• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

23 Operating System courses in Belfast

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Introduction to the Junos Operating System

5.0(3)

By Systems & Network Training

JUNOS OPERATING SYSTEM TRAINING COURSE DESCRIPTION This course provides students with the foundational knowledge required to work with the Junos OS and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Delegates will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 15.1X49. WHAT WILL YOU LEARN * Describe the design architecture of the Junos OS. * Navigate within the Junos CLI and perform tasks within the CLI operational and configuration modes. * Configure and monitor network interfaces. * Navigate within the Junos J-Web interface. * Identify where you might use firewall filters. * Explain basic routing operations and concepts. * Identify key factors in Juniper Networks' security. JUNOS OPERATING SYSTEM TRAINING COURSE DETAILS * Who will benefit: This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. * Prerequisites: TCP/IP foundation for engineers * Duration 3 days JUNOS OPERATING SYSTEM TRAINING COURSE CONTENTS * Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices * User Interface Options-The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode * User Interface Options-The J-Web Interface The J-Web GUI Configuration Lab 1: User Interface Options * Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Lab 2: Initial System Configuration * Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Lab 3: Secondary System Configuration * Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Lab 4: Operational Monitoring and Maintenance * Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups * Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Lab 5: Routing Fundamentals * Routing Policy Routing Policy Overview Case Study: Routing Policy Lab 6: Routing Policy * Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Lab 7: Firewall Filters * Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS Lab 8: Class of Service * JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC * Juniper Security Concepts Security Challenges Juniper's Security Focus * Appendix A: IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration

Introduction to the Junos Operating System
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2367

Supporting Windows 10

5.0(3)

By Systems & Network Training

SUPPORTING WINDOWS 10 COURSE DESCRIPTION This course is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices in a Windows Server domain environment. These skills include understanding of Windows 10 features, how they can be used in an Active Directory environment and how to troubleshoot them. WHAT WILL YOU LEARN * Troubleshoot startup issues and operating system services on a Windows 10 PC. * Troubleshoot issues related to network connectivity. * Troubleshoot client configuration failures and GPO application issues. * Troubleshoot issues related to application installation and operation. * Recover a PC running Windows 10. SUPPORTING WINDOWS 10 COURSE DETAILS * Who will benefit: Anyone supporting users running Windows 10 personal computers within a medium to large enterprise. * Prerequisites: None. * Duration 5 days SUPPORTING WINDOWS 10 COURSE CONTENTS * Implementing a Troubleshooting Methodology Overview of Windows 10, Introduction to the EDST Job Role, Overview of the Troubleshooting Steps & Tools. Hands on Implementing a Troubleshooting Methodology. Hands on Using Troubleshooting Tools for Windows 10. * Troubleshooting Startup Issues Overview of the Windows 10 Startup Recovery Environment, Troubleshooting Startup Settings & Operating System Services Issues, Recovering BitLocker-Protected Drives. Hands on Troubleshooting Startup Issues. Hands on Recovering BitLocker-Encrypted Drives, Creating a New BitLocker Password. * Troubleshooting Hardware and Device Drivers Troubleshooting Device Driver Failures & Physical Failures, Overview of Hardware Troubleshooting, Monitoring Reliability, Configuring the Registry. Hands on Troubleshooting Device Driver Issues, Resolving Hardware Issues, Adding a Missing Device Driver to a Driver Store, Reverting a Problematic Device Driver. Hands on Troubleshooting Hardware Issues, Diagnosing Memory, Troubleshooting and Repairing Failed Disk Redundancy Synchronizing Settings, Accessing Data on a Foreign Volume. * Troubleshooting Remote Computers Using Remote Desktop and Remote Assistance, Remoting with Windows PowerShell Hands on Troubleshooting Remote Computer by using Remote Desktop and Remote Assistance. Hands on Troubleshooting Remote Computer by using Windows PowerShell. * Resolving Network Connectivity Issues Determining Network Settings, Troubleshooting Network Connectivity Issues, Troubleshooting Name Resolution. Hands on Resolving Network Connectivity Issues. Hands onResolving Name Resolution Issues. * Troubleshooting Group Policy Overview of Group Policy Application, Resolving Client Configuration Failures and GPO Application Issues. Hands on Troubleshooting Group Policy Application Issues. Hands on Resolving Group Policy Issues. Hands on Installing and Sharing a Printer. * Troubleshooting User Settings Troubleshooting Sign In Issues, Troubleshooting the Application of User Settings. Hands on Troubleshooting Sign in Problems. Hands on Troubleshooting the Application of User Settings, Resolving Folder Redirection Problem, Resolving Roaming User Profile Problem. * Troubleshooting Remote Connectivity Troubleshooting VPN Connectivity Issues & DirectAccess. Hands on Troubleshooting VPN Connectivity Lab : Configuring and Troubleshooting DirectAccess Configuring and Verifying, DirectAccess Client-Side Settings, Troubleshooting DirectAccess. Troubleshooting Resource Access Within a Domain & File Permissions Issues, Recovering Files Encrypted by EFS, Troubleshooting Printer Access Issues. Lab : Troubleshooting File Access Issues Lab : Troubleshooting Access to Encrypted Files. Hands on Troubleshooting Printer Access Issues * Troubleshooting Resource Access for Non Domain Member Clients Configuring and Troubleshooting Device Registration, Configuring and Troubleshooting Work Folders, Configuring and Troubleshooting OneDrive Access. Hands on Troubleshooting Resource Access for Clients that are not Domain Members. Troubleshooting Device Registration, Work Folders and OneDrive for Business. * Troubleshooting Applications Troubleshooting Desktop App Installation Issues, Desktop Apps, Managing Windows Store Apps, Troubleshooting Access to Company Web Applications. Hands on Troubleshooting Desktop Apps, AppLocker Policy Application & Application Compatibility issue. Hands on Troubleshooting Access to Company Web Applications, Internet Explorer Issue & Microsoft Edge. * Maintaining Windows 10 Managing & Troubleshooting Windows Activation, Troubleshooting Performance, Applying Applications. Hands on Monitoring and Troubleshooting Performance. * Recovering Data and Operating System File Recovery in Windows 10, Recovering an OS. Hands on Recovering Data, Recovering Data from Azure Backup, Recovering Deleted File by Using File History. Hands on Provisioning Computer to Comply with Company Standards, Provision Computer to Comply with Company Standards.

