• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

193 Business Continuity courses

Security Analyst

5.0(2)

By Studyhub UK

In a world where 68% of business leaders feel their cybersecurity risks are increasing, the role of a security analyst has never been more crucial. Our Security Analyst Course, featuring an impressive eight-module curriculum, gives you the comprehensive training you need to thrive in this in-demand field.   Dive into the complexities of security management, organisational security, risk analysis, and risk reduction. Grasp the fundamentals of both physical and information security protection, essential for defending valuable corporate assets. Explore business resilience and crisis management in this Security Analyst course, ensuring businesses stay robust in the face of adversities.   Gain an in-depth understanding of Cyber Security and Fraud Prevention, which is integral to protecting the digital frontier. Master the art of conducting security investigations and fostering threat awareness. Finally, become well-versed in the laws and regulations guiding the security industry. With our comprehensive Security Analyst course mock and final exams, you'll test your knowledge and readiness for real-world scenarios.   Take the first step towards a lucrative career in cybersecurity with our Security Analyst Course. You're just a click away from transforming your future. Enrol now! WHAT WILL YOU LEARN? Upon completion of the Security Analyst course, you will be able to: * Understand the complexities of security management in organisations. * Learn to perform comprehensive security risk analysis and risk reduction. * Gain expertise in physical and information security protection. * Develop resilience strategies for business continuity and crisis management. * Acquire knowledge of cyber security principles and fraud prevention tactics. * Hone your skills in conducting security investigations and developing threat awareness. * Understand the essential laws and regulations in the security industry. WHY BUY THIS SECURITY ANALYST COURSE? * Unlimited access to the course forever * Digital Certificate, Transcript, and student ID are all included in the price * Absolutely no hidden fees * Directly receive CPD accredited qualifications after course completion * Receive one-to-one assistance when needed * Immediately receive the PDF certificate after passing * Receive the original copies of your certificate and transcript immediately * Easily learn the skills and knowledge from the comfort of your home WHO IS THIS COURSE FOR: This Security Analyst course is ideal for: * Aspiring security analysts seeking comprehensive training. * IT professionals aiming to specialize in cybersecurity. * Business leaders looking to understand organizational security better. * Risk management professionals aiming to deepen their knowledge. * Individuals interested in laws and regulations related to security. CAREER PATH: Our Security Analyst course will prepare you for a range of careers, including:   * Security Analyst: £40,000 - £60,000 * Information Security Analyst: £45,000 - £65,000 * Cyber Security Analyst: £50,000 - £70,000 * Fraud Prevention Analyst: £55,000 - £75,000 * Risk Management Analyst: £60,000 - £80,000 * Security Manager: £65,000 - £85,000 COURSE DESIGN The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of * Text lessons * Online study materials HOW IS THE COURSE ASSESSED? To successfully complete the course you must pass an automated, multiple-choice assessment. The assessment is delivered through our online learning platform. You will receive the results of your assessment immediately upon completion. WILL I RECEIVE A CERTIFICATE OF COMPLETION? Upon successful completion, you will qualify for the UK and internationally-recognised certification and you can choose to make your achievement formal by obtaining your PDF Certificate at a cost of £9 and Hardcopy Certificate for £15. WHY STUDY THIS SECURITY MANAGEMENT COURSE? Whether you're an existing practitioner or aspiring professional, this course will enhance your expertise and boost your CV with key skills and an accredited qualification attesting to your knowledge. The Security Analyst is open to all, with no formal entry requirements. All you need is a passion for learning, a good understanding of the English language, numeracy and IT, and to be over the age of 16. COURSE CURRICULUM Security Analyst Module 01: Introduction to Security Management 00:30:00 Module 02: Organisational Security Management 00:26:00 Module 03: Security Risk Analysis and Risk Reduction 00:23:00 Module 04: Physical and Information Security Protection 00:32:00 Module 05: Business Resilience and Crisis Management 00:17:00 Module 06: Cyber Security and Fraud Prevention 00:25:00 Module 07: Security Investigations and Threat Awareness 00:24:00 Module 08: Laws and Regulations 00:25:00 Mock Exam Mock Exam - Security Analyst 00:20:00 Final Exam Final Exam - Security Analyst 00:20:00

