• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

41 Accounts courses in Coventry

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Microsoft Active Directory

5.0(3)

By Systems & Network Training

MICROSOFT ACTIVE DIRECTORY COURSE DESCRIPTION A thorough understanding of this system is essential for anyone managing enterprise MS networks. Essential theory is complimented with a high level of hands on practice allowing delegates to observe the idiosyncrasies of Active Directory and Group Policy at first hand. Delegates learn the fundamental theory of AD and progress onto building a multi-domain network in the classroom. The course includes troubleshooting methods, and essential maintenance procedures. This course is designed to teach you the skills needed for day to day management of these technologies. WHAT WILL YOU LEARN * Install AD on multiple PCs. * Use the tools to create and manage objects. * Create appropriate group policies to restrict selected user's desktops and network access. * Install DNS to support Active Directory without loosing Internet Connectivity. * Maintain and troubleshoot AD problems * Backup Active Directory. MICROSOFT ACTIVE DIRECTORY COURSE DETAILS * Who will benefit: Technical staff working with AD based networks. * Prerequisites: Supporting Windows server. * Duration 3 days MICROSOFT ACTIVE DIRECTORY COURSE CONTENTS * Introduction to Active Directory Network authentication methods, Active Directory defined, AD naming conventions, network management with AD, AD structures: Domains, Organisational Units, Forests & Trees, Sites, The Global Catalogue. Windows 2003 new features, installing AD. Hands on Installing an AD network. * Windows overview Management methods Server management tools, installing the additional tools, Terminal Server: Administration mode, Administrator accounts in AD, Local Security Policy. Hands on Install the management tools, Management using Terminal Services. * Creating & Managing Objects (a quick look) AD management tools, AD users and computers, Creating & managing OUs, User Accounts and groups, controlling access to AD objects, moving objects, Publishing resources, locating objects in AD, delegating authority. Hands on Creating a control OU structure and delegating authority. * Introduction to Group Policies What are Group Policies? Where Group Policy data is stored, security, Group Policy flow. Hands on Implementing Group Policies * Working with Group Policies Local security templates, administrative templates, scripts, folder redirection, software deployment. Hands on Scripts, redirecting the start menu, creating a secure, robust desktop environment. * Implementing DNS DNS basics, troubleshooting, implementing DNS zones. Hands on Building a unified DNS solution. * Maintaining and managing the AD database AD support tools, database internal structure, replication, replication tools, Single Operations Masters, tools for maintenance, maintenance techniques, Backing up AD, Directory Services restore mode, NTDSUtil, Authoritative & non-authoritative restoration, rebuilding. Hands on NTDSUtil.

Microsoft Active Directory
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1877

Masters in IPSAS

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- This course will help our clients to assist not only in meeting the challenges of introducing IPSAS but also to secure the benefits of improved financial management to help secure the organisational objectives and goals of each public service organisation. We have developed this course starting with an introduction and then implementation of IPSAS.  This course will help our clients to assist not only in meeting the challenges of introducing IPSAS but also to secure the benefits of improved financial management to help secure the organisational objectives and goals of each public service organisation. This enables multi-national organisations to make comparisons between projects wherever in the world they happen, irrespective of jurisdiction, culture, language and ethnicity. IPSAS is becoming and will become the World standard for Public Sector entities. We have developed this course starting with an introduction and then implementation of IPSAS. This allows clients to structure the move to IPSAS within its appropriate Framework. It is an approach that enables implementation to be done in a structured and well-managed way. In the course we will consider the main requirements of IPSAS and, by showing how they affect financial reports and published accounts, will help you to apply IPSAS. The course will assist both finance managers and general managers whose organisations and departments will be affected by IPSAS.