Supporting Windows 10
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

CompTIA A+ bootcamp essentials and electives

5.0(3)

By Systems & Network Training

COMPTIA A+ BOOTCAMP TRAINING COURSE DESCRIPTION This course includes A+ Certification: Systems Hardware and Networking Support Skills and A+ Certification: Operating Systems and Security Support Skills. The course will provide IT "super users" or new support professionals with the fastest route to A+ Certification. Full practical sessions will prepare students for the two A+ Certification exams. Note: Some self-study each evening will be required. WHAT WILL YOU LEARN * Install, configure, and troubleshoot peripheral devices, system components, print devices, wired and wireless LAN links and internet access devices. * Install, configure, and troubleshoot the Microsoft Windows, Linux, and Mac OS PC operating systems plus iOS, Android, and Windows mobile devices. * Perform basic PC maintenance. * Configure access control measures. * Perform basic PC maintenance. COMPTIA A+ BOOTCAMP TRAINING COURSE DETAILS * Who will benefit: Students wishing to take both CompTIA A+ exams. * Prerequisites: PC fundamentals * Duration 5 days NETWORKING MICROSOFT SYSTEMS COURSE CONTENTS * Peripherals and Adapters Motherboard Components, Connection Interfaces, Display Devices, Audio and Multimedia Devices, Removable Storage Devices. * System Components Mass Storage Devices, System Memory, Processors, BIOS and UEFI, Power Supplies. * Troubleshooting and Mobile Devices Troubleshooting System Components, Laptops, Mobile Devices, Troubleshooting Mobile Devices. * Printer and Network Hardware Printers, Configuring Printers, Troubleshooting Printers, Network Architectures, Ethernet Networks. * Networks Wireless Networks, Internet Connections, Internet Protocol, Routers and Firewalls, Troubleshooting Networks. * Supporting Windows (1) Windows Operating System, Administration Tools, Managing Storage, Managing Files, Managing Applications. * Supporting Windows (2) Managing Devices, Managing Performance, Troubleshooting Windows, Installing Windows. * Supporting Windows Troubleshooting Boot Problems, Maintenance and Backup, Threats and Vulnerabilities, Viruses and Malware, Securing Workstations, Securing Data. * Supporting Windows Networks Configuring Network Connections, Securing Network Connections, Configuring Shared Resources, Virtualization and Services. * Linux, OS X, and Mobile OS Linux Operating System, OS X, Mobile Operating Systems, Mobile OS Security and Troubleshooting, Safety and Environmental Procedures, Professionalism and Communication.

