• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

193 Business Continuity courses

VMware HCX: Management and Operations

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for System administrators System engineers Migration engineers Migration architects Overview By the end of the course, you should be able to meet the following objectives: Describe core VMware HCX use cases and common triggers for mobility Describe the core components and features of VMware HCX Describe a real-life example of a VMware HCX project Identify all major Cloud Providers offering and supporting VMware HCX Describe the features of VMware HCX services Explain the different deployment types for VMware HCX and choose the correct components to deploy for a particular use case Understand the resource, network, and VMware ESXi™ and VMware vCenter requirements for VMware HCX Install and configure VMware HCX Understand, deploy, and manage the HCX Service Mesh Understand Network Extension and Traffic Engineering Create Network Extension and enable Mobility Optimized Networking Understand WAN Optimization Understand the different migration types and be able to choose the best one for different applications and workloads Incorporate VMware HCX into a disaster recovery strategy Design a VMware HCX deployment for different use cases Manage the lifecycle of VMware HCX This four-day course gives you knowledge and practical exercises sufficient to manage VMware HCX© and to migrate virtual machines using VMware HCX. The course focuses on configuration and management of VMware HCX. The course equips system administrators with the knowledge, skills, and abilities to achieve competence in migrating virtual machines. COURSE INTRODUCTION * Introductions and course logistics * Course objectives INTRODUCTION TO VMWARE HCX * Describe workload mobility challenges that VMware HCX addresses * Recognize use cases for VMware HCX * Identify all major Cloud providers offering and supporting VMware HCX HCX SERVICES AND DEPLOYMENT TYPES * Describe the functions of VMware HCX components * Recognize the services provided by VMware HCX * Recognize when to use different deployment types for VMware HCX * Be able to choose which components to install and configure for a different VMware HCX service * HCX DEPLOYMENT * Identify the resource, network, and ESXi/VMware vCenter server requirements for VMware HCX * Understand the VMware vCenter user roles and access requirements * Describe the installation workflow * Install, activate, and configure VMware HCX manager * Understand the compute and network profile requirements for VMware HCX and its services * Create site pair, compute, and network profiles * Describe and manage the HCX Service Mesh * Create and configure a HCX Service Mesh * NETWORK EXTENSION * Describe network extension use case and benefits * Compare the HCX-Network extension service with other solutions * Examine Network Extension capabilities and topology * Create a Network Extension * Describe network traffic packet flow * Describe Mobility Optimized Networking * Enable Mobility Optimized Networking * Describe the TCP Flow Conditioning and Application path resiliency feature of VMware HCX * Recognize the key benefits of TCP flow conditioning and Application path resiliency * Describe WAN optimization * WORKLOAD MOBILITY * Describe different migration types * Recognize the limitation of each migration method and consideration when planning a migration * Understand Bulk and Replication Assisted VMware HCX© vMotion© migration methods * Migrate a VM using Bulk migration * Describe cold and vMotion migration method * Migrate a VM using HCX vMotion migration * Examine non VMware vSphere© workload migration * Migrate a VM using an OS assisted migration method * BUSINESS CONTINUITY AND DISASTER RECOVERY * Examine disaster recovery concepts * Describe disaster recovery networks * Plan and create disaster recovery networks * Describe VM protection operations * Protect, recover, and test recovery and reverse replication of a VM * Understand VMware HCX and SRM integration and value * HCX LIFECYCLE MANAGEMENT * Backup and restore the VMware HCX manager * Locate and access VMware HCX logs * Troubleshoot VMware HCX * Plan for VMware HCX manager and component updates CUSTOMER DESIGN SCENARIOS * Design a VMware HCX deployment * Choose workload mobility methods for the migration * Discuss customer requirements and proposed design * Discuss components, services, and migration methods for the scenario *

VMware HCX: Management and Operations
Delivered on-request, onlineDelivered Online
Price on Enquiry

