• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5244 Courses in Bristol delivered Live Online

Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA)

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS DESIGNED FOR ANYONE SEEKING CCNA CERTIFICATION. THE COURSE ALSO PROVIDES FOUNDATIONAL KNOWLEDGE FOR ALL SUPPORT TECHNICIANS INVOLVED IN THE BASIC INSTALLATION, OPERATION, AND VERIFICATION OF CISCO NETWORKS. THE JOB ROLES BEST SUITED TO THE MATERIAL IN THIS COURSE ARE: ENTRY-LEVEL NETWORK ENGINEER NETWORK ADMINISTRATOR NETWORK SUPPORT TECHNICIAN HELP DESK TECHNICIAN OVERVIEW THIS COURSE WILL HELP YOU: LEARN THE KNOWLEDGE AND SKILLS TO INSTALL, CONFIGURE, AND OPERATE A SMALL- TO MEDIUM-SIZED NETWORK GAIN A FOUNDATION IN THE ESSENTIALS OF NETWORKING, SECURITY, AND AUTOMATION EARN 30 CE CREDITS TOWARD RECERTIFICATION DESCRIPTION THE IMPLEMENTING AND ADMINISTERING CISCO SOLUTIONS (CCNA) V2.0 COURSE GIVES YOU A BROAD RANGE OF FUNDAMENTAL KNOWLEDGE FOR ALL IT CAREERS. THROUGH A COMBINATION OF LECTURE, HANDS-ON LABS, AND SELF-STUDY, YOU WILL LEARN HOW TO INSTALL, OPERATE, CONFIGURE, AND VERIFY BASIC IPV4 AND IPV6 NETWORKS. THE COURSE COVERS CONFIGURING NETWORK COMPONENTS SUCH AS SWITCHES, ROUTERS, AND WIRELESS LAN CONTROLLERS; MANAGING NETWORK DEVICES; AND IDENTIFYING BASIC SECURITY THREATS. THE COURSE ALSO GIVES YOU A FOUNDATION IN NETWORK PROGRAMMABILITY, AUTOMATION, AND SOFTWARE-DEFINED NETWORKING. THIS COURSE HELPS YOU PREPARE TO TAKE THE 200-301 CISCO© CERTIFIED NETWORK ASSOCIATE (CCNA©) EXAM. BY PASSING THIS ONE EXAM, YOU EARN THE CCNA CERTIFICATION. THIS COURSE ALSO EARNS YOU 30 CONTINUING EDUCATION (CE) CREDITS TOWARDS RECERTIFICATION. COURSE OUTLINE * Exploring the Functions of Networking ? Lecture * Introducing the Host-to-Host Communications Model ? Lecture * Operating Cisco IOS Software ? Lecture * Introducing LANs ? Lecture * Exploring the TCP/IP Link Layer ? Lecture * Starting a Switch ? Lecture * Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets ? Lecture * Explaining the TCP/IP Transport Layer and Application Layer ? Lecture * Exploring the Functions of Routing ? Lecture * Configuring a Cisco Router ? Lecture * Exploring the Packet Delivery Process ? Lecture * Troubleshooting a Simple Network ? Lecture * Introducing Basic IPv6 ? Lecture * Configuring Static Routing ? Lecture * Implementing VLANs and Trunks ? Lecture * Routing Between VLANs ? Lecture * Introducing OSPF ? Lecture * Building Redundant Switched Topologies ? Self-study * Improving Redundant Switched Topologies with EtherChannel ? Lecture * Exploring Layer 3 Redundancy ? Self-study * Introducing WAN Technologies ? Self-study * Explaining Basics of ACL ? Lecture * Enabling Internet Connectivity ? Lecture * Introducing QoS ? Self-study * Explaining Wireless Fundamentals ? Self-study * Introducing Architectures and Virtualization ? Self-study * Explaining the Evolution of Intelligent Networks ? Lecture * Introducing System Monitoring ? Lecture * Managing Cisco Devices ? Lecture * Examining the Security Threat Landscape ? Self-study ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA)
Delivered Online6 days, May 13th, 13:00 + 17 more
£4195

CertNexus Certified CyberSec First Responder (CFR-410)

