• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

336 Firewall courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

55399 Implementing and Managing Microsoft Intune

By Nexus Human

Duration 3 Days 18 CPD hours This three-day instructor-led course is aimed at modern device management professionals looking to manage their enterprise devices using Microsoft Intune. This course will cover Enrolment, Application Management, Endpoint Security and Windows Autopilot as well as Azure Active Directory Conditional Access and Identity Protection. The delegates will learn how to enroll devices, deploy applications and manage them to maximize user productivity and device security. 1: INTRODUCTION TO MICROSOFT INTUNE * Mobile Device Management * Microsoft Intune * Azure Active Directory * AAD Identity Protection * AAD Conditional Access 2: MICROSOFT INTUNE DEVICE MANAGEMENT * Enrolling Devices * Device Compliance * Device Profiles * Device Updates 3: MICROSOFT INTUNE APPLICATION MANAGEMENT * Application Management * Deploying Applications * Application Configuration * Managing Applications * Policy Sets and Guided Scenarios 4: MICROSOFT INTUNE ENDPOINT SECURITY * Security Baselines and tasks * Antivirus * Disk Encryption * Firewall * Atack Surface reduction * Endpoint detection and response * Account Protection 5: DEPLOYING WINDOWS WITH WINDOWS AUTOPILOT * Windows Autopilot overview * Preparing for Windows Autopilot deployment * Deploying Windows 11 using Windows Autopilot 6: MICROSOFT INTUNE ADDITIONAL AND PREMIUM FEATURES * Remote Help * Tunnel for Mobile Application Management * Endpoint Privilege Management * Advanced Endpoint Analytics ADDITIONAL COURSE DETAILS: Nexus Humans 55399 Implementing and Managing Microsoft Intune training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55399 Implementing and Managing Microsoft Intune course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55399 Implementing and Managing Microsoft Intune
Delivered Online4 days, Jun 3rd, 13:00 + 9 more
£1785

AZ-040T00 Automating Administration with Powershell

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT Professionals who are already experienced in general Windows Server, Windows client, Azure, and Microsoft 365 administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of PowerShell or any scripting language is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Microsoft Exchange Server, Microsoft SharePoint Server, and Microsoft SQL Server. This course provides students with the fundamental knowledge and skills to use PowerShell for administering and automating administration of Windows servers. This course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports. This course provides prerequisite skills supporting a broad range of Microsoft products, including Windows Server, Windows Client, Microsoft Azure, and Microsoft 365. In keeping with that goal, this course will not focus on any one of those products, although Windows Server, which is the common platform for all of those products, will serve as the example for the techniques this course teaches. Prerequisites Before attending this course, students must have: * -Experience with Windows networking technologies and implementation. * - Experience with Windows Server administration, maintenance, and troubleshooting. 1 - REVIEW WINDOWS POWERSHELL * Learn about Windows PowerShell * Get familiar with Windows PowerShell applications * Identify factors to install and use Windows PowerShell * Configure the Windows PowerShell console * Configure the Windows PowerShell Integrated Scripting Environment (ISE) * Use Visual Studio Code with PowerShell 2 - UNDERSTAND THE COMMAND SYNTAX IN WINDOWS POWERSHELL * Discover the structure of PowerShell cmdlets * Discover the parameters for using PowerShell cmdlets * Review the tab completion feature in PowerShell * Display the About files content in PowerShell 3 - FIND COMMANDS AND GET-HELP IN WINDOWS POWERSHELL * Define modules in PowerShell * Find cmdlets in PowerShell * Use command aliases in PowerShell * Use Show-Command and Get-Help in PowerShell * Interpret the help file contents and update the local help content in PowerShell 4 - MANAGE ACTIVE DIRECTORY DOMAIN SERVICES USING POWERSHELL CMDLETS * Manage user accounts in PowerShell * Manage groups and group memberships in PowerShell * Manage computer accounts in PowerShell * Manage organizational units and Active Directory objects in PowerShell 5 - MANAGE NETWORK SERVICE SETTINGS FOR WINDOWS DEVICES USING POWERSHELL CMDLETS * Manage IP addresses in PowerShell * Manage IP routing in PowerShell * Manage DNS clients in PowerShell * Manage Windows Firewall settings in PowerShell 6 - MANAGE WINDOWS SERVER SETTINGS USING POWERSHELL CMDLETS * Automate management tasks using the Group Policy management cmdlets * Manage server roles and services using PowerShell cmdlets * Manage Hyper-V Virtual Machines using PowerShell cmdlets * Manage Internet Information Services using PowerShell cmdlets 7 - MANAGE SETTINGS FOR A LOCAL WINDOWS MACHINE USING POWERSHELL CMDLETS * Manage Windows 10 using PowerShell * Manage permissions with PowerShell 8 - UNDERSTAND THE WINDOWS POWERSHELL PIPELINE * Review Windows PowerShell pipeline and its output * Discover object members in PowerShell * Control the formatting of pipeline output 9 - SELECT, SORT, AND MEASURE OBJECTS USING THE PIPELINE * Sort and group objects by property in the pipeline * Measure objects in the pipeline * Select a set of objects in the pipeline * Select object properties in the pipeline * Create and format calculated properties in the pipeline 10 - FILTER OBJECTS OUT OF THE PIPELINE * Learn about the comparison operators in PowerShell * Review basic filter syntax in the pipeline * Review advanced filter syntax in the pipeline * Optimize the filter performance in the pipeline 11 - ENUMERATE OBJECTS IN THE PIPELINE * Learn about enumerations in the pipeline * Review basic syntax to enumerate objects in the pipeline * Review advanced syntax to enumerate objects in the pipeline 12 - SEND AND PASS DATA AS OUTPUT FROM THE PIPELINE * Write pipeline data to a file * Convert pipeline objects to other forms of data representation in PowerShell * Control additional output options in PowerShell 13 - PASS PIPELINE OBJECTS * Pipeline parameter binding * Identify ByValue parameters * Pass data by using ByValue * Pass data by using ByPropertyName * Identify ByPropertyName parameters * Use manual parameters to override the pipeline * Use parenthetical commands * Expand property values 14 - CONNECT WITH DATA STORES USING POWERSHELL PROVIDERS * Define Windows PowerShell providers * Review the built-in providers in PowerShell * Access provider help in PowerShell 15 - USE POWERSHELL DRIVES IN POWERSHELL * Explain PowerShell drives in PowerShell * Use PowerShell drive cmdlets in PowerShell * Manage the file system in PowerShell * Manage the registry in PowerShell * Work with certificates in PowerShell * Work with other PowerShell drives in PowerShell 16 - REVIEW CIM AND WMI * Review architecture of CIM and WMI * Review repositories in CIM and WMI * Locate online class documentation by using CIM and WMI cmdlets 17 - QUERY CONFIGURATION