• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1297 Network & Security courses

WordPress, Secure Programming & Web Application Penetration Testing

By Imperial Academy

3 QLS Endorsed Diploma | QLS Hard Copy Certificates Included | 200 CPD Courses | Lifetime Access | Tutor Support

WordPress, Secure Programming & Web Application Penetration Testing
Delivered Online On Demand
£399

Certified TIA-942 Design Consultant (CTDC)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Participants must possess a valid data centre training certificate such as CDCP or any other approved equivalent. Please submit a copy of your certificate for verification upon registration for the CTDC course. Overview After completion of the course the participant will be able to:1. Learn to properly comprehend and apply the ANSI/TIA-942 Standard requirements and guidelines2. Understand the proper intent of the ANSI/TIA-942 Standard to avoid both over- and/or under-investment3. Align the selection of redundancy levels and infrastructure investments to the business requirements.4. Understand the criteria and requirements for a high-availability data centre design and how to effectively establish the data centre from the perspective of the ANSI/TIA-942 Standard5. Understand how the ANSI/TIA-942 Standard relates to various worldwide standards This course, the participant will learn how to design an ANSI/TIA-942 compliant data centre. It will provide a clear understanding of the requirements of the ANSI/TIA-942 Standard and possible implementation variations. INTRODUCTION TO DATA CENTRE FACILITIES * About the ANSI/TIA-942 * Life of the ANSI/TIA-942 Standard * Relation to other standards * Architectural * Electrical * Mechanical * Telecommunication * Areas under scope * High level redundancy definitions * Redundancy options (N, N+1 etc.) * Fault tolerant * Concurrent maintainability * Compartmentalisation * Examples of redundancy levels DATA CENTRE SPACE PLANNING DATA CENTRE TOPOLOGIES RECOMMENDATIONS FOR ENERGY EFFICIENCY ARCHITECTURAL * Site selection * Parking * Multi-tenant building * Building construction * Vapor barrier * Roofing * Floor loading * Raised flooring * Suspended/drop ceiling * Hanging load * Seismic BUILDING SECURITY & SAFETY * Security * CCTV * Staffing * Bullet/ballistic proofing * Lighting * Safety * - Signage BUILDING AND ROOM ACCESS * Security checkpoints * Entry lobby * Doors and windows * Exit corridors * Shipping and receiving areas ROOM/AREA DESIGN REQUIREMENTS * Administrative offices * Security offce * Operations centre * Restroom and break room * UPS/Battery rooms * Generator and fuel storage area * Computer room ELECTRICAL * Utility power * - Substation * - Feed requirements * - Self-generation * HT/HV switch gear * Generator and fuel supply * LT/LV switch gear * - ATS * - Alternatives to ATS * UPS and batteries * PDU * STS * Grounding * Surge protection * EPO * Central power monitoring * Load banks * Testing * Equipment maintenance * - Preventive maintenance * - Facility training programs MECHANICAL * Environmental design * - Temperature and humidity requirements * - Contamination * - Sources * - Clean air * - Pressurisation * - Radio sources * - Vibration * - Water ingress * Water cooled systems * - Heat rejection * - Chilled water system * - Condenser water? * - Make up water * Air cooled systems * HVAC control systems * Plumbing * - Pipe routing * Fire suppression * Water leak detection TELECOMMUNICATIONS * Network topology * Redundancy level design * Media and connectors * Cabling pathways * Detailed cabling design considerations * Administration and labeling * Cable testing * Data centre fabrics EXAM: CERTIFIED TIA-942 DESIGN CONSULTANT * Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Certified TIA-942 Design Consultant (CTDC)
Delivered Online4 days, Aug 28th, 07:00
£2400

Certified Security Leadership Officer (CSLO) - Complete Video Course

4.3(43)