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS DESIGNED PRIMARILY FOR CYBERSECURITY PRACTITIONERS PREPARING FOR OR WHO CURRENTLY PERFORM JOB FUNCTIONS RELATED TO PROTECTING INFORMATION SYSTEMS BY ENSURING THEIR AVAILABILITY, INTEGRITY, AUTHENTICATION, CONFIDENTIALITY, AND NON-REPUDIATION. IT IS IDEAL FOR THOSE ROLES WITHIN FEDERAL CONTRACTING COMPANIES AND PRIVATE SECTOR FIRMS WHOSE MISSION OR STRATEGIC OBJECTIVES REQUIRE THE EXECUTION OF DEFENSIVE CYBER OPERATIONS (DCO) OR DOD INFORMATION NETWORK (DODIN) OPERATION AND INCIDENT HANDLING. THIS COURSE FOCUSES ON THE KNOWLEDGE, ABILITY, AND SKILLS NECESSARY TO PROVIDE FOR THE DEFENSE OF THOSE INFORMATION SYSTEMS IN A CYBERSECURITY CONTEXT, INCLUDING PROTECTION, DETECTION, ANALYSIS, INVESTIGATION, AND RESPONSE PROCESSES. OVERVIEW IN THIS COURSE, YOU WILL IDENTIFY, ASSESS, RESPOND TO, AND PROTECT AGAINST SECURITY THREATS AND OPERATE A SYSTEM AND NETWORK SECURITY ANALYSIS PLATFORM. YOU WILL: ASSESS CYBERSECURITY RISKS TO THE ORGANIZATION. ANALYZE THE THREAT LANDSCAPE. ANALYZE VARIOUS RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS. ANALYZE VARIOUS ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS. ANALYZE VARIOUS POST-ATTACK TECHNIQUES. ASSESS THE ORGANIZATION'S SECURITY POSTURE THROUGH AUDITING, VULNERABILITY MANAGEMENT, AND PENETRATION TESTING. COLLECT CYBERSECURITY INTELLIGENCE FROM VARIOUS NETWORK-BASED AND HOST-BASED SOURCES. ANALYZE LOG DATA TO REVEAL EVIDENCE OF THREATS AND INCIDENTS. PERFORM ACTIVE ASSET AND NETWORK ANALYSIS TO DETECT INCIDENTS. RESPOND TO CYBERSECURITY INCIDENTS USING CONTAINMENT, MITIGATION, AND RECOVERY TACTICS. INVESTIGATE CYBERSECURITY INCIDENTS USING FORENSIC ANALYSIS TECHNIQUES. DESCRIPTION THIS COURSE COVERS NETWORK DEFENSE AND INCIDENT RESPONSE METHODS, TACTICS, AND PROCEDURES THAT ARE IN ALIGNMENT WITH INDUSTRY FRAMEWORKS SUCH AS NIST 800-61R2 (COMPUTER SECURITY INCIDENT HANDLING GUIDE), US-CERT'S NATIONAL CYBER INCIDENT RESPONSE PLAN (NCIRP), AND PRESIDENTIAL POLICY DIRECTIVE (PPD)-41 ON CYBER INCIDENT COORDINATION. IT IS IDEAL FOR CANDIDATES WHO HAVE BEEN TASKED WITH THE RESPONSIBILITY OF MONITORING AND DETECTING SECURITY INCIDENTS IN INFORMATION SYSTEMS AND NETWORKS, AND FOR EXECUTING STANDARDIZED RESPONSES TO SUCH INCIDENTS. THE COURSE INTRODUCES TOOLS, TACTICS, AND PROCEDURES TO MANAGE CYBERSECURITY RISKS, DEFEND CYBERSECURITY ASSETS, IDENTIFY VARIOUS TYPES OF COMMON THREATS, EVALUATE THE ORGANIZATION'S SECURITY, COLLECT AND ANALYZE CYBERSECURITY INTELLIGENCE, AND REMEDIATE AND REPORT INCIDENTS AS THEY OCCUR. THIS COURSE PROVIDES A COMPREHENSIVE METHODOLOGY FOR INDIVIDUALS RESPONSIBLE FOR DEFENDING THE CYBERSECURITY OF THEIR ORGANIZATION. THIS COURSE IS DESIGNED TO ASSIST STUDENTS IN PREPARING FOR THE CERTNEXUS CYBERSEC FIRST RESPONDER (EXAM CFR-410) CERTIFICATION EXAMINATION. WHAT YOU LEARN AND PRACTICE IN THIS COURSE CAN BE A SIGNIFICANT PART OF YOUR PREPARATION. IN ADDITION, THIS COURSE AND SUBSEQUENT CERTIFICATION (CFR-410) MEET ALL REQUIREMENTS FOR PERSONNEL REQUIRING DOD DIRECTIVE 8570.01-M POSITION CERTIFICATION BASELINES: CSSP ANALYST CSSP INFRASTRUCTURE SUPPORT CSSP INCIDENT RESPONDER CSSP AUDITOR THE COURSE AND CERTIFICATION ALSO MEET ALL CRITERIA FOR THE FOLLOWING CYBERSECURITY MATURITY MODEL CERTIFICATION (CMMC) DOMAINS: INCIDENT RESPONSE (IR) AUDIT AND ACCOUNTABILITY (AU) RISK MANAGEMENT (RM) LESSON 1: ASSESSING CYBERSECURITY RISK * Topic A: Identify the Importance of Risk Management * Topic B: Assess Risk * Topic C: Mitigate Risk * Topic D: Integrate Documentation into Risk Management LESSON 2: ANALYZING THE THREAT LANDSCAPE * Topic A: Classify Threats * Topic B: Analyze Trends Affecting Security Posture LESSON 3: ANALYZING RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS * Topic A: Implement Threat Modeling * Topic B: Assess the Impact of Reconnaissance * Topic C: Assess the Impact of Social Engineering LESSON 4: ANALYZING ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS * Topic A: Assess the Impact of System Hacking Attacks * Topic B: Assess the Impact of Web-Based Attacks * Topic C: Assess the Impact of Malware * Topic D: Assess the Impact of Hijacking and Impersonation Attacks * Topic E: Assess the Impact of DoS Incidents * Topic F: Assess the Impact of Threats to Mobile Security * Topic G: Assess the Impact of Threats to Cloud Security LESSON 5: ANALYZING POST-ATTACK TECHNIQUES * Topic A: Assess Command and Control Techniques * Topic B: Assess Persistence Techniques * Topic C: Assess Lateral Movement and Pivoting Techniques * Topic D: Assess Data Exfiltration Techniques * Topic E: Assess Anti-Forensics Techniques LESSON 6: ASSESSING THE ORGANIZATION'S SECURITY POSTURE * Topic A: Implement Cybersecurity Auditing * Topic B: Implement a Vulnerability Management Plan * Topic C: Assess Vulnerabilities * Topic D: Conduct Penetration Testing LESSON 7: COLLECTING CYBERSECURITY INTELLIGENCE * Topic A: Deploy a Security Intelligence Collection and Analysis Platform * Topic B: Collect Data from Network-Based Intelligence Sources * Topic C: Collect Data from Host-Based Intelligence Sources LESSON 8: ANALYZING LOG DATA * Topic A: Use Common Tools to Analyze Logs * Topic B: Use SIEM Tools for Analysis LESSON 9: PERFORMING ACTIVE ASSET AND NETWORK ANALYSIS * Topic A: Analyze Incidents with Windows-Based Tools * Topic B: Analyze Incidents with Linux-Based Tools * Topic C: Analyze Indicators of Compromise LESSON 10: RESPONDING TO CYBERSECURITY INCIDENTS * Topic A: Deploy an Incident Handling and Response Architecture * Topic B: Mitigate Incidents * Topic C: Hand Over Incident Information to a Forensic Investigation LESSON 11: INVESTIGATING CYBERSECURITY INCIDENTS * Topic A: Apply a Forensic Investigation Plan * Topic B: Securely Collect and Analyze Electronic Evidence * Topic C: Follow Up on the Results of an Investigation ADDITIONAL COURSE DETAILS: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified CyberSec First Responder (CFR-410)
Delivered Online6 days, May 13th, 13:00 + 2 more
£3495

CompTIA PenTest+ (PenTest)

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS DESIGNED FOR IT PROFESSIONALS WHO WANT TO DEVELOP PENETRATION TESTING SKILLS TO ENABLE THEM TO IDENTIFY INFORMATION-SYSTEM VULNERABILITIES AND EFFECTIVE REMEDIATION TECHNIQUES FOR THOSE VULNERABILITIES. TARGET STUDENTS WHO ALSO NEED TO OFFER PRACTICAL RECOMMENDATIONS FOR ACTION TO PROPERLY PROTECT INFORMATION SYSTEMS AND THEIR CONTENTS WILL DERIVE THOSE SKILLS FROM THIS COURSE. THIS COURSE IS ALSO DESIGNED FOR INDIVIDUALS WHO ARE PREPARING TO TAKE THE COMPTIA PENTEST+ CERTIFICATION EXAM PT0-002, OR WHO PLAN TO USE PENTEST+ AS THE FOUNDATION FOR MORE ADVANCED SECURITY CERTIFICATIONS OR CAREER ROLES. INDIVIDUALS SEEKING THIS CERTIFICATION SHOULD HAVE THREE TO FOUR YEARS OF HANDS-ON EXPERIENCE PERFORMING PENETRATION TESTS, VULNERABILITY ASSESSMENTS, AND VULNERABILITY MANAGEMENT. OVERVIEW AFTER COMPLETING THIS COURSE, YOU WILL BE ABLE TO PLAN, CONDUCT, ANALYZE, AND REPORT ON PENETRATION TESTS, INCLUDING THE ABILITY TO: PLAN AND SCOPE PENETRATION TESTS. CONDUCT PASSIVE RECONNAISSANCE. PERFORM NON-TECHNICAL TESTS TO GATHER INFORMATION. CONDUCTIVE ACTIVE RECONNAISSANCE. ANALYZE VULNERABILITIES. PENETRATE NETWORKS. EXPLOIT HOST-BASED VULNERABILITIES. TEST APPLICATIONS. COMPLETE POST-EXPLOIT TASKS. ANALYZE AND REPORT PEN TEST RESULTS. DESCRIPTION SECURITY REMAINS ONE OF THE HOTTEST TOPICS IN IT AND OTHER INDUSTRIES. IT SEEMS THAT EACH WEEK BRINGS NEWS OF SOME NEW BREACH OF PRIVACY OR SECURITY. AS ORGANIZATIONS SCRAMBLE TO PROTECT THEMSELVES AND THEIR CUSTOMERS, THE ABILITY TO CONDUCT PENETRATION TESTING IS AN EMERGING SKILL SET THAT IS BECOMING EVER MORE VALUABLE TO THE ORGANIZATIONS SEEKING PROTECTION, AND EVER MORE LUCRATIVE FOR THOSE WHO POSSESS THESE SKILLS. IN THIS COURSE, YOU WILL BE INTRODUCED TO SOME GENERAL CONCEPTS AND METHODOLOGIES RELATED TO PEN TESTING, AND YOU WILL WORK YOUR WAY THROUGH A SIMULATED PEN TEST FOR A FICTITIOUS COMPANY. 1 - OUTLINE * Lesson 1: Scoping Organization/Customer Requirements * Lesson 2: Defining the Rules of Engagement * Lesson 3: Footprinting and Gathering Intelligence * Lesson 4: Evaluating Human and Physical Vulnerabilities * Lesson 5: Preparing the Vulnerability Scan * Lesson 6: Scanning Logical Vulnerabilities * Lesson 7: Analyzing Scanning Results * Lesson 8: Avoiding Detection and Covering Tracks * Lesson 9: Exploiting the LAN and Cloud * Lesson 10: Testing Wireless Networks * Lesson 11: Targeting Mobile Devices * Lesson 12: Attacking Specialized Systems * Lesson 13: Web Application-Based Attacks * Lesson 14: Performing System Hacking * Lesson 15: Scripting and Software Development * Lesson 16: Leveraging the Attack: Pivot and Penetrate * Lesson 17: Communicating During the PenTesting Process * Lesson 18: Summarizing Report Components * Lesson 19: Recommending Remediation * Lesson 20: Performing Post-Report Delivery Activities ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Penetration Testing Certification (PenTest Plus) - (Exam PT0-002) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Penetration Testing Certification (PenTest Plus) - (Exam PT0-002) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA PenTest+ (PenTest)
Delivered Online6 days, May 13th, 13:00 + 3 more
£3295