INFORMATION BY USING CIM AND WMI * List local repository namespaces and classes by using CIM and WMI * Query instances by using commands and WMI Query Language * Connect to remote computers by using CIM and WMI cmdlets * Query repository classes from remote computers by using CIMSession objects 18 - QUERY AND MANIPULATE REPOSITORY OBJECTS BY USING CIM AND WMI METHODS * Discover methods of repository objects by using CIM and WMI * Locate class methods and documentation by using CIM and WMI * Invoke methods of repository objects by using CIM and WMI 19 - MANAGE VARIABLES IN WINDOWS POWERSHELL SCRIPTS * Define variables in Windows PowerShell scripts * Create variable names in Windows PowerShell scripts * Assign values and types to variables in Windows PowerShell scripts * Identify the methods and properties of variables in Windows PowerShell scripts * Use string variables and methods in Windows PowerShell scripts * Use date variables and methods in Windows PowerShell scripts 20 - WORK WITH ARRAYS AND HASH TABLES IN WINDOWS POWERSHELL SCRIPTS * Define an array in Windows PowerShell scripts * Work with array lists in Windows PowerShell scripts * Define hash tables in Windows PowerShell Scripts * Work with hash tables in Windows PowerShell scripts 21 - CREATE AND RUN SCRIPTS BY USING WINDOWS POWERSHELL * Review Windows PowerShell scripts * Modify scripts in the PowerShell Gallery * Create scripts using Windows PowerShell * Review the PowerShellGet module in Windows PowerShell * Run scripts and set the execution policy in Windows PowerShell * Review Windows PowerShell and AppLocker * Sign the scripts digitally in Windows PowerShell 22 - WORK WITH SCRIPTING CONSTRUCTS IN WINDOWS POWERSHELL * Review and use the ForEach loop in Windows PowerShell scripts * Review and use the If construct in Windows PowerShell scripts * Review and use the Switch construct in Windows PowerShell scripts * Review the For construct in Windows PowerShell scripts * Review other loop constructs in Windows PowerShell scripts * Review Break and Continue in Windows PowerShell scripts 23 - IMPORT DATA IN DIFFERENT FORMATS FOR USE IN SCRIPTS BY USING WINDOWS POWERSHELL CMDLETS * Use the Get-Content command in Windows PowerShell scripts * Use the Import-Csv cmdlet in Windows PowerShell scripts * Use the Import-Clixml cmdlet in Windows PowerShell scripts * Use the ConvertFrom-Json cmdlet in Windows PowerShell scripts 24 - USE METHODS TO ACCEPT USER INPUTS IN WINDOWS POWERSHELL SCRIPTS * Identify values that might change in Windows PowerShell scripts * Use the Read-Host cmdlet in Windows PowerShell scripts * Use the Get-Credential cmdlet in Windows PowerShell scripts * Use the Out-GridView cmdlet in Windows PowerShell scripts * Pass parameters to a Windows PowerShell script 25 - TROUBLESHOOT SCRIPTS AND HANDLE ERRORS IN WINDOWS POWERSHELL * Interpret error messages generated for Windows PowerShell commands * Add output to Windows PowerShell scripts * Use breakpoints in Windows PowerShell scripts * Interpret error actions for Windows PowerShell commands 26 - USE FUNCTIONS AND MODULES IN WINDOWS POWERSHELL SCRIPTS * Review functions in Windows PowerShell scripts * Use variable scope in Windows PowerShell scripts * Create modules in Windows PowerShell scripts * Use the dot sourcing feature in Windows PowerShell 27 - MANAGE SINGLE AND MULTIPLE COMPUTERS BY USING WINDOWS POWERSHELL REMOTING * Review the remoting feature of Windows PowerShell * Compare remoting with remote connectivity * Review the remoting security feature of Windows PowerShell * Enable remoting by using Windows PowerShell * Use one-to-one remoting by using Windows PowerShell * Use one-to-many remoting by using Windows PowerShell * Compare remoting output with local output 28 - USE ADVANCED WINDOWS POWERSHELL REMOTING TECHNIQUES * Review common remoting techniques of Windows PowerShell * Send parameters to remote computers in Windows PowerShell * Set access protection to variables, aliases, and functions by using the scope modifier * Enable multi-hop remoting in Windows PowerShell 29 - MANAGE PERSISTENT CONNECTIONS TO REMOTE COMPUTERS BY USING WINDOWS POWERSHELL SESSIONS * Review persistent connections in Windows PowerShell * Create and manage persistent PSSessions by using Windows PowerShell * Disconnect PSSessions by using Windows PowerShell * Review the feature of implicit remoting in Windows PowerShell 30 - REVIEW AZURE POWERSHELL MODULE * Review Azure PowerShell * Review the benefits of the Azure PowerShell module * Install the Azure PowerShell module * Migrate Azure PowerShell from AzureRM to Azure * Review Microsoft Azure Active Directory module for Windows PowerShell and Azure Active Directory PowerShell for Graph modules 31 - REVIEW THE FEATURES AND TOOLS FOR AZURE CLOUD SHELL * Review the characteristics of Azure Cloud Shell * Review the features and tools of Azure Cloud Shell * Configure and experiment with Azure Cloud Shell 32 - MANAGE AZURE RESOURCES WITH WINDOWS POWERSHELL * Create a new Azure virtual machine by using Windows PowerShell commands * Manage Azure virtual machines by using Windows PowerShell commands * Manage Azure related storage by using Azure PowerShell * Manage Azure subscriptions by using Azure PowerShell 33 - MANAGE USERS, GROUPS, AND LICENSES IN MICROSOFT ENTRA ID BY USING WINDOWS POWERSHELL * Review benefits to manage Microsoft 365 services by using Windows PowerShell * Connect to the Microsoft 365 tenant by using Windows PowerShell * Manage users in Microsoft 365 by using Windows PowerShell * Manage groups in Microsoft 365 by using Windows PowerShell * Manage roles in Microsoft 365 by using Windows PowerShell * Manage licenses in Microsoft 365 by using Windows PowerShell 34 - MANAGE EXCHANGE ONLINE BY USING WINDOWS POWERSHELL * Connect to Exchange Online by using Windows PowerShell * Manage mailboxes in Exchange Online by using Windows PowerShell * Manage resources in Exchange Online by using Windows PowerShell * Manage admin roles in Exchange Online by using Windows PowerShell 35 - MANAGE SHAREPOINT ONLINE BY USING WINDOWS POWERSHELL * Install and connect to SharePoint Online Management Shell by using Windows PowerShell * Manage SharePoint Online users and groups by using Windows PowerShell * Manage SharePoint sites by using Windows PowerShell * Manage SharePoint Online external user sharing by using Windows PowerShell 36 - MANAGE MICROSOFT TEAMS BY USING WINDOWS POWERSHELL * Review Microsoft Teams PowerShell module * Install the Microsoft Teams PowerShell module * Manage teams with Microsoft Teams PowerShell module 37 - CREATE AND MANAGE BACKGROUND JOBS USING WINDOWS POWERSHELL * Define the types of background jobs in Windows PowerShell * Start remote jobs and CIM/WMI jobs in Windows PowerShell * Monitor jobs in Windows PowerShell * Retrieve results for running jobs in Windows PowerShell 38 - CREATE AND MANAGE SCHEDULED JOBS USING WINDOWS POWERSHELL * Create and run Windows PowerShell scripts as scheduled tasks * Define scheduled jobs in Windows PowerShell * Create job option and job trigger objects in Windows PowerShell * Create and register a scheduled job in Windows PowerShell * Retrieve the results from a scheduled job in Windows PowerShell