AZ-303T00 - Microsoft Azure Architect Technologies

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for IT Professionals with expertise in designing and implementing solutions running on Microsoft Azure. They should have broad knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platform, budgeting, and governance. Azure Solution Architects use the Azure Portal and as they become more adept they use the Command Line Interface. Candidates must have expert-level skills in Azure administration and have experience with Azure development processes and DevOps processes. Overview Secure identities with Azure Active Directory and users and groups. Implement identity solutions spanning on-premises and cloud-based capabilities Apply monitoring solutions for collecting, combining, and analyzing data from different sources. Manage subscriptions, accounts, Azure policies, and Role-Based Access Control. Administer Azure using the Resource Manager, Azure portal, Cloud Shell, and CLI. Configure intersite connectivity solutions like VNet Peering, and virtual network gateways. Administer Azure App Service, Azure Container Instances, and Kubernetes. This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include virtualization, automation, networking, storage, identity, security, data platform, and application infrastructure. This course outlines how decisions in each theses area affects an overall solution. IMPLEMENT AZURE ACTIVE DIRECTORY * Overview of Azure Active Directory * Users and Groups * Domains and Custom Domains * Azure AD Identity Protection * Implement Conditional Access * Configure Fraud Alerts for MFA * Implement Bypass Options * Configure Guest Users in Azure AD * Configure Trusted IPs * Manage Multiple Directories IMPLEMENT AND MANAGE HYBRID IDENTITIES * Install and Configure Azure AD Connect * Configure Password Sync and Password Writeback * Configure Azure AD Connect Health IMPLEMENT VIRTUAL NETWORKING * Virtual Network Peering * Implement VNet Peering IMPLEMENT VMS FOR WINDOWS AND LINUX * Select Virtual Machine Size * Configure High Availability * Implement Azure Dedicated Hosts * Deploy and Configure Scale Sets * Configure Azure Disk Encryption IMPLEMENT LOAD BALANCING AND NETWORK SECURITY * Implement Azure Load Balancer * Implement an Application Gateway * Understand Web Application Firewall * Implement Azure Firewall * Implement Azure Front Door * Implementing Azure Traffic Manager IMPLEMENT STORAGE ACCOUNTS * Storage Accounts * Blob Storage * Storage Security * Managing Storage * Accessing Blobs and Queues using AAD IMPLEMENT NOSQL DATABASES * Configure Storage Account Tables * Select Appropriate CosmosDB APIs IMPLEMENT AZURE SQL DATABASES * Configure Azure SQL Database Settings * Implement Azure SQL Database Managed Instances * High-Availability and Azure SQL Database * In this module, you will learn how to * Create an Azure SQL Database (single database) * Create an Azure SQL Database Managed Instance * Recommend high-availability architectural models used in Azure SQL Database AUTOMATE DEPLOYMENT AND CONFIGURATION OF RESOURCES * Azure Resource Manager Templates * Save a Template for a VM * Evaluate Location of New Resources * Configure a Virtual Hard Disk Template * Deploy from a template * Create and Execute an Automation Runbook IMPLEMENT AND MANAGE AZURE GOVERNANCE * Create Management Groups, Subscriptions, and Resource Groups * Overview of Role-Based Access Control (RBAC) * Role-Based Access Control (RBAC) Roles * Azure AD Access Reviews * Implement and Configure an Azure Policy * Azure Blueprints MANAGE SECURITY FOR APPLICATIONS * Azure Key Vault * Azure Managed Identity MANAGE WORKLOADS IN AZURE * Migrate Workloads using Azure Migrate * VMware - Agentless Migration * VMware - Agent-Based Migration * Implement Azure Backup * Azure to Azure Site Recovery * Implement Azure Update Management IMPLEMENT CONTAINER-BASED APPLICATIONS * Azure Container Instances * Configure Azure Kubernetes Service IMPLEMENT AN APPLICATION INFRASTRUCTURE * Create and Configure Azure App Service * Create an App Service Web App for Containers * Create and Configure an App Service Plan * Configure Networking for an App Service * Create and Manage Deployment Slots * Implement Logic Apps * Implement Azure Functions IMPLEMENT CLOUD INFRASTRUCTURE MONITORING * Azure Infrastructure Security Monitoring * Azure Monitor * Azure Workbooks * Azure Alerts * Log Analytics * Network Watcher * Azure Service Health * Monitor Azure Costs * Azure Application Insights * Unified Monitoring in Azure

AZ-303T00 - Microsoft Azure Architect Technologies
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cloud Computing / CompTIA Cloud+ (CV0-002)