By John Academy

DESCRIPTION: This Certified Security Leadership Officer (CSLO) - Complete Video Course covers everything you need to know about becoming a Certified Security Leadership Officer. In this course, you will learn about security management, risk management, encryption, information security - access control concepts, incident handling and evidence, operations security, and knowing network security. This course will help you to become a Certified Security Leadership Officer. It will give you an essential understanding of current security issues, best practices, and technology. You will be prepared to manage the security component of a business and its information technology security projects. A C)SLO will be able to better manage IT projects in a secure manner by possessing the essential, up-to-date knowledge and skills required to supervise the security component of any information technology project. ASSESSMENT: * At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. * Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. CERTIFICATION: * After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. * Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. WHO IS THIS COURSE FOR? Certified Security Leadership Officer (CSLO) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. REQUIREMENTS Our Certified Security Leadership Officer (CSLO) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. CAREER PATH After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Security Management Security Management FREE 00:58:00 Risk Management Risk Management 00:35:00 Encryption Encryption 00:31:00 Information Security - Access Control Concepts Information Security - Access Control Concepts 00:31:00 Incident Handling and Evidence Incident Handling and Evidence 01:01:00 Operations Security Operations Security 00:48:00 Knowing Network Security Knowing Network Security 01:12:00 Mock Exam Mock Exam- Certified Security Leadership Officer (CSLO) - Complete Video Course 00:20:00 Final Exam Final Exam- Certified Security Leadership Officer (CSLO) - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Security Leadership Officer (CSLO) - Complete Video Course
Delivered Online On Demand
£23

Linux Security and Hardening

5.0(2)

By Studyhub UK

The 'Linux Security and Hardening' course focuses on strengthening the security measures of Linux systems. It covers various aspects of security, including general security practices, physical security, account security, network security, and file system security. Learners will gain valuable knowledge and techniques to enhance the security of Linux environments. LEARNING OUTCOMES: 1. Understand the importance of Linux security and its significance in protecting systems and data. 2. Implement general security best practices, including updates, patches, and system configurations. 3. Secure physical access to Linux servers and prevent unauthorized access. 4. Manage user accounts and permissions effectively to maintain a secure environment. 5. Apply network security measures, including firewalls, to safeguard against external threats. 6. Set up file system security and encryption to protect sensitive data. 7. Explore additional resources for continuous learning and staying up-to-date with Linux security practices. WHY BUY THIS LINUX SECURITY AND HARDENING? 1. Unlimited access to the course for forever 2. Digital Certificate, Transcript, student ID all included in the price 3. Absolutely no hidden fees 4. Directly receive CPD accredited qualifications after course completion 5. Receive one to one assistance on every weekday from professionals 6. Immediately receive the PDF certificate after passing 7. Receive the original copies of your certificate and transcript on the next working day 8. Easily learn the skills and knowledge from the comfort of your home CERTIFICATION After studying the course materials of the Linux Security and Hardening there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. WHO IS THIS COURSE FOR? This Linux Security and Hardening course is ideal for * Students * Recent graduates * Job Seekers * Anyone interested in this topic * People already working in the relevant fields and want to polish their knowledge and skill. PREREQUISITES This Linux Security and Hardening does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Linux Security and Hardening was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. CAREER PATH As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This Linux Security and Hardening is a great way for you to gain multiple skills from the comfort of your home. COURSE CURRICULUM Unit 01: Course Overview and Downloads Course Overview 00:01:00 Unit 02: General Security Section Overview - General Security 00:01:00 Is Linux Secure? 00:02:00 What Makes Linux Secure? 00:08:00 Security Guidelines and Principles 00:08:00 Section Summary - General Security 00:02:00 Unit 03: Physical Security Section Overview - Physical Security 00:01:00 Physical Security Concepts 00:08:00 Single User Mode Security 00:07:00 Single User Mode and Blank Passwords 00:03:00 Securing the Boot Loader 00:07:00 Disk Encryption 00:06:00 Encrypting a New Device, Part I 00:09:00 Encrypting a New Device, Part II 00:04:00 Encrypting an Existing Device 00:01:00 Disabling Control Alt Delete 00:02:00 Section Summary - Physical Security 00:01:00 Unit 04: Account Security Section Overview - Account Security 00:01:00 Intro to PAM 00:05:00 PAM Configuration Example 00:04:00 Password Security 00:08:00 Account Security Demo #1 (UID 0) 00:03:00 Controlling Account Access 00:05:00 Security by Account Type 00:06:00 Account Security Demo #2 00:03:00 Account Security Demo #3 (Sudo) 00:05:00 Unit 05: Network Security Section Overview - Network Security 00:01:00 Network Security, Part I 00:08:00 Network Security, Part II 00:06:00 Securing SSHD, Part I 00:08:00 Securing SSHD, Part II 00:03:00 Linux Firewall Fundamentals 00:08:00 Configuring the Firewall from the Command Line 00:04:00 Firewall Rule Specifications 00:05:00 Example Firewall Rules 00:04:00 Linux Firewall Demonstration 00:10:00 TCP Wrappers, Part I 00:07:00 TCP Wrappers, Part II 00:04:00 Unit 06: File System Security Section Overview - File System Security 00:01:00 File and Directory Permissions, Intro 00:01:00 File and Directory Permissions, Part I 00:11:00 File and Directory Permissions, Part II 00:09:00 Special Modes, Part I 00:08:00 Special Modes, Part II 00:03:00 File Attributes 00:06:00 File Attributes Demo 00:03:00 ACLs 00:09:00 ACLs Demo 00:06:00 Rootkits 00:09:00 Rootkit Hunter Demonstration 00:07:00 Unit 07: Additional Resources Additional Resources 00:05:00 Assignment Assignment - Linux Security and Hardening 00:00:00