AZ-040T00 Automating Administration with Powershell
Delivered Online6 days, Jun 3rd, 13:00 + 9 more
£2975

CompTIA Network+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for entry-level computer support professionals with a basic knowledge of computer hardware, software, and operating systems who wish to increase their knowledge and understanding of networking concepts and acquire the required skills to prepare for a career in network support or administration, or who wish to prepare for the CompTIA Network+ certification. CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT professionals with job roles such as network administrator, network technician, network installer, help desk technician, and IT cable installer. This course is also designed for students who are seeking the CompTIA Network+ certification and who want to prepare for the CompTIA Network+ N10-008 Certification Exam. Overview In this course, you will describe the major networking technologies and systems of modern networks and configure, manage, and troubleshoot modern networks. Explain the OSI and TCP/IP Models. Explain properties of network traffic. Install and configure switched networks. Configure IP networks. Install and configure routed networks. Configure and monitor ports and protocols. Explain network application and storage issues. Monitor and troubleshoot networks. Explain network attacks and mitigations. Install and configure security devices. Explain authentication and access controls. Deploy and troubleshoot cabling solutions. Implement and troubleshoot wireless technologies. Compare and contrast WAN technologies. Use remote access methods. Identify site policies and best practices. CompTIA's Network+ certification is a foundation-level certification designed for IT professionals with around one year of experience, whose job role is focused on network administration. The CompTIA Network+ exam will certify the successful candidate has the knowledge and skills required to troubleshoot, configure, and manage common network devices; establish basic network connectivity; understand and maintain network documentation; identify network limitations and weaknesses; and implement network security, standards, and protocols. The candidate will have a basic understanding of enterprise technologies, including cloud and virtualization technologies. The Official CompTIA© Network+© (Exam N10-008): will teach you the fundamental principles of installing, configuring, and troubleshooting network technologies and help you to progress a career in network administration. In this course, you will build on your existing user-level knowledge and experience with personal computer operating systems and networks to master the fundamental skills and concepts that you will need to use on the job in any type of networking career. Prerequisites * CompTIA A+ Certification (Exams 220-1001 and 220-1002) 1 - EXPLAINING THE OSI AND TCP/IP MODELS * Topic A: Explain OSI Model Layers * Topic B: Explain the TCP/IP Suite 2 - EXPLAINING PROPERTIES OF NETWORK TRAFFIC * Topic A: Explain Media Types and Access Methods * Topic B: Deploy Ethernet Standards * Topic C: Configure and Monitor Network Interfaces 3 - INSTALLING AND CONFIGURING SWITCHED NETWORKS * Topic A: Install and Configure Hubs and Bridges * Topic B: Install and Configure Switches * Topic C: Compare and Contrast Network Topologies * Topic D: Compare and Contrast Network Types 4 - CONFIGURING IP NETWORKS * Topic A: Configure IPv4 Addressing Components * Topic B: Test IP Interfaces with Command Line Tools * Topic C: Configure IPv4 Subnets * Topic D: Configure Private and Public IPv4 Addressing Schemes * Topic E: Configure IPv6 Addressing Components * Topic F: Configure DHCP Services 5 - INSTALLING AND CONFIGURING ROUTED NETWORKS * Topic A: Explain Characteristics of Routing * Topic B: Install and Configure Routers 6 - CONFIGURING AND MONITORING PORTS AND PROTOCOLS * Topic A: Explain the Uses of Ports and Protocols * Topic B: Use Port Scanners and Protocol Analyzers * Topic C: Explain the Use of Name Resolution Services * Topic D: Configure DNS and IPAM Services 7 - EXPLAINING NETWORK APPLICATION AND STORAGE SERVICES * Topic A: Explain the Uses of Network Applications * Topic B: Explain the Uses of Voice Services and Advanced Networking Devices * Topic C: Explain the Uses of Virtualization and Network Storage Services * Topic D: Summarize the Concepts of Cloud Services 8 - MONITORING AND TROUBLESHOOTING NETWORKS * Topic A: Monitor Network Interfaces and Logs * Topic B: Explain Network Troubleshooting Methodology * Topic C: Troubleshoot Common Network Services Issues 9 - EXPLAINING NETWORKING ATTACKS AND MITIGATIONS * Topic A: Summarize Common Networking Attacks * Topic B: Explain the Characteristics of VLANs * Topic C: Explain the Characteristics of NAT and Port Forwarding 10 - INSTALLING AND CONFIGURING SECURITY DEVICES * Topic A: Install and Configure Firewalls and Proxies * Topic B: Explain the Uses of IDS/IPS and UTM 11 - EXPLAINING AUTHENTICATION AND ACCESS CONTROLS * Topic A: Explain Authentication Controls and Attacks * Topic B: Explain the Uses of Authentication Protocols and Directory Services * Topic C: Explain the Uses of Port Security and NAC * Topic D: Implement Network Device Hardening * Topic E: Explain Patch Management and Vulnerability Scanning Processes 12 - DEPLOYING AND TROUBLESHOOTING CABLING SOLUTIONS * Topic A: Deploy Structured Cabling Systems * Topic B: Deploy Twisted Pair Cabling Solutions * Topic C: Test and Troubleshoot Twisted Pair Cabling Solutions * Topic D: Deploy Fiber Optic Cabling Solutions 13 - IMPLEMENTING AND TROUBLESHOOTING WIRELESS TECHNOLOGIES * Topic A: Install and Configure Wireless Technologies * Topic B: Troubleshoot Wireless Performance Issues * Topic C: Secure and Troubleshoot Wireless Connectivity 14 - COMPARING AND CONTRASTING WAN TECHNOLOGIES * Topic A: Compare and Contrast WAN Core Service Types * Topic B: Compare and Contrast WAN Subscriber Service Types * Topic C: Compare and Contrast WAN Framing Service Types * Topic D: Compae and Contrast Wireless and IoT WAN Technologies 15 - USING REMOTE ACCESS METHODS * Topic A: Use Remote Access VPNs * Topic B: Use Remote Access Management Methods 16 - IDENTIFYING SITE POLICIES AND BEST PRACTICES * Topic A: Manage Networks with Documentation and Diagrams * Topic B: Summarize the Purposes of Physical Security Devices * Topic C: Compare and Contrast Business Continuity and Disaster Recovery Concepts * Topic D: Identify Policies and Best Practices

CompTIA Network+
Delivered Online6 days, Jun 3rd, 13:00 + 20 more
£2475

MD-102T00 Microsoft 365 Endpoint Administrator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - EXPLORE THE ENTERPRISE DESKTOP * Examine benefits of modern management * Examine the enterprise desktop life-cycle model * Examine planning and purchasing * Examine desktop deployment * Plan an application deployment * Plan for upgrades and retirement 2 - EXPLORE WINDOWS EDITIONS * Examine Windows client editions and capabilities * Select client edition * Examine hardware requirements 3 - UNDERSTAND MICROSOFT ENTRA ID * Examine Microsoft Entra ID * Compare Microsoft Entra ID and Active Directory Domain Services * Examine Microsoft Entra ID as a directory service for cloud apps * Compare Microsoft Entra ID P1 and P2 plans * Examine Microsoft Entra Domain Services 4 - MANAGE MICROSOFT ENTRA IDENTITIES * Examine RBAC and user roles in Microsoft Entra ID * Create and manage users in Microsoft Entra ID * Create and manage groups in Microsoft Entra ID * Manage Microsoft Entra objects with PowerShell * Synchronize objects from AD DS to Microsoft Entra ID 5 - MANAGE DEVICE AUTHENTICATION * Describe Microsoft Entra join * Examine Microsoft Entra join prerequisites limitations and benefits * Join devices to Microsoft Entra ID * Manage devices joined to Microsoft Entra ID 6 - ENROLL DEVICES USING MICROSOFT CONFIGURATION MANAGER * Deploy the Microsoft Configuration Manager client * Monitor the Microsoft Configuration Manager client * Manage the Microsoft Configuration Manager client 7 - ENROLL DEVICES USING MICROSOFT INTUNE * Manage mobile devices with Intune * Enable mobile device management * Explain considerations for device enrollment * Manage corporate enrollment policy * Enroll Windows devices in Intune * Enroll Android devices in Intune * Enroll iOS devices in Intune * Explore device enrollment manager * Monitor device enrollment * Manage devices remotely 8 - EXECUTE DEVICE PROFILES * Explore Intune device profiles * Create device profiles * Create a custom device profile 9 - OVERSEE DEVICE PROFILES * Monitor device profiles in Intune * Manage device sync in Intune * Manage devices in Intune using scripts 10 - MAINTAIN USER PROFILES * Examine user profile * Explore user profile types * Examine options for minimizing user profile size * Deploy and configure folder redirection * Sync user state with Enterprise State Roaming * Configure Enterprise State Roaming in Azure 11 - EXECUTE MOBILE APPLICATION MANAGEMENT * Examine mobile application management * Examine considerations for mobile application management * Prepare line-of-business apps for app protection policies * Implement mobile application management policies in Intune * Manage mobile application management policies in Intune 12 - DEPLOY AND UPDATE APPLICATIONS * Deploy applications with Intune * Add apps to Intune * Manage Win32 apps with Intune * Deploy applications with Configuration Manager * Deploying applications with Group Policy * Assign and publish software * Explore Microsoft Store for Business * Implement Microsoft Store Apps * Update Microsoft Store Apps with Intune * Assign apps to company employees 13 - ADMINISTER ENDPOINT APPLICATIONS * Manage apps with Intune * Manage Apps on non-enrolled devices * Deploy Microsoft 365 Apps with Intune * Additional Microsoft 365 Apps Deployment Tools * Configure Microsoft Edge Internet Explorer mode * App Inventory Review 14 - PROTECT IDENTITIES IN MICROSOFT ENTRA ID * Explore Windows Hello for Business * Deploy Windows Hello * Manage Windows Hello for Business * Explore Microsoft Entra ID Protection * Manage self-service password reset in Microsoft Entra ID * Implement multi-factor authentication 15 - ENABLE ORGANIZATIONAL ACCESS * Enable access to organization resources * Explore VPN types and configuration * Explore Always On VPN * Deploy Always On VPN 16 - IMPLEMENT DEVICE COMPLIANCE * Protect access to resources using Intune * Explore device compliance policy * Deploy a device compliance policy * Explore conditional access * Create conditional access policies 17 - GENERATE INVENTORY AND COMPLIANCE REPORTS * Report enrolled devices inventory in Intune * Monitor and report device compliance * Build custom Intune inventory reports * Access Intune using Microsoft Graph API 18 - DEPLOY DEVICE DATA PROTECTION * Explore Windows Information Protection * Plan Windows Information Protection * Implement and use Windows Information Protection * Explore Encrypting File System in Windows client * Explore BitLocker 19 - MANAGE MICROSOFT DEFENDER FOR ENDPOINT * Explore Microsoft Defender for Endpoint * Examine key capabilities of Microsoft Defender for Endpoint * Explore Windows Defender Application Control and Device Guard * Explore Microsoft Defender Application Guard * Examine Windows Defender Exploit Guard * Explore Windows Defender System Guard 20 - MANAGE MICROSOFT DEFENDER IN WINDOWS CLIENT * Explore Windows Security Center * Explore Windows Defender Credential Guard * Manage Microsoft Defender Antivirus * Manage Windows Defender Firewall * Explore Windows Defender Firewall with Advanced Security 21 - MANAGE MICROSOFT DEFENDER FOR CLOUD APPS * Explore Microsoft Defender for Cloud Apps * Planning Microsoft Defender for Cloud Apps * Implement Microsoft Defender for Cloud Apps 22 - ASSESS DEPLOYMENT READINESS * Examine deployment guidelines * Explore readiness tools * Assess application compatibility * Explore tools for application compatibility mitigation * Prepare network and directory for deployment * Plan a pilot 23 - DEPLOY USING THE MICROSOFT DEPLOYMENT TOOLKIT * Evaluate traditional deployment methods * Set up the Microsoft Deployment Toolkit for client deployment * Manage and deploy images using the Microsoft Deployment Toolkit 24 - DEPLOY USING MICROSOFT CONFIGURATION MANAGER * Explore client deployment using Configuration Manager * Examine deployment components of Configuration Manager * Manage client deployment using Configuration Manager * Plan in-place upgrades using Configuration Manager 25 - DEPLOY DEVICES USING WINDOWS AUTOPILOT * Use Autopilot for modern deployment * Examine requirements for Windows Autopilot * Prepare device IDs for Autopilot * Implement device registration and out-of-the-box customization * Examine Autopilot scenarios * Troubleshoot Windows Autopilot 26 - IMPLEMENT DYNAMIC DEPLOYMENT METHODS * Examine subscription activation * Deploy using provisioning packages * Use Windows Configuration Designer * Use Microsoft Entra join with automatic MDM enrollment 27 - PLAN A TRANSITION TO MODERN ENDPOINT MANAGEMENT * Explore using co-management to transition to modern endpoint management * Examine prerequisites for co-management * Evaluate modern management considerations * Evaluate upgrades and migrations in modern transitioning * Migrate data when modern transitioning * Migrate workloads when modern transitioning 28 - MANAGE WINDOWS 365 * Explore Windows 365 * Configure Windows 365 * Administer Windows 365 29 - MANAGE AZURE VIRTUAL DESKTOP * Examine Azure Virtual Desktop * Explore Azure Virtual Desktop * Configure Azure Virtual Desktop * Administer Azure Virtual Desktop ADDITIONAL COURSE DETAILS: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MD-102T00 Microsoft 365 Endpoint Administrator
Delivered Online6 days, Jun 10th, 13:00 + 15 more
£2975