By Apex Learning

OVERVIEW Cloud computing has become the backbone of businesses and organisations across the globe. Our 'Cloud Computing / CompTIA Cloud+ (CV0-002)' course will equip you with the knowledge and skills needed to excel in this burgeoning industry. The demand for cloud computing professionals is soaring, with an estimated 61% of companies already using cloud-based applications. This dynamic field offers lucrative opportunities and a wide salary range, making it a wise career choice.  Cloud computing professionals are in high demand worldwide, and this course empowers you to join their ranks. With a focus on CompTIA Cloud+ (CV0-002), you'll gain a comprehensive understanding of cloud technologies, deployment models, security protocols, and much more.  This course is your ticket to your career in cloud computing. Enrol today! HOW WILL I GET MY CERTIFICATE? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. WHO IS THIS COURSE FOR? There is no experience or previous qualifications required for enrolment on this Cloud Computing / CompTIA Cloud+ (CV0-002). It is available to all students, of all academic backgrounds. REQUIREMENTS Our Cloud Computing / CompTIA Cloud+ (CV0-002) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. There is no time limit for completing this course, it can be studied in your own time at your own pace. CAREER PATH Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- * Open doors of opportunities * Increase your adaptability * Keep you relevant * Boost confidence And much more! COURSE CURRICULUM 11 sections • 100 lectures • 10:39:00 total length •Introduction to the Cloud: 00:04:00 •Cloud+ Exam Info: 00:08:00 •What Can Cloud+ Do For You?: 00:03:00 •Preparing for the Cloud+ Exam: 00:06:00 •Setting up Your Cloud Accounts: 00:06:00 •Defining the Cloud: 00:08:00 •Deployment Models: 00:05:00 •Public Cloud (Demo): 00:08:00 •Private Cloud (Demo): 00:06:00 •Community Cloud (Demo): 00:06:00 •Hybrid Cloud (Demo): 00:05:00 •Additional Models: 00:05:00 •Cloud Architectures: 00:06:00 •Capacity, Elasticity, and Support Agreements: 00:08:00 •Resource Balancing: 00:07:00 •Change Management: 00:07:00 •Deployment Exam Objectives Explained: 00:06:00 •Cloud Component Interactions, Part 1: 00:07:00 •Cloud Component Interaction, Part 2: 00:08:00 •Non-Cloud Component Interactions: 00:09:00 •Platforms and Applications: 00:05:00 •Baselines (Lab): 00:07:00 •Target Hosts: 00:05:00 •Existing Systems (Lab): 00:09:00 •Architecting for Elements and Targets (Demo): 00:07:00 •Selecting Deployment Tools (Demo): 00:07:00 •Executing a Deployment Plan (Demo): 00:09:00 •Evaluating Testing Plans: 00:05:00 •Testing Techniques: 00:05:00 •Analyzing Testing Results: 00:04:00 •Baseline Confirmation (Lab): 00:08:00 •Deployment Problem Resolution (Lab): 00:08:00 •Cloud Storage Types: 00:06:00 •Provisioning Storage: 00:06:00 •Storage Protection Capabilities: 00:09:00 •Storage Features: 00:06:00 •Access Protocols: 00:06:00 •Storage Management (Demo): 00:06:00 •Storage Security (Lab): 00:05:00 •Disaster Recovery Capabilities (Demo): 00:07:00 •Disaster Recovery Considerations: 00:05:00 •Business Continuity Plan (Lab): 00:07:00 •Compute Introduction: 00:06:00 •CPU Capabilities: 00:08:00 •Memory Requirements: 00:07:00 •Performance Considerations: 00:07:00 •Cost Considerations (Lab): 00:07:00 •Energy Savings: 00:05:00 •Dedicated vs. Shared Compute: 00:04:00 •High Availability and Disaster Recovery for Compute: 00:05:00 •Monitoring (Lab): 00:08:00 •Forecasting: 00:05:00 •Policies: 00:03:00 •Network Components (Demo): 00:09:00 •Network Protocols: 00:04:00 •Network Ports (Lab): 00:05:00 •Virtual Private Networks (VPNs): 00:08:00 •IDS/IPS: 00:07:00 •Segmentation: 00:09:00 •Network SLAs and Change Management: 00:04:00 •Networking in Different Models: 00:05:00 •Security Policies: 00:06:00 •Standards and Compliance (Demo): 00:05:00 •Identity, Authentication, and Authorization: 00:08:00 •Multi-Factor Authentication (Lab): 00:05:00 •Authorization (Lab): 00:08:00 •Encryption (Demo): 00:08:00 •Compute Security (Demo): 00:07:00 •Account Management (Lab): 00:07:00 •Segmentation (Lab): 00:05:00 •Security Tools (Demo): 00:07:00 •Security Services: 00:05:00 •Security Automation and Orchestration: 00:06:00 •Models and Security: 00:06:00 •Migration Types: 00:07:00 •Workload Management: 00:05:00 •Virtualizing Physical Systems: 00:06:00 •Migrating Security: 00:07:00 •Protocols and Services: 00:08:00 •Environmental Constraints: 00:07:00 •Planning Patch Management: 00:07:00 •Manual Patch Management: 00:04:00 •Automated Patch Management (Lab): 00:03:00 •Update Types: 00:08:00 •Automated Workflows (Lab): 00:07:00 •Backup Types (Lab): 00:10:00 •Backup Targets and Options: 00:07:00 •Maintenance Automation Techniques: 00:05:00 •Maintenance Automation Tasks: 00:07:00 •Provisioning and Deprovisioning: 00:07:00 •Application Life Cycle: 00:03:00 •Monitoring and Reporting (Lab): 00:07:00 •Monitoring Metrics: 00:06:00 •Troubleshooting Methodology: 00:08:00 •Troubleshooting Deployment: 00:07:00 •Troubleshooting Capacity: 00:08:00 •Troubleshooting Automation and Orchestration: 00:07:00 •Troubleshooting Connectivity: 00:10:00 •Troubleshooting Security: 00:09:00 •Resource - Cloud Computing / CompTIA Cloud+ (CV0-002): 00:00:00

