collaboration is comprised of many functional components and collaboration endpoint control plane elements such as Cisco Unified Communications Manager, Cisco TelePresence Video...
[READ MORE]
Cisco business video collaboration is comprised of many functional components and collaboration endpoint control plane elements such as Cisco Unified Communications Manager, Cisco TelePresence Video Communication Server (VCS), Cisco Digital Media Manager (DMM), and Cisco Video Surveillance Manager (VSM). This course describes Cisco Collaboration and the functional components in the Cisco Collaboration architecture, and compares Cisco Collaboration with legacy enterprise communication architectures. In this course, you will learn about the discovery of central Cisco Unified Communications, Cisco TelePresence, and Cisco digital-media endpoint control plane elements, and other relevant endpoint control plane network requisites. This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 210-065: Implementing Cisco Video Network Devices.
Cisco business video collaboration is comprised of many functional components and collaboration endpoint control plane elements such as Cisco Unified Communications Manager, Cisco TelePresence Video Communication Server (VCS), Cisco Digital Media Manager (DMM), and Cisco Video Surveillance Manager (VSM). This course describes Cisco Collaboration and the functional components in the Cisco Collaboration architecture, and compares Cisco Collaboration with legacy enterprise communication architectures. In this course, you will learn about the discovery of central Cisco Unified Communications, Cisco TelePresence, and Cisco digital-media endpoint control plane elements, and other relevant endpoint control plane network requisites. This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 210-065: Implementing Cisco Video Network Devices.
[READ LESS]
Produced by: SkillSoft
Cisco provides a diverse offering of business video solutions. This course provides an overview of the Cisco video and content delivery products and also compares the Cisco Digital Media Suite (DMS) and other...
[READ MORE]
Cisco provides a diverse offering of business video solutions. This course provides an overview of the Cisco video and content delivery products and also compares the Cisco Digital Media Suite (DMS) and other Cisco digital media solutions with legacy digital media content architectures as well as Cisco Digital Media Player (DMP) integration into Appspace. In this course, you'll learn about the Cisco Video Surveillance solution and functional components within the Cisco Unified Communications video solution architecture and also explore Cisco Video Surveillance as part of the Cisco Connected Physical Security solution and legacy CCTV video surveillance architectures. This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 210-065: Implementing Cisco Video Network Devices.
Cisco provides a diverse offering of business video solutions. This course provides an overview of the Cisco video and content delivery products and also compares the Cisco Digital Media Suite (DMS) and other Cisco digital media solutions with legacy digital media content architectures as well as Cisco Digital Media Player (DMP) integration into Appspace. In this course, you'll learn about the Cisco Video Surveillance solution and functional components within the Cisco Unified Communications video solution architecture and also explore Cisco Video Surveillance as part of the Cisco Connected Physical Security solution and legacy CCTV video surveillance architectures. This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 210-065: Implementing Cisco Video Network Devices.
[READ LESS]
Produced by: SkillSoft
Among the most powerful elements of Cisco TelePresence is the capability of facilitating conferences between more than two locations. Additionally, customers have come to expect high definition for all...
[READ MORE]
Among the most powerful elements of Cisco TelePresence is the capability of facilitating conferences between more than two locations. Additionally, customers have come to expect high definition for all aspects of the experience, including the playback of on-demand video. This capability of high definition media is provided by Cisco Digital Media Players. In this course, you'll learn about configuration of MultiSite Cisco TelePresence conferencing as well as Cisco Digital Media Player management and configuration. This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 210-065: Implementing Cisco Video Network Devices.
Among the most powerful elements of Cisco TelePresence is the capability of facilitating conferences between more than two locations. Additionally, customers have come to expect high definition for all aspects of the experience, including the playback of on-demand video. This capability of high definition media is provided by Cisco Digital Media Players. In this course, you'll learn about configuration of MultiSite Cisco TelePresence conferencing as well as Cisco Digital Media Player management and configuration. This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 210-065: Implementing Cisco Video Network Devices.
[READ LESS]
Produced by: SkillSoft
Cisco TelePresence has a wide variety of solutions for endpoints. Software-based options for TelePresence endpoints greatly extend the flexibility of this enterprise solution. Among those options is the Cisco...
[READ MORE]
Cisco TelePresence has a wide variety of solutions for endpoints. Software-based options for TelePresence endpoints greatly extend the flexibility of this enterprise solution. Among those options is the Cisco TC software-based endpoint. This course focuses on the installation and configuration of Cisco TelePresence TC Software-based endpoints. Youll learn about call control scenarios, firewall traversal, and mobility. This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 210-065: Implementing Cisco Video Network Devices.