Masters in IPSAS
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3626

IPSAS

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- This course will help our clients to assist not only in meeting the challenges of introducing IPSAS but also to secure the benefits of improved financial management to help secure the organisational objectives and goals of each public service organisation. This enables multi-national organisations to make comparisons between projects wherever in the world they happen, irrespective of jurisdiction, culture, language and ethnicity. IPSAS is becoming and will become the World standard for Public Sector entities. We have developed this course starting with an introduction and then implementation of IPSAS. This allows clients to structure the move to IPSAS within its appropriate Framework. It is an approach that enables implementation to be done in a structured and well-managed way. In the course we will consider the main requirements of IPSAS and, by showing how they affect financial reports and published accounts, will help you to apply IPSAS. The course will assist both finance managers and general managers whose organisations and departments will be affected by IPSAS. The consequences of managing the finances of public organisations will be examined, together with potential unintended consequences. How to implement IPSAS effectively and economically, is probably the most important aspect. The approach will be to understand the advantages to the organisation from IPSAS implementation and how benefits realisation can be ensured both internally and for stakeholders. The course will deal with practical issues for public sector organisations, including strategic management and the medium-term financial framework

IPSAS
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3626

Biofuels and Alternative Fuel Sources

By Asia Edge

ABOUT THIS TRAINING The expanding human population and industrialisation are increasing the demand for energy worldwide. This has resulted in numerous challenges such as environmental pollution, reliable supply of fossil fuels, and increased demand of electricity supply, which must be overcome. To fulfil the energy demands and overcome these challenges, numerous projects and funds are involved in finding an adequate solution. Transport accounts for around one-fifth of global carbon dioxide (CO2) emissions and road travel accounts for three-quarters of transport emissions. Most of this comes from passenger vehicles. Emission limits are increasingly stringent, and the fuel industry must change its approach to product formulation to meet the challenge. Training Objectives Upon completion of this course, participants will be able to: * Get a clear overview of the different types of bio and alternative fuels * Understand how different bio and alternative fuels are produced * Have an overview of feedstock utilised for biofuels production * Realize how the biofuels production could be integrated in modern refinery * Understand how bio and alternative fuels function as single and blended fuels * Understand what impact bio and alternative fuels have on car engine * Get an overview of the environmental impact of bio and alternative fuels * Get the overview of regulation related to bio and alternative fuel Target Audience The course is intended for individuals who are interested in or developing in the field of bio and alternative fuels. The following personnel will benefit from the knowledge shared in this course: * Refinery Technical Personnel * Trading and blending personnel * Sales, marketing, and product trading personnel * Laboratory supervisors and technical personnel * Policymakers * Professionals who are interested in or developing in the field of bio and alternative fuels * Process, project, and consultant engineers involved in bioenergy, petrochemical and chemical industries Course Level * Basic or Foundation Trainer Your expert course leader is an experienced manager with more than 25 years of operational experience in the downstream Oil & Gas industry. She is a recognised expert in conventional, biofuels and alternative fuels with extensive experience in the crude selection process and formulation of finished products including product portfolio strategy, product quality road mapping and benchmarking. She is a long-time laboratory manager with comprehensive experience in laboratory processes, including financing, benchmarking, efficiency improvement and total quality management processes. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Biofuels and Alternative Fuel Sources
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2321 to £2699

Securing Microsoft systems

5.0(3)

By Systems & Network Training

MICROSOFT SECURITY TRAINING COURSE DESCRIPTION A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment. WHAT WILL YOU LEARN * Use Microsoft security tools. * Secure Microsoft servers. * Secure Microsoft desktops. * Secure Microsoft networks. MICROSOFT SECURITY TRAINING COURSE DETAILS * Who will benefit: Technical server support staff. Technical desktop support staff. Technical network staff. Technical security staff. * Prerequisites: Supporting Windows server 2016 Networking Microsoft systems. * Duration 3 days MICROSOFT SECURITY TRAINING COURSE CONTENTS * Introduction Security threats, Microsoft defaults, admin accounts, security patches, patch management, patch tools. Hands on: Studying Microsoft defaults, applying security patches. * Microsoft security tools Microsoft updates, WSUS, Inventory tool, baseline security analyser, URLscan, EventCombMT, Cipher security tool, Port reporter, PortQry. Tools hackers use. Hands on: Using Microsoft security tools. * Server security Checklists, core server security, AD, Member server security, Domain controller security, Specific roles. Hands on Hardening Microsoft servers, security templates. * Active Directory Admin authority in AD, group policy, trust and authentication. * Desktop security Checklists, core client security, anti virus software, anti spyware software, firewalls, securing clients with AD, securing clients with group policy, software restriction policies. Hands on Securing Microsoft desktops. * Network security Checklist, IP security, VPNs, PKI, certificate authorities, RAS, RRAS, IAS. Hands on: VPN configuration, IAS configuration. * Monitoring Auditing, authorisation and logons, tracking, system monitoring, detecting attacks. Hands on: Monitoring Microsoft systems. * Summary Microsoft security response centre, security advisories.