Security Analyst
Delivered Online On Demand
£10.99

Cisco Managing LAN Infrastructure with Cisco Data Center Network Manager v1.1 (DCNML)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for the following professionals: Data Network Engineers and Administrators Data Center Technical Managers Overview After completing the course, you should be able to: Describe the components and functionality of DCNM. Describe the software define network protocols of VXLAN, eVPN and BGP. Deploy a DCNM environment in high-availability environment. Operate the DCNM discovery process to acquire management of all devices. List high lever navigation features of DCNM and utilize the DCNM GUI (Graphical User Interface) to optimize data center topologies. Manage and monitor data center LAN fabric from DCNM. Program RESTful APIs native to DCNM to perform any network management task. Troubleshoot and monitor the network using DCNM troubleshooting tools. Describe the benefits of DCNM Network Insights. The course, Managing LAN Infrastructure with Cisco Data Center Network Manager (DCNML) v1.0 enhances your knowledge of managing LAN Infrastructure with Cisco Data Center Network Manager (DCNM) implementing a spine-and-leaf network fabric using DCNM with Virtual Extensible LAN (VXLAN), Ethernet VPN (EVPN), and Border Gateway Protocol (BGP). You will learn how the integration of spine-and-leaf network fabric with Cisco Data Center Network Manager increases overall data center infrastructure uptime and reliability, thereby improving business continuity. It provides a robust framework and comprehensive feature set that meets the routing, switching, and storage administration needs of data centers. Cisco DCNM streamlines the provisioning for the unified fabric and monitors the SAN (Storage area network) and LAN (Local area network) components. INTRODUCING CISCO DCNM LAN * Cisco DCNM Introduction * Cisco DCNM LAN Solution Overview DEPLOYING VXLAN EVPN WITH CISCO DCNM LAN * VXLAN Overlays and Underlays * Easy Fabric VXLAN EVPN Underlay Model DEPLOYING CISCO DCNM * Cisco DCNM High Availability * Cisco DCNM Installation Requirements DISCOVERING EXISTING NETWORK DEVICES WITH CISCO DCNM * Configure Switches for Discovery EXPLORING THE DATA CENTER WITH CISCO DCNM TOPOLOGY * Access Topology View in the GUI * Navigate the Map Views and Layouts MANAGING AND MONITORING THE DATA CENTER WITH CISCO DCNM LAN * Manage the Configuration Archive * Deploy Changes to the Fabric AUTOMATING CISCO DCNM PROGRAMMATICALLY * Explore APIs for the Network * REST API Tool TROUBLESHOOTING AND MONITORING CISCO DCNM * Troubleshoot and Monitor Cisco DCNM DESCRIBING NETWORK INSIGHTS * Network Insights Advisor ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Managing LAN Infrastructure with Cisco Data Center Network Manager v1.1 (DCNML) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Managing LAN Infrastructure with Cisco Data Center Network Manager v1.1 (DCNML) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Managing LAN Infrastructure with Cisco Data Center Network Manager v1.1 (DCNML)
Delivered on-request, onlineDelivered Online
Price on Enquiry

