• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1837 Courses in Southampton

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

PENETRATION TESTING TRAINING COURSE DESCRIPTION An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. WHAT WILL YOU LEARN * Perform penetration tests. * Explain the technical workings of various penetration tests. * Produce reports on results of penetration tests. * Defend against hackers. PENETRATION TESTING TRAINING COURSE DETAILS * Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. * Prerequisites: IP Security IP VPNs * Duration 5 days PENETRATION TESTING TRAINING COURSE CONTENTS * Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. * Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering * Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. * Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. * Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. * Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. * Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. * Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. * DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. * SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. * Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. * Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. * Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Advanced Junos Security

5.0(3)

By Systems & Network Training

ADVANCED JUNOS SECURITY TRAINING COURSE DESCRIPTION This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. WHAT WILL YOU LEARN * Demonstrate the understanding of integrated user firewall. * Implement next generation Layer 2 security features. * Implement virtual routing instances in a security setting. * Utilize Junos tools for troubleshooting Junos security implementations. * Implement IPS policy. ADVANCED JUNOS SECURITY TRAINING COURSE DETAILS * Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. * Prerequisites: Intro to the Junos Operating System * Duration 5 days ADVANCED JUNOS SECURITY TRAINING COURSE CONTENTS * Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security * Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing * AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures * AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure * Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director * Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware * Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo * Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM * Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy * SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN * Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall * Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques * Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Objective-C programming

5.0(3)

By Systems & Network Training

OBJECTIVE-C PROGRAMMING TRAINING COURSE DESCRIPTION A hands on introduction that will allow you to master Objective-C and start using it to write powerful native applications for even the newest Macs and iOS devices! Using The step-by-step approach, will let you get comfortable with Objective-C's unique capabilities and Apple's Xcode 5 development environment. Make the most of Objective-C objects and messaging. Work effectively with design patterns, collections, blocks, foundation classes, threading, Git and a whole lot more. Every session builds on what you've already learned, giving a rock-solid foundation for real-world success! WHAT WILL YOU LEARN * Use Xcode 5. * Declare classes, instance variables, properties, methods, and actions. * Use arrays, dictionaries, and sets. * Expand and extend classes with protocols, delegates, categories, and extensions. * Use Apple's powerful classes and frameworks. OBJECTIVE-C PROGRAMMING TRAINING COURSE DETAILS * Who will benefit: Developers wanting to learn Objective-C. * Prerequisites: Software development fundamentals. * Duration 5 days OBJECTIVE-C PROGRAMMING TRAINING COURSE CONTENTS * PART 1: GETTING STARTED WITH OBJECTIVE-C * The Developer Program: Objective-C, enrolling as an Apple Developer, setting up the development environment, Xcode. Your first project. * OO programming with Objective-C: OO projects, Frameworks, classes and instances, encapsulation, accessors, Inheritance. * OO features in Objective-C: Messages, methods, working with id, nesting messages, method signatures and parameters. allocating and initializing objects. Using Xcode: Xcode, source code control, git and Xcode, Using a Remote Repository. * Compiler Directives: Projects, Compiler Directives, Prefix headers, main.m, .h files. * PART 2: OBJECTIVE-C BASICS * Messaging in a Testbed App: Setting Up the Testbed Apps, Adding a Text Field and Connecting It to Your Code, Sending a Message to the Text Field, Reviewing the Message Syntax. * Declaring a Class in an Interface File: Context, Creating an Instance Variable with id, What Happens When Execution Stops, dynamic binding, Creating an Instance Variable for with the Class Name and with a Superclass Name, instance variable visibility. * Properties in an Interface File: Interface Variables vs Properties, Declared Properties, Using Attributes. Implementing Properties. @synthesize, @dynamic. * Methods in an Interface File: Methods in a Class, class and instance methods, Method declaration, returning complex data structures from Methods. * Actions in an Interface File: Actions, Actions in OS X and iOS, disconnecting actions. * Routing messages with selectors: Receiver and selector objects in messages, Objective-C Runtime, SEL and @selector (), performSelector, NSInvocation, testing whether an Instance can respond to a selector. * Building on the Foundation: The Foundation Framework, Foundation Classes, Foundation Paradigms and Policies; Mutability, class clusters, notifications. * Defining a Class in Implementation Files: Projects, dynamic typing, creating a new App, implementing a method, expanding Classses with init Methods. * Organizing Data with Collections: Collecting Objects, Property Lists, Runtime, comparing the Collection Classes, Creating a Collection, Objective-C Literal Syntax, Enumerating collections, Testing Membership in a Collection, Accessing an Object in a Collection. * Managing Memory and Runtime Objects: Managing objects in memory, managing reference counts manually and with ARC, variable qualifiers, variable autorelease. * PART 3: EXPANDING AND EXTENDING CLASSES * Protocols and Delegates: Subclassing, Protocols, Delegates, Looking Deeper Inside Protocols. * Categories and Extensions: Comparing categories and protocols, categories vs subclasses, working with categories, class extensions, informal protocols. * Associative References and Fast Enumeration: Objective-C 2.0 Time-Saving Features, Extending Classes by Adding Instance Variables (Sort of), Using Fast Enumeration. * Blocks: Revisiting Blocks, Callbacks, Blocks, Exploring Blocks in Cocoa, Cocoa Blocks and Memory. * PART 4: BEYOND THE BASICS * Handling Exceptions and Errors: Exception and Error classes: NSException, NSError, Identifying exceptions, throwing exceptions, catching exceptions. * Queues and Threading: Getting Started with Concurrency, Introducing Queues, Dispatch Sources, Using Dispatch Queues. * Working with the Debugger: Logging Information, Console Logs, NSLog, Smart Breakpoints, enhancing breakpoints with messages. * Using Xcode Debug Gauges for Analysis: Debug Gauges, Monitoing CPU and memory utilization, monitoring energy, Using Instruments. * PART 5: OPTIONAL TOPICS * C Syntax Summary: Data Types, Control Structures. * Apps, Packages, and Bundles: Project Bundles, lproj Files, Asset Catalogs, plist Files, Precompiled Header Files (.pch). * Archiving and Packaging Apps for Development and Testing: Archiving.