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. COMPUTER FORENSICS IN TODAY?S WORLD * 1.1. Understand the Fundamentals of Computer Forensics * 1.2. Understand Cybercrimes and their Investigation Procedures * 1.3. Understand Digital Evidence * 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security * Operations Center) in Computer Forensics * 1.5. Identify the Roles and Responsibilities of a Forensic Investigator * 1.6. Understand the Challenges Faced in Investigating Cybercrimes * 1.7. Understand Legal Compliance in Computer Forensics * COMPUTER FORENSICS INVESTIGATION PROCESS * 2.1. Understand the Forensic Investigation Process and its Importance * 2.2. Understand the Pre-investigation Phase * 2.3. Understand First Response * 2.4. Understand the Investigation Phase * 2.5. Understand the Post-investigation Phase * UNDERSTANDING HARD DISKS AND FILE SYSTEMS * 3.1. Describe Different Types of Disk Drives and their Characteristics * 3.2. Explain the Logical Structure of a Disk * 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems * 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems * 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools * 3.6 Understand Storage Systems * 3.7. Understand Encoding Standards and Hex Editors * 3.8. Analyze Popular File Formats Using Hex Editor * DATA ACQUISITION AND DUPLICATION * 4.1. Understand Data Acquisition Fundamentals * 4.2. Understand Data Acquisition Methodology * 4.3. Prepare an Image File for Examination * DEFEATING ANTI-FORENSICS TECHNIQUES * 5.1. Understand Anti-forensics Techniques * 5.2. Discuss Data Deletion and Recycle Bin Forensics * 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions * 5.4. Explore Password Cracking/Bypassing Techniques * 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch * 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption * 5.7. Detect Program Packers and Footprint Minimizing Techniques * 5.8. Understand Anti-forensics Countermeasures * WINDOWS FORENSICS * 6.1. Collect Volatile and Non-volatile Information * 6.2. Perform Windows Memory and Registry Analysis * 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers * 6.4. Examine Windows Files and Metadata * 6.5. Understand ShellBags, LNK Files, and Jump Lists * 6.6. Understand Text-based Logs and Windows Event Logs * LINUX AND MAC FORENSICS * 7.1. Understand Volatile and Non-volatile Data in Linux * 7.2. Analyze Filesystem Images Using The Sleuth Kit * 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec * 7.4. Understand Mac Forensics * * NETWORK FORENSICS * 8.1. Understand Network Forensics * 8.2. Explain Logging Fundamentals and Network Forensic Readiness * 8.3. Summarize Event Correlation Concepts * 8.4. Identify Indicators of Compromise (IoCs) from Network Logs * 8.5. Investigate Network Traffic * 8.6. Perform Incident Detection and Examination with SIEM Tools * 8.7. Monitor and Detect Wireless Network Attacks * INVESTIGATING WEB ATTACKS * 9.1. Understand Web Application Forensics * 9.2. Understand Internet Information Services (IIS) Logs * 9.3. Understand Apache Web Server Logs * 9.4. Understand the Functionality of Intrusion Detection System (IDS) * 9.5. Understand the Functionality of Web Application Firewall (WAF) * 9.6. Investigate Web Attacks on Windows-based Servers * 9.7. Detect and Investigate Various Attacks on Web Applications * DARK WEB FORENSICS * 10.1. Understand the Dark Web * 10.2. Determine How to Identify the Traces of Tor Browser during Investigation * 10.3. Perform Tor Browser Forensics * DATABASE FORENSICS * 11.1. Understand Database Forensics and its Importance * 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server * 11.3. Collect Evidence Files on MSSQL Server * 11.4. Perform MSSQL Forensics * 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory * 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis * 11.7. Perform MySQL Forensics on WordPress Web Application Database * CLOUD FORENSICS * 12.1. Understand the Basic Cloud Computing Concepts * 12.2. Understand Cloud Forensics * 12.3. Understand the Fundamentals of Amazon Web Services (AWS) * 12.4. Determine How to Investigate Security Incidents in AWS * 12.5. Understand the Fundamentals of Microsoft Azure * 12.6. Determine How to Investigate Security Incidents in Azure * 12.7. Understand Forensic Methodologies for Containers and Microservices * INVESTIGATING EMAIL CRIMES * 13.1. Understand Email Basics * 13.2. Understand Email Crime Investigation and its Steps * 13.3. U.S. Laws Against Email Crime * MALWARE FORENSICS * 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware * 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis * 14.3. Understand and Perform Static Analysis of Malware * 14.4. Analyze Suspicious Word and PDF Documents * 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches * 14.6. Analyze Malware Behavior on System Properties in Real-time * 14.7. Analyze Malware Behavior on Network in Real-time * 14.8. Describe Fileless Malware Attacks and How they Happen * 14.9. Perform Fileless Malware Analysis - Emotet * MOBILE FORENSICS * 15.1. Understand the Importance of Mobile Device Forensics * 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices * 15.3. Explain the Steps Involved in Mobile Forensics Process * 15.4. Investigate Cellular Network Data * 15.5. Understand SIM File System and its Data Acquisition Method * 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices * 15.7. Perform Logical Acquisition on Android and iOS Devices * 15.8. Perform Physical Acquisition on Android and iOS Devices * 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report * IOT FORENSICS * 16.1. Understand IoT and IoT Security Problems * 16.2. Recognize Different Types of IoT Threats * 16.3. Understand IoT Forensics * 16.4. Perform Forensics on IoT Devices *