Cisco TelePresence has a wide variety of solutions for endpoints. Software-based options for TelePresence endpoints greatly extend the flexibility of this enterprise solution. Among those options is the Cisco TC software-based endpoint. This course focuses on the installation and configuration of Cisco TelePresence TC Software-based endpoints. Youll learn about call control scenarios, firewall traversal, and mobility. This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 210-065: Implementing Cisco Video Network Devices.
[READ LESS]
Produced by: SkillSoft
It is essential that IT individuals who deploy and maintain Cisco TelePresence understand the options for TelePresence endpoints. Additionally, successful deployment requires knowledge of how to properly...
[READ MORE]
It is essential that IT individuals who deploy and maintain Cisco TelePresence understand the options for TelePresence endpoints. Additionally, successful deployment requires knowledge of how to properly configure each endpoint, whether software or hardware-based. In this course, you'll learn about working with Cisco TelePresence endpoints including software-based endpoints and the Cisco DX650. This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 210-065: Implementing Cisco Video Network Devices.
It is essential that IT individuals who deploy and maintain Cisco TelePresence understand the options for TelePresence endpoints. Additionally, successful deployment requires knowledge of how to properly configure each endpoint, whether software or hardware-based. In this course, you'll learn about working with Cisco TelePresence endpoints including software-based endpoints and the Cisco DX650. This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 210-065: Implementing Cisco Video Network Devices.
[READ LESS]
Produced by: SkillSoft
Familiarity with Cisco Unified IP phones, collaboration desk endpoints and Cisco Jabber is imperative for the IP network and telephony engineer looking to further develop their collaboration and video skills....
[READ MORE]
Familiarity with Cisco Unified IP phones, collaboration desk endpoints and Cisco Jabber is imperative for the IP network and telephony engineer looking to further develop their collaboration and video skills. This course describes and compares the characteristics of the Cisco Unified IP phones, Collaboration desk endpoints, and Cisco Jabber. In this course, you will explore how to configure Cisco Unified IP phones and Cisco Jabber to register with call control servers and prepare for audio and video services. This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 210-065: Implementing Cisco Video Network Devices.
Familiarity with Cisco Unified IP phones, collaboration desk endpoints and Cisco Jabber is imperative for the IP network and telephony engineer looking to further develop their collaboration and video skills. This course describes and compares the characteristics of the Cisco Unified IP phones, Collaboration desk endpoints, and Cisco Jabber. In this course, you will explore how to configure Cisco Unified IP phones and Cisco Jabber to register with call control servers and prepare for audio and video services. This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 210-065: Implementing Cisco Video Network Devices.
[READ LESS]
Produced by: SkillSoft
Verifying, troubleshooting and resolving issues are important skills to have for the IP network and telephony collaboration engineer. This course describes how to verify and troubleshoot most common...
[READ MORE]
Verifying, troubleshooting and resolving issues are important skills to have for the IP network and telephony collaboration engineer. This course describes how to verify and troubleshoot most common registration, call setup, and video quality issues for Cisco Unified IP phones and Cisco Jabber. In this course, you'll learn about log verification, registration and endpoint issues, common call-setup issues, and QoS (Quality of Service). This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 210-065: Implementing Cisco Video Network Devices.
Verifying, troubleshooting and resolving issues are important skills to have for the IP network and telephony collaboration engineer. This course describes how to verify and troubleshoot most common registration, call setup, and video quality issues for Cisco Unified IP phones and Cisco Jabber. In this course, you'll learn about log verification, registration and endpoint issues, common call-setup issues, and QoS (Quality of Service). This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 210-065: Implementing Cisco Video Network Devices.
[READ LESS]
Produced by: SkillSoft
Achieving and maintaining a successful deployment of Cisco TelePresence requires individuals be capable of solving challenges that may arise with the endpoints. In this course, you'll learn about...
[READ MORE]
Achieving and maintaining a successful deployment of Cisco TelePresence requires individuals be capable of solving challenges that may arise with the endpoints. In this course, you'll learn about troubleshooting Cisco TelePresence endpoints and techniques such as analysis of logs, QoS and using the Cisco DX650 Problem Reporting Tool. This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 210-065: Implementing Cisco Video Network Devices.
Achieving and maintaining a successful deployment of Cisco TelePresence requires individuals be capable of solving challenges that may arise with the endpoints. In this course, you'll learn about troubleshooting Cisco TelePresence endpoints and techniques such as analysis of logs, QoS and using the Cisco DX650 Problem Reporting Tool. This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 210-065: Implementing Cisco Video Network Devices.
[READ LESS]
Produced by: SkillSoft