Certified Information Systems Auditor (CISA)

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THE INTENDED AUDIENCE FOR THIS COURSE IS INFORMATION SYSTEMS SECURITY PROFESSIONALS, INTERNAL REVIEW AUDITORS, AND OTHER INDIVIDUALS WHO HAVE AN INTEREST IN ASPECTS OF INFORMATION SYSTEMS AUDIT, CONTROLS, AND SECURITY. OVERVIEW UPON SUCCESSFUL COMPLETION OF THIS COURSE, STUDENTS WILL BE ABLE TO: - IMPLEMENT INFORMATION SYSTEMS AUDIT SERVICES IN ACCORDANCE WITH INFORMATION SYSTEMS AUDIT STANDARDS, GUIDELINES, AND BEST PRACTICES. - EVALUATE AN ORGANIZATIONS STRUCTURE, POLICIES, ACCOUNTABILITY, MECHANISMS, AND MONITORING PRACTICES. - EVALUATE INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT, AND IMPLEMENTATION. - EVALUATE THE INFORMATION SYSTEMS OPERATIONS, MAINTENANCE, AND SUPPORT OF AN ORGANIZATION; AND EVALUATE THE BUSINESS CONTINUITY AND DISASTER RECOVERY PROCESSES USED TO PROVIDE ASSURANCE THAT IN THE EVENT OF A DISRUPTION, IT SERVICES ARE MAINTAINED. - DEFINE THE PROTECTION POLICIES USED TO PROMOTE THE CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY OF INFORMATION ASSETS. DESCRIPTION IN THIS COURSE, STUDENTS WILL EVALUATE ORGANIZATIONAL POLICIES, PROCEDURES, AND PROCESSES TO ENSURE THAT AN ORGANIZATIONS INFORMATION SYSTEMS ALIGN WITH ITS OVERALL BUSINESS GOALS AND OBJECTIVES. 1 - THE PROCESS OF AUDITING INFORMATION SYSTEMS * ISACA Information Systems Auditing Standards and Guidelines * Fundamental Business Processes * Develop and Implement an Information Systems Audit Strategy * Plan an Audit * Conduct an Audit * The Evidence Life Cycle * Communicate Issues, Risks, and Audit Results * Support the Implementation of Risk Management and Control Practices 2 - IT GOVERNANCE AND MANAGEMENT * Evaluate the Effectiveness of IT Governance * Evaluate the IT Organizational Structure and HR Management * Evaluate the IT Strategy and Direction * Evaluate IT Policies, Standards, and Procedures * Evaluate the Effectiveness of Quality Management Systems * Evaluate IT Management and Monitoring of Controls * IT Resource Investment, Use, and Allocation Practices * Evaluate IT Contracting Strategies and Policies * Evaluate Risk Management Practices * Performance Monitoring and Assurance Practices * Evaluate the Organizations Business Continuity Plan 3 - INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT, AND IMPLEMENTATION * Evaluate the Business Case for Change * Evaluate Project Management Frameworks and Governance Practices * Development Life Cycle Management * Perform Periodic Project Reviews * Evaluate Control Mechanisms for Systems * Evaluate Development and Testing Processes * Evaluate Implementation Readiness * Evaluate a System Migration * Perform a Post-Implementation System Review 4 - INFORMATION SYSTEMS OPERATIONS, MAINTENANCE, AND SUPPORT * Perform Periodic System Reviews * Evaluate Service Level Management Practices * Evaluate Third-Party Management Practices * Evaluate Operations and End User Management Practices * Evaluate the Maintenance Process * Evaluate Data Administration Practices * Evaluate the Use of Capacity and Performance Monitoring Methods * Evaluate Change, Configuration, and Release Management Practices * Evaluate Problem and Incident Management Practices * Evaluate the Adequacy of Backup and Restore Provisions 5 - PROTECTION OF INFORMATION ASSETS * Information Security Design * Encryption Basics * Evaluate the Functionality of the IT Infrastructure * Evaluate Network Infrastructure Security * Evaluate the Design, Implementation, and Monitoring of Logical Access Controls * Risks and Controls of Virtualization * Evaluate the Design, Implementation, and Monitoring of Data Classification Process * Evaluate the Design, Implementation, and Monitoring of Physical Access Controls * Evaluate the Design, Implementation, and Monitoring of Environmental Controls

Certified Information Systems Auditor (CISA)
Delivered Online6 days, May 13th, 13:00 + 2 more
£3250

