• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

73 Policy courses in Liverpool

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Public Policy Analysis

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- The significance and goals of public policy * Using game theory to analyze public policy. * Understand the importance of public policy in society. * Understand the significance of theoretical and empirical models in understanding public policy. * Goals of public policy * Recognizing market failures. * Distinguishing between public and private goods.

Public Policy Analysis
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3626

All organizations have policies and procedures that guide how decisions are made and how the work is done in that organization. Professionally written policies and procedures increase organizational accountability and transparency and are fundamental to quality/standards assurance and quality improvement.

Policy & Procedure Writing
Delivered in-person, on-request, onlineDelivered Online & In-Person in Loughborough
£668

Advanced Junos Service Provider Routing

5.0(3)

By Systems & Network Training

ADVANCED JUNOS SP ROUTING COURSE DESCRIPTION This is designed to provide students with detailed coverage of OSPF, IS-IS, BGP, and routing policy. Students will gain experience in configuring, monitoring, and troubleshooting the Junos operating system and in monitoring device and protocol operations. This course uses Juniper Networks vMX Series Routers for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. WHAT WILL YOU LEARN * Describe and configure OSPF area types and operations. * Configure and monitor IS-IS. * Describe basic BGP operation. * Explain the causes for route instability. * Describe how to troubleshoot routing policy. * Explain the default behaviour of damping on links. ADVANCED JUNOS SP ROUTING COURSE DETAILS * Who will benefit: Network staff working with Junos at layer 3. * Prerequisites: Junos Intermediate Routing * Duration 5 days ADVANCED JUNOS SP ROUTING COURSE CONTENTS * OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication Lab: OSPF Multi-Area Networks Chapter 3: OSPF Areas Review of OSPF Areas Stub Area Operation and Configuration NSSA Operation and Configuration Route Summarization Lab: OSPF Route Summarization * OSPF Case Studies and Solutions Virtual Links OSPF Multiarea Adjacencies External Reachability Lab: Advanced OSPF Options and Routing Policy * Troubleshooting OSPF Troubleshooting OSPF Lab: OSPF Troubleshooting * IS-IS Overview of IS-IS IS-IS PDUs Neighbors and Adjacencies Configuring and Monitoring IS-IS Lab: IS-IS Configuration and Monitoring * Advanced IS-IS Operations and Configuration Options IS-IS Operations IS-IS Configuration Options IS-IS Routing Policy Lab: Advanced IS-IS Configuration Options and Routing Policy * Multilevel IS-IS Networks Level 1 and Level 2 Operations Multilevel Configuration Lab: Configuring a Multilevel IS-IS Network * Troubleshooting IS-IS Troubleshooting IS-IS Lab: IS-IS Troubleshooting * BGP Review of BGP BGP Operations BGP Path Selection Options Configuration Options Lab: BGP and BGP Attributes * BGP Attributes and Policy - Part1 BGP Policy Next Hop Origin and MED AS Path Lab: BGP Attributes - Next Hop, Origin, MED, and AS Path * Attributes and Policy - Part2 Local Preference Communities Lab: BGP Attributes - Local Preference and Communities * Route Reflection and Confederations Route Reflection Operation Configuration and Routing Knowledge BGP Confederations Lab: Scaling BGP * BGP Route Damping Route Flap and Damping Overview Route Damping Parameters Configuring and Monitoring Route Damping Lab: BGP Route Damping * Troubleshooting BGP Troubleshooting BGP Lab: BGP Troubleshooting * Troubleshooting Policy Troubleshooting Policy Lab: Policy Troubleshooting

Advanced Junos Service Provider Routing
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Advanced Junos Security

5.0(3)

By Systems & Network Training

ADVANCED JUNOS SECURITY TRAINING COURSE DESCRIPTION This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. WHAT WILL YOU LEARN * Demonstrate the understanding of integrated user firewall. * Implement next generation Layer 2 security features. * Implement virtual routing instances in a security setting. * Utilize Junos tools for troubleshooting Junos security implementations. * Implement IPS policy. ADVANCED JUNOS SECURITY TRAINING COURSE DETAILS * Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. * Prerequisites: Intro to the Junos Operating System * Duration 5 days ADVANCED JUNOS SECURITY TRAINING COURSE CONTENTS * Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security * Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing * AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures * AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure * Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director * Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware * Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo * Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM * Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy * SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN * Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall * Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques * Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Aesthetic Therapy Training - Beginner to Advanced PACKAGE

4.6(39)