Linux Security and Hardening
Delivered Online On Demand
£10.99

Certified Cyber Security Pathway with Career Guarantee

By NuYew Ltd

Accelerate Your Cyber Career: Fast-Track Program with Exams, TOTUM Card & 5-Year Support. Enrol Today! -------------------------------------------------------------------------------- Study method Online Duration 9 months · Self-paced Access to content 5 years Certifications CompTIA A+ CompTIA Network+ CompTIA Security+ CompTIA IT Fundamentals Certification CompTIA CySA+ CompTIA PenTest+ Certificates * Official CompTIA Certification - Free Additional info * Exam(s) / assessment(s) is included in price * Tutor is available to students * TOTUM card included in price * Job guarantee programme is included in this course -------------------------------------------------------------------------------- OVERVIEW Learn the most in-demand digital skills in the world today with the Nuyew Tech Academy With the increase in cyberattacks and the number of new connected devices, the need for skilled cybersecurity professionals is growing at a rapid pace, and cybersecurity professionals must nurture their practical, hands-on skills. If you are looking for employment in cybersecurity, then this programme will provide you with an endorsement of your skills that is respected globally and industry-wide. CERTIFICATIONS COMPTIA A+ COMPTIA NETWORK+ COMPTIA SECURITY+ COMPTIA IT FUNDAMENTALS CERTIFICATION COMPTIA CYSA+ COMPTIA PENTEST+ Awarded by CompTIA -------------------------------------------------------------------------------- DESCRIPTION With a national shortage of Cyber Security Engineers, starting salaries of up to £25,000 per annum (average UK Salary £72,500) and amazing future employed and self-employed career prospects, take the next step today with our Fast Track Cyber Security Programme. What you can expect from our Fast Track Programme: * World Class Education * Energetic and unlimited 24/7 Student Support * Real, tangible Career Outcomes * 5 Years Career Support What our programme includes: Industry Recognised Qualifications CompTIA ITF+ (IT Fundamentals) CompTIA A+ CompTIA Network+ CompTIA Security+ CompTIA CySA+ OR CompTIA PenTest+ Exams Includes all Exams and Unlimited Re-Sits 5 Years Career Support Guarantee As part of our unique Support Guarantee, our Career Support Team will assist you with: * CV writing * Expert careers advice * Interview preparation * Identifying and applying for the best opportunities in your area As a student in the Nuyew Tech Academy you will also be given exclusive access to our AdvancedCareer Skills Academy which includes advanced courses on Employability, CV Preparation, Interview Skills and Technique and everything else you need to get ready for your new Career. WHO IS THIS COURSE FOR? This course is open to anyone interested in pursuing a Career in Cyber Security. Our Foundation Level provides the flexibility for us to accommodate students with any level of previous knowledge and experience. REQUIREMENTS This course is open to all and has no pre-requisites All you need is a passion for technology and a strong desire to succeed. CAREER PATH Our programme is designed to enable you to achieve an Entry Level/Helpdesk role during training (£18k-£24K) ensuring that you also have the vital work experience required to enter the Tech Industry at a higher level (Av Salary £72.5K). Our Career Support Guarantee gives you exclusive access to our dedicated Career Support Team and Advanced Career Skills Academy for 5 Years following Graduation. -------------------------------------------------------------------------------- CERTIFICATES OFFICIAL COMPTIA CERTIFICATION Hard copy certificate - Included We provide Official CompTIA Certificates for all courses included (ITF+, A+(2), Network+, Security+, CySA+ or PenTest+.