Securing Microsoft systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497

Oracle database administration

5.0(3)

By Systems & Network Training

ORACLE DATABASE 12C ADMIN TRAINING COURSE DESCRIPTION This Oracle Database 12c Administration course is designed to give the Oracle database administrator practical experience in administering, monitoring, tuning and troubleshooting an Oracle 12c database. Database administrators will gain an understanding of the architecture and processes of the Oracle database server. They will be able to ensure the integrity and availability of a company's data within the Oracle environment. They will be able to monitor the performance of the database, allocate resources with the Resource Manager and Schedule jobs. WHAT WILL YOU LEARN * Administer an Oracle database instance. * Monitor an Oracle database. * Configure the Oracle network environment. * Create and manage database storage structures. * Manage users, profiles, privileges and roles. * Manage undo data and temporary segments. * Monitor and resolve lock conflicts. * Maintain database security. * Implement database auditing. * Monitor the performance of the Database. * Load and unload data. * Use the job scheduler. * Configure a database for backup and recovery. ORACLE DATABASE 12C ADMIN TRAINING COURSE DETAILS * Who will benefit: This Oracle Database 12c Administration course is for anyone who needs to administer, monitor and support an Oracle 12c database. * Prerequisites: An understanding of relational database concepts and good operating system knowledge. They should have attended the Oracle SQL course or have a good working knowledge of Oracle SQL. Knowledge of the usage of PL/SQL packages is highly recommended. * Duration 5 days ORACLE DATABASE 12C ADMIN TRAINING COURSE CONTENTS * Introduction to Oracle database 12c Overview of the Oracle database 12c, Overview of the Oracle Cloud, Relational database concepts, database administration tasks. * Oracle Database 12c Architecture Overview of the Oracle database architecture, The Oracle database instance, Oracle Database memory structures, Process architecture and structures, Server and client processes, The Oracle database storage architecture, Connect to the Oracle database instance. * Administer a database instance Administrative tools available to a DBA, Use SQL*Plus in Oracle to manage a database instance, Use SQL Developer to manage a database instance, Administer the database using Enterprise Manager (EM), Overview of the Enterprise Manager framework, Access Enterprise Manager Database Express, The Enterprise Manager Database Express Home Page, Enterprise Manager Cloud Control, Initialization parameter files. * Configure the Oracle network environment Overview of network configuration, Oracle Net Listener configuration and management, Oracle Net naming methods, Tools for configuring and managing the Oracle network, Using the Net Configuration Assistant, Configure client connections with Net Manager, View listener configuration, Start and stop the Oracle listener, Use TNSPING to test Oracle Net connectivity, Connect to the database, Configure Net Services with Enterprise Manager. * Storage Structures Overview of data storage, The database block, Overview of tablespaces and datafiles, Use Enterprise Manager to view the storage structure of the database, Create and alter tablespace commands, Temporary tablespaces, Create and manage datafiles, Use OMF, Drop tablespaces and datafiles. * Manage users Predefined database administration accounts, User accounts, Create a user account, User authentication, Change a user's password, Manage a user account, Drop a user account, Monitor user information, Terminate user sessions. * Manage profiles and resources Overview of user profiles, Profile resource parameters, Create profile command, Manage passwords with profiles, Control resource usage with profiles, Maintain profiles. * Manage privileges Database access, Oracle supplied roles, System and object level privileges, The grant and revoke commands, Create, modify and drop roles, Use predefined roles. * Database auditing Overview of database security, Overview of database auditing, Security compliance, Standard auditing, Unified audit trail, Separation of audit responsibilities with the AUDIT_ADMIN and AUDIT_VIEWER roles, Configure the audit trail, Specify audit options. * Data concurrency and lock conflicts Levels of locking in Oracle, Methods used to acquire locks, Data concurrency, Possible causes of contention, DML locks, Prevent locking problems, Detect lock contention, Resolve conflicts. * Undo management Undo data overview, Monitor and administer undo, Configure undo retention, Switch undo tablespaces, Specify the retention period, Guarantee undo retention, Retention period for flashback queries, View undo space information, Use the undo advisor, Size the undo tablespace, Alter an undo tablespace to a fixed size. * Proactive database management Database Maintenance, View the alert log, The Automatic Workload Repository, Statistic levels, The Automatic Database Diagnostic Monitoring, Monitor an Oracle database, Use the Advisors, Set up notification rules/ * Performance management Tuning information sources, Performance monitoring, Tuning activities, Performance planning, Instance tuning, Performance tuning methodology, Performance tuning data, Monitoring performance, Managing memory. * SQL tuning SQL tuning, The Oracle Optimizer, SQL Plan directives, Adaptive execution plans, SQL Advisors, Automatic SQL Tuning results, Implement automatic tuning recommendations , SQL Tuning Advisor. * Moving data Create directory objects , Data Pump architecture, Data Pump data dictionary views, Data Pump interactive mode, Data Pump API, Use Data Pump to export and import data, Overview of SQL Loader, Command line parameters, Record filtering, Control file keywords, Datafiles, SQL Loader data paths, External Tables. * Automate tasks with the scheduler Introduction to the Scheduler, Access Rights, Scheduler components and workflow, Create a Job, Job Classes, Use time based, event based schedules, Create an event based schedule. * Managing resources with Resource Manager Overview of the Database Resource Manage, Use the Resource Manager, Create Resource Plans, The default maintenance resource manager plan, Create Resource Plan Directives, Allocate resources for Resource Plans. * Manage space Overview of space management, Block space management within segments, Segment types, Allocate extents, Allocate space, Row chaining and migration, Create tables without segments. * Backup and recovery configuration Oracle backup solutions, Oracle suggested backup strategy, Overview of database backup, restore and recover, Flashback technology, Types of failure ,Instance recovery, Tune instance recovery, The MTTR Advisor, Media failure, Configure a database for recoverability * Oracle support The Enterprise Manager Support Workbench, Register for security updates, Work with Oracle Support, My Oracle Support integration, Log Service Requests, Manage patches, Apply a patch