Cloud Computing / CompTIA Cloud+ (CV0-002)
Delivered Online On Demand
£12

NECA: Nutanix Enterprise Cloud Administration

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Administrators, architects, and business leaders who manage Nutanix clusters in the datacenter Managers and technical staff seeking information to drive purchase decisions Anyone who is seeking the Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) certification Overview During this program, attendees will: Develop a working knowledge of the Nutanix product family. Understand the requirements and considerations involved in setting up a Nutanix cluster. Familiarize themselves with cluster management and monitoring via the Prism web console. Learn how to create, manage, and migrate VMs, set up data protection services, and plan for business continuity. Understand how to plan and handle upgrades, assess future requirements, and create what-if scenarios to adress scaling for business needs. The Nutanix Enterprise Cloud Administration (ECA) course enables administrators (system, network, and storage) to successfully configure and manage Nutanix in the datacenter. The course covers many of the tasks Nutanix administrators perform through the use of graphical user interfaces (GUIs) and command line interfaces (CLIs). It also provides insight into a Nutanix cluster?s failover and self-healing capabilities, offers tips for solving common problems, and provides guidelines for collecting information when interacting with Nutanix Support INTRODUCTION * The section describes the Nutanix HCI solution, walks you through the components of the Nutanix Enterprise Cloud, and explains the relationship between physical and logical cluster components. MANAGING THE NUTANIX CLUSTER * In this section, you will use the Prism console to monitor a cluster, configure a cluster using various interfaces, use the REST API Explorer to manage the cluster, and learn how to deploy Nutanix-specific PowerShell cmdlets. SECURING THE NUTANIX CLUSTER * This section shows how to secure a Nutanix cluster through user authentication, SSL certificate installation, and cluster access control. ACROPOLILS NETWORKING * This section explains how to configure managed and unmanaged Acropolis networks and describes the use of Open vSwitch (OVS) in Acropolis. You will learn how to display and manage network details, differentiate between supported OVS bond modes, and gain insight into default network configuration. VM MANAGEMENT * This section shows you how to upload images, and how to create and manage virtual machines. HEALTH MONITORING AND ALERTS * In this section, you will use the Health Dashboard to monitor a cluster?s health and performance. You will also use Analysis Dashboard to create charts that you can export with detailed information on a variety of components and metrics. DISTRIBUTED STORAGE FABRIC * This section discusses creating and configuring storage containers, including the storage optimization features: deduplication, compression, and erasure coding. AHV WORKLOAD MIGRATION * Using Nutanix Move, this section shows how to migrate workloads to a cluster running AHV. This is followed by a lab where a VM running on a Nutanix cluster configured with ESXi is migrated to a Nutanix cluster running AHV. FILE AND VOLUMES * This section gives you detailed information on Nutanix Volumes, which provides highly available, high-performance block storage through a few easy configuration steps. It also discusses Nutanix Files. UNDERSTANDING INFRASTRUCTURE RESILIENCY * This section shows how Nutanix provides comprehensive data protection at all levels of the virtual datacenter: logical and physical. DATA PROTECTION * Data can be replicated between Nutanix clusters, synchronously and asynchronously. This section shows how to configure a Protection Domain (PD) and Remote Sites, recover a VM from a PD, and perform a planned failover of a PD. PRISM CENTRAL * Having discussed and used Prism Element earlier, this section looks at the capabilities of Prism Central. With the added functionality provided by a Pro license, the focus is on features related to monitoring and managing multiple activities across a set of clusters. MONITORING THE NUTANIX CLUSTER * This section shows you where to locate and how to interpret cluster-related log files. In addition, you will take a closer look at the Nutanix Support Portal and online help. CLUSTER MANAGEMENT AND EXPANSION * This section outlines essential life-cycle operations, including starting/stopping a Nutanix cluster, as well as starting/shutting down a node. You will also learn how to expand a cluster, manage licenses, and upgrade the cluster?s software and firmware. REMOTE OFFICE BRANCH OFFICE (ROBO) DEPLOYMENTS * In this section, you will understand various configurations and requirements specific to a ROBO site. This includes hardware/software, Witness VM, networking, failure and recovery scenarios for two-node clusters, and the seeding process. ADDITIONAL COURSE DETAILS: Nexus Humans NECA: Nutanix Enterprise Cloud Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the NECA: Nutanix Enterprise Cloud Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