Certified Cyber Security Pathway with Career Guarantee
Delivered Online On Demand
£3196

Palo Alto Firewall V9 & V10 (A to Z) Training Course

4.8(8)

By Skill Up

Venture into the realms of Palo Alto Firewall V9 & V10 with this comprehensive training course, guiding you through its many facets for a secure online presence.

Palo Alto Firewall V9 & V10 (A to Z) Training Course
Delivered Online On Demand
£25

CNSE-AWS Check Point Network Security Expert for AWS

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Cloud Architects, Security Experts, and Network Administrators requiring in depth knowledge on CloudGuard Network Security products. Overview Discuss AWS Platform Components and their relationship to Check Point CloudGuard Network Security. Explain how to maintain a secure, efficient, and stable cloud environment. Describe the components and constraints of a hub and spoke security environment. Describe the function of the Cloud Management Extension. Explain the purpose of identity and access controls and constraints in different cloud platforms. Explain the steps required to configure Identity and Access controls in AWS. Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature. Explain how to design and configure Cloud Adaptive Policies. Discuss the purpose and function of Data Center Objects. Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployments. Explain how CSP templates can be used for maintenance tasks in the cloud environment. Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them. Discuss Scaling Solutions and Options for Cloud Environments. Explain the Scaling Options in AWS. Describe the workflow for configuring scaling solutions in AWS. Discuss how ClusterXL operates and what elements work together to permit traffic failover. Explain how ClusterXL functions differently in a Cloud Environment. Describe how clusters are created and function in AWS. Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved. Explain the nature of a 'Greenfield' deployment, the advantages of it, and the constraints involved. Describe the components and constraint involved in deploying a Disaster Recovery Site in the cloud. Discuss the steps required for troubleshooting automation in AWS. Explain the steps required for troubleshooting Scaling Solution issues in AWS. Describe the steps required for troubleshooting clusters in AWS. Learn advanced concepts and develop skills needed to design and administer CloudGuard Network Security Environments. COURSE OUTLINE * Create an SSH Key Pair. * Create a VPC. * Deploy an SMS. * Connect to SmartConsole. * Review the IAM Role. * Configure the Cloud Management Extension. * Configure the Access Control Policy. * Create the AWS Data Center Object. * Create Access Control Policy with a Data Center Object. * Create the AWS VPC Spokes. * Deploy the Web Servers into the Spoke VPCs. * Create the AWS Auto Scale Deployment. * Create the External and Internal Load Balancers. * Create the VPC for the Auto Scale Deployment. * Create the VPC Peers. * Deploy the CloudGuard Cluster Template. * Create the AWS VPN Gateway. * Configure the Tunnel Interfaces. * Configure the Static Routes. * Configure the Network Objects. * Configure the VPN Community. * Configure the Security Policy. * Test the Traffic. * Troubleshoot the CloudGuard Controller. * Debug the CloudGuard Controller. * Debug the Cloud Management Extension ADDITIONAL COURSE DETAILS: Nexus Humans CNSE-AWS Check Point Network Security Expert for AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNSE-AWS Check Point Network Security Expert for AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CNSE-AWS Check Point Network Security Expert for AWS
Delivered on-request, onlineDelivered Online
Price on Enquiry

Network design

5.0(3)