Oracle database administration
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797

D-Link switches

5.0(3)

By Systems & Network Training

D-LINK SWITCHES TRAINING COURSE DESCRIPTION A hands on course covering the product specifics of D-Link switches. Installation, configuration, maintenance and troubleshooting are all covered in a practical oriented way. WHAT WILL YOU LEARN * Install D-Link switches. * Use the command line interface and the web based interface to manage D-Link switches. * Configure and troubleshoot D-Link switches. * Perform software upgrades and maintain configurations using TFTP. D-LINK SWITCHES TRAINING COURSE DETAILS * Who will benefit: Anyone working with D-Link switches. Particularly aimed at engineers and technicians supporting D-Link switches. * Prerequisites: None. * Duration 2 days D-LINK SWITCHES TRAINING COURSE CONTENT * Introduction How Ethernet works with hubs, How Ethernet works with switches. Installing D-link switches. Hands on Building a network with a hub, building a network with a D-Link switch. * Basic troubleshooting The D-Link switch range, LEDs, cabling issues, factory resets, default settings. Hands on Building a network with multiple D-link switches. * Configuration methods Managed vs. unmanaged switches, Console port access, telnet, web based access, SNMP, saving configurations, NVRAM, switch stacks. Hands on Accessing the switch using the CLI, IP address configuration, telnet. * Command line interface Users, privileges, the CLI, online help. Hands on Basic commands, user accounts, displaying the switch configuration. * Web based interface Getting started, basic format. Hands on Configuring the switch using the web interface. * Port configuration Common port configuration tasks, link aggregation. Hands on Configuring ports. * STP configuration What is STP? 802.1D vs. 802.1W (RSTP), configuring STP. Hands on Enabling and disabling STP, changing STP versions, configuring STP. * VLAN configuration What are VLANS? 802.1Q, tagged/untagged, creating VLANS, applying VLANS. Hands on Setting up VLANS, setting up 802.1Q, Inter VLAN traffic. * Housekeeping TFTP, upload download, updating firmware, updating configuration files, BOOTP/DHCP for IP addresses. Hands on Using TFTP to configure a D-Link switch. * SNMP Switch configuration, D-View, other NMS's. Hands on Using SNMP to manage a D-link switch putting it all together: troubleshooting.