55340 Developing ASP.NET Core Web Applications

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS INTENDED FOR PROFESSIONAL WEB DEVELOPERS WHO USE MICROSOFT VISUAL STUDIO IN AN INDIVIDUAL-BASED OR TEAM-BASED, SMALL-SIZED TO LARGE DEVELOPMENT ENVIRONMENT. CANDIDATES FOR THIS COURSE ARE INTERESTED IN DEVELOPING ADVANCED WEB APPLICATIONS AND WANT TO MANAGE THE RENDERED HTML COMPREHENSIVELY. THEY WANT TO CREATE WEBSITES THAT SEPARATE THE USER INTERFACE, DATA ACCESS, AND APPLICATION LOGIC. OVERVIEW DESCRIBE THE MICROSOFT WEB TECHNOLOGIES STACK AND SELECT AN APPROPRIATE TECHNOLOGY TO USE TO DEVELOP ANY GIVEN APPLICATION. DESIGN THE ARCHITECTURE AND IMPLEMENTATION OF A WEB APPLICATION THAT WILL MEET A SET OF FUNCTIONAL REQUIREMENTS, USER INTERFACE REQUIREMENTS, AND ADDRESS BUSINESS MODELS. CONFIGURE THE PIPELINE OF ASP.NET CORE WEB APPLICATIONS USING MIDDLEWARE, AND LEVERAGE DEPENDENCY INJECTION ACROSS APPLICATIONS. DEVELOP A WEB APPLICATION THAT USES THE ASP.NET CORE ROUTING ENGINE TO PRESENT FRIENDLY URLS AND A LOGICAL NAVIGATION HIERARCHY TO USERS. CREATE VIEWS IN AN APPLICATION THAT DISPLAY AND EDIT DATA AND INTERACT WITH MODELS AND CONTROLLERS. CONNECT AN ASP.NET CORE APPLICATION TO A DATABASE USING ENTITY FRAMEWORK CORE. IMPLEMENT A CONSISTENT LOOK AND FEEL ACROSS AN ENTIRE WEB APPLICATION. WRITE JAVASCRIPT CODE THAT RUNS ON THE CLIENT-SIDE AND UTILIZES THE JQUERY SCRIPT LIBRARY TO OPTIMIZE THE RESPONSIVENESS OF AN WEB APPLICATION. ADD CLIENT SIDE PACKAGES AND CONFIGURE TASK RUNNERS. RUN UNIT TESTS AND DEBUGGING TOOLS AGAINST A WEB APPLICATION IN VISUAL STUDIO 2022. WRITE AN APPLICATION THAT AUTHENTICATES AND AUTHORIZES USERS TO ACCESS CONTENT SECURELY USING IDENTITY. BUILD AN APPLICATION THAT RESISTS MALICIOUS ATTACKS. USE CACHING TO ACCELERATE RESPONSES TO USER REQUESTS. USE SIGNALR TO ENABLE TWO-WAY COMMUNICATION BETWEEN CLIENT AND SERVER. DESCRIBE WHAT A WEB API IS AND WHY DEVELOPERS MIGHT ADD A WEB API TO AN APPLICATION. DESCRIBE HOW TO PACKAGE AND DEPLOY AN ASP.NET CORE WEB APPLICATION FROM A DEVELOPMENT COMPUTER TO A WEB SERVER. DESCRIPTION IN THIS 5-DAY COURSE, PROFESSIONAL WEB DEVELOPERS WILL LEARN TO DEVELOP ADVANCED ASP.NET CORE APPLICATIONS USING .NET TOOLS AND TECHNOLOGIES. THE FOCUS WILL BE ON CODING ACTIVITIES THAT ENHANCE THE PERFORMANCE AND SCALABILITY OF THE WEB SITE APPLICATION. MODULE 1: EXPLORING ASP.NET CORE * Introducing of Microsoft Web Technologies * Getting Started with Razor Pages in ASP.NET Core * Introducing ASP.NET Core MVC MODULE 2: DESIGNING ASP.NET CORE MVC WEB APPLICATIONS * Planning in the Project Design Phase * Designing Models, Controllers and Views MODULE 3: CONFIGURE MIDDLEWARE AND SERVICES IN ASP.NET CORE * Configuring Middlewares * Configuring Services MODULE 4: DEVELOPING CONTROLLERS * Writing Controllers and Actions * Configuring Routes * Writing Action Filters MODULE 5: DEVELOPING VIEWS * Creating Views with Razor Syntax * Using HTML Helpers and Tag Helpers * Reusing Code in Views MODULE 6: DEVELOPING MODELS * Creating MVC Models * Working with Forms * Validating User Input MODULE 7: USING ENTITY FRAMEWORK CORE IN ASP.NET CORE * Introduction to Entity Framework Core * Working with Entity Framework Core * Use Entity Framework Core to connect to Microsoft SQL Server MODULE 8: USING LAYOUTS, CSS AND JAVASCRIPT IN ASP.NET CORE * Using Layouts * Using CSS and JavaScript * Using JavaScript Libraries MODULE 9: CLIENT-SIDE DEVELOPMENT * Applying Styles and Responsive Design * Using Task Runners * Looking at ASP.NET Core Blazor MODULE 10: TESTING AND TROUBLESHOOTING * Testing ASP.NET Core Applications * Implementing an Exception Handling Strategy * Logging ASP.NET Core Applications MODULE 11: MANAGING SECURITY * Authentication in ASP.NET Core * Authorization in ASP.NET Core * Defending from Common Attack MODULE 12: PERFORMANCE AND COMMUNICATION IMPLEMENTING A CACHING STRATEGY * Managing State * Supporting Two-way Communication MODULE 13: IMPLEMENTING WEB APIS * Introducing Web APIs * Developing a Web API * Calling a Web API MODULE 14: HOSTING AND DEPLOYMENT * Hosting and Deploying On-premises * Deploying to Microsoft Azure * Looking at Microsoft Azure Fundamentals