By Systems & Network Training

NETWORK DESIGN TRAINING COURSE DESCRIPTION This course provides you with the knowledge needed to perform the design of a network infrastructure that supports desired network solutions to achieve effective performance, scalability, and availability. We recognise that the role of design does not normally require hands on skills but hands on sessions are used to reinforce the theory not to teach configuration or troubleshooting. WHAT WILL YOU LEARN * Create HA enterprise network designs. * Develop optimum Layer 3 designs. * Design effective modern WAN and data center networks. * Develop effective migration approaches to IPv6. * Create effective network security designs. NETWORK DESIGN TRAINING COURSE DETAILS * Who will benefit: Anyone involved with network design. * Prerequisites: TCP/IP Foundation for engineers * Duration 5 days NETWORK DESIGN TRAINING COURSE CONTENTS PART I RELIABLE, RESILIENT ENTERPRISE L2/3 NETWORK DESIGN Optimal Enterprise Campus Design: Enterprise campus design principles, hierarchy, modularity, flexibility, resiliency. EIGRP design: EIGRP Design, Should you use EIGRP? OSPF design: OSPF scalability designs, OSPF area design, OSPF Full-Mesh Design, OSPF Hub-and-Spoke Design, OSPF convergence design and optimization techniques. IS-IS Design: The protocol, IS-IS hierarchical architecture, IS-IS vs OSPF, IS-IS Deep Dive, IS-IS Design Considerations. BGP design: BGP overview, Designing Scalable iBGP Networks, BGP Route Reflector Design, Enhancing the Design of BGP Policies with BGP Communities, Case Study: Designing Enterprise wide BGP Policies Using BGP Communities, BGP Load-Sharing Design. PART II ENTERPRISE IPV6 DESIGN CONSIDERATIONS IPv6 Design Considerations in the Enterprise: IPv6 Deployment and Design Considerations, Considerations for Migration to IPv6 Design, IPv6 Transition Mechanisms, Final Thoughts on IPv6 Transition Mechanisms. Challenges of the Transition to IPv6: IPv6 Services, Link Layer Security Considerations. PART III MODERN ENTERPRISE WIDE-AREA NETWORKS DESIGN Service Provider-Managed VPNs: Choosing Your WAN Connection, Layer 3 MPLS VPNs, Case Study: MPLS VPN Routing Propagation, Layer 2 MPLS VPN Services. Enterprise-Managed WANs: Enterprise-Managed VPNs, GRE, Multipoint GRE, Point-to-Point and Multipoint GRE, IPsec, IPsec and dynamic VTI, DMVPN, Case Study: EIGRP DMVPN, DMVPN and Redundancy, Case Study: MPLS/VPN over GRE/DMVPN, SSL VPN. Enterprise WAN Resiliency Design: WAN Remote-Site Overview, MPLS L3 WAN Design Models, Common L2 WAN Design Models, Common VPN WAN Design Models, 3G/4G VPN Design Models, Remote Site Using Local Internet, Remote-Site LAN, Case Study: Redundancy and Connectivity, NGWAN, SDWAN, and IWAN Solution Overview, IWAN Design Overview, Enterprise WAN and Access Management. PART IV ENTERPRISE DATA CENTER DESIGNS Multitier Data Center Designs: Case Study: Small Data Centers (Connecting Servers to an Enterprise LAN), Case Study: Two-Tier Data Center Network Architecture, Case Study: Three-Tier Data Center Network Architecture. Trends and Techniques to Design Modern Data Centers: The Need for a New Network Architecture, Limitations of Current Networking Technology, Modern Data Center Design Techniques and Architectures, Multitenant Data Center. SDN: SDN characteristics, How SDN addresses current Networking Limitations, SDN Architecture Components, SDN Network Virtualization overlays. Data Center Connections: Data Center Traffic Flows, The Need for DCI, IP Address Mobility, Case Study: Dark Fiber DCI, Pseudowire DCI. PART V DESIGN QOS FOR OPTIMIZED USER EXPERIENCE QoS Overview: QoS Overview, IntServ versus DiffServ, Classification and Marking, Policers and Shapers, Policing Tools: Single-Rate Three-Color Marker, Policing Tools: TwoRate Three-Color Marker, Queuing Tools, Dropping Tools. QoS design principles and best practices: QoS overview, classification and marking design principles, policing and remarking design principles, queuing design principles, dropping design principles, Per-Hop behavior queue design principles, RFC 4594 QoS Recommendation, QoS Strategy Models. Campus QoS, WAN QoS, Data Center QoS. MPLS VPN QoS Design: The Need for QoS in MPLS VPN, Layer 2 Private WAN QoS Administration, Fully Meshed MPLS VPN QoS Administration, MPLS DiffServ Tunneling Modes, Sample MPLS VPN QoS Roles. IPsec VPN QoS Design: The Need for QoS in IPsec VPN, VPN Use Cases and Their QoS Models, IPsec Refresher, Encryption and Classification: Order of Operations, MTU Considerations, DMVPN QoS Considerations. PART VI IP MULTICAST DESIGN Enterprise IP Multicast Design: How Does IP Multicast Work? Multicast Protocols, Multicast Forwarding and RPF Check, Multicast Protocol Basics, PIM-SM Overview, Multicast Routing Table, Basic SSM Concepts, Bidirectional PIM. RP discovery, Anycast RP Features, MSDP. PART VII DESIGNING OPTIMUM ENTERPRISE NETWORK SECURITY Designing Security Services and Infrastructure Protection Network Security Zoning, Designing Infrastructure Protection. Designing firewall & IPS solutions: Firewall architectures, virtualized firewalls. Case Study: Application Tier separation, Case Study: Firewalls in a Data Center, Case Study: Firewall High Availability, IPS Architectures, Case Study: Secure Campus Edge Design (Internet and Extranet Connectivity). IP Multicast Security: Multicast Security Challenges, Multicast Network Security Considerations. Designing Network Access Control Solutions: IEEE 802.1X, EAP, 802.1X supplicants, 802.1X phased deployment, Case Study: Authorization Options. PART VIII DESIGN SCENARIOS Design Case Studies: 1: Enterprise Connectivity, 2: Enterprise BGP with Internet Connectivity, 3: IPv6, 4: Data Center Connectivity, 5: Resilient Enterprise WAN, 6: Secure Enterprise Network, 7: QoS in the Enterprise Network.