Objective-C programming
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Complete Visual BASIC

5.0(3)

By Systems & Network Training

COMPLETE VISUAL BASIC TRAINING COURSE DESCRIPTION A hands-on introduction to programming in Visual BASIC V6. WHAT WILL YOU LEARN * Build Visual BASIC applications. * Build simple components. * Debug Visual BASIC programs. * Examine existing code and determine its function. COMPLETE VISUAL BASIC TRAINING COURSE DETAILS * Who will benefit: Anyone wishing to program in Visual BASIC. * Prerequisites: None although experience in another high level language would be useful. * Duration 5 days COMPLETE VISUAL BASIC TRAINING COURSE CONTENTS * Application development using VB VB features. VB editions, VB terminology. Working in the Development Environment. Event-Driven Programming. Creating a program in VB. Project and executable files. VB reference materials. * Visual Basic fundamentals Objects. Controlling objects. Introduction to forms. Introduction to controls. Basic controls. * Working with code and forms Modules. Working with code. Interacting with the user. Working with code statements. Managing forms. * Variables and procedures Introduction to variables and constants. Working with Procedures and Functions. * Controlling program execution Common VB functions. Comparison and relational operators. Conditional structures. Looping structures. * Debugging Error types. Debugging logic errors in VB. * Working with controls Control types. Standard controls. Advanced standard controls. ActiveX controls. Insertable controls. * Data access using the ADO data control Overview of ActiveX Data Objects. VB data access features. Relational database concepts. Using the ADO data Control to access data. SQL. Manipulating data. Using the data form wizard. * Input validation Field-Level validation. The masked edit control. Form-Level validation. Form events used when validating data. * Error trapping Trapping run time errors. Error handling overview. Enabling an error trap. Errors and the calling chain. In line error handling. * Enhancing the User Interface Menus. Status bars. Toolbars. * Drag and Drop Overview of Drag and Drop. Mouse events Drag and Drop basics. * More about controls Using control arrays. Using the controls collection. Working with object variables. Collections. * Finishing touches User Interface design principles. Distributing an application. Creating a default project.