NECA: Nutanix Enterprise Cloud Administration
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certificate in Intellectual Property (CIP)

By EMG Associates UK Limited

CERTIFICATE IN INTELLECTUAL PROPERTY (CIP) WHY ATTEND As international trade and business continues to evolve, the importance of Intellectual Property Rights (IPRs) becomes increasingly vital. With new technologies and products relying heavily on IPRs, governments around the world are competing to offer higher levels of protection in order to attract investments and promote local innovation and production. Due to the complex nature of the scientific, economic, social, and theoretical aspects of IPRs, it is crucial for entities to have a comprehensive understanding of these issues. During this course, through practical workshops, case studies and expert knowledge, participants will gain an understanding of the concepts, theories, legislative and practical elements necessary to develop a successful IP strategy for their organization. COURSE METHODOLOGY In this interactive training course participants will frequently work in pairs as well as in larger groups to complete exercises, and regional and international case studies COURSE OBJECTIVES By the end of the course, participants will be able to: * Understand the theoretical background of Intellectual Property (IP) and the various types of IP existence * Understand the international and local set of conventions and laws governing IPRs * Demonstrate deep knowledge of the conditions that should exist in each type of IPR, their registration, licensing and enforcement * Apply knowledge of IPRs in all legal fields including contracts and litigation * Participate effectively in building a comprehensive IP strategy for their organization TARGET AUDIENCE This course is suitable for professionals working in the legal and IP filed, including but not limited to; lawyers, in-house counsels, governmental officials, police, customs, health authorities, researchers, university lecturers, publishers, IP agents as well as researchers who are interested in having deeper knowledge about IP in the GCC. It will also highly benefit in-house councils who recently joined their companies in the GCC as it will give them all the knowledge needed to handle all IP issues within the region. TARGET COMPETENCIES * General principles of IPRs * Trademarks, Patents, Copyright * Principles of IP Enforcement * Building IP Strategy NOTE The Dubai Government Legal Affairs Department has introduced a Continuing Legal Professional Development (CLPD) programme to legal consultants authorised to practise through a licensed firm in the Emirate of Dubai.  We are proud to announce that the Dubai Government Legal Affairs Department has accredited EMG Associates as a CLPD provider. In addition, all our legal programmes have been approved. This PLUS Specialty Training Legal course qualifies for 4 elective CLPD points. * Introduction and basic concepts  * Types of IPRs * Main theories justifying IP protection * The role of IP in economic development * The Role of IP in innovation and creativity * The globalization of IPRs protection * International conventions * Trade-Related Aspects of Intellectual Property Rights (TRIPS) and the World Trade Organization * The GCC Cooperation in the field of IP protection * Trademarks and copyright  * Definition and types of marks * Scope of trade marks protection * Registration procedures and rights conferred to trade mark owner * Legal protection of trade marks * Subject matter and conditions of copyright * Types of protected works * Financial and moral rights * Fair use, duration of protection and legal protection for copyright * Patents and trade secrets * Patentable inventions and types of patents * Registration process   * Ownership and rights conferred to patent owner * Employer-employee inventions and legal protection for patents * Definition of trade secrets and confidential information * Elements of trade secrets * Utilization of trade secrets commercially * Legal protection of trade secrets * Building a strong IP strategy and strategic management of IPRs * Overview and basic concepts * Understand your business and your IP needs * IP audit and building the portfolio * Onward licensing (licensing process and contracts) * IP commercialization mechanisms and maximizing the benefits * Practical steps to building a successful IP strategy * IP valuation - your gateway to know how much your IP worth * Assessment of the IP strategy for further success 