Network design
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Certified Information Systems Auditor (CISA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security. Overview Upon successful completion of this course, students will be able to: - implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices. - evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices. - evaluate information systems acquisition, development, and implementation. - evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained. - define the protection policies used to promote the confidentiality, integrity, and availability of information assets. In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives. 1 - THE PROCESS OF AUDITING INFORMATION SYSTEMS * ISACA Information Systems Auditing Standards and Guidelines * Fundamental Business Processes * Develop and Implement an Information Systems Audit Strategy * Plan an Audit * Conduct an Audit * The Evidence Life Cycle * Communicate Issues, Risks, and Audit Results * Support the Implementation of Risk Management and Control Practices 2 - IT GOVERNANCE AND MANAGEMENT * Evaluate the Effectiveness of IT Governance * Evaluate the IT Organizational Structure and HR Management * Evaluate the IT Strategy and Direction * Evaluate IT Policies, Standards, and Procedures * Evaluate the Effectiveness of Quality Management Systems * Evaluate IT Management and Monitoring of Controls * IT Resource Investment, Use, and Allocation Practices * Evaluate IT Contracting Strategies and Policies * Evaluate Risk Management Practices * Performance Monitoring and Assurance Practices * Evaluate the Organizations Business Continuity Plan 3 - INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT, AND IMPLEMENTATION * Evaluate the Business Case for Change * Evaluate Project Management Frameworks and Governance Practices * Development Life Cycle Management * Perform Periodic Project Reviews * Evaluate Control Mechanisms for Systems * Evaluate Development and Testing Processes * Evaluate Implementation Readiness * Evaluate a System Migration * Perform a Post-Implementation System Review 4 - INFORMATION SYSTEMS OPERATIONS, MAINTENANCE, AND SUPPORT * Perform Periodic System Reviews * Evaluate Service Level Management Practices * Evaluate Third-Party Management Practices * Evaluate Operations and End User Management Practices * Evaluate the Maintenance Process * Evaluate Data Administration Practices * Evaluate the Use of Capacity and Performance Monitoring Methods * Evaluate Change, Configuration, and Release Management Practices * Evaluate Problem and Incident Management Practices * Evaluate the Adequacy of Backup and Restore Provisions 5 - PROTECTION OF INFORMATION ASSETS * Information Security Design * Encryption Basics * Evaluate the Functionality of the IT Infrastructure * Evaluate Network Infrastructure Security * Evaluate the Design, Implementation, and Monitoring of Logical Access Controls * Risks and Controls of Virtualization * Evaluate the Design, Implementation, and Monitoring of Data Classification Process * Evaluate the Design, Implementation, and Monitoring of Physical Access Controls * Evaluate the Design, Implementation, and Monitoring of Environmental Controls