COBIT 2019 Foundation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The COBIT 2019 Foundation course would suit candidates working in the following IT professions or areas: IT Auditors IT Managers IT Quality professionals IT Leadership IT Developers Process practitioners Managers in IT service providing firms The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs. Overview This COBIT 2019 Foundation course is designed as an introduction to COBIT 2019 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions and increased productivity. The syllabus areas that this course is designed to cover are: New framework introduction Key concepts and terminology Governance and Framework Principles Governance system and components Governance and management objectives Performance management Designing a tailored governance system COBIT 2019 builds on and integrates more than 25 years of development in this field, not only incorporating new insights from science, but also operationalizing these insights as practice. The heart of the COBIT framework updates COBIT principles while laying out the structure of the overall framework including: New concepts are introduced and terminology is explained?the COBIT Core Model and its 40 governance and management objectives provide the platform for establishing your governance program. The performance management system is updated and allows the flexibility to use maturity measurements as well as capability measurements. Introductions to design factors and focus areas offer additional practical guidance on flexible adoption of COBIT 2019, whether for specific projects or full implementation. From its foundation in the IT audit community, COBIT has developed into a broader and more comprehensive information and technology (I&T) governance and management framework and continues to establish itself as a generally accepted framework for I&T governance. 1 - COBIT 5 OVERVIEW AND INTRODUCTION * Course Administration * Course Objectives * Exam Overview * Certification Scheme * History of COBIT * COBIT 2019 Improvements * Major differences with 2019 * Misconceptions about COBIT * COBIT and Other Standards 2 - KEY CONCEPTS AND TERMINOLOGY * Introduction to Enterprise Governance of Information and Technology * Benefits of Information and Technology Governance * COBIT Information and Technology Governance Framework * Distinction of Governance and Management * Three Principles of a Governance Framework * Six Principles for a Governance System 3 - GOVERNANCE SYSTEMS AND COMPONENTS * Introduction to the Components of a Governance System * Processes and Capability Levels * Organizational Structures and Defined Roles * Information Flows and Items * People, Skills and Competencies * Principles, Policies and Frameworks * Culture, Ethics and Behavior * Services, Infrastructure and Applications 4 - GOVERNANCE MANAGEMENT OBJECTIVES * Governance and Management Objectives Publication * Governance and Management Objectives * Governance and Management Objectives Core Model * Evaluate, Direct and Monitor * Align, Plan and Organize * Build, Acquire and Implement * Deliver, Service and Support * Monitor, Evaluate and Assess 5 - GOALS CASCADE * Governance and Management Objective Relationships * Governance and Management Objective Descriptions * High-Level Information Example * Introduction to the Goals Cascade * Enterprise Goals * Alignment Goals * Mapping Tables ? Appendix A 6 - PERFORMANCE MANAGEMENT * Introduction to Performance Management * COBIT Performance Management Principles * COBIT Performance Management (CPM) Overview * Process Capability Levels * Rating Process Activities * Focus Area Maturity Levels * Performance Management of Organizational Structures * Performance Management of Information Items * Performance Management of Culture and Behavior 7 - DESIGNING A TAILORED GOVERNANCE SYSTEM * The Need for Tailoring * Design Factors * Enterprise Strategy * Enterprise Goals * Risk Profile * I&T Related Issues * Threat Landscape * Compliance Requirements * Role of IT * Sourcing Model for IT * IT Implementation Methods * Technology Adoption Strategy * Enterprise Size * Focus Areas * Designing a Tailored Governance System * Management Objective Priority and Target Capability Levels * Component Variations * Specific Focus Areas * Stages and Steps in the Design Process 8 - IMPLEMENTING ENTERPRISE GOVERNANCE OF IT * The Business Case * The COBIT Implementation Guide Purpose * COBIT Implementation Approach * Phase 1 ? What are the Drivers * Phase 2 ? Where are we Now * Phase 3 ? Where do we Want to be * Phase 4 ? What Needs to be Done * Phase 5 ? How do we get There * Phase 6 ? Did we get There * Phase 7 How do we Weep the Momentum Going? * EGIT Implementation Program Challenges