55340 Developing ASP.NET Core Web Applications
Delivered Online6 days, May 13th, 13:00 + 2 more
£2975

AZ-040T00 Automating Administration with Powershell

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS INTENDED FOR IT PROFESSIONALS WHO ARE ALREADY EXPERIENCED IN GENERAL WINDOWS SERVER, WINDOWS CLIENT, AZURE, AND MICROSOFT 365 ADMINISTRATION, AND WHO WANT TO LEARN MORE ABOUT USING WINDOWS POWERSHELL FOR ADMINISTRATION. NO PRIOR EXPERIENCE WITH ANY VERSION OF POWERSHELL OR ANY SCRIPTING LANGUAGE IS ASSUMED. THIS COURSE IS ALSO SUITABLE FOR IT PROFESSIONALS ALREADY EXPERIENCED IN SERVER ADMINISTRATION, INCLUDING MICROSOFT EXCHANGE SERVER, MICROSOFT SHAREPOINT SERVER, AND MICROSOFT SQL SERVER. DESCRIPTION THIS COURSE PROVIDES STUDENTS WITH THE FUNDAMENTAL KNOWLEDGE AND SKILLS TO USE POWERSHELL FOR ADMINISTERING AND AUTOMATING ADMINISTRATION OF WINDOWS SERVERS. THIS COURSE PROVIDES STUDENTS THE SKILLS TO IDENTIFY AND BUILD THE COMMAND THEY REQUIRE TO PERFORM A SPECIFIC TASK. IN ADDITION, STUDENTS LEARN HOW TO BUILD SCRIPTS TO ACCOMPLISH ADVANCED TASKS SUCH AS AUTOMATING REPETITIVE TASKS AND GENERATING REPORTS. THIS COURSE PROVIDES PREREQUISITE SKILLS SUPPORTING A BROAD RANGE OF MICROSOFT PRODUCTS, INCLUDING WINDOWS SERVER, WINDOWS CLIENT, MICROSOFT AZURE, AND MICROSOFT 365. IN KEEPING WITH THAT GOAL, THIS COURSE WILL NOT FOCUS ON ANY ONE OF THOSE PRODUCTS, ALTHOUGH WINDOWS SERVER, WHICH IS THE COMMON PLATFORM FOR ALL OF THOSE PRODUCTS, WILL SERVE AS THE EXAMPLE FOR THE TECHNIQUES THIS COURSE TEACHES. PREREQUISITES BEFORE ATTENDING THIS COURSE, STUDENTS MUST HAVE: * -EXPERIENCE WITH WINDOWS NETWORKING TECHNOLOGIES AND IMPLEMENTATION. * - EXPERIENCE WITH WINDOWS SERVER ADMINISTRATION, MAINTENANCE, AND TROUBLESHOOTING. 1 - REVIEW WINDOWS POWERSHELL * Learn about Windows PowerShell * Get familiar with Windows PowerShell applications * Identify factors to install and use Windows PowerShell * Configure the Windows PowerShell console * Configure the Windows PowerShell Integrated Scripting Environment (ISE) * Use Visual Studio Code with PowerShell 2 - UNDERSTAND THE COMMAND SYNTAX IN WINDOWS POWERSHELL * Discover the structure of PowerShell cmdlets * Discover the parameters for using PowerShell cmdlets * Review the tab completion feature in PowerShell * Display the About files content in PowerShell 3 - FIND COMMANDS AND GET-HELP IN WINDOWS POWERSHELL * Define modules in PowerShell * Find cmdlets in PowerShell * Use command aliases in PowerShell * Use Show-Command and Get-Help in PowerShell * Interpret the help file contents and update the local help content in PowerShell 4 - MANAGE ACTIVE DIRECTORY DOMAIN SERVICES USING POWERSHELL CMDLETS * Manage user accounts in PowerShell * Manage groups and group memberships in PowerShell * Manage computer accounts in PowerShell * Manage organizational units and Active Directory objects in PowerShell 5 - MANAGE NETWORK SERVICE SETTINGS FOR WINDOWS DEVICES USING POWERSHELL CMDLETS * Manage IP addresses in PowerShell * Manage IP routing in PowerShell * Manage DNS clients in PowerShell * Manage Windows Firewall settings in PowerShell 6 - MANAGE WINDOWS SERVER SETTINGS USING POWERSHELL CMDLETS * Automate management tasks using the Group Policy management cmdlets * Manage server roles and services using PowerShell cmdlets * Manage Hyper-V Virtual Machines using PowerShell cmdlets * Manage Internet Information Services using PowerShell cmdlets 7 - MANAGE SETTINGS FOR A LOCAL WINDOWS MACHINE USING POWERSHELL CMDLETS * Manage Windows 10 using PowerShell * Manage permissions with PowerShell 8 - UNDERSTAND THE WINDOWS POWERSHELL PIPELINE * Review Windows PowerShell pipeline and its output * Discover object members in PowerShell * Control the formatting of pipeline output 9 - SELECT, SORT, AND MEASURE OBJECTS USING THE PIPELINE * Sort and group objects by property in the pipeline * Measure objects in the pipeline * Select a set of objects in the pipeline * Select object properties in the pipeline * Create and format calculated properties in the pipeline 10 - FILTER OBJECTS OUT OF THE PIPELINE * Learn about the comparison operators in PowerShell * Review basic filter syntax in the pipeline * Review advanced filter syntax in the pipeline * Optimize the filter performance in the pipeline 11 - ENUMERATE OBJECTS IN THE PIPELINE * Learn about enumerations in the pipeline * Review basic syntax to enumerate objects in the pipeline * Review advanced syntax to enumerate objects in the pipeline 12 - SEND AND PASS DATA AS OUTPUT FROM THE PIPELINE * Write pipeline data to a file * Convert pipeline objects to other forms of data representation in PowerShell * Control additional output options in PowerShell 13 - PASS PIPELINE OBJECTS * Pipeline parameter binding * Identify ByValue parameters * Pass data by using ByValue * Pass data by using ByPropertyName * Identify ByPropertyName parameters * Use manual parameters to override the pipeline * Use parenthetical commands * Expand property values 14 - CONNECT WITH DATA STORES USING POWERSHELL PROVIDERS * Define Windows PowerShell providers * Review the built-in providers in PowerShell * Access provider help in PowerShell 15 - USE POWERSHELL DRIVES IN POWERSHELL * Explain PowerShell drives in PowerShell * Use PowerShell drive cmdlets in PowerShell * Manage the file system in PowerShell * Manage the registry in PowerShell * Work with certificates in PowerShell * Work with other PowerShell drives in PowerShell 16 - REVIEW CIM AND WMI * Review architecture of CIM and WMI * Review repositories in CIM and WMI * Locate online class documentation by using CIM and WMI cmdlets 17 - QUERY CONFIGURATION INFORMATION BY USING CIM AND WMI * List local repository namespaces and classes by using CIM and WMI * Query instances by using commands and WMI Query Language * Connect to remote computers by using CIM and WMI cmdlets * Query repository classes from remote computers by using CIMSession objects 18 - QUERY AND MANIPULATE REPOSITORY OBJECTS BY USING CIM AND WMI METHODS * Discover methods of repository objects by using CIM and WMI * Locate class methods and documentation by using CIM and WMI * Invoke methods of repository objects by using CIM and WMI 19 - MANAGE VARIABLES IN WINDOWS POWERSHELL SCRIPTS * Define variables in Windows PowerShell scripts * Create variable names in Windows PowerShell scripts * Assign values and types to variables in Windows PowerShell scripts * Identify the methods and properties of variables in Windows PowerShell scripts * Use string variables and methods in Windows PowerShell scripts * Use date variables and methods in Windows PowerShell scripts 20 - WORK WITH ARRAYS AND HASH TABLES IN WINDOWS POWERSHELL SCRIPTS * Define an array in Windows PowerShell scripts * Work with array lists in Windows PowerShell scripts * Define hash tables in Windows PowerShell Scripts * Work with hash tables in Windows PowerShell scripts 21 - CREATE AND RUN SCRIPTS BY USING WINDOWS POWERSHELL * Review Windows PowerShell scripts * Modify scripts in the PowerShell Gallery * Create scripts using Windows PowerShell * Review the PowerShellGet module in Windows PowerShell * Run scripts and set the execution policy in Windows PowerShell * Review Windows PowerShell and AppLocker * Sign the scripts digitally in Windows PowerShell 22 - WORK WITH SCRIPTING CONSTRUCTS IN WINDOWS POWERSHELL * Review and use the ForEach loop in Windows PowerShell scripts * Review and use the If construct in Windows PowerShell scripts * Review and use the Switch construct in Windows PowerShell scripts * Review the For construct in Windows PowerShell scripts * Review other loop constructs in Windows PowerShell scripts * Review Break and Continue in Windows PowerShell scripts 23 - IMPORT DATA IN DIFFERENT FORMATS FOR USE IN SCRIPTS BY USING WINDOWS POWERSHELL CMDLETS * Use the Get-Content command in Windows PowerShell scripts * Use the Import-Csv cmdlet in Windows PowerShell scripts * Use the Import-Clixml cmdlet in Windows PowerShell scripts * Use the ConvertFrom-Json cmdlet in Windows PowerShell scripts 24 - USE METHODS TO ACCEPT USER INPUTS IN WINDOWS POWERSHELL SCRIPTS * Identify values that might change in Windows PowerShell scripts * Use the Read-Host cmdlet in Windows PowerShell scripts * Use the Get-Credential cmdlet in Windows PowerShell scripts * Use the Out-GridView cmdlet in Windows PowerShell scripts * Pass parameters to a Windows PowerShell script 25 - TROUBLESHOOT SCRIPTS AND HANDLE ERRORS IN WINDOWS POWERSHELL * Interpret error messages generated for Windows PowerShell commands * Add output to Windows PowerShell scripts * Use breakpoints in Windows PowerShell scripts * Interpret error actions for Windows PowerShell commands 26 - USE FUNCTIONS AND MODULES IN WINDOWS POWERSHELL SCRIPTS * Review functions in Windows PowerShell scripts * Use variable scope in Windows PowerShell scripts * Create modules in Windows PowerShell scripts * Use the dot sourcing feature in Windows PowerShell 27 - MANAGE SINGLE AND MULTIPLE COMPUTERS BY USING WINDOWS POWERSHELL REMOTING * Review the remoting feature of Windows PowerShell * Compare remoting with remote connectivity * Review the remoting security feature of Windows PowerShell * Enable remoting by using Windows PowerShell * Use one-to-one remoting by using Windows PowerShell * Use one-to-many remoting by using Windows PowerShell * Compare remoting output with local output 28 - USE ADVANCED WINDOWS POWERSHELL REMOTING TECHNIQUES * Review common remoting techniques of Windows PowerShell * Send parameters to remote computers in Windows PowerShell * Set access protection to variables, aliases, and functions by using the scope modifier * Enable multi-hop remoting in Windows PowerShell 29 - MANAGE PERSISTENT CONNECTIONS TO REMOTE COMPUTERS BY USING WINDOWS POWERSHELL SESSIONS * Review persistent connections in Windows PowerShell * Create and manage persistent PSSessions by using Windows PowerShell * Disconnect PSSessions by using Windows PowerShell * Review the feature of implicit remoting in Windows PowerShell 30 - REVIEW AZURE POWERSHELL MODULE * Review Azure PowerShell * Review the benefits of the Azure PowerShell module * Install the Azure PowerShell module * Migrate Azure PowerShell from AzureRM to Azure * Review Microsoft Azure Active Directory module for Windows PowerShell and Azure Active Directory PowerShell for Graph modules 31 - REVIEW THE FEATURES AND TOOLS FOR AZURE CLOUD SHELL * Review the characteristics of Azure Cloud Shell * Review the features and tools of Azure Cloud Shell * Configure and experiment with Azure Cloud Shell 32 - MANAGE AZURE RESOURCES WITH WINDOWS POWERSHELL * Create a new Azure virtual machine by using Windows PowerShell commands * Manage Azure virtual machines by using Windows PowerShell commands * Manage Azure related storage by using Azure PowerShell * Manage Azure subscriptions by using Azure PowerShell 33 - MANAGE USERS, GROUPS, AND LICENSES IN MICROSOFT ENTRA ID BY USING WINDOWS POWERSHELL * Review benefits to manage Microsoft 365 services by using Windows PowerShell * Connect to the Microsoft 365 tenant by using Windows PowerShell * Manage users in Microsoft 365 by using Windows PowerShell * Manage groups in Microsoft 365 by using Windows PowerShell * Manage roles in Microsoft 365 by using Windows PowerShell * Manage licenses in Microsoft 365 by using Windows PowerShell 34 - MANAGE EXCHANGE ONLINE BY USING WINDOWS POWERSHELL * Connect to Exchange Online by using Windows PowerShell * Manage mailboxes in Exchange Online by using Windows PowerShell * Manage resources in Exchange Online by using Windows PowerShell * Manage admin roles in Exchange Online by using Windows PowerShell 35 - MANAGE SHAREPOINT ONLINE BY USING WINDOWS POWERSHELL * Install and connect to SharePoint Online Management Shell by using Windows PowerShell * Manage SharePoint Online users and groups by using Windows PowerShell * Manage SharePoint sites by using Windows PowerShell * Manage SharePoint Online external user sharing by using Windows PowerShell 36 - MANAGE MICROSOFT TEAMS BY USING WINDOWS POWERSHELL * Review Microsoft Teams PowerShell module * Install the Microsoft Teams PowerShell module * Manage teams with Microsoft Teams PowerShell module 37 - CREATE AND MANAGE BACKGROUND JOBS USING WINDOWS POWERSHELL * Define the types of background jobs in Windows PowerShell * Start remote jobs and CIM/WMI jobs in Windows PowerShell * Monitor jobs in Windows PowerShell * Retrieve results for running jobs in Windows PowerShell 38 - CREATE AND MANAGE SCHEDULED JOBS USING WINDOWS POWERSHELL * Create and run Windows PowerShell scripts as scheduled tasks * Define scheduled jobs in Windows PowerShell * Create job option and job trigger objects in Windows PowerShell * Create and register a scheduled job in Windows PowerShell * Retrieve the results from a scheduled job in Windows PowerShell