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online6 days, Jun 10th, 13:00 + 2 more
£3495

Security Engineering on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for security engineers, security architects, and information security professionals. Overview Identify security benefits and responsibilities of using the AWS Cloud Build secure application infrastructures Protect applications and data from common security threats Perform and automate security checks Configure authentication and permissions for applications and resources Monitor AWS resources and respond to incidents Capture and process logs Create and configure automated and repeatable deployments with tools such as AMIs and AWS CloudFormation This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents. Prerequisites We recommend that attendees of this course have: * Working knowledge of IT security practices and infrastructure concepts * Familiarity with cloud computing concepts * Completed AWS Security Essentials and Architecting on AWS courses 1 - SECURITY ON AWS * Security in the AWS cloud * AWS Shared Responsibility Model * Incident response overview * DevOps with Security Engineering 2 - IDENTIFYING ENTRY POINTS ON AWS * Identify the different ways to access the AWS platform * Understanding IAM policies * IAM Permissions Boundary * IAM Access Analyzer * Multi-factor authentication * AWS CloudTrail 3 - SECURITY CONSIDERATIONS: WEB APPLICATION ENVIRONMENTS * Threats in a three-tier architecture * Common threats: user access * Common threats: data access * AWS Trusted Advisor 4 - APPLICATION SECURITY * Amazon Machine Images * Amazon Inspector * AWS Systems Manager 5 - DATA SECURITY * Data protection strategies * Encryption on AWS * Protecting data at rest with Amazon S3, Amazon RDS, Amazon DynamoDB * Protecting archived data with Amazon S3 Glacier * Amazon S3 Access Analyzer * Amazon S3 Access Points 6 - SECURING NETWORK COMMUNICATIONS * Amazon VPC security considerations * Amazon VPC Traffic Mirroring * Responding to compromised instances * Elastic Load Balancing * AWS Certificate Manager 7 - MONITORING AND COLLECTING LOGS ON AWS * Amazon CloudWatch and CloudWatch Logs * AWS Config * Amazon Macie * Amazon VPC Flow Logs * Amazon S3 Server Access Logs * ELB Access Logs 8 - PROCESSING LOGS ON AWS * Amazon Kinesis * Amazon Athena 9 - SECURITY CONSIDERATIONS: HYBRID ENVIRONMENTS * AWS Site-to-Site and Client VPN connections * AWS Direct Connect * AWS Transit Gateway 10 - OUT-OF-REGION PROTECTION * Amazon Route 53 * AWS WAF * Amazon CloudFront * AWS Shield * AWS Firewall Manager * DDoS mitigation on AWS 11 - SECURITY CONSIDERATIONS: SERVERLESS ENVIRONMENTS * Amazon Cognito * Amazon API Gateway * AWS Lambda 12 - THREAT DETECTION AND INVESTIGATION * Amazon GuardDuty * AWS Security Hub * Amazon Detective 13 - SECRETS MANAGEMENT ON AWS * AWS KMS * AWS CloudHSM * AWS Secrets Manager 14 - AUTOMATION AND SECURITY BY DESIGN * AWS CloudFormation * AWS Service Catalog 15 - ACCOUNT MANAGEMENT AND PROVISIONING ON AWS * AWS Organizations * AWS Control Tower * AWS SSO * AWS Directory Service

Security Engineering on AWS
Delivered Online4 days, Jun 12th, 13:00 + 2 more
£2025

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - INTRODUCTION TO ETHICAL HACKING * Information Security Overview * Cyber Kill Chain Concepts * Hacking Concepts * Ethical Hacking Concepts * Information Security Controls * Information Security Laws and Standards 2 - 2 - FOOT-PRINTING AND RECONNAISSANCE * Footprinting Concepts * Footprinting through Search Engines * Footprinting through Web Services * Footprinting through Social Networking Sites * Website Footprinting * Email Footprinting * Who is Footprinting * DNS Footprinting * Network Footprinting * Footprinting through Social Engineering * Footprinting Tools * Footprinting Countermeasures 3 - SCANNING NETWORKS * Network Scanning Concepts * Scanning Tools * Host Discovery * Port and Service Discovery * OS Discovery (Banner Grabbing/OS Fingerprinting) * Scanning Beyond IDS and Firewall * Draw Network Diagrams 4 - ENUMERATION * Enumeration Concepts * NetBIOS Enumeration * SNMP Enumeration * LDAP Enumeration * NTP and NFS Enumeration * SMTP and DNS Enumeration * Other Enumeration Techniques * Enumeration Countermeasures 5 - VULNERABILITY ANALYSIS * Vulnerability Assessment Concepts * Vulnerability Classification and Assessment Types * Vulnerability Assessment Solutions and Tools * Vulnerability Assessment Reports 6 - SYSTEM HACKING * System Hacking Concepts * Gaining Access * Escalating Privileges * Maintaining Access * Clearing Logs 7 - MALWARE THREATS * Malware Concepts * APT Concepts * Trojan Concepts * Virus and Worm Concepts * Fileless Malware Concepts * Malware Analysis * Countermeasures * Anti-Malware Software 8 - SNIFFING * Sniffing Concepts * Sniffing Technique: MAC Attacks * Sniffing Technique: DHCP Attacks * Sniffing Technique: ARP Poisoning * Sniffing Technique: Spoofing Attacks * Sniffing Technique: DNS Poisoning * Sniffing Tools * Countermeasures * Sniffing Detection Techniques 9 - SOCIAL ENGINEERING * Social Engineering Concepts * Social Engineering Techniques * Insider Threats * Impersonation on Social Networking Sites * Identity Theft * Countermeasures 10 - DENIAL-OF-SERVICE * DoS/DDoS Concepts * DoS/DDoS Attack Techniques * BotnetsDDoS Case Study * DoS/DDoS Attack Tools * Countermeasures * DoS/DDoS Protection Tools 11 - SESSION HIJACKING * Session Hijacking Concepts * Application Level Session Hijacking * Network Level Session Hijacking * Session Hijacking Tools * Countermeasures 12 - EVADING IDS, FIREWALLS, AND HONEYPOTS * IDS, IPS, Firewall, and Honeypot Concepts * IDS, IPS, Firewall, and Honeypot Solutions * Evading IDS * Evading Firewalls * IDS/Firewall Evading Tools * Detecting Honeypots * IDS/Firewall Evasion Countermeasures 13 - HACKING WEB SERVERS * Web Server Concepts * Web Server Attacks * Web Server Attack Methodology * Web Server Attack Tools * Countermeasures * Patch Management * Web Server Security Tools 14 - HACKING WEB APPLICATIONS * Web Application Concepts * Web Application Threats * Web Application Hacking Methodology * Web API, Webhooks, and Web Shell * Web Application Security 15 - SQL INJECTION * SQL Injection Concepts * Types of SQL Injection * SQL Injection Methodology * SQL Injection Tools * Evasion Techniques * Countermeasures 16 - HACKING WIRELESS NETWORKS * Wireless Concepts * Wireless Encryption * Wireless Threats * Wireless Hacking Methodology * Wireless Hacking Tools * Bluetooth Hacking * Countermeasures * Wireless Security Tools 17 - HACKING MOBILE PLATFORMS * Mobile Platform Attack Vectors * Hacking Android OS * Hacking iOS * Mobile Device Management * Mobile Security Guidelines and Tools 18 - IOT AND OT HACKING * IoT Hacking * IoT Concepts * IoT Attacks * IoT Hacking Methodology * IoT Hacking Tools * Countermeasures * OT Hacking * OT Concepts * OT Attacks * OT Hacking Methodology * OT Hacking Tools * Countermeasures 19 - CLOUD COMPUTING * Cloud Computing Concepts * Container Technology * Serverless Computing * Cloud Computing Threats * Cloud Hacking * Cloud Security 20 - CRYPTOGRAPHY * Cryptography Concepts * Encryption Algorithms * Cryptography Tools * Public Key Infrastructure (PKI) * Email Encryption * Disk Encryption * Cryptanalysis * Countermeasures ADDITIONAL COURSE DETAILS: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online6 days, Jun 17th, 13:00 + 5 more
£3495