COBIT 2019 Foundation
Delivered Online3 days, Sept 9th, 13:00
£1330

M20742 Identity with Windows Server 2016

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server 2016. The secondary audience for this course includes IT professionals who are looking to consolidate their knowledge about AD DS and related technologies, in addition to IT professionals who want to prepare for the 70-742 exam. Overview After completing this course, students will be able to: Install and configure domain controllers. Manage objects in AD DS by using graphical tools and Windows PowerShell. Implement AD DS in complex environments. Implement AD DS sites, and configure and manage replication. Implement and manage Group Policy Objects (GPOs). Manage user settings by using GPOs. Secure AD DS and user accounts. Implement and manage a certificate authority (CA) hierarchy with AD CS. Deploy and manage certificates. Implement and administer AD FS. Implement and administer Active Directory Rights Management Services (AD RMS). Implement synchronization between AD DS and Azure AD. Monitor, troubleshoot, and establish business continuity for AD DS services. This course teaches IT Pros how to deploy and configure Active Directory Domain Services in a distributed environment, how to implement Group Policy, how to perform backup & restore, & how to troubleshoot Active Directory?related issues. INSTALLING & CONFIGURING DCS * Overview of AD DS * Overview of AD DS DCs * Deploying DCs * Lab: Deploying and administering AD DS MANAGING OBJECTS IN AD DS * Managing user accounts * Managing groups in AD DS * Managing computer accounts * Using Windows PowerShell for AD DS administration * Implementing and managing organizational units * Lab: Deploying and administering AD DS * Lab: Administering AD DS ADVANCED AD DS INFRASTRUCTURE MANAGEMENT * Overview of advanced AD DS deployments * Deploying a distributed AD DS environment * Configuring AD DS trusts * Lab: Domain and trust management in AD DS IMPLEMENTING & ADMINISTERING AD DS SITES & REPLICATION * Overview of AD DS replication * Configuring AD DS sites * Configuring and monitoring AD DS replication * Lab: Managing and implementing AD DS sites and replication IMPLEMENTING GROUP POLICY * Introducing Group Policy * Implementing and administering GPOs * Group Policy scope and Group Policy processing * Troubleshooting the application of GPOs * Lab: Implementing a Group Policy infrastructure * Lab: Troubleshooting a Group Policy Infrastructure MANAGING USER SETTINGS WITH GPOS * Implementing administrative templates * Configuring Folder Redirection and scripts * Configuring Group Policy preferences * Lab: Managing user settings with GPOs SECURING AD DS * Securing domain controllers * Implementing account security * Audit authentication * Configuring managed service accounts (MSAs) * Lab: Securing AD DS DEPLOYING & MANAGING AD CS * Deploying CAs * Administering CAs * Troubleshooting and maintaining CAs * Lab: Deploying and configuring a two-tier CA hierarchy DEPLOYING & MANAGING CERTIFICATES * Deploying and managing certificate templates * Managing certificate deployment, revocation, and recovery * Using certificates in a business environment * Implementing and managing smart cards * Lab: Deploying certificates IMPLEMENTING & ADMINISTERING AD FS * Overview of AD FS * AD FS requirements and planning * Deploying and configuring AD FS * Overview of Web Application Proxy * Lab: Implementing AD FS IMPLEMENTING & ADMINISTERING AD RMS * Overview of AD RMS * Deploying and managing an AD RMS infrastructure * Configuring AD RMS content protection * Lab: Implementing an AD RMS infrastructure IMPLEMENTING AD DS SYNCHRONIZATION WITH AZURE AD * Planning and preparing for directory synchronization * Implementing directory synchronization by using Azure AD Connect * Managing identities with directory synchronization * Lab: Configuring directory synchronization MONITORING, MANAGING, & RECOVERING AD DS * Monitoring AD DS * Managing the AD DS database * Recovering AD DS objects * Lab: Recovering objects in AD DS

M20742 Identity with Windows Server 2016
Delivered on-request, onlineDelivered Online
Price on Enquiry