AZ-040T00 Automating Administration with Powershell
Delivered Online6 days, May 13th, 13:00 + 10 more
£2975

Excel Module 2 - Data Analysis and Pivot Tables

By Underscore Group

Expand your Excel knowledge and learn how to structure and analyse large data sets.

Excel Module 2 - Data Analysis and Pivot Tables
Delivered Online3 hours 15 minutes, May 13th, 12:45 + 1 more
£270

CompTIA Security+

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS DESIGNED FOR PEOPLE WHO ARE SEEKING TO LAUNCH A CAREER IN CYBERSECURITY. OVERVIEW ASSESS THE SECURITY POSTURE OF AN ENTERPRISE ENVIRONMENT AND RECOMMEND AND IMPLEMENT APPROPRIATE SECURITY SOLUTIONS; MONITOR AND SECURE HYBRID ENVIRONMENTS, INCLUDING CLOUD, MOBILE, AND IOT; OPERATE WITH AN AWARENESS OF APPLICABLE LAWS AND POLICIES, INCLUDING PRINCIPLES OF GOVERNANCE, RISK, AND COMPLIANCE; IDENTIFY, ANALYZE, AND RESPOND TO SECURITY EVENTS AND INCIDENTS. DESCRIPTION COMPTIA SECURITY+ IS A GLOBAL CERTIFICATION THAT VALIDATES THE BASELINE SKILLS NECESSARY TO PERFORM CORE SECURITY FUNCTIONS AND IS THE FIRST SECURITY CERTIFICATION A CANDIDATE SHOULD EARN. COMPTIA SECURITY+ ESTABLISHES THE CORE KNOWLEDGE REQUIRED OF ANY CYBERSECURITY ROLE AND PROVIDES A SPRINGBOARD TO INTERMEDIATE-LEVEL CYBERSECURITY JOBS. LESSON 1: SUMMARIZE FUNDAMENTAL SECURITY CONCEPTS * Security Concepts * Security Controls LESSON 2: COMPARE THREAT TYPES * Threat Actors * Attack Surfaces * Social Engineering LESSON 3: EXPLAIN CRYPTOGRAPHIC SOLUTIONS * Cryptographic Algorithms * Public Key Infrastructure * Cryptographic Solutions LESSON 4: IMPLEMENT IDENTITY AND ACCESS MANAGEMENT * Authentication * Authorization * Identity Management LESSON 5: SECURE ENTERPRISE NETWORK ARCHITECTURE * Enterprise Network Architecture * Network Security Appliances * Secure Communications LESSON 6: SECURE CLOUD NETWORK ARCHITECTURE * Cloud Infrastructure * Embedded Systems and Zero Trust Architecture LESSON 7: EXPLAIN RESILIENCY AND SITE SECURITY CONCEPTS * Asset Management * Redundancy Strategies * Physical Security LESSON 8: EXPLAIN VULNERABILITY MANAGEMENT * Device and OS Vulnerabilities * Application and Cloud Vulnerabilities * Vulnerability Identification Methods * Vulnerability Analysis and Remediation LESSON 9: EVALUATE NETWORK SECURITY CAPABILITIES * Network Security Baselines * Network Security Capability Enhancement LESSON 10: ASSESS ENDPOINT SECURITY CAPABILITIES * Implement Endpoint Security * Mobile Device Hardening LESSON 11: ENHANCE APPLICATION SECURITY CAPABILITIES * Application Protocol Security Baselines * Cloud and Web Application Security Concepts LESSON 12: EXPLAIN INCIDENT RESPONSE AND MONITORING CONCEPTS * Incident Response * Digital Forensics * Data Sources * Alerting and Monitoring Tools LESSON 13: ANALYZE INDICATORS OF MALICIOUS ACTIVITY * Malware Attack Indicators * Physical and Network Attack Indicators * Application Attack Indicators LESSON 14: SUMMARIZE SECURITY GOVERNANCE CONCEPTS * Policies, Standards, and Procedures * Change Management * Automation and Orchestration LESSON 15: EXPLAIN RISK MANAGEMENT PROCESSES * Risk Management Processes and Concepts * Vendor Management Concepts * Audits and Assessments LESSON 16: SUMMARIZE DATA PROTECTION AND COMPLIANCE CONCEPTS * Data Classification and Compliance * Personnel Policies ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered Online6 days, May 13th, 13:00 + 27 more
£2475