Certificate in Intellectual Property (CIP)
Delivered Online
Dates arranged on request
£3822

Purchasing, Procurement and Inventory Management

By Course Gate

Gain essential skills in purchasing, procurement, and inventory management with our comprehensive course. Perfect for professionals and students alike, this course covers supply chain basics, procurement strategies, and inventory control techniques to enhance your career prospects in the competitive job market.

Purchasing, Procurement and Inventory Management
Delivered Online On Demand
£11.99

CompTIA Security+ Certification Training Advanced Diploma

By Alpha Academy

The CompTIA Security+ (SY0-401) certification course provides information about the corporate security which is recognised as one of the fastest-growing fields in IT. Every institution even small business invests in IT security to secure their confidential data. The course covers the security fundamentals including the information security cycle, information security controls, authentication methods, cryptography fundamentals, and security policy fundamentals. Throughout the course, you will learn the Security Threats and vulnerabilities, Managing data, Application and Host Security, and the system of implementing Networking Security, implementing access control, authentication and Account Management, and implementing Compliance and Operating Security. Finally, the course will teach you how to manage certificates, how to manage risk, how to troubleshoot and manage security incidents, and the proper Business Continuity and Disaster Recovery Planning. In short, the course helps you to acquire competency in network infrastructure, system security, organizational security and access control. COURSE HIGHLIGHTS * The price is for the whole course including final exam - no hidden fees * Accredited Certificate upon successful completion * Efficient exam system with instant results * Track progress within own personal learning portal * 24/7 customer support via live chat This valuable course is suitable for anyone interested in working in this sector or who simply wants to learn more about the topic. If you're an individual looking to excel within this field then CompTIA Security+ Certification Training Advanced Diploma is for you. We've taken this comprehensive course and broken it down into several manageable modules which we believe will assist you to easily grasp each concept - from the fundamental to the most advanced aspects of the course. It really is a sure pathway to success. All our courses offer 12 months access and are designed to be studied at your own pace so you can take as much or as little time as you need to complete and gain the accredited qualification. We pride ourselves on having friendly and experienced instructors who provide full weekday support and are ready to help with any of your queries. So, if you need help, just drop them an email and await a speedy response. Furthermore, you can check the validity of your qualification and verify your certification on our website at anytime. So, why not improve your chances of gaining professional skills and better earning potential. ASSESSMENT AND CERTIFICATION At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. After you have successfully passed the final exam, you will be able to order an Accredited Certificate of Achievement at an additional cost of £19 for a PDF copy and £29 for an original print copy sent to you by post or for both £39. CAREER PATH Not only does our accredited course look good on your CV, setting you apart from the competition, it can be used as a stepping stone to greater things. Further advance your learning, launch a new career or reinvigorate an existing one. On successful completion of this course, you have the potential to achieve an estimated salary of £30,000. The sky really is the limit. COURSE CURRICULUM Security Fundamentals The Information Security Cycle 00:37:00 Information Security Controls 00:35:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Identifying Security Threats and Vulnerabilities Social Engineering 00:31:00 Malware 00:25:00 Software-Based Threats 00:21:00 Based Threats 00:38:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Managing Data, Application, and Host Security Manage Data Security 00:47:00 Manage Application Security 00:56:00 Manage Device and Host Security 01:07:00 Manage Mobile Security 00:10:00 Implementing Network Security Configure Security Parameters on Network Devices and Technologies 00:49:00 Network Design Elements and Components 00:26:00 Implement Networking Protocols and Services 01:09:00 Apply Secure Network Administration Principles 00:12:00 Secure Wireless Traffic 00:31:00 Implementing Access Control, Authentication, and Account Management Access Control and Authentication Services 00:42:00 Implement Account Management Security Controls 00:33:00 Managing Certificates Install a CA Hierarchy 00:25:00 Enroll Certificates 00:13:00 Secure Network Traffic by Using Certificates 00:03:00 Renew Certificates 00:01:00 Back Up and Restore Certificates and Private Keys 00:05:00 Revoke Certificates 00:07:00 Implementing Compliance and Operational Security Physical Security 00:20:00 Legal Compliance 00:10:00 Security Awareness and Training 00:11:00 Integrate Systems and Data with Third Parties 00:08:00 Risk Management A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:04:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Troubleshooting and Managing Security Incidents Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:09:00 Business Continuity and Disaster Recovery Planning Business Continuity 00:17:00 Plan for Disaster Recovery 00:17:00 Execute DRPs and Procedures 00:13:00 Mock Exam Mock Exam- CompTIA Security+ Certification - Complete Video Course 00:20:00 Final Exam Final Exam- CompTIA Security+ Certification - Complete Video Course 00:20:00

CompTIA Security+ Certification Training Advanced Diploma
Delivered Online On Demand
£10.99

CompTIA Security+ (SY0-601)

By Apex Learning

OVERVIEW This comprehensive course on CompTIA Security+ (SY0-601) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Security+ (SY0-601) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. HOW WILL I GET MY CERTIFICATE? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. WHO IS THIS COURSE FOR? There is no experience or previous qualifications required for enrolment on this CompTIA Security+ (SY0-601). It is available to all students, of all academic backgrounds. REQUIREMENTS Our CompTIA Security+ (SY0-601) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. CAREER PATH Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- * Open doors of opportunities * Increase your adaptability * Keep you relevant * Boost confidence And much more! COURSE CURRICULUM 14 sections • 164 lectures • 20:35:00 total length •Introduction to CompTIA Security+ SY0-601: 00:03:00 •About the CompTIA Security+ SY0-601 Exam: 00:03:00 •Defining Risk: 00:08:00 •Threats and Vulnerabilities: 00:07:00 •Threat Intelligence: 00:11:00 •Risk Management Concepts: 00:07:00 •Security Controls: 00:09:00 •Risk Assessments and Treatments: 00:06:00 •Quantitative Risk Assessments: 00:07:00 •Qualitative Risk Assessments: 00:04:00 •Business Impact Analysis: 00:09:00 •Data Types and Roles: 00:11:00 •Security and the Information Life Cycle: 00:09:00 •Data Destruction: 00:06:00 •Personnel Risk and Policies: 00:10:00 •Third-Party Risk Management: 00:09:00 •Agreement Types: 00:07:00 •Exam Question Review: 00:02:00 •Wiping Disks with the dd Command Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Cryptography Basics: 00:16:00 •Data Protection: 00:09:00 •Cryptographic Methods: 00:07:00 •Symmetric Cryptosystems: 00:13:00 •Symmetric Block Modes: 00:08:00 •Asymmetric Cryptosystems: 00:13:00 •Diffie-Hellman: 00:07:00 •Hashing: 00:09:00 •Understanding Digital Certificates: 00:08:00 •Trust Models: 00:05:00 •Public Key Infrastructure: 00:04:00 •Certificate Types: 00:14:00 •Touring Certificates: 00:09:00 •Cryptographic Attacks: 00:05:00 •Password Cracking: 00:10:00 •Password Cracking Demo: 00:06:00 •Exam Question Review: 00:02:00 •SSH Public Key Authentication Lab: 00:09:00 •Ask Me Anything (AMA): 00:02:00 •Identification, Authentication, and Authorization: 00:08:00 •Enabling Multifactor Authentication: 00:05:00 •Authorization: 00:05:00 •Accounting: 00:05:00 •Authentication Methods: 00:14:00 •Access Control Schemes: 00:07:00 •Account Management: 00:13:00 •Network Authentication: 00:09:00 •Identity Management Systems: 00:06:00 •Exam Question Review: 00:02:00 •Creating LInux Users and Groups Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Touring the CLI: 00:16:00 •Shells: 00:06:00 •The Windows Command Line: 00:05:00 •Microsoft PowerShell: 00:13:00 •Linux Shells: 00:12:00 •Python Scripts: 00:07:00 •Windows Command-Line Tools: 00:16:00 •Linux Command-Line Tools: 00:10:00 •Network Scanners: 00:05:00 •Network Scanning with Nmap: 00:09:00 •Network Protocol Analyzers: 00:08:00 •Using Wireshark to Analyze Network Traffic: 00:09:00 •Using tcpdump to Analyze Network Traffic: 00:08:00 •Log Files: 00:09:00 •Centralized Logging: 00:09:00 •Configuring Linux Log Forwarding: 00:08:00 •Exam Question Review: 00:03:00 •Lunux Shell Script Lab: 00:07:00 •Nmap Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00 •Malware: 00:14:00 •Weak Configurations: 00:12:00 •Common Attacks: 00:09:00 •Driver and Overflow Attacks: 00:08:00 •Password Attacks: 00:08:00 •Bots and Botnets: 00:06:00 •Disk RAID Levels: 00:10:00 •Securing Hardware: 00:11:00 •Securing Endpoints: 00:09:00 •Exam Question Review: 00:02:00 •Linux Software RAID Lab: 00:08:00 •Ask Me Anything (AMA): 00:02:00 •The OSI Model: 00:13:00 •ARP Cache Poisoning: 00:09:00 •Other Layer 2 Attacks: 00:05:00 •Network Planning: 00:07:00 •Load Balancing: 00:06:00 •Securing Network Access: 00:06:00 •Honeypots: 00:06:00 •Firewalls: 00:11:00 •Proxy Servers: 00:06:00 •Network and Port Address Translation: 00:07:00 •IP Security (IPsec): 00:09:00 •Virtual Private Networks (VPNs): 00:10:00 •Intrusion Detection and Prevention Systems (IDS/IPS): 00:13:00 •Exam Question Review: 00:03:00 •Linux Snort IDS Lab: 00:07:00 •Ask Me Anything (AMA): 00:01:00 •Wi-Fi Encryption Standards: 00:10:00 •RFID, NFC, and Bluetooth: 00:07:00 •Wi-Fi Coverage and Performance: 00:08:00 •Wi-Fi Discovery and Attacks: 00:12:00 •Cracking WPA2: 00:10:00 •Wi-Fi Hardening: 00:11:00 •Exam Question Review: 00:02:00 •WPA2 Cracking Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Defining a Public Server: 00:01:00 •Common Attacks and Mitigations: 00:10:00 •Containers and Software-Defined Networking: 00:11:00 •Hypervisors and Virtual Machines: 00:08:00 •Cloud Deployment Models: 00:09:00 •Cloud Service Models: 00:08:00 •Securing the Cloud: 00:10:00 •Exam Question Review: 00:02:00 •Docker Container Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Embedded Systems: 00:13:00 •Industrial Control System (ICS): 00:07:00 •Internet of Things (IoT) Devices: 00:10:00 •Connecting to Dedicated and Mobile Systems: 00:11:00 •Security Constraints for Dedicated Systems: 00:05:00 •Mobile Device Deployment and Hardening: 00:11:00 •Exam Question Review: 00:03:00 •Smartphone Hardening Lab: 00:03:00 •Ask Me Anything (AMA): 00:02:00 •Physical Security Overview: 00:01:00 •Physical Security: 00:10:00 •Keylogger Demo: 00:05:00 •Environmental Controls: 00:05:00 •Exam Question Review: 00:02:00 •Physical Security Lab: 00:03:00 •Ask Me Anything (AMA): 00:03:00 •DNS Security: 00:05:00 •FTP Packet Capture: 00:03:00 •Secure Web and E-mail: 00:02:00 •Request Forgery Attacks: 00:05:00 •Cross-Site Scripting Attacks: 00:07:00 •Web Application Security: 01:20:00 •Web App Vulnerability Scanning: 00:06:00 •Exam Question Review: 00:03:00 •OWASP ZAP Web App Scan Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Testing Infrastructure Overview: 00:05:00 •Social Engineering: 00:06:00 •Social Engineering Attacks: 00:11:00 •Vulnerability Assessments: 00:09:00 •Penetration Testing: 00:10:00 •Security Assessment Tools: 00:12:00 •The Metasploit Framework: 00:08:00 •Exam Question Review: 00:02:00 •Hping3 Forged Packet Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Incident Response Overview: 00:03:00 •Incident Response Plans (IRPs): 00:06:00 •Threat Analysis and Mitigating Actions: 00:08:00 •Digital Forensics: 00:12:00 •Gathering Digital Evidence: 00:10:00 •Business Continuity and Alternate Sites: 00:06:00 •Data Backup: 00:10:00 •Exam Question Review: 00:01:00 •Autopsy Forensic Browser Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00

CompTIA Security+ (SY0-601)
Delivered Online On Demand
£12

VMware Cloud Foundation: Plan, Manage and Operate [V5.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System architects and system administrators Overview By the end of the course, you should be able to meet the following objectives: Plan a deployment for VMware Cloud Foundation Understand VMware Cloud Foundation and supporting architecture Configure VMware Cloud Foundation for VMware Cloud Connectivity Understand the VMware Cloud Foundation subscription licensing model Perform Day-Zero tasks Perform VMware Cloud Foundation platform onboarding Manage user credentials in VMware Cloud Foundation Configure NSX networking in VMware Cloud Foundation Deploy and manage Workload Domains Deploy vSphere with Tanzu on VMware Cloud Foundation Understand and implement storage solutions and related policies Perform maintenance tasks for the VMware Cloud Foundation platform Manage certificates for VMware Cloud Foundation and connected technologies Manage the lifecycle for VMware Cloud Foundation Engage with VMware Cloud Foundation Technical Support This five-day training course provides you with the knowledge, skills, and abilities to achieve competence with VMware Cloud Foundation 5.0. This course teaches you how deploy VMware Cloud Foundation, and perform the tasks required for the initial configuration and ongoing operation after deployment. COURSE INTRODUCTION * Introductions and course logistics * Course objectives VMWARE CLOUD FOUNDATION OVERVIEW * Describe the VMware Cloud Foundation solution * Describe VMware Cloud Foundation architecture * Identify VMware Cloud Foundation components * Describe the VMware Cloud Foundation topology VMWARE CLOUD FOUNDATION+ AND VMWARE CLOUD CONNECTIVITY * Describe the VMware Cloud Foundation+ architecture * Identify the pre-requisites for VMware Cloud Foundation+ * Describe VMware Cloud Foundation+ value added features * Configure subscription-based licensing parameters * Describe the vCenter Cloud Gateway functionality * Identify the vCenter Cloud Gateway components * Describe the vCenter Cloud Gateway architecture * Connect the vCenter Cloud Gateway to VMware Cloud * Describe the VMware Cloud platform * Describe the VMware vSphere+ services used in VMware Cloud Foundation+ * Demonstrate the capabilities of the VMware Cloud user interface for VMware Cloud Foundation+ DAY ZERO TASKS * Identify the requirements for deploying VMware Cloud Foundation * Describe the VMware Cloud Foundation bring-up process * Identify the information required for the Planning and Preparation Workbook * Complete the Deployment Parameter Workbook * Describe how VMware Cloud Builder automates the deployment process * Identify the configuration validation process performed by VMware Cloud Builder * Describe the deployment of the management domain POST-DEPLOYMENT OPERATIONS * Complete the Onboarding Wizard * Understand VMware Cloud Foundation integration with VMware Single Sign-On * Configure user access to VMware Cloud Foundation * Describe the importance of user roles in vSphere * Configure identity sources for VMware Cloud Foundation * Perform the SDDC Manager backup and restore process * Identify steps in the NSX backup and restore process * Manage passwords in VMware Cloud Foundation * Explain the importance of using VMware Cloud Foundation to manage passwords for vSphere components * Manage and secure a primary password list * Describe the process for rotating passwords not managed by VMware Cloud Foundation VMWARE CLOUD FOUNDATION NETWORKING WITH NSX * Describe network virtualization with NSX * Recognize NSX operational planes * Identify NSX components * Describe logical switching * Describe NSX Data Center deployment in VMware Cloud Foundation * Explain how logical routing works in NSX * Identify NSX Edge functions * Describe data plane preparation for NSX Edge nodes in a workload domain * Recognize Tier-0 and Tier-1 gateway topologies * Define application virtual networks * Describe management domain rack options * List NSX Edge cluster requirements for vSphere with Tanzu * Discuss NSX Edge cluster placement considerations MANAGING WORKLOAD DOMAINS * Define workload domains * List the types of workload domains * Identify workload domain prerequisites * Understand the scalability limits for workload domains * Identify use cases for multiple clusters in a workload domain * Create network pools * Size network pools * Commission hosts with SDDC Manager * Create workload domains * Scale workload domains * Decommission hosts from a workload domain * Remove workload domains * Describe distinctive design decisions for VMware Cloud Foundation components VSPHERE WITH TANZU IN VMWARE CLOUD FOUNDATION * Explain vSphere with Tanzu * Define the role of the Spherelet * Describe the supervisor cluster control plane * Create vSphere with Tanzu namespaces * Describe the role of NSX networking components in vSphere with Tanzu * Discuss vSphere with Tanzu networking topology * Describe control plane VM management networking requirements * Plan appropriate IP address ranges for pod, ingress, and egress networking * Describe prerequisites for vSphere with Tanzu cluster compatibility * Deploy vSphere with Kubernetes * Create a vSphere namespace * Configure limits and permissions for a vSphere namespace VMWARE CLOUD FOUNDATION STORAGE MANAGEMENT * Identify storage use cases in VMware Cloud Foundation * Determine the most appropriate storage option for a workload domain * Describe different vSphere-native storage design options * Identify vSAN architecture and components * Describe vSAN requirements for the management and workload domains * Configure deduplication and compression * Discuss how to scale vSAN clusters in VMware Cloud Foundation * Configure storage policies for vSAN * Explain storage policy failure tolerance rules * Identify a virtual machine storage policy compliance status * Explain how vSAN storage policies protect VMware Cloud Foundation components AVAILABILITY AND BUSINESS CONTINUITY * Explain the importance of external service availability * Describe availability options native to VMware vSphere * Identify stretched cluster use cases * Identify stretched cluster components * Recognize stretched cluster requirements in VMware Cloud Foundation * Prepare and deploy a vSAN stretched cluster using APIs VMWARE CLOUD FOUNDATION CERTIFICATE MANAGEMENT * Learn the basics of public key infrastructure (PKI) * Describe the purpose of certificate signing requests (CSRs) * Describe available options in SDDC Manager for certificate authorities * View certificates for VMware Cloud Foundation components * Install and replace certificates for VMware Cloud Foundation components * Configure the integrated Certificate Authorities in SDDC Manager * Configure a certificate template in Microsoft Certificate Authority server * Configure the OpenSSL certificate authority in SDDC Manager * Install certificates issued by Microsoft, OpenSSL, and third-party certificate authorities VMWARE CLOUD FOUNDATION LIFECYCLE MANAGEMENT * Describe VMware Cloud Foundation Life Cycle Management * List the products managed by VMware Cloud Foundation Lifecycle management * Use online and offline bundle downloads using VMware Cloud Foundation Lifecycle management * Understand the role of vSphere Lifecycle Management in VMware Cloud Foundation * Understand vSphere Lifecycle Manager features * Understand how and when to use cluster images * Describe the importance of Hardware Support Managers * Describe the upgrade prerequisites * Outline the upgrade precheck process * Describe the order of upgrade for VMware Cloud Foundation components VMWARE CLOUD FOUNDATION TROUBLESHOOTING * Use the SoS command-line tool to create log bundles, perform health checks, and check password validity * List VMware Cloud Foundation services * Identify VMware Cloud Foundation log files * Use token IDs to troubleshoot failed workflows

VMware Cloud Foundation: Plan, Manage and Operate [V5.0]
Delivered on-request, onlineDelivered Online
Price on Enquiry

Practical Cyber Hacking Skills for Beginners

By Packt

Learn theoretical and practical skills in cybersecurity, ethical hacking, cyber management, and develop safe networking principles. We will cover crafting phishing mails, performing brute force attacks, conducting audits with Burp Suite, gather data with Maltego software, and safeguard systems and networks from phishing, malware, ransomware, and social engineering.

Practical Cyber Hacking Skills for Beginners
Delivered Online On Demand
£82.99