20742 Identity with Windows Server 2016

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server 2016. The secondary audience for this course includes IT professionals who are looking to consolidate their knowledge about AD DS and related technologies, in addition to IT professionals who want to prepare for the 70-742 exam. Overview After completing this course, students will be able to:Install and configure domain controllers.Manage objects in AD DS by using graphical tools and Windows PowerShell.Implement AD DS in complex environments.Implement AD DS sites, and configure and manage replication.Implement and manage Group Policy Objects (GPOs).Manage user settings by using GPOs.Secure AD DS and user accounts.Implement and manage a certificate authority (CA) hierarchy with AD CS.Deploy and manage certificates.Implement and administer AD FS.Implement and administer Active Directory Rights Management Services (AD RMS).Implement synchronization between AD DS and Azure AD.Monitor, troubleshoot, and establish business continuity for AD DS services. This course teaches IT Pros how to deploy and configure Active Directory Domain Services in a distributed environment, how to implement Group Policy, how to perform backup & restore, & how to troubleshoot Active Directory?related issues. INSTALLING & CONFIGURING DCS * Overview of AD DS * Overview of AD DS DCs * Deploying DCs * Lab: Deploying and administering AD DS MANAGING OBJECTS IN AD DS * Managing user accounts * Managing groups in AD DS * Managing computer accounts * Using Windows PowerShell for AD DS administration * Implementing and managing organizational units * Lab: Deploying and administering AD DS * Lab: Administering AD DS ADVANCED AD DS INFRASTRUCTURE MANAGEMENT * Overview of advanced AD DS deployments * Deploying a distributed AD DS environment * Configuring AD DS trusts * Lab: Domain and trust management in AD DS IMPLEMENTING & ADMINISTERING AD DS SITES & REPLICATION * Overview of AD DS replication * Configuring AD DS sites * Configuring and monitoring AD DS replication * Lab: Managing and implementing AD DS sites and replication IMPLEMENTING GROUP POLICY * Introducing Group Policy * Implementing and administering GPOs * Group Policy scope and Group Policy processing * Troubleshooting the application of GPOs * Lab: Implementing a Group Policy infrastructure * Lab: Troubleshooting a Group Policy Infrastructure MANAGING USER SETTINGS WITH GPOS * Implementing administrative templates * Configuring Folder Redirection and scripts * Configuring Group Policy preferences * Lab: Managing user settings with GPOs SECURING AD DS * Securing domain controllers * Implementing account security * Audit authentication * Configuring managed service accounts (MSAs) * Lab: Securing AD DS DEPLOYING & MANAGING AD CS * Deploying CAs * Administering CAs * Troubleshooting and maintaining CAs * Lab: Deploying and configuring a two-tier CA hierarchy DEPLOYING & MANAGING CERTIFICATES * Deploying and managing certificate templates * Managing certificate deployment, revocation, and recovery * Using certificates in a business environment * Implementing and managing smart cards * Lab: Deploying certificates IMPLEMENTING & ADMINISTERING AD FS * Overview of AD FS * AD FS requirements and planning * Deploying and configuring AD FS * Overview of Web Application Proxy * Lab: Implementing AD FS IMPLEMENTING & ADMINISTERING AD RMS * Overview of AD RMS * Deploying and managing an AD RMS infrastructure * Configuring AD RMS content protection * Lab: Implementing an AD RMS infrastructure IMPLEMENTING AD DS SYNCHRONIZATION WITH AZURE AD * Planning and preparing for directory synchronization * Implementing directory synchronization by using Azure AD Connect * Managing identities with directory synchronization * Lab: Configuring directory synchronization MONITORING, MANAGING, & RECOVERING AD DS * Monitoring AD DS * Managing the AD DS database * Recovering AD DS objects * Lab: Recovering objects in AD DS

20742 Identity with Windows Server 2016
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Information Systems Auditor (CISA) - Complete Video Course

4.3(43)

By John Academy

DESCRIPTION: This Certified Information Systems Auditor (CISA) - Complete Video Course will provide you with the knowledge and proficiency to prepare for the globally recognized CISA certification exam. The CISA certification has become very popular since it originated in 1978, and is a benchmark for IS audit, security, control, and assurance personnel to validate your skill set. This course will immerse you into the subject, with in-depth coverage of the information covering the five domains that make up the 'Body of Knowledge' for the CISA exam and will provide you the tools to build your technical skills to develop, manage, and perform IT security audits. Being CISA-certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise. So, enhance your career by earning CISA - world-renowned as the standard of achievement for those who audit, control, monitor and assess information technology and business system ASSESSMENT: * At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. * Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. CERTIFICATION: * After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. * Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. WHO IS THIS COURSE FOR? Certified Information Systems Auditor (CISA) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. REQUIREMENTS Our Certified Information Systems Auditor (CISA) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. CAREER PATH After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. The Process of Auditing Information Systems Management of the Audit Function FREE 00:20:00 ISACA IT Audit and Assurance Standards and Guidelines 01:16:00 Risk Analysis 00:21:00 Internal Controls 00:17:00 Performing An IS Audit 01:07:00 Control Self-Assessment 00:09:00 The Evolving IS Audit Process 00:12:00 Governance and Management of IT Corporate Governance 00:06:00 IT Governance 00:02:00 IT Monitoring and Assurance Practices for Board and Senior Management 00:40:00 Information Systems Strategy 00:05:00 Maturity and Process Improvement Models 00:01:00 IT Investment and Allocation Practices 00:05:00 Policies and Procedures 00:17:00 Risk Management 00:31:00 IS Management Practices 00:50:00 IS Organizational Structure and Responsibilities 00:17:00 Auditing IT Governance Structure and Implementation 00:06:00 Business Continuity Planning 00:37:00 Information Systems Acquisition, Development and Implementation Business Realization 01:21:00 Project Management Structure 00:08:00 Project Management Practices 00:18:00 Business Application Development 00:42:00 Business Application Systems 00:38:00 Alternative Forms of Software Project Organization 00:03:00 Alternative Development Methods 00:10:00 Infrastructure Development/Acquisition Practices 00:09:00 Information Systems Maintenance Practices 00:09:00 System Development Tools And Productivity Aids 00:05:00 Business Process Reengineering And Process Change Projects 00:08:00 Application Controls 00:07:00 Auditing Application Controls 00:14:00 Auditing Systems Development, Acquisition And Maintenance 00:08:00 Information Systems Operations, Maintenance and Support Information Systems Operations 00:19:00 Information Systems Hardware 00:13:00 IS Architecture and Software 00:39:00 Network Infrastructure 01:16:00 Disaster Recovery Planning 00:19:00 Protection of Information Assets Importance Of Information Security 00:43:00 Logical Access 00:37:00 Network Infrastructure Security 00:39:00 Auditing Information Security Management Framework 00:03:00 Auditing Network Infrastructure Security 00:13:00 Environmental Exposures and Controls 00:02:00 Physical Access Exposures and Controls 00:05:00 Mobile Computing 00:05:00 Mock Exam Mock Exam- Certified Information Systems Auditor (CISA) - Complete Video Course 00:20:00 Final Exam Final Exam- Certified Information Systems Auditor (CISA) - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Information Systems Auditor (CISA) - Complete Video Course
Delivered Online On Demand
£24