Complete Visual BASIC
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Complete COBOL programming

5.0(3)

By Systems & Network Training

COBOL TRAINING COURSE DESCRIPTION A hands on training course providing an introduction to COBOL. WHAT WILL YOU LEARN * Write COBOL programs * Debug COBOL programs * Examine existing code and determine its function. COBOL TRAINING COURSE DETAILS * Who will benefit: Programmers working with COBOL. * Prerequisites: None although experience in another high level language would be useful. A 10 day version of this course would be more applicable for those new to programming. * Duration 5 days COBOL TRAINING COURSE CONTENTS * Introduction to COBOL Compilation, linkage editor. Compile errors, compiler options. Divisions, syntax and format, COBOL character set, program structure. * COBOL statement structure COBOL words, format of statements. * Divisions Identification entries, Environment entries, Data division: FD, record descriptions, hierarchy and level numbers, description-string entry. * File and Working-Storage Sections Literals, figurative constants, redefines clause, data representation, Usage clause, synchronization, sign clause. * Procedure Division File status codes; Open, Read, Write, Close, Stop, Goback; Accept, display; Move, Justified, data name qualification, reference modification. * Perform statement Out-of-line, With test ... Until, ... Times, in-line statement; Go to statement. * Program design Design techniques, design considerations, procedure names, program structure. * Printing Printed output, Write, advancing option, editing characters; Initialize. * Condition testing Conditional statements: IF, class, sign and relation conditions, condition-name conditionals, Set, compound conditions, logical operators. Evaluate, Continue. * Arithmetic Rounded option, On Size Error option, Add, Subtract, Multiply, Divide, Compute. * Non-sequential files File access modes, Select. Indexed and relative files. Open, Close, creating / reading sequential access files, Write, Read, Invalid key clause, reading, writing / updating Random access files, Rewrite, Delete, Start. * Declarative routines Clauses. * Subroutines Call, Using clause - calling program/called program, Linkage Section, returning control. * Table handling Subscripted tables: One/two/three dimensional tables, Perform, variable length tables. Indexed tables: Set, using an index; Search. Copy code: Copy, Suppress, Replacing. * Data Manipulation Inspect, String, Unstring. COBOL/370 LE/370 and Intrinsic Functions.

Complete COBOL programming
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Definitive Microsoft Lync for engineers

5.0(3)