Certified Information Systems Auditor (CISA)
Delivered Online6 days, Aug 12th, 13:00 + 1 more
£3250

CompTIA Network+ N10-007

4.3(43)

By John Academy

DESCRIPTION: If you are seeking a career as a network technician or want to pass the CompTIA Network+ N10-007 exam, then welcome to CompTIA Network+ N10-007. Through the course, you will earn about the five domains for the Network+ N10-007, such as networking concepts, infrastructure, network operations, network security and network troubleshooting and tools in an approachable manner. By the time you complete this course, your skills will develop, and you can confidently work on enterprise production networks as a network technician. In addition to that, you will be able to describe computer networks, their functions and components. This course can be extremely beneficial if you are interested in a networking career and enhance your skills concerning networking field. ASSESSMENT & CERTIFICATION To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. * Hardcopy Certificate by post - £19 * Soft copy PDF via email - £10 REQUIREMENTS Our CompTIA Network+ Certification - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. CAREER PATH After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Module 01 Networking Fundamentals FREE 00:45:00 Network Models and Topologies 00:23:00 Network Components and Services 00:04:00 Becoming a Network Professional 00:14:00 Module 02 Introducing Networking Standards 00:08:00 Open Interconnection Systems Reference Model 00:12:00 IEEE Network Standards 00:19:00 Module 03 Fundamentals of Network Transmission 00:19:00 Copper Media 00:16:00 Optical Media 00:08:00 Specialty Cables and Connectors 00:03:00 LAN Infrastructure Wiring 00:06:00 Wireless Networking 00:50:00 Module 04 Understanding TCP IP 00:39:00 Working with IPv4 Addresses 01:27:00 Working With IPv6 Addresses 00:26:00 Assigning Addresses with DHCP 00:14:00 Resolving Names Using DNS 00:19:00 Module 05 Introduction to Network Devices 00:08:00 Physical Layer Devices 00:10:00 Data Link Layer Devices 00:38:00 Network Layer Devices 00:42:00 Additional Network Devices 00:06:00 Module 06 WAN Fundamentals 00:07:00 Wired WAN Connections 00:20:00 Wireless WAN Connections 00:08:00 Fiber WAN Connections 00:13:00 Module 07 Introduction to Remote Networking 00:22:00 Authenticating Remote Connections 00:16:00 Understanding Virtual Private Networks 00:26:00 Module 08 Network Security Fundamentals 00:34:00 Planning for Network Security 00:44:00 Identifying Threats and Vulnerabilities 00:39:00 Protecting the Network 00:50:00 Module 09 Maintaining Business Continuity 00:24:00 Virtualization and Cloud Computing 01:00:00 Unified Communications 00:07:00 Module 10 Network Safety Fundamentals 00:10:00 Network Operations 00:04:00 Maintaining and Monitoring Networks 00:27:00 Troubleshooting Methodology 00:17:00 Troubleshooting Tools 00:19:00 Troubleshooting Network Issues 00:16:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

CompTIA Network+ N10-007
Delivered Online On Demand
£23
1...56789...130