CompTIA Security+ Certification SY0-601: The Total Course

By Packt

This video course is designed to prepare you to achieve the internationally recognized fundamental IT training certification, CompTIA Security+ Certification SY0-601 exam. The course covers all the major domains needed for the certification and will help you develop the basics of IT and computers with the help of examples and quizzes.

CompTIA Security+ Certification SY0-601: The Total Course
Delivered Online On Demand
£59.99

Symantec Ghost Solution Suite 3.0 - Administration

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for network and system administrators, IT managers, IT support personnel, and other network operations staff who are responsible for deploying new computers across their organizations, managing ongoing software and hardware configuration tasks for computers, and retiring outdated computers. Overview By the completion of this course, you will be able to: Install and configure Ghost Solution Suite 3.0. Use the Ghost Console to create and use jobs and tasks to manage computes. Configure image deployments. Manage ?unknown? and predefined computers. Perform disk wipes and create disk partitions. Create Windows scripted OS installations. Create PC transplant templates. Capture a computer personality, and deploy personality packages. Perform a computer migration from Win 7 to Win 8.1. This course is designed for the professional tasked with installing, configuring, and managing a Deployment Solution system. OVERVIEW OF ENDPOINT LIFECYCLE MANAGEMENT * Introduction to Endpoint Lifecycle Management Phases of Endpoint Lifecycle Management ELM Business Objectives and Goals ELM Solution Mapping to Business Objectives Ghost Solution Suite 3.0 Product Overview IMPLEMENTATION ASSESSMENT * ELM Requirements Gathering Solution Analysis of ELM Requirements IMPLEMENTATION DESIGN * GSS 3.0 Technical Overview Installation Options and Prerequisites Defining the Solution Infrastructure Defining the ELM Solution Configuration INSTALLATION AND CONFIGURATION OF THE ELM SOLUTION * Base Software Installation Navigating the Console Core & Solution Configuration Driver Management Pre-boot Environment ENDPOINT IDENTIFICATION & GATHERING * IT Requirements Overview Analyzing and Defining IT Requirements Using ELM to Forecast IT Requirements ENDPOINT CONFIGURATION STANDARDS * Endpoint Standards Overview Defining Endpoint Standards Implementation of Endpoint Standards ENDPOINT PROVISIONING * Endpoint Provisioning Overview Standard Build and Image Methodology Software Compatibility Analysis Software Packaging requirements for use in the ELM Solution Software Quality Assurance Methodology ENDPOINT DEPLOYMENT & STAGING * Endpoint Lifecycle Automation Endpoint Lifecycle Automation Scenario Exercise Backup and restore Automating the backup of a computer image Scripted OS Installation Capturing an image for deployment Automating the creation of a master image Automating the deployment of computer images SOFTWARE DISTRIBUTION * Software Delivery Methods Software Installation Methods Understanding Software Delivery Reporting and Analysis of Software Distribution Tasks IMAGE AND BUILD MAINTENANCE * Image maintenance overview Restoring a computer image Capturing the updated image Updating Jobs MANAGING SOFTWARE UPGRADES * Software Upgrade Process Overview Distribution of Software Updates SUPPORTING THE BUSINESS * Ensuring Business Continuity in an ELM System Endpoint Restoration/Recovery Managing Service Support Activities Endpoint Monitoring & Alerting Endpoint Configuration & Maintenance Automating Problem Resolution Application Self-Healing Desired State Management HARDWARE REFRESH & MIGRATION * Hardware Refresh & Migration Process Overview Personality Capture and Restore Gathering Current State Inventory for Requirements and Planning Activities Performing Data capture and storage activities Gathering User state or PC personality information Automating the Migration Process ENDPOINT RETIREMENT/DISPOSAL * Ensuring Compliant Disposal Methods and Procedures END TO END ENDPOINT LIFECYCLE USE CASE * Endpoint Management Lifecycle Use Case for GSS ADDITIONAL COURSE DETAILS: Nexus Humans Symantec Ghost Solution Suite 3.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Ghost Solution Suite 3.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Ghost Solution Suite 3.0 - Administration