CompTIA Network+

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS INTENDED FOR ENTRY-LEVEL COMPUTER SUPPORT PROFESSIONALS WITH A BASIC KNOWLEDGE OF COMPUTER HARDWARE, SOFTWARE, AND OPERATING SYSTEMS WHO WISH TO INCREASE THEIR KNOWLEDGE AND UNDERSTANDING OF NETWORKING CONCEPTS AND ACQUIRE THE REQUIRED SKILLS TO PREPARE FOR A CAREER IN NETWORK SUPPORT OR ADMINISTRATION, OR WHO WISH TO PREPARE FOR THE COMPTIA NETWORK+ CERTIFICATION. COMPTIA NETWORK+ IS THE FIRST CERTIFICATION IT PROFESSIONALS SPECIALIZING IN NETWORK ADMINISTRATION AND SUPPORT SHOULD EARN. NETWORK+ IS AIMED AT IT PROFESSIONALS WITH JOB ROLES SUCH AS NETWORK ADMINISTRATOR, NETWORK TECHNICIAN, NETWORK INSTALLER, HELP DESK TECHNICIAN, AND IT CABLE INSTALLER. THIS COURSE IS ALSO DESIGNED FOR STUDENTS WHO ARE SEEKING THE COMPTIA NETWORK+ CERTIFICATION AND WHO WANT TO PREPARE FOR THE COMPTIA NETWORK+ N10-008 CERTIFICATION EXAM. OVERVIEW IN THIS COURSE, YOU WILL DESCRIBE THE MAJOR NETWORKING TECHNOLOGIES AND SYSTEMS OF MODERN NETWORKS AND CONFIGURE, MANAGE, AND TROUBLESHOOT MODERN NETWORKS. EXPLAIN THE OSI AND TCP/IP MODELS. EXPLAIN PROPERTIES OF NETWORK TRAFFIC. INSTALL AND CONFIGURE SWITCHED NETWORKS. CONFIGURE IP NETWORKS. INSTALL AND CONFIGURE ROUTED NETWORKS. CONFIGURE AND MONITOR PORTS AND PROTOCOLS. EXPLAIN NETWORK APPLICATION AND STORAGE ISSUES. MONITOR AND TROUBLESHOOT NETWORKS. EXPLAIN NETWORK ATTACKS AND MITIGATIONS. INSTALL AND CONFIGURE SECURITY DEVICES. EXPLAIN AUTHENTICATION AND ACCESS CONTROLS. DEPLOY AND TROUBLESHOOT CABLING SOLUTIONS. IMPLEMENT AND TROUBLESHOOT WIRELESS TECHNOLOGIES. COMPARE AND CONTRAST WAN TECHNOLOGIES. USE REMOTE ACCESS METHODS. IDENTIFY SITE POLICIES AND BEST PRACTICES. DESCRIPTION COMPTIA'S NETWORK+ CERTIFICATION IS A FOUNDATION-LEVEL CERTIFICATION DESIGNED FOR IT PROFESSIONALS WITH AROUND ONE YEAR OF EXPERIENCE, WHOSE JOB ROLE IS FOCUSED ON NETWORK ADMINISTRATION. THE COMPTIA NETWORK+ EXAM WILL CERTIFY THE SUCCESSFUL CANDIDATE HAS THE KNOWLEDGE AND SKILLS REQUIRED TO TROUBLESHOOT, CONFIGURE, AND MANAGE COMMON NETWORK DEVICES; ESTABLISH BASIC NETWORK CONNECTIVITY; UNDERSTAND AND MAINTAIN NETWORK DOCUMENTATION; IDENTIFY NETWORK LIMITATIONS AND WEAKNESSES; AND IMPLEMENT NETWORK SECURITY, STANDARDS, AND PROTOCOLS. THE CANDIDATE WILL HAVE A BASIC UNDERSTANDING OF ENTERPRISE TECHNOLOGIES, INCLUDING CLOUD AND VIRTUALIZATION TECHNOLOGIES. THE OFFICIAL COMPTIA© NETWORK+© (EXAM N10-008): WILL TEACH YOU THE FUNDAMENTAL PRINCIPLES OF INSTALLING, CONFIGURING, AND TROUBLESHOOTING NETWORK TECHNOLOGIES AND HELP YOU TO PROGRESS A CAREER IN NETWORK ADMINISTRATION. IN THIS COURSE, YOU WILL BUILD ON YOUR EXISTING USER-LEVEL KNOWLEDGE AND EXPERIENCE WITH PERSONAL COMPUTER OPERATING SYSTEMS AND NETWORKS TO MASTER THE FUNDAMENTAL SKILLS AND CONCEPTS THAT YOU WILL NEED TO USE ON THE JOB IN ANY TYPE OF NETWORKING CAREER. PREREQUISITES * COMPTIA A+ CERTIFICATION (EXAMS 220-1001 AND 220-1002) 1 - EXPLAINING THE OSI AND TCP/IP MODELS * Topic A: Explain OSI Model Layers * Topic B: Explain the TCP/IP Suite 2 - EXPLAINING PROPERTIES OF NETWORK TRAFFIC * Topic A: Explain Media Types and Access Methods * Topic B: Deploy Ethernet Standards * Topic C: Configure and Monitor Network Interfaces 3 - INSTALLING AND CONFIGURING SWITCHED NETWORKS * Topic A: Install and Configure Hubs and Bridges * Topic B: Install and Configure Switches * Topic C: Compare and Contrast Network Topologies * Topic D: Compare and Contrast Network Types 4 - CONFIGURING IP NETWORKS * Topic A: Configure IPv4 Addressing Components * Topic B: Test IP Interfaces with Command Line Tools * Topic C: Configure IPv4 Subnets * Topic D: Configure Private and Public IPv4 Addressing Schemes * Topic E: Configure IPv6 Addressing Components * Topic F: Configure DHCP Services 5 - INSTALLING AND CONFIGURING ROUTED NETWORKS * Topic A: Explain Characteristics of Routing * Topic B: Install and Configure Routers 6 - CONFIGURING AND MONITORING PORTS AND PROTOCOLS * Topic A: Explain the Uses of Ports and Protocols * Topic B: Use Port Scanners and Protocol Analyzers * Topic C: Explain the Use of Name Resolution Services * Topic D: Configure DNS and IPAM Services 7 - EXPLAINING NETWORK APPLICATION AND STORAGE SERVICES * Topic A: Explain the Uses of Network Applications * Topic B: Explain the Uses of Voice Services and Advanced Networking Devices * Topic C: Explain the Uses of Virtualization and Network Storage Services * Topic D: Summarize the Concepts of Cloud Services 8 - MONITORING AND TROUBLESHOOTING NETWORKS * Topic A: Monitor Network Interfaces and Logs * Topic B: Explain Network Troubleshooting Methodology * Topic C: Troubleshoot Common Network Services Issues 9 - EXPLAINING NETWORKING ATTACKS AND MITIGATIONS * Topic A: Summarize Common Networking Attacks * Topic B: Explain the Characteristics of VLANs * Topic C: Explain the Characteristics of NAT and Port Forwarding 10 - INSTALLING AND CONFIGURING SECURITY DEVICES * Topic A: Install and Configure Firewalls and Proxies * Topic B: Explain the Uses of IDS/IPS and UTM 11 - EXPLAINING AUTHENTICATION AND ACCESS CONTROLS * Topic A: Explain Authentication Controls and Attacks * Topic B: Explain the Uses of Authentication Protocols and Directory Services * Topic C: Explain the Uses of Port Security and NAC * Topic D: Implement Network Device Hardening * Topic E: Explain Patch Management and Vulnerability Scanning Processes 12 - DEPLOYING AND TROUBLESHOOTING CABLING SOLUTIONS * Topic A: Deploy Structured Cabling Systems * Topic B: Deploy Twisted Pair Cabling Solutions * Topic C: Test and Troubleshoot Twisted Pair Cabling Solutions * Topic D: Deploy Fiber Optic Cabling Solutions 13 - IMPLEMENTING AND TROUBLESHOOTING WIRELESS TECHNOLOGIES * Topic A: Install and Configure Wireless Technologies * Topic B: Troubleshoot Wireless Performance Issues * Topic C: Secure and Troubleshoot Wireless Connectivity 14 - COMPARING AND CONTRASTING WAN TECHNOLOGIES * Topic A: Compare and Contrast WAN Core Service Types * Topic B: Compare and Contrast WAN Subscriber Service Types * Topic C: Compare and Contrast WAN Framing Service Types * Topic D: Compae and Contrast Wireless and IoT WAN Technologies 15 - USING REMOTE ACCESS METHODS * Topic A: Use Remote Access VPNs * Topic B: Use Remote Access Management Methods 16 - IDENTIFYING SITE POLICIES AND BEST PRACTICES * Topic A: Manage Networks with Documentation and Diagrams * Topic B: Summarize the Purposes of Physical Security Devices * Topic C: Compare and Contrast Business Continuity and Disaster Recovery Concepts * Topic D: Identify Policies and Best Practices