CompTIA A+ bootcamp essentials and electives
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797

Principles and Practices of Cyber Security

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- Cyber Security plays an important role in every business as it encompasses everything that relates to protecting sensitive data, personal information, intellectual property, data, and governmental and industry information systems from theft and damage attempted by criminals and adversaries. This course is designed to understand and gain practical skills to plan, deliver and monitor IT/cyber security to internal and external clients understanding a complete, knowledge in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking including understanding the basics of Kali Operating System and its tools and techniques. It will also cover WiFi security, Website security, human factors, cyber forensics, and cyber security team management, including all other areas in relation to Cyber Security.

Principles and Practices of Cyber Security
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3626

HTML5 development fundamentals

5.0(3)

By Systems & Network Training

HTML5 DEVELOPMENT TRAINING COURSE DESCRIPTION This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-375, and build an understanding of these topics: Manage the Application Life Cycle, Build the User Interface by Using HTML5, Format the User Interface by Using CSS, Code by Using JavaScript. This course leverages the same content as found in the Microsoft Official Academic Course (MOAC) for this exam. WHAT WILL YOU LEARN * Manage the Application Life Cycle. * Build the User Interface by Using HTML5. * Format the User Interface by Using CSS. * Code by Using JavaScript. HTML5 DEVELOPMENT TRAINING COURSE DETAILS * Who will benefit: Anyone working with HTML5. * Prerequisites: None. * Duration 3 days HTML5 DEVELOPMENT TRAINING COURSE CONTENTS * Managing the Application Life Cycle * Platform fundamentals Packaging and the runtime environment: app package, app container, credentials/permission sets, host process, leverage existing HTML5 skills and content for slate/tablet applications. * Manage the state of an application Manage session state, app state and persist state information; understand states of an application; understand the differences between local and session storage. * Debug and test a HTML5 touch-enabled application Touch gestures; gestures you test on a device. * HTML5 UI: Text, Graphics, and Media * HTML5 tags for text content and graphics. When, why and how to use Canvas; when, why and how to use scalable vector graphics (SVG). * HTML5 tags to play media. Video and audio tags. * HTML5 UI: Organization, Input, and Validation * HTML5 tags to organise content and forms Tables, lists, sections; semantic HTML. * HTML5 tags for input and validation * CSS Essentials: Content Flow, Positioning, styling * Core CSS concepts Separate presentation from content (create content with HTML and style content with CSS); manage content flow (inline versus block flow); manage positioning of individual elements( float versus absolute positioning); manage content overflow (scrolling, visible and hidden); basic CSS styling. * CSS Essentials: Layouts * Arrange UI content by using CSS Use flexible box and grid layouts to establish content alignment, direction and orientation; proportional scaling and use of "free scale" for elements within a flexible box or grid; order and arrange content; concepts for using flex box for simple layouts and grid for complex layouts; grid content properties for rows and columns; use application templates. * Managing Text Flow by Using CSS Regions and using regions to flow text content between multiple sections (content source, content container, dynamic flow, flow-into, flow-from, msRegionUpdate, msRegionOverflow, msGetRegionContent); columns and hyphenation and using these CSS settings to optimise the readability of text; use "positioned floats" to create text flow around a floating object * Managing the Graphical Interface by Using CSS Graphics effects (rounded edges, shadows, transparency, background gradients, typography and Web Open Font Format); 2-D 3-D transformations (translate, scale, rotate, skew and 3-D perspective transitions and animations); SVG filter effects; Canvas. * JavaScript and coding essentials Manage and maintain JavaScript, Create and use functions; jQuery and other third-party libraries. Update the UI by using JavaScript Locate/access elements; listen and respond to events; show and hide elements; update the content of elements. * Animations, Graphics, and Accessing Data * Code animations with JavaScript animation; manipulate the canvas; work with images, shapes and other graphics. * Access data access by using JavaScript Send and receive data; transmit complex objects and parsing; load and save files; App Cache; datatypes; forms; cookies; localStorage * JavaScript coding for Touch Interface, Device and Operating System Resources, and More Respond to the touch interface, Gestures, how to capture and respond to gestures, Code additional HTML5 APIs, GeoLocation, Web Workers, WebSocket; File API, Access device and operating system resources, In- memory resources, such as contact lists and calendar; hardware capabilities, such as GPS, accelerometer and camera.