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware vSphere: Advanced Administration Workshop [v7]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators System engineer Overview By the end of the course, you should be able to meet the following objectives: Configure and manage complex storage solutions in a vSphere environment (including NFS, iSCSI, and so on) Configure and manage complex, scalable vSphere networking operations (vSphere Standard Switch and Distributed Switches) Deploy, manage, and optimize virtual machines (advanced configuration, content library, latency-sensitive workloads, and more) Manage business continuity and operations in your vSphere environment (VMware vCenter Server Appliance™ file-based backup, VMware vCenter Server profiles, host profiles, and so on) Plan and implement increased vSphere security (use a Key Provider, VM Encryption, CPU scheduler remediations, and so on) Troubleshoot the vSphere environment Use VMware vSphere Lifecycle Manager™ to upgrade to VMware ESXi™ hosts and virtual machines (VUM, image-based clusters, and so on) Implement vSphere cluster solutions (Cluster QuickStart wizard, VMware vSphere Distributed Resource Scheduler™, VMware vSphere High Availability, VMware vSAN™, and so on) Implement resource optimizations to streamline vSphere deployments Create an advanced configuration of vCenter Server (including an identity source) This five-day course provides hands-on training to equip students with a range of skills, from performing routine VMware vSphere© 7 administrative tasks to complex vSphere operations and configurations. Through lab-based activities, students are immersed in real-life situations faced by VMBeans, a fictitious company. These situations expose students to real-life scenarios faced by companies that are building and scaling their virtual infrastructure. Approximately 90% of the class is application-focused and taught through labs. The course aligns fully with the VMware Certified Advanced Professional ? Data Center Virtualization Deploy exam objectives. COURSE INTRODUCTION * Introductions and course logistics * Course objectives * Introduction to fictitious company: VMBeans CONFIGURE AND MANAGE YOUR VSPHERE ENVIRONMENT * Perform various vCenter Server configurations * Configure an external identity source * Configure virtual networking with advanced options * Configure and manage advanced storage configurations * Configure vSphere clusters (also using Cluster QuickStart) MANAGEMENT AND OPERATIONS IN YOUR DATA CENTER * Collect vSphere log files * Configure vCenter Server file-based backup * Working with vCenter Server profiles * Configure and manage advanced cluster settings * Create and configure advanced host options * Create and manage host profiles * Manage and remediate clusters using vSphere Lifecycle Manager * Create and configure a Content Library * Update a managed virtual machine template * Configure a central VMware ToolsTM installation repository * Manage vSphere roles and permissions TROUBLESHOOT YOUR DATA CENTER ENVIRONMENT * Troubleshoot vSphere configuration issues * Troubleshoot resource pool configuration issues * Troubleshoot network and storage issues * Troubleshoot ESXi host issues * Troubleshoot vCenter Server resource issues INCREASING SECURITY IN YOUR DATA CENTER * Create and manage a Key Management solution * Create an encrypted virtual machine * Configure CPU scheduler options to achieve security remediations PERFORMANCE AND OPTIMIZATION IN YOUR DATA CENTER * Manage advanced virtual machine configurations * Identify and implement vSphere resource optimization opportunities ADDITIONAL COURSE DETAILS: Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere: Advanced Administration Workshop [v7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere: Advanced Administration Workshop [v7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSphere: Advanced Administration Workshop [v7]
Delivered on-request, onlineDelivered Online
Price on Enquiry