CompTIA Network+
Delivered Online6 days, May 13th, 13:00 + 23 more
£2475

CompTIA Linux+

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS DESIGNED FOR IT PROFESSIONALS WHOSE PRIMARY JOB RESPONSIBILITY IS THE MANAGEMENT OF SERVERS AND OTHER DEVICES RUNNING THE LINUX OPERATING SYSTEM. A TYPICAL STUDENT IN THIS COURSE SHOULD HAVE AT LEAST NINE MONTHS OF HANDS-ON LINUX EXPERIENCE AND AT LEAST ONE AND A HALF YEARS OF IT EXPERIENCE IN OTHER COMPUTING ENVIRONMENTS. THE TARGET STUDENT SHOULD WISH TO EXPAND THEIR SKILLSET TO SUPPORT THEIR CAREER IN LINUX SYSTEM ADMINISTRATION AND OPERATION. THIS COURSE IS ALSO DESIGNED FOR STUDENTS WHO ARE SEEKING THE COMPTIA LINUX+ CERTIFICATION AND WHO WANT TO PREPARE FOR EXAM XK0-005. THE LINUX+ CERTIFICATION CAN VALIDATE THE STUDENT'S UNDERSTANDING AND SKILL IN CONFIGURING, MONITORING, AND SUPPORTING LINUX SYSTEMS. OVERVIEW IN THIS COURSE, YOU WILL CONFIGURE, OPERATE, AND TROUBLESHOOT LINUX SYSTEMS. YOU WILL: - PERFORM BASIC LINUX TASKS. - MANAGE USERS AND GROUPS. - MANAGE PERMISSIONS AND OWNERSHIP. - MANAGE STORAGE. - MANAGE FILES AND DIRECTORIES. - MANAGE KERNEL MODULES. - MANAGE THE LINUX BOOT PROCESS. - MANAGE SYSTEM COMPONENTS. - MANAGE DEVICES. - MANAGE NETWORKING. - MANAGE PACKAGES AND SOFTWARE. - SECURE LINUX SYSTEMS. - WRITE AND EXECUTE BASH SHELL SCRIPTS. - AUTOMATE TASKS. - PLAN AND PERFORM A LINUX INSTALLATION. DESCRIPTION THE OFFICIAL COMPTIA© LINUX+© COURSEWARE BUILDS ON YOUR EXISTING EXPERIENCE WITH SYSTEMS OPERATIONS AND ADMINISTRATION TO PROVIDE YOU WITH THE KNOWLEDGE AND SKILLS REQUIRED TO CONFIGURE, MANAGE, OPERATE, AND TROUBLESHOOT A LINUX ENVIRONMENT BY USING SECURITY BEST PRACTICES, SCRIPTING, AND AUTOMATION. THIS COURSE WILL ALSO PREPARE YOU FOR THE EXAM XKO-005. 1 - PERFORMING BASIC LINUX TASKS * Identify the History and Development of Linux * Enter Shell Commands * Get Help Using Linux 2 - MANAGING USERS AND GROUPS * Assume Superuser Privileges * Create, Modify, and Delete Users * Create, Modify, and Delete Groups * Query Users and Groups * Configure Account Profiles 3 - MANAGING PERMISSIONS AND OWNERSHIP * Modify File and Directory Permissions * Modify File and Directory Ownership * Configure Special Permissions and Attributes * Troubleshoot Permissions Issues 4 - MANAGING STORAGE * Create Partitions * Manage Logical Volumes * Mount File Systems * Manage File Systems * Navigate the Linux Directory Structure * Troubleshoot Storage Issues 5 - MANAGING FILES AND DIRECTORIES * Create and Edit Text Files * Search for Files * Perform Operations on Files and Directories * Process Text Files * Manipulate File Output 6 - MANAGING KERNEL MODULES * Explore the Linux Kernel * Install and Configure Kernel Modules * Monitor Kernel Modules 7 - MANAGING THE LINUX BOOT PROCESS * Configure Linux Boot Components * Configure GRUB 2 8 - MANAGING SYSTEM COMPONENTS * Configure Localization Options * Configure GUIs * Manage Services * Troubleshoot Process Issues * Troubleshoot CPU and Memory Issues 9 - MANAGING DEVICES * Identify the Types of Linux Devices * Configure Devices * Monitor Devices * Troubleshoot Hardware Issues 10 - MANAGING NETWORKING * Identify TCP/IP Fundamentals * Identify Linux Server Roles * Connect to a Network * Configure DHCP and DNS Client Services * Configure Cloud and Virtualization Technologies * Troubleshoot Networking Issues 11 - MANAGING PACKAGES AND SOFTWARE * Identify Package Managers * Manage RPM Packages with YUM * Manage Debian Packages with APT * Configure Repositories * Acquire Software * Build Software from Source Code * Troubleshoot Software Dependency Issues 12 - SECURING LINUX SYSTEMS * Implement Cybersecurity Best Practices * Implement Identity and Access Management Methods * Configure SELinux or AppArmor * Configure Firewalls * Implement Logging Services * Back Up, Restore, and Verify Data 13 - WORKING WITH BASH SCRIPTS * Customize the Bash Shell Environment * Identify Scripting and Programming Fundamentals * Write and Execute a Simple Bash Script * Incorporate Control Statements in Bash Scripts 14 - AUTOMATING TASKS * Schedule Jobs * Implement Version Control Using Git * Identify Orchestration Concepts 15 - INSTALLING LINUX * Prepare for Linux Installation * Perform the Installation ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Linux Plus Certification (Exam XK0-005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Linux Plus Certification (Exam XK0-005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Linux+
Delivered Online6 days, May 13th, 13:00 + 4 more
£2475

Educators

Show all 3140