By Systems & Network Training

MICROSOFT LYNC TRAINING COURSE DESCRIPTION This course teaches IT staff how to plan, design, deploy, configure, and administer a Microsoft Lync Server solution. The course emphasizes Lync Server Enterprise Unified Communications features focussing particularly on coexisting with and migrating from legacy communication services. The labs in this course create a solution that includes IM and Presence, Conferencing, and Persistent Chat. This course helps prepare for Exam 70-336. WHAT WILL YOU LEARN * Describe the Lync Server architecture. * Install and deploy Lync Server. * Use Lync Server management interfaces. * Deploy and manage clients. * Manage and administer dial-in conferencing. * Design audio and video for web conferencing. * Plan for instant message and presence Federation. * Deploy and configure persistent chat in Lync. * Configure archiving and monitoring services. * Troubleshoot Lync Server. * Describe the required daily, weekly, and monthly maintenance tasks. * Use SIP commands and analyze SIP logs. * Configure high availability features in Lync. * Design load balancing in Lync Server. * Backup and restore Lync Server data. MICROSOFT LYNC TRAINING COURSE DETAILS * Who will benefit: Technical staff working with Microsoft Lync. * Prerequisites: Supporting Windows 2008 or 2012. * Duration 5 days MICROSOFT LYNC TRAINING COURSE CONTENTS * Microsoft Lync Server architecture Lync Server architecture, Lync core capabilities, Lync design process, assessing infrastructure requirements and updating the design, planning for all Microsoft solutions framework phases. * Designing a Lync Server topology Infrastructure requirements for Lync Server, using the planning tool, using topology builder, server infrastructure, documentation. Hands on Environment preparation and Lync Server pools. * Users and rights in Microsoft Lync Server Managing Lync Server, role based access control. Hands on Using the management shell, configuring role-based access control. * Client/device deployment and management Deploy and manage clients, prepare for device deployment, IP phones. Hands on Clients. * Conferencing in Lync Server Introduction to conferencing in Lync Server, designing for audio\video and web conferencing, dial-in conferencing in Lync Server, managing and administering conferencing. Hands on Conferencing in Microsoft Lync. * Designing and deploying external access Conferencing and external capabilities of Lync Server, planning for IM and presence federation, designing edge services. Hands on Deploying Edge Server and Configuring Remote Access, Validating the Edge Server. * Deploying Lync Server persistent chat Overview of persistent chat architecture in Lync Server, designing persistent chat, deploying and persistent chat. Hands on persistent chat server. * Monitoring and archiving The archiving service, the monitoring service, configuring archiving and monitoring. Hands on Archiving and monitoring in Lync Server. * Administration and maintenance of Lync Lync Server troubleshooting tools, Lync Server operational tasks, Lync Server troubleshooting techniques. Hands on Lync administration tools, centralized logging service, analysing Lync Server logs and traces. * High Availability in Lync Server High availability in Lync Server, configuring high availability in Lync Server, planning for load balancing, designing load balancing. Hands on Configuring database mirroring, experiencing a scheduled SQL Server outage, experiencing an unscheduled SQL Server outage. * Disaster recovery in Lync Server Disaster recovery in Lync Server, tools for backing up and restoring Lync Server, critical Lync Server data to back up and restore, critical data to export and import, designing branch site resiliency. Hands on Configure pool pairing, experiencing a pool failure or outage. * Planning a migration to Lync Server Coexistence and migration, migration steps, planning for clients and devices. Designing a client migration and device migration strategy. Hands on Creating a migration plan, documenting the migration phases.

Definitive Microsoft Lync for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Object Oriented Analysis & Design

5.0(3)

By Systems & Network Training

OOAD TRAINING COURSE DESCRIPTION A workshop course providing thorough practical knowledge of object oriented analysis and design methods. WHAT WILL YOU LEARN * Perform Systems Analysis with Object Oriented methods. * Identify key classes and objects. * Expand and refine OO problem domain models. * Design Class hierarchies using inheritance and polymorphism. * Design programs with Object Oriented methods. OOAD TRAINING COURSE DETAILS * Who will benefit: System analysts, designers, programmers and project managers. * Prerequisites: It is desirable that delegates have experience of programming in C++/Java or some other OOP language. * Duration 5 days OOAD TRAINING COURSE CONTENTS * What is OO? Classes, objects, messages, encapsulation, associations, inheritance, polymorphism, reusability. * What is Systems Analysis and design? Data flow diagrams, structure diagrams. The OO approach. * OOA The problem domain and object modelling. Identifying classes and objects. Generalisation and inheritance. Defining attributes and methods. * OOD Refining the OOA results. Designing the User Interface. Designing the algorithms and data structures using objects. Designing the methods. * OOP Prototyping. Implementing OOD with OOPs and OOPLs.

Object Oriented Analysis & Design
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4637

Mental Health First Aid

5.0(2)

By Changing Minds Training

Mental Health First Aid
Delivered in-person, on-request, onlineDelivered Online & In-Person in London
£3995

Climate science workshop - Climate Fresk

By The C Collective

Join a Climate Fresk Climate science workshop to learn about the causes and effects of climate change through a fun and collaborative experience.

Climate science workshop - Climate Fresk
Delivered in-person, on-request, onlineDelivered Online & In-Person in London
£1500 to £5000

Biodiversity training - Biodiversity collage workshop

By The C Collective

Join a Biodiversity collage workshop to learn about the biodiversity crisis and how to tackle it.

Biodiversity training - Biodiversity collage workshop
Delivered in-person, on-request, onlineDelivered Online & In-Person in London
£1500 to £5000