AZ-304T00 - Microsoft Azure Architect Design

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for IT Professionals with expertise in designing and implementing solutions running on Microsoft Azure. They should have broad knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platform, budgeting, and governance. Azure Solution Architects use the Azure Portal and as they become more adept they use the Command Line Interface. Candidates must have expert-level skills in Azure administration and have experience with Azure development processes and DevOps processes. Overview Recommend solutions to minimize costs Recommend a solution for Conditional Access, including multi-factor authentication Recommend a solution for a hybrid identity including Azure AD Connect and Azure AD Connect Recommend a solution for using Azure Policy Recommend a solution that includes KeyVault Recommend a solution that includes Azure AD Managed Identities Recommend a storage access solution Design an Azure Site Recovery solution Recommend a solution for autoscaling Recommend a solution for containers Recommend a solution for network security Recommend a solution for migrating applications and VMs Recommend a solution for migration of databases This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include design considerations related to logging, cost analysis, authentication and authorization, governance, security, storage, high availability, and migration. This role requires decisions in multiple areas that affect an overall design solution. DESIGN A COMPUTE SOLUTION * Recommend a Solution for Compute Provisioning * Determine Appropriate Compute Technologies * Recommend a Solution for Containers * Recommend a Solution for Automating Compute Management DESIGN A NETWORK SOLUTION * Recommend a Solution for Network Addressing and Name Resolution * Recommend a Solution for Network Provisioning * Recommend a Solution for Network Security * Recommend a Solution for iInternete Connectivity and On-Premises Networks * Recommend a Solution for Automating Network Management * Recommend a Solution for Load Balancing and Rraffic Routing DESIGN FOR MIGRATION * Assess and On-Premises Servers and Applications for Migration * Recommend a Solution for Migrating Applications and VMs * Recommend a Solution for Migration of Databases DESIGN AUTHENTICATION AND AUTHORIZATION * Tips for Identity and Access Management * Recommend a Solution for Multi-Factor Authentication * Five Steps for Securing Identity Infrastructure * Recommend a Solution for Single-Sign On (SSO) * Recommend a Solution for a Hybrid Identity * Recommend a Solution for B2B Integration * Recommend a Hierarchical Structure for Management Groups DESIGN GOVERNANCE * Recommend a Solution for using Azure Policy * Recommend a Solution for using Azure Blueprint DESIGN A SOLUTION FOR DATABASES * Select an Appropriate Data Platform Based on Requirements * Overview of Azure Data Storage * Recommend Database Service Tier Sizing * Dynamically Scale Azure SQL Database and Azure SQL Managed Instances * Recommend a Solution for Encrypting Data at Rest, Transmission, and In Use SELECT AN APPROPRIATE STORAGE ACCOUNT * Understanding Storage Tiers * Recommend a Storage Access Solution * Recommend Storage Management Tools DESIGN DATA INTEGRATION * Recommend a Data Flow * Recommend a Solution for Data Integration DESIGN A SOLUTION FOR LOGGING AND MONITORING * Azure Monitoring Services * Azure Monitor DESIGN A SOLUTION FOR BACKUP AND RECOVERY * Recommend a Recovery Solution for Hybrid and On-Premises Workloads * Design and Azure Site Recovery Solution * Recommend a Solution for Recovery in Different Regions * Recommend a Solution for Azure Backup Management * Design a Solution for Data Archiving and Retention DESIGN FOR HIGH AVAILABILITY * Recommend a Solution for Application and Workload Redundancy * Recommend a Solution for Autoscaling * Identify Resources that Require High Availability * Identify Storage Tpes for High Availability * Recommend a Solution for Geo-Redundancy of Workloads DESIGN FOR COST OPTIMIZATION * Recommend Solutions for Cost Management * Recommended Viewpoints for Minimizing Costs DESIGN AN APPLICATION ARCHITECTURE * Recommend a Microservices Architecture * Recommend an Orchestration Solution for Deployment of Applications * Recommend a Solution for API Integration DESIGN SECURITY FOR APPLICATIONS * Security for Applications and Services * Recommend a Solution using Key Vault * Recommend Solutions using Azure AD Managed Identities

AZ-304T00 - Microsoft Azure Architect Design
Delivered on-request, onlineDelivered Online
Price on Enquiry