AZ-104T00 Microsoft Azure Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Administrators. The Azure Administrator implements, manages, and monitors identity, governance, storage, compute, and virtual networks in a cloud environment. The Azure Administrator will provision, size, monitor, and adjust resources as appropriate. This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution. Prerequisites Successful Azure Administrators start this role with experience in virtualization, networking, identity, and storage. Understanding of on-premises virtualization technologies, including: VMs, virtual networking, and virtual hard disks. Understanding of network configurations, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies. Understanding of Active Directory concepts, including users, groups, and role-based access control. Understanding of resilience and disaster recovery, including backup and restore operations. 1 - CONFIGURE MICROSOFT ENTRA ID * Describe Microsoft Entra ID benefits and features * Describe Microsoft Entra concepts * Compare Active Directory Domain Services to Microsoft Entra ID * Select Microsoft Entra editions * Implement Microsoft Entra join * Implement Microsoft Entra self-service password reset 2 - CONFIGURE USER AND GROUP ACCOUNTS * Create user accounts * Manage user accounts * Create bulk user accounts * Create group accounts * Create administrative units 3 - CONFIGURE SUBSCRIPTIONS * Identify Azure regions * Implement Azure subscriptions * Obtain an Azure subscription * Identify Azure subscription usage * Implement Microsoft Cost Management * Apply resource tagging * Apply cost savings 4 - CONFIGURE AZURE POLICY * Create management groups * Implement Azure policies * Create Azure policies * Create policy definitions * Create an initiative definition * Scope the initiative definition * Determine compliance 5 - CONFIGURE ROLE-BASED ACCESS CONTROL * Implement role-based access control * Create a role definition * Create a role assignment * Compare Azure roles to Microsoft Entra roles * Apply role-based access control * Review fundamental Azure RBAC roles 6 - CONFIGURE AZURE RESOURCES WITH TOOLS * Use the Azure portal * Use Azure Cloud Shell * Use Azure PowerShell * Use Azure CLI 7 - USE AZURE RESOURCE MANAGER * Review Azure Resource Manager benefits * Review Azure resource terminology * Create resource groups * Create Azure Resource Manager locks * Reorganize Azure resources * Remove resources and resource groups * Determine resource limits 8 - CONFIGURE RESOURCES WITH AZURE RESOURCE MANAGER TEMPLATES * Review Azure Resource Manager template advantages * Explore the Azure Resource Manager template schema * Explore the Azure Resource Manager template parameters * Consider Bicep templates * Review QuickStart templates 9 - CONFIGURE VIRTUAL NETWORKS * Plan virtual networks * Create subnets * Create virtual networks * Plan IP addressing * Create public IP addressing * Associate public IP addresses * Allocate or assign private IP addresses 10 - CONFIGURE NETWORK SECURITY GROUPS * Implement network security groups * Determine network security group rules * Determine network security group effective rules * Create network security group rules * Implement application security groups 11 - CONFIGURE AZURE DNS * Identify domains and custom domains * Verify custom domain names * Create Azure DNS zones * Delegate DNS domains * Add DNS record sets * Plan for Azure Private DNS zones * Review Azure Private DNS zone scenarios 12 - CONFIGURE AZURE VIRTUAL NETWORK PEERING * Determine Azure Virtual Network peering uses * Determine gateway transit and connectivity * Create virtual network peering * Extend peering with user-defined routes and service chaining 13 - CONFIGURE NETWORK ROUTING AND ENDPOINTS * Review system routes * Identify user-defined routes * Determine service endpoint uses * Determine service endpoint services * Identify private link uses 14 - CONFIGURE AZURE LOAD BALANCER * Determine Azure Load Balancer uses * Implement a public load balancer * Implement an internal load balancer * Determine load balancer SKUs * Create back-end pools * Create health probes * Create load balancer rules 15 - CONFIGURE AZURE APPLICATION GATEWAY * Implement Azure Application Gateway * Determine Azure Application Gateway routing * Configure Azure Application Gateway components 16 - CONFIGURE STORAGE ACCOUNTS * Implement Azure Storage * Explore Azure Storage services * Determine storage account types * Determine replication strategies * Access storage * Secure storage endpoints 17 - CONFIGURE AZURE BLOB STORAGE * Implement Azure Blob Storage * Create blob containers * Assign blob access tiers * Add blob lifecycle management rules * Determine blob object replication * Upload blobs * Determine Blob Storage pricing 18 - CONFIGURE AZURE STORAGE SECURITY * Review Azure Storage security strategies * Create shared access signatures * Identify URI and SAS parameters * Determine Azure Storage encryption * Create customer-managed keys * Apply Azure Storage security best practices 19 - CONFIGURE AZURE FILES AND AZURE FILE SYNC * Compare storage for file shares and blob data * Manage Azure file shares * Create file share snapshots * Implement Azure File Sync * Identify Azure File Sync components * Deploy Azure File Sync 20 - CONFIGURE AZURE STORAGE WITH TOOLS * Use Azure Storage Explorer * Use the Azure Import/Export service * Use the WAImportExport tool * Use the AzCopy tool 21 - CONFIGURE VIRTUAL MACHINES * Review cloud services responsibilities * Plan virtual machines * Determine virtual machine sizing * Determine virtual machine storage * Create virtual machines in the Azure portal * Connect to virtual machines 22 - CONFIGURE VIRTUAL MACHINE AVAILABILITY * Plan for maintenance and downtime * Create availability sets * Review update domains and fault domains * Review availability zones * Compare vertical and horizontal scaling * Implement Azure Virtual Machine Scale Sets * Create Virtual Machine Scale Sets * Implement autoscale * Configure autoscale 23 - CONFIGURE AZURE APP SERVICE PLANS * Implement Azure App Service plans * Determine Azure App Service plan pricing * Scale up and scale out Azure App Service * Configure Azure App Service autoscale 24 - CONFIGURE AZURE APP SERVICE * Implement Azure App Service * Create an app with App Service * Explore continuous integration and deployment * Create deployment slots * Add deployment slots * Secure your App Service app * Create custom domain names * Back up and restore your App Service app * Use Azure Application Insights 25 - CONFIGURE AZURE CONTAINER INSTANCES * Compare containers to virtual machines * Review Azure Container Instances * Implement container groups * Review the Docker platform 26 - CONFIGURE FILE AND FOLDER BACKUPS * Describe Azure Backup benefits * Implement Backup Center for Azure Backup * Configure Azure Recovery Services vault backup options * Use the Microsoft Azure Recovery Services (MARS) agent * Configure on-premises file and folder backups 27 - CONFIGURE VIRTUAL MACHINE BACKUPS * Explore options to protect virtual machine data * Create virtual machine snapshots in Azure Backup * Set up Azure Recovery Services vault backup options * Back up your virtual machines * Restore your virtual machines * Implement System Center DPM and Azure Backup Server * Compare the MARS agent and Azure Backup Server * Implement soft delete for your virtual machines * Implement Azure Site Recovery 28 - CONFIGURE AZURE MONITOR * Describe Azure Monitor key capabilities * Describe Azure Monitor components * Define metrics and logs * Identify monitoring data and tiers * Describe activity log events * Query the activity log 29 - CONFIGURE AZURE ALERTS * Describe Azure Monitor alerts * Manage Azure Monitor alerts * Create alert rules * Create action groups 30 - CONFIGURE LOG ANALYTICS * Determine Log Analytics uses * Create a Log Analytics workspace * Create Kusto (KQL) queries * Structure Log Analytics queries 31 - CONFIGURE NETWORK WATCHER * Describe Azure Network Watcher features * Review IP flow verify diagnostics * Review next hop diagnostics * Visualize the network topology

AZ-104T00 Microsoft Azure Administrator
Delivered Online5 days, Jun 11th, 13:00 + 22 more
£2380

Palo Alto Firewall Training with Step-by-Step Lab Workbook

4.8(8)

By Skill Up

Become a network security expert with comprehensive Palo Alto firewall training. Master configurations and protection techniques.