HTML5 development fundamentals
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2367

Essential SDN for engineers

5.0(3)

By Systems & Network Training

ESSENTIAL SDN TRAINING COURSE DESCRIPTION Software Defined Networking (SDN) has become one of the industries most talked technologies. This training course cuts through the hype and looks at the technology, architecture and products available for SDN along with looking at the impact it may have on your network. WHAT WILL YOU LEARN * Explain how SDN works. * Describe the architecture of SDN. * Explain the relationship between SDN and OpenFlow. * Recognise the impact SDN will have on existing networks. ESSENTIAL SDN TRAINING COURSE DETAILS * Who will benefit: Anyone wishing to know more about SDN. * Prerequisites: None. * Duration 2 days ESSENTIAL SDN TRAINING COURSE CONTENTS * Introduction What is SDN? What is OpenFlow? SDN benefits. The SDN stack and architecture. * SDN architecture SDN applications, SDN switches, SDN controllers, Network Operating Systems. Control plane, data plane. Control to Data Plane Interface (CDPI), Northbound interfaces. SDN components, control and data plane abstractions. * Network Operating Systems Finding the topology, Global view, control program, configuration based on views, graph algorithm. * OpenFlow Just one part of SDN. Open Networking Foundation, OpenFlow ports, Flow tables, OpenFlow Channels. The OpenFlow protocol, OpenFlow header, OpenFlow operations. OpenFlow versus OpFlex. * SDN and open source OpenDaylight, OpenVSwitch, Open Networking Forum, Open Network Operating System. OpenStack Neutron. * SDN implications Separation of control and data plane, NOS running on servers, Emphasis on edge complexity, core simplicity, OpenvSwitch, Incremental migration, importance of software. SDN vs NVF.

Essential SDN for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1727

Advanced Junos Service Provider Routing

5.0(3)

By Systems & Network Training

ADVANCED JUNOS SP ROUTING COURSE DESCRIPTION This is designed to provide students with detailed coverage of OSPF, IS-IS, BGP, and routing policy. Students will gain experience in configuring, monitoring, and troubleshooting the Junos operating system and in monitoring device and protocol operations. This course uses Juniper Networks vMX Series Routers for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. WHAT WILL YOU LEARN * Describe and configure OSPF area types and operations. * Configure and monitor IS-IS. * Describe basic BGP operation. * Explain the causes for route instability. * Describe how to troubleshoot routing policy. * Explain the default behaviour of damping on links. ADVANCED JUNOS SP ROUTING COURSE DETAILS * Who will benefit: Network staff working with Junos at layer 3. * Prerequisites: Junos Intermediate Routing * Duration 5 days ADVANCED JUNOS SP ROUTING COURSE CONTENTS * OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication Lab: OSPF Multi-Area Networks Chapter 3: OSPF Areas Review of OSPF Areas Stub Area Operation and Configuration NSSA Operation and Configuration Route Summarization Lab: OSPF Route Summarization * OSPF Case Studies and Solutions Virtual Links OSPF Multiarea Adjacencies External Reachability Lab: Advanced OSPF Options and Routing Policy * Troubleshooting OSPF Troubleshooting OSPF Lab: OSPF Troubleshooting * IS-IS Overview of IS-IS IS-IS PDUs Neighbors and Adjacencies Configuring and Monitoring IS-IS Lab: IS-IS Configuration and Monitoring * Advanced IS-IS Operations and Configuration Options IS-IS Operations IS-IS Configuration Options IS-IS Routing Policy Lab: Advanced IS-IS Configuration Options and Routing Policy * Multilevel IS-IS Networks Level 1 and Level 2 Operations Multilevel Configuration Lab: Configuring a Multilevel IS-IS Network * Troubleshooting IS-IS Troubleshooting IS-IS Lab: IS-IS Troubleshooting * BGP Review of BGP BGP Operations BGP Path Selection Options Configuration Options Lab: BGP and BGP Attributes * BGP Attributes and Policy - Part1 BGP Policy Next Hop Origin and MED AS Path Lab: BGP Attributes - Next Hop, Origin, MED, and AS Path * Attributes and Policy - Part2 Local Preference Communities Lab: BGP Attributes - Local Preference and Communities * Route Reflection and Confederations Route Reflection Operation Configuration and Routing Knowledge BGP Confederations Lab: Scaling BGP * BGP Route Damping Route Flap and Damping Overview Route Damping Parameters Configuring and Monitoring Route Damping Lab: BGP Route Damping * Troubleshooting BGP Troubleshooting BGP Lab: BGP Troubleshooting * Troubleshooting Policy Troubleshooting Policy Lab: Policy Troubleshooting

Advanced Junos Service Provider Routing
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Advanced Junos Security

5.0(3)

By Systems & Network Training

ADVANCED JUNOS SECURITY TRAINING COURSE DESCRIPTION This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. WHAT WILL YOU LEARN * Demonstrate the understanding of integrated user firewall. * Implement next generation Layer 2 security features. * Implement virtual routing instances in a security setting. * Utilize Junos tools for troubleshooting Junos security implementations. * Implement IPS policy. ADVANCED JUNOS SECURITY TRAINING COURSE DETAILS * Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. * Prerequisites: Intro to the Junos Operating System * Duration 5 days ADVANCED JUNOS SECURITY TRAINING COURSE CONTENTS * Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security * Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing * AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures * AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure * Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director * Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware * Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo * Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM * Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy * SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN * Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall * Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques * Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Linux shell scripting

5.0(3)

By Systems & Network Training

LINUX SHELL SCRIPTING TRAINING COURSE DESCRIPTION A practical introduction to writing scripts using the Bourne shell under any Linux operating system. Applicable for those using the Korn shell as well. WHAT WILL YOU LEARN * Read shell scripts. * Write shell scripts. * Use different types of quotes. * Recognise the role of shell scripts within the Linux system. LINUX SHELL SCRIPTING TRAINING COURSE DETAILS * Who will benefit: Programmers developing programs under UNIX. Administrators / support personnel who wish to find out more about the workings of Linux or write simple utility programs. * Prerequisites: Linux Fundamentals * Duration 2 days LINUX SHELL SCRIPTING TRAINING COURSE CONTENTS * Review of Linux fundamentals * Basic shell scripts What does the shell do? How are commands executed? Different shells. what is a shell script? Comments, creating shell scripts. * Variables Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. * Positional parameters $0 to $9, $#, $* and others. shift parameter substitution. * Control statements The test command The if statement while loops for loops The case statement. * Special characters Redirection of errors, here documents, quoting. * Arithmetic in shell scripts The expr command. * System shell scripts * Screen handling The terminfo database, The tput command. * Advanced issues (optional session) Shell functions, getopts, xargs, debugging shell scripts, portability issues. Extras in the Korn shell. * Optimising shell scripts The time command, performance tips.

Linux shell scripting
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1497

Securing Kubernetes and Containers

5.0(3)

By Systems & Network Training

SECURING KUBERNETES TRAINING COURSE DESCRIPTION This course introduces concepts, procedures, and best practices to harden Kubernetes based systems and container-based applications against security threats. It deals with the main areas of cloud-native security: Kubernetes cluster setup, Kubernetes cluster hardening, hardening the underlying operating system and networks, minimizing microservices vulnerabilities, obtaining supply chain security as well as monitoring, logging, and runtime security. WHAT WILL YOU LEARN * Harden Kubernetes systems and clusters. * Harden containers. * Configure and use Kubernetes audit logs. SECURING KUBERNETES TRAINING COURSE DETAILS * Who will benefit: Technical staff working with Kubernetes * Prerequisites: Kubernetes_for_engineers_course.htm Definitive Docker for engineers * Duration 2 days SECURING KUBERNETES TRAINING COURSE CONTENTS This course does not only deal with the daily security administration of Kubernetes-based systems but also prepares delegates for the official Certified Kubernetes Security Specialist (CKS) exams of the Cloud Native Computing Foundation (CNCF). Structure: 50% theory 50% hands on lab exercise MODULE 1: USER AND AUTHORIZATION MANAGEMENT * Users and service accounts in Kubernetes * Authenticating users * Managing authorizations with RBAC MODULE 2: SUPPLY CHAIN SECURITY * Vulnerabilit checking for images * Image validation in Kubernetes * Reducing image footprint * Secure image registries MODULE 3: VALIDATING CLUSTER SETUP AND PENETRATION TESTING * Use CIS benchmark to review the security configuration of Kubernetes components. * Modify the cluster components' configuration to match the CIS Benchmark. * Penetration testing Kubernetes for known vulnerabilities. MODULE 4: SYSTEM HARDENING * Use kernel hardening tools * Setup appropriate OS level security domains * Container runtime sandboxes * Limit network access MODULE 5: MONITORING AND LOGGING * Configure Kubernetes audit logs * Configure Audit Policies * Monitor applications behaviour with Falco

Securing Kubernetes and Containers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1727