By Geopace Training

THIS COURSE PACKAGE INCLUDES: 1: PERIPHERAL I.V. CANNULATION - IV THERAPIES COURSE (GPT008) 2: VACCINATION / INJECTION COURSE (GPT601) Learn how to administer injectables and intravenous therapies ... FAST-TRACK YOUR AESTHETICS TRAINING WITH OUR COMPLETE TRAINING PACKAGE 20% Multi-Course Discount Cover all stages from Level 1 through to Level 4 (FDSc) Cover your theory training online Complete your advanced practical training in 1 day Practical training in Classroom or Virtual Classroom Comprehensive Practise@Home training kits for VC Awards 2 accredited qualifications Dual Accreditations for all courses Covers all steps required to safely perform injectables Covers all steps required to safely perform IV therapies Practise IV on artificial arm with fake blood Practise injection techniques on realistic injection pads Learn beginner to advanced skills and techniques Basic understanding of English language required OPEN TO ALL APPLICANTS

Aesthetic Therapy Training - Beginner to Advanced PACKAGE
Delivered Online or in Liverpool + 5 more locationsFull day, Jun 30th, 08:30 + 12 more
£292

Supporting Windows 10

5.0(3)

By Systems & Network Training

SUPPORTING WINDOWS 10 COURSE DESCRIPTION This course is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices in a Windows Server domain environment. These skills include understanding of Windows 10 features, how they can be used in an Active Directory environment and how to troubleshoot them. WHAT WILL YOU LEARN * Troubleshoot startup issues and operating system services on a Windows 10 PC. * Troubleshoot issues related to network connectivity. * Troubleshoot client configuration failures and GPO application issues. * Troubleshoot issues related to application installation and operation. * Recover a PC running Windows 10. SUPPORTING WINDOWS 10 COURSE DETAILS * Who will benefit: Anyone supporting users running Windows 10 personal computers within a medium to large enterprise. * Prerequisites: None. * Duration 5 days SUPPORTING WINDOWS 10 COURSE CONTENTS * Implementing a Troubleshooting Methodology Overview of Windows 10, Introduction to the EDST Job Role, Overview of the Troubleshooting Steps & Tools. Hands on Implementing a Troubleshooting Methodology. Hands on Using Troubleshooting Tools for Windows 10. * Troubleshooting Startup Issues Overview of the Windows 10 Startup Recovery Environment, Troubleshooting Startup Settings & Operating System Services Issues, Recovering BitLocker-Protected Drives. Hands on Troubleshooting Startup Issues. Hands on Recovering BitLocker-Encrypted Drives, Creating a New BitLocker Password. * Troubleshooting Hardware and Device Drivers Troubleshooting Device Driver Failures & Physical Failures, Overview of Hardware Troubleshooting, Monitoring Reliability, Configuring the Registry. Hands on Troubleshooting Device Driver Issues, Resolving Hardware Issues, Adding a Missing Device Driver to a Driver Store, Reverting a Problematic Device Driver. Hands on Troubleshooting Hardware Issues, Diagnosing Memory, Troubleshooting and Repairing Failed Disk Redundancy Synchronizing Settings, Accessing Data on a Foreign Volume. * Troubleshooting Remote Computers Using Remote Desktop and Remote Assistance, Remoting with Windows PowerShell Hands on Troubleshooting Remote Computer by using Remote Desktop and Remote Assistance. Hands on Troubleshooting Remote Computer by using Windows PowerShell. * Resolving Network Connectivity Issues Determining Network Settings, Troubleshooting Network Connectivity Issues, Troubleshooting Name Resolution. Hands on Resolving Network Connectivity Issues. Hands onResolving Name Resolution Issues. * Troubleshooting Group Policy Overview of Group Policy Application, Resolving Client Configuration Failures and GPO Application Issues. Hands on Troubleshooting Group Policy Application Issues. Hands on Resolving Group Policy Issues. Hands on Installing and Sharing a Printer. * Troubleshooting User Settings Troubleshooting Sign In Issues, Troubleshooting the Application of User Settings. Hands on Troubleshooting Sign in Problems. Hands on Troubleshooting the Application of User Settings, Resolving Folder Redirection Problem, Resolving Roaming User Profile Problem. * Troubleshooting Remote Connectivity Troubleshooting VPN Connectivity Issues & DirectAccess. Hands on Troubleshooting VPN Connectivity Lab : Configuring and Troubleshooting DirectAccess Configuring and Verifying, DirectAccess Client-Side Settings, Troubleshooting DirectAccess. Troubleshooting Resource Access Within a Domain & File Permissions Issues, Recovering Files Encrypted by EFS, Troubleshooting Printer Access Issues. Lab : Troubleshooting File Access Issues Lab : