• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

302 Computing courses in Shrewsbury

Essential Cloud Technologies

5.0(3)

By Systems & Network Training

CLOUD TECHNOLOGIES TRAINING COURSE DESCRIPTION This course provides an introduction to cloud technologies, including, configuration and deployment, security, maintenance, and management. It covers all aspects of cloud computing infrastructure. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. . WHAT WILL YOU LEARN * Contrast and compare AWS, GCP and Azure. * Explain the different cloud services, models and characteristics. * Explain cloud virtualization components and options. * Explain cloud security options. * Describe cloud automation, orchestration, monitoring and performance options. CLOUD TECHNOLOGIES TRAINING COURSE DETAILS * Who will benefit: Anyone working with or looking to work with cloud technologies. * Prerequisites: None. * Duration 2 days CLOUD TECHNOLOGIES TRAINING COURSE CONTENTS * What is the cloud? The Internet Cloud computing Benefits Disadvantages * Cloud services IaaS, PaaS, SaaS, others. * Cloud service providers AWS, GCP Microsoft Azure, others * Cloud architectures Private, public, hybrid others Cloud based delivery * The cloud and virtualization Virtual Machines, networks, storage, deployment. * Accessing the Virtual Machine * Secure cloud environments Security considerations. Data privacy considerations * Automation and orchestration * Monitoring and performance Performance Cost issues Cost containment

Essential Cloud Technologies
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1497

Cloud deployment

5.0(3)

By Systems & Network Training

CLOUD DEPLOYMENT TRAINING COURSE DESCRIPTION This course covers the important topics every cloud professional needs, including, configuration and deployment, security, maintenance, management, and troubleshooting. It covers all aspects of cloud computing infrastructure and administration, with a practical focus on real-world skills. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. Deploy and implement cloud solutions, manage the infrastructure, and monitor performance. You will also be able to install, configure, and manage virtual machines. WHAT WILL YOU LEARN * Cloud services, models, and characteristics. * Virtualization components, installation, and configuration. * Infrastructure configurations and optimization. * Resource management and specific allocations. * IT security concepts, tools, and best practices. * Recovery, availability and continuity in the cloud. CLOUD DEPLOYMENT TRAINING COURSE DETAILS * Who will benefit: IT professionals looking to deploy and implement cloud solutions, manage the infrastructure, and monitor performance, Install, configure, and manage virtual machines. * Prerequisites: Introduction to virtualization. * Duration 5 days CLOUD DEPLOYMENT TRAINING COURSE CONTENTS Preparing to Deploy Cloud Solutions Deploying a Pilot Project Testing Pilot Project Deployments Designing a Secure and Compliant Cloud Infrastructure Designing and Implementing a Secure Cloud Environment Planning Identity and Access Management for Cloud Deployments Determining CPU and Memory Sizing for Cloud Deployments Determining Storage Requirements for Cloud Deployments Analysing Workload Characteristics to Ensure Successful Migration Maintaining Cloud Systems Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures Analysing Cloud Systems for Performance Analysing Cloud Systems for Anomalies and Growth Forecasting Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues Troubleshooting Connectivity Issues Troubleshooting Security Issues

Cloud deployment
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797

Definitive network forensics for engineers

5.0(3)

By Systems & Network Training

NETWORK FORENSICS TRAINING COURSE DESCRIPTION This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. WHAT WILL YOU LEARN * Recognise network forensic data sources. * Perform network forensics using: Wireshark NetFlow Log analysis * Describe issues such as encryption. NETWORK FORENSICS TRAINING COURSE DETAILS * Who will benefit: Technical network and/or security staff. * Prerequisites: TCP/IP foundation for engineers. * Duration 3 days NETWORK FORENSICS TRAINING COURSE CONTENTS * What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. * Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. * Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. * Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. * Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. * Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. * The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. * Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. * Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.

Definitive network forensics for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497

Complete VBA programming

5.0(3)

By Systems & Network Training

COMPLETE VBA PROGRAMMING TRAINING COURSE DESCRIPTION This course helps you extend the capabilities of the entire Office suite using Visual Basic for Applications (VBA). Even if you have no programming experience, you'll be automating routine computing processes quickly using the simple, yet powerful VBA programming language. We start at the beginning to get you acquainted with VBA so you can start recording macros right away. You'll then build upon that foundation to utilize the full capabilities of the language in Word, Excel, Outlook, and PowerPoint. WHAT WILL YOU LEARN * Record, write and run macros. * Work with VBA Editor. * Use the huge library of built-in functions. * Create simple dialog boxes and complex forms. * Customize Word, Excel, PowerPoint, Outlook, and Access. * Program the Office 2016 ribbon. COMPLETE VBA PROGRAMMING TRAINING COURSE DETAILS * Who will benefit: Anyone looking to extend the capabilities of the entire Office suite using VBA. * Prerequisites: None. * Duration 5 days COMPLETE VBA PROGRAMMING TRAINING COURSE CONTENTS * Macros and getting started in VBA VBA syntax, variables, constants, and enumerations, array variables, finding objects, methods, and properties. * Working with VBA 1 VBA syntax, variables, constants, and enumerations, array variables, finding objects, methods, and properties. * Decisions, loops and functions Built-in functions, creating your own functions, making decisions in your code, using loops to repeat actions. * Using message boxes, input boxes, and dialog boxes Getting user input with message boxes and input boxes, creating simple custom dialog boxes, creating complex forms. * Creating effective code Building modular code and using classes, debugging your code and handling errors, building well-behaved code, exploring VBA's security features. * Programming the Office applications The Word object model and key objects, working with widely used objects in Word, the Excel object model and key objects, working with widely used objects in Excel, the PowerPoint object, model and key objects, working with shapes and running slide shows, the Outlook object model and key objects, working with events in Outlook, the Access object model and key objects, manipulating the data in an Access database via VBA, accessing one application from another application, programming the Office 2016 ribbon.

Complete VBA programming
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

UNIX Virtualization and High Availability

5.0(3)

By Systems & Network Training

UNIX VIRTUALIZATION AND HIGH AVAILABILITY COURSE DESCRIPTION This course covers administering UNIX enterprise-wide with an emphasis on virtualization and high availability. WHAT WILL YOU LEARN * Manage Virtual Machines. * Manage containers. * Manage HA clusters. * Manage HA cluster storage. UNIX VIRTUALIZATION AND HIGH AVAILABILITY COURSE DETAILS * Who will benefit: Enterprise-level UNIX professional. UNIX professionals working with virtualization and/or High availability. * Prerequisites: Linux network administration 2 (LPIC-2) * Duration 5 days UNIX VIRTUALIZATION AND HIGH AVAILABILITY COURSE CONTENTS * VIRTUALIZATION * Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. * Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. * KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. * Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. * Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. * Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. * Containers Containers versus VMs, Docker, Kubernetes. * Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. * Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). * HIGH AVAILABILITY CLUSTER STORAGE * DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. * Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

UNIX Virtualization and High Availability
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Linux virtualization and High Availability

5.0(3)

By Systems & Network Training

LINUX VIRTUALIZATION AND HA TRAINING COURSE DESCRIPTION The LPIC-3 certification is the culmination of LPI's multi -level professional certification program. LPIC-3 is designed for the enterprise-level Linux professional and represents the highest level of professional, distribution neutral Linux certification within the industry. LPIC-3 304 covers administering Linux enterprise-wide with an emphasis on virtualization and high availability. At SNT we have enhanced the contents of the course by covering containers. WHAT WILL YOU LEARN * Manage Virtual Machines. * Manage containers. * Manage HA clusters. * Manage HA cluster storage. LINUX VIRTUALIZATION AND HA TRAINING COURSE DETAILS * Who will benefit: Linux professionals working with virtualization and/or High availability. * Prerequisites: Linux network administration 2 (LPIC-2) * Duration 5 days LINUX VIRTUALIZATION AND HA TRAINING COURSE CONTENTS * VIRTUALIZATION * Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. * Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. * KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. * Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. * Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. * Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. * Containers Containers versus VMs, Docker, Kubernetes. * Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. * Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). * HIGH AVAILABILITY CLUSTER STORAGE * DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. * Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

Linux virtualization and High Availability
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Securing Kubernetes and Containers

5.0(3)

By Systems & Network Training

SECURING KUBERNETES TRAINING COURSE DESCRIPTION This course introduces concepts, procedures, and best practices to harden Kubernetes based systems and container-based applications against security threats. It deals with the main areas of cloud-native security: Kubernetes cluster setup, Kubernetes cluster hardening, hardening the underlying operating system and networks, minimizing microservices vulnerabilities, obtaining supply chain security as well as monitoring, logging, and runtime security. WHAT WILL YOU LEARN * Harden Kubernetes systems and clusters. * Harden containers. * Configure and use Kubernetes audit logs. SECURING KUBERNETES TRAINING COURSE DETAILS * Who will benefit: Technical staff working with Kubernetes * Prerequisites: Kubernetes_for_engineers_course.htm Definitive Docker for engineers * Duration 2 days SECURING KUBERNETES TRAINING COURSE CONTENTS This course does not only deal with the daily security administration of Kubernetes-based systems but also prepares delegates for the official Certified Kubernetes Security Specialist (CKS) exams of the Cloud Native Computing Foundation (CNCF). Structure: 50% theory 50% hands on lab exercise MODULE 1: USER AND AUTHORIZATION MANAGEMENT * Users and service accounts in Kubernetes * Authenticating users * Managing authorizations with RBAC MODULE 2: SUPPLY CHAIN SECURITY * Vulnerabilit checking for images * Image validation in Kubernetes * Reducing image footprint * Secure image registries MODULE 3: VALIDATING CLUSTER SETUP AND PENETRATION TESTING * Use CIS benchmark to review the security configuration of Kubernetes components. * Modify the cluster components' configuration to match the CIS Benchmark. * Penetration testing Kubernetes for known vulnerabilities. MODULE 4: SYSTEM HARDENING * Use kernel hardening tools * Setup appropriate OS level security domains * Container runtime sandboxes * Limit network access MODULE 5: MONITORING AND LOGGING * Configure Kubernetes audit logs * Configure Audit Policies * Monitor applications behaviour with Falco

Securing Kubernetes and Containers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1727

Internet of Things demystified

5.0(3)

By Systems & Network Training

INTERNET OF THINGS TRAINING COURSE DESCRIPTION A concise overview course covering The Internet of Things and the technologies involved. Particular emphasis is placed on the high level architecture of IoT and the benefits achievable. WHAT WILL YOU LEARN * Describe the structure of the IoT * List the technologies involved in IoT. * Explain how IoT works. INTERNET OF THINGS TRAINING COURSE DETAILS * Who will benefit: Non-technical staff working with IoT. * Prerequisites: None. * Duration 1 day INTERNET OF THINGS TRAINING COURSE CONTENTS * What is IoT The Internet, what is IoT? IoT and M2M, IoT technologies, IoT architecture. Wired and wireless communication. IoT applications; Smart houses, smart cities, smart cars, wearable, environment, other domain specific IoTs. * IoT architecture Physical objects, virtual objects, cloud computing, data capture, communications. Big data. * Components Hardware, sensors, actuators, chips, firmware, embedded systems. Open source platforms. Power options: Battery, solar, PoE. * IoT communication RF, ZigBee, Bluetooth, Bluetooth LE, RFID, WiFi, 802.11ah, mobile technologies. Wired. * Arduino (as an example) Microcontrollers, the platform, development, Arduino software, reading from sensors, I2C, SPI. Arduino and the Internet, HTTP, WiFi, GSM. The cloud and IoT: Pachube, nimbits, ThingSpeak * Security in IoT Authentication, Encryption, secure booting, firewalls.

Internet of Things demystified
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£967

Total NTP and PTP for engineers

5.0(3)

By Systems & Network Training

NTP AND PTP TRAINING COURSE DESCRIPTION This course looks at timing and synchronization as provided by NTP and PTP. Hands on sessions primarily involve using Wireshark to analyse the protocols. WHAT WILL YOU LEARN * Recognise the importance of timing and synchronisation. * Explain how NTP works. * Explain how PTP works. NTP AND PTP TRAINING COURSE DETAILS * Who will benefit: Anyone using NTP or PTP but particularly relevant for those in the broadcast industry. * Prerequisites: TCP/IP foundation for engineers * Duration 1 day NTP AND PTP TRAINING COURSE CONTENTS * Introduction Clock drift. Timing and synchronization. Importance in computing. Importance in broadcasting. * NTP NTP versions, v0 to v4. Architecture. The intersection algorithm. Accuracy. Clock strata, Stratum 0, 1, 2 and 3. Protocol modes. Hands on NTP configuration * More NTP NTP packet header. Timestamps. Variables in the header. Clock synchronization algorithm. SNTP. The Windows Time service. Hands on Wireshark and NTP analysis. * PTP PTP v2, IEEE 1588. Architecture. Accuracy. Synchronization with PTP. Offset and delay. Hands on Analysing PTP packet flows. * More PTP Ordinary clocks, boundary clocks, masters and grandmasters. PTP specific switch types. Hardware time stamping. SMPTE ST2059-2. PTP packet header. PTP domains. Best master clock algorithm. Hands on More Wireshark and PTP.

Total NTP and PTP for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£967

Credit Analysis

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- This training course will give participants a developed knowledge of credit analysis. Through a mix of lectures and interactive case studies, participants will be able to perform detailed credit analysis, including analysing market and environment, computing key financial ratios, interpreting cash flows and analysing financing needs. Key Topics * Financial needs and the business operating cycle * Review of financial statements * Financial ratio analysis * Corporate cash flow analysis * Cash flow projections for debt service * Key lending policy guidelines

Credit Analysis
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3779

Educators matching "Computing"

Show all 21
Shropshire Chamber of Commerce Ltd

shropshire chamber of commerce ltd

0.0(4)

Telford

Shropshire Chamber provides business and industry support in Shropshire. A true champion of Shropshire businesses at a local, regional and national level. Shropshire Chamber of Commerce sits at the heart of the community, working with companies of all shapes and sizes, and representing all sectors. Dedicated to sharing opportunities, knowledge and expertise, Shropshire Chamber is a dynamic member-led organisation that is firmly committed to positively impacting the local economy, and supports a network of more than 750 county-based businesses, strengthening their position in the region, ensuring their voices are heard, and providing useful connections and valuable access to new ideas and innovations. Championing the cause of local business at local, regional and national level Our Vision, Mission and Values Dedicated to sharing opportunities, knowledge and expertise, Shropshire Chamber is a dynamic member-led organisation that is firmly committed to positively impacting the local economy, and supports a network of more than 750 county-based businesses, strengthening their position in the region, ensuring their voices are heard, and providing useful connections and valuable access to new ideas and innovations. Our Vision Every business in Shropshire is aware of the value and opportunity provided by Shropshire Chamber of Commerce Join us Our Mission Championing the cause of local business at local, regional and national level Join us Our Values Approachable, fair, ethical, quality assured services that are accessible to all members Join us Image of the board of directors Board of Directors Our illustrious Board is made up of experienced business people of note in the county of Shropshire. Their vision sets the tone and direction of the Chamber and all are focussed on the success of the Chamber for the benefit of our membership. To learn more about our Board, please click on the link below. Meet our Board Shropshire Chamber Patrons Being a Patron of Shropshire Chamber of Commerce is a mark of excellence and integrity and demonstrates our firm commitment to the Chamber, the wider business community and the success of Shropshire’s economy as a whole. Meet our Patrons Chamber Team The Chamber team is a diverse set of experienced professionals whose sole focus is the success of our members. Each have specific duties around the various functions of the Chamber and is headed up by Richard Sheehan, Chief Executive and Ruth Ross, our Deputy Chief Executive. Click on the link below to read more. Meet the Team Locations Locations We have two Offices that are handliy located to cover the most populated areas of Shropshire. Find out more Conference Facilities At Shropshire Chamber we provide quality rooms for hire. They can be adapted to suit meetings, seminars, training, events, workshops, assessments and interviews. Catering is available on request to suit all budget and dietary requirements. All our rooms are on ground level and are easily accessible by wheelchair users. Assistance will be provided where required. Find out more What is a Chamber of Commerce? How long has the Shropshire Chamber of Commerce been running? What is a Patron? What do the Board do? Become a member today Latest News Retained Services from Saracen SolutionsMEMBERS NEWS Retained Services From Saracen Solutions Read more...November 10, 2022 Would you like to get into teaching or upskill to a leadership role in a school?MEMBERS NEWS Would You Like To Get Into Teaching Or Upskill To A Leadership Role In A School? Read more...November 10, 2022 Bosses risk weeks of chaos if workers go World Cup AWOLMEMBERS NEWS Bosses Risk Weeks Of Chaos If Workers Go World Cup AWOL Read more...November 2, 2022 About Us What We Do Our Vision, Mission and Values Board of Directors Patrons Chamber Team Locations Conference Facilities Office Space for Rent Job Vacancies Annual General Meeting Membership See our range of options ready to take your business forward Events Centre View our exciting range of Events tailored to your business success International Trade Get help with every aspect of buying and selling across the world Business Training See our wide range of training available to support your business needs Policy & Representation Ensure your voice is heard by councils and government agencies Campaigns View the latest campaigns we are supporting to aid your business success News Read Shropshire Chamber News, Members News and Announcements Would you like to see your company advertised on this page? Would you like to see your company advertised on this page? Report a problem with this page Join Us Events International Trade Training Policy Campaigns News Telford: Trevithick House, Stafford Park 4, Telford, Shropshire, TF3 3BA 01952 208200 Shrewsbury: Chamber House, 5 Henry Close, Battlefield Enterprise Park, Shrewsbury, Shropshire, SY1 3TJ 01743 460486 enquiries@shropshire-chamber.co.uk Registered in England & Wales #254208 Terms of UsePrivacy PolicyCookie PolicyModern Slavery PolicySitemap footer logo bccsocial fb social tw social in