D-Link switches
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

Securing Kubernetes and Containers

5.0(3)

By Systems & Network Training

SECURING KUBERNETES TRAINING COURSE DESCRIPTION This course introduces concepts, procedures, and best practices to harden Kubernetes based systems and container-based applications against security threats. It deals with the main areas of cloud-native security: Kubernetes cluster setup, Kubernetes cluster hardening, hardening the underlying operating system and networks, minimizing microservices vulnerabilities, obtaining supply chain security as well as monitoring, logging, and runtime security. WHAT WILL YOU LEARN * Harden Kubernetes systems and clusters. * Harden containers. * Configure and use Kubernetes audit logs. SECURING KUBERNETES TRAINING COURSE DETAILS * Who will benefit: Technical staff working with Kubernetes * Prerequisites: Kubernetes_for_engineers_course.htm Definitive Docker for engineers * Duration 2 days SECURING KUBERNETES TRAINING COURSE CONTENTS This course does not only deal with the daily security administration of Kubernetes-based systems but also prepares delegates for the official Certified Kubernetes Security Specialist (CKS) exams of the Cloud Native Computing Foundation (CNCF). Structure: 50% theory 50% hands on lab exercise MODULE 1: USER AND AUTHORIZATION MANAGEMENT * Users and service accounts in Kubernetes * Authenticating users * Managing authorizations with RBAC MODULE 2: SUPPLY CHAIN SECURITY * Vulnerabilit checking for images * Image validation in Kubernetes * Reducing image footprint * Secure image registries MODULE 3: VALIDATING CLUSTER SETUP AND PENETRATION TESTING * Use CIS benchmark to review the security configuration of Kubernetes components. * Modify the cluster components' configuration to match the CIS Benchmark. * Penetration testing Kubernetes for known vulnerabilities. MODULE 4: SYSTEM HARDENING * Use kernel hardening tools * Setup appropriate OS level security domains * Container runtime sandboxes * Limit network access MODULE 5: MONITORING AND LOGGING * Configure Kubernetes audit logs * Configure Audit Policies * Monitor applications behaviour with Falco

Securing Kubernetes and Containers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1727

Cyber Security demystified

5.0(3)

By Systems & Network Training

CYBER SECURITY TRAINING COURSE DESCRIPTION The reliance of the world on the Internet and computer systems means the protection of information systems is vitally important. This is even more important smart devices and the Internet of Things increase the number of devices. This Cyber Security provides a concise overview on the threats and attacks that can happen along with the counter measures that can be taken. WHAT WILL YOU LEARN * Recognise the different types of attack. * Describe the attacks that can be made against information systems. * Describe the counter measures available. CYBER SECURITY TRAINING COURSE DETAILS * Who will benefit: Non-technical staff working with computers. * Prerequisites: None. * Duration 1 day CYBER SECURITY TRAINING COURSE CONTENTS * What is Cyber Security? Computer security, Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. * Attacks Physical access, Social engineering, Privilege escalation, Malware, Trojans, worms, viruses, rootkits, Backdoors, Denial of Service (DOS), Distributed DOS, Eavesdropping, Spoofing, Man the middle tampering. * Countermeasures Prevention, detection, response. Physical, user accounts, Firewalls, IDS, AAA, authentication, cryptography, encryption, data integrity. * Cyber security standards ETSI, ISO 27001, 27002, NIST, ISA/IEC 62443.

Cyber Security demystified
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£967

Cyber security for engineers

5.0(3)

By Systems & Network Training

CYBER SECURITY TRAINING COURSE DESCRIPTION This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. WHAT WILL YOU LEARN * Describe: - Basic security attacks - RADIUS - SSL - VPNs * Deploy firewalls and secure networks * Explain how the various technologies involved in an IP VPN work. * Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. CYBER SECURITY TRAINING COURSE DETAILS * Who will benefit: Anyone working in the security field. * Prerequisites: TCP/IP foundation for engineers * Duration 5 days CYBER SECURITY TRAINING COURSE CONTENTS * Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. * Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. * Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. * Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. * Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. * Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. * Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. * Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. * Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. * Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. * Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. * Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. * VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. * VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. * L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. * IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. * SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. * MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. * Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697