Palo Alto Firewall Training with Step-by-Step Lab Workbook
Delivered Online On Demand
£25

DP-300T00 Administering Microsoft Azure SQL Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The audience for this course is data professionals managing data and databases who want to learn about administering the data platform technologies that are available on Microsoft Azure. This course is also valuable for data architects and application developers who need to understand what technologies are available for the data platform with Azure and how to work with those technologies through applications. This course provides students with the knowledge and skills to administer a SQL Server database infrastructure for cloud, on-premises and hybrid relational databases and who work with the Microsoft PaaS relational database offerings. Additionally, it will be of use to individuals who develop applications that deliver content from SQL-based relational databases. Prerequisites In addition to their professional experience, students who take this training should have technical knowledge equivalent to the following courses: AZ-900T00 Microsoft Azure Fundamentals DP-900T00 Microsoft Azure Data Fundamentals 1 - PREPARE TO MAINTAIN SQL DATABASES ON AZURE * Describe Microsoft Intelligent Data Platform roles * Understand SQL Server in an Azure virtual machine * Design Azure SQL Database for cloud-native applications * Explore Azure SQL Database Managed Instance 2 - DEPLOY IAAS SOLUTIONS WITH AZURE SQL * Explain IaaS options to deploy SQL Server in Azure * Understand hybrid scenarios * Explore performance and security * Explain high availability and disaster recovery options 3 - DEPLOY PAAS SOLUTIONS WITH AZURE SQL * Explain PaaS options for deploying SQL Server in Azure * Explore single SQL database * Deploy SQL database elastic pool * Understand SQL database hyperscale * Examine SQL managed instance * Describe SQL Edge 4 - EVALUATE STRATEGIES FOR MIGRATING TO AZURE SQL * Understand compatibility level * Understand Azure preview features * Describe Azure database migration options 5 - MIGRATE SQL WORKLOADS TO AZURE SQL DATABASES * Choose the right SQL Server Instance option in Azure * Migrate SQL Server to Azure SQL Database offline * Migrate SQL Server to Azure SQL Database online * Load and move data to Azure SQL Database 6 - MIGRATE SQL WORKLOADS TO AZURE MANAGED INSTANCES * Evaluate migration scenarios to SQL Database Managed Instance * Migrate to SQL Database Managed Instance * Load and Move data to SQL Database Managed Instance 7 - CONFIGURE DATABASE AUTHENTICATION AND AUTHORIZATION * Describe Active Directory and Azure Active Directory * Describe authentication and identities * Describe Security Principals * Describe database and object permissions * Identify authentication and authorization failures 8 - PROTECT DATA IN-TRANSIT AND AT REST * Explore Transparent Data Encryption * Configure server and database firewall rules * Explain object encryption and secure enclaves * Enable encrypted connections * Describe SQL injection * Understand Azure Key Vault 9 - IMPLEMENT COMPLIANCE CONTROLS FOR SENSITIVE DATA * Explore data classification * Explore server and database audit * Implement Dynamic Data Masking * Implement Row Level security * Understand Microsoft Defender for SQL * Explore Azure SQL Database Ledger * Implement Azure Purview 10 - DESCRIBE PERFORMANCE MONITORING * Describe performance monitoring tools * Describe critical performance metrics * Establish baseline metrics * Explore extended events * Describe Azure SQL Insights * Explore Query Performance Insight 11 - CONFIGURE SQL SERVER RESOURCES FOR OPTIMAL PERFORMANCE * Explain how to optimize Azure storage for SQL Server virtual machines * Describe virtual machine resizing * Optimize database storage * Control SQL Server resources 12 - CONFIGURE DATABASES FOR OPTIMAL PERFORMANCE * Explore database maintenance checks * Describe database scoped configuration options * Describe automatic tuning * Describe intelligent query processing 13 - EXPLORE QUERY PERFORMANCE OPTIMIZATION * Understand query plans * Explain estimated and actual query plans * Describe dynamic management views and functions * Explore Query Store * Identify problematic query plans * Describe blocking and locking 14 - EVALUATE PERFORMANCE IMPROVEMENTS * Describe wait statistics * Tune and maintain indexes * Understand query hints 15 - EXPLORE PERFORMANCE-BASED DESIGN * Describe normalization * Choose appropriate data types * Design indexes 16 - AUTOMATE DEPLOYMENT OF DATABASE RESOURCES * Describe deployment models in Azure * Automate deployment by using Azure Resource Manager templates and Bicep * Automate deployment by using PowerShell * Automate deployment by using Azure CLI 17 - CREATE AND MANAGE SQL AGENT JOBS * Create a SQL Server maintenance plan * Describe task status notifications 18 - MANAGE AZURE PAAS TASKS USING AUTOMATION * Explore Elastic jobs * Understand Azure Automation * Build an automation runbook * Automate database workflows by using Logic Apps * Monitor automated tasks 19 - DESCRIBE HIGH AVAILABILITY AND DISASTER RECOVERY STRATEGIES * Describe recovery time objective and recovery point objective * Explore high availability and disaster recovery options * Describe Azure high availability and disaster recovery features for Azure Virtual Machines * Describe high availability and disaster recovery options for PaaS deployments * Explore an IaaS high availability and disaster recovery solution * Describe hybrid solutions 20 - EXPLORE IAAS AND PAAS SOLUTIONS FOR HIGH AVAILABILITY AND DISASTER RECOVERY * Describe failover clusters in Windows Server * Configure Always-on availability groups * Describe temporal tables in Azure SQL Database * Describe active geo-replication for Azure SQL Database * Explore auto-failover groups for Azure SQL Database and Azure SQL Managed Instance 21 - BACK UP AND RESTORE DATABASES * Back up and restore SQL Server running on Azure virtual machines * Back up a SQL Server virtual machine * Back up and restore a database using Azure SQL Database ADDITIONAL COURSE DETAILS: Nexus Humans DP-300T00: Administering Microsoft Azure SQL Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-300T00: Administering Microsoft Azure SQL Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DP-300T00 Administering Microsoft Azure SQL Solutions
Delivered Online5 days, Jun 17th, 13:00 + 3 more
£2380

Educators matching "Firewall"

Show all 10
Leith Victoria Aac

leith victoria aac

5.0(8)

Edinburgh

We receive, collect and store any information you enter on our website or provide us in any other way. In addition, we collect e-mail address. We may use software tools to measure and collect session information, including page response times, length of visits to certain pages, page interaction information, and methods used to browse away from the page. How we collect information? We collect personal information you give us such as your name, address and email address. Why we collect such personal information? We collect Personal Information for the following purposes: 1. To comply with any applicable laws and regulations. How we store, use, share and disclose our site visitors' personal information? Our web site is hosted on the Wix.com platform. Your data may be stored through Wix.com’s data storage, databases and the general Wix.com applications. They store your data on secure servers behind a firewall. How we communicate with our site visitors? We communicate with you through replying to your emails. How we use cookies and other tracking tools? It's important to note that third-party services, such as Google Analytics or other applications offered through the Wix App Market, placing cookies or utilizing other tracking technologies through Wix´s services, may have their own policies regarding how they collect and store information. As these are external services, such practices are not covered by the Wix Privacy Policy. How can site visitors' withdraw their consent? If you don’t want us to process your data anymore, please contact us at: douglas.lvaac.hotmail.co.uk. Privacy policy updates We reserve the right to modify this privacy policy at any time, so please review it frequently. Changes and clarifications will take effect immediately upon their posting on the website. If we make material changes to this policy, we will notify you here that it has been updated, so that you are aware of what information we collect, how we use it, and under what circumstances, if any, we use and/or disclose it.

The Quality Assurance Agency For Higher Education

the quality assurance agency for higher education

0.0(3)

Gloucester

The Quality Assurance Agency for Higher Education (QAA) is an independent charity working to benefit students and higher education, and one of the world’s experts in quality assurance. We are trusted by higher education providers and regulatory bodies to maintain and enhance quality and standards. We work with governments, agencies and institutions globally to benefit UK higher education and its international reputation. In England, we have two distinct roles, which we keep separate through an ‘ethical barrier’ or firewall. A ring-fenced team fulfils our role as the Designated Quality Body in England, providing reviews and advice to the regulator, the Office for Students (OfS). Separately, we provide services and advice to our member institutions in England, including support with quality enhancement activities. We do not provide any guidance to institutions in England on how to meet the regulator’s requirements. In Scotland, Wales and Northern Ireland, there is no such separation of roles, and our quality enhancement and membership work is provided in concert with, and informed by, our quality assurance activities. We work closely with all higher education providers and the respective funders and regulators, in line with the policy and regulatory approach of each nation. Our UK-wide responsibilities include being the regulator of the Access to HE Diploma, which transforms lives by offering students from non-traditional backgrounds access to higher education. We also work internationally on behalf of our members and the wider UK higher education sector. We now welcome international members as well as those from the UK.

ssg solutions

ssg solutions

SSG Solutions (P) Ltd., is a company based in Hyderabad, the capital city of the State of Andhra Pradesh offering software solutions to the customers with high quality software products. Started in April, 1996 as a regional distributor for Dr. Solomon’s range of products we have established our name in the market as anti virus experts. We are specialized in providing solutions in the areas of Antivirus, Antispam, IPS, Data encryption, Data Recovery,DLP, Data Backup, Network Security and monitoring. Depending on organization needs and their future growth we offer the solutions using the best fit from the products from software houses like McAfee Security, Symantec,Trend Micro, Fortinet, Sonicwall, Watchguard, Websense, Stellar, Girsoft, PGP, Ironport, Bluecoat, Computer Associates, Microsoft, Oracle, Autodesk, Adobe etc. Our endeavour has been to engage ourselves in commercial business services to render satisfactory services to the customers. Service Overview Our focus is mainly to offer software solutions to the customers for their networking needs and data security requirements. Our clientele includes all the public sector units, major corporate sector units, Defence organizations, Banks and the Government institutions in this region. What we offer ANTIVIRUS - MCAFEE, SYMANTEC, TRENDMICRO,F-Secure,QUICK HEAL SEQRITE ETC. ANTISPAM - MCAFEE, SYMANTEC, TRENDMICRO, BARRACUDA, WEBSENSE CLOUD SECURITY - MCAFEE SKYHIGH, SYMANTEC CASB SOLUTIONS ENCRYPTION - CHECKPOINT, PGP(SYMANTEC), MCAFEE WEB SECURITY - GFI, WEBSENSE, MCAFEE, SYMANTEC, TRENDMICRO, BARRACUDA, BLUECOAT DATA LOSS PREVENTION - MCAFEE, TRENDMICRO, WEBSENSE, SYMANTEC FIREWALL - SONICWALL, WATCHGUARD, MCAFEE, CHECKPOINT, FORTINET NETWORK ACCESS CONTROL - FORSCOUT, SYMANTEC SOFTWARE - MICROSOFT, ORACLE, ADOBE, ABBYY, PROPALMS, AUTODESK DATA RECOVERY - STELLAR BACKUP & STORAGE - SYMANTEC, COMPUTER ASSOCIATES, SONICWALL, IBM. SSG Solutions (P) Ltd., All rights reserved.

Schema Therapy Institute

schema therapy institute

1. You can place an Adobe Schema eBook order DIRECTLY from this page -- just click on the Add to Cart button below the product you want to purchase below. 2. All of our products have the identical Schema Inventories and forms included, and are valid for one year from the date of purchase (but can be renewed). All Schema eBooks are available in English only. The Schema eBook is 52 pages long. Click here to see the complete contents of our Schema eBook. 3. If you plan to install the schema inventories in an institutional setting -- with its own internet connection, firewall security, and/or restricted servers -- we strongly encourage you to purchase the new Standard PDF Version of the inventories to avoid any compatibility problems. See Option 5 below. 4. If you are a past customer and your license is expiring, please contact us for renewal discounts on most Adobe products: support@schematherapy.com 5. Click here for help installing Adobe Schema eBooks on an iPad or Android tablet. We do not offer technical support for tablets, but provide extensive self-help instructions. 6. If you would like to be certain that your computer, printer, and network are compatible with the Adobe software and eBook, you can learn more about eBook compatibility and order the Adobe Compatibility Test eBook by clicking here. 7. A few customers each year request a refund on the basis that they cannot install the Schema eBook because it is too difficult for them, or because the process is too time-consuming -- but they are not willing to go through the troubleshooting process. We will not issue full refunds for these reasons unless we are unable to correct the problem. As stated in our licensing agreement, intermediate-level computer experience (or higher) is required to install Adobe eBook products. 8. We strongly recommend that you use a high-quality laser printer with at least 600dpi resolution, so that the schema inventories will print clearly and legibly. You can find information about resolution in the User Guide for your printer. 9. You can only print pages from the Schema eBook to a physical printer. You cannot print all or part of the eBook to a digital file such as a PDF, to a virtual printer, or in any other form.

Barnes Ip Training

barnes ip training

London

We receive, collect and store any information you enter on our website or provide us in any other way. In addition, we collect the Internet protocol (IP) address used to connect your computer to the Internet; login; e-mail address; password; computer and connection information and purchase history. We may use software tools to measure and collect session information, including page response times, length of visits to certain pages, page interaction information, and methods used to browse away from the page. We also collect personally identifiable information (including name, email, password, communications); payment details (including credit card information), comments, feedback, product reviews, recommendations, and personal profile. How do you collect information? When you conduct a transaction on our website, as part of the process, we collect personal information you give us such as your name, address and email address. Your personal information will be used for the specific reasons stated above only. Why do you collect such personal information? We collect such Non-personal and Personal Information for the following purposes: To provide and operate the Services; To provide our Users with ongoing customer assistance and technical support; To be able to contact our Visitors and Users with general or personalized service-related notices and promotional messages; To create aggregated statistical data and other aggregated and/or inferred Non-personal Information, which we or our business partners may use to provide and improve our respective services; To comply with any applicable laws and regulations. How do you store, use, share and disclose your site visitors' personal information? Our company is hosted on the Wix.com platform. Wix.com provides us with the online platform that allows us to sell our products and services to you. Your data may be stored through Wix.com’s data storage, databases and the general Wix.com applications. They store your data on secure servers behind a firewall. All direct payment gateways offered by Wix.com and used by our company adhere to the standards set by PCI-DSS as managed by the PCI Security Standards Council, which is a joint effort of brands like Visa, MasterCard, American Express and Discover. PCI-DSS requirements help ensure the secure handling of credit card information by our store and its service providers. How do you communicate with your site visitors? We may contact you to notify you regarding your account, to troubleshoot problems with your account, to resolve a dispute, to collect fees or monies owed, to poll your opinions through surveys or questionnaires, to send updates about our company, or as otherwise necessary to contact you to enforce any agreement or applicable national laws we may have with you. For these purposes we may contact you via email, telephone, text messages, and postal mail. How do you use cookies and other tracking tools? If you don’t want us to process your data anymore, please contact us at enquiries@barnesiptraining.co.uk or send us mail to: Barnes IP Training, Castle Hill House, 12 Castle Hill, Windsor, Berkshire, SL4 1PD. Privacy policy updates We reserve the right to modify this privacy policy at any time, so please review it frequently. Changes and clarifications will take effect immediately upon their posting on the website. If we make material changes to this policy, we will notify you here that it has been updated, so that you are aware of what information we collect, how we use it, and under what circumstances, if any, we use and/or disclose it. Questions and your contact information If you would like to: access, correct, amend or delete any personal information we have about you, you are invited to contact us at enquiries@barnesiptraining.co.uk or send us mail to: Barnes IP Training, Castle Hill House, 12 Castle Hill, Windsor, Berkshire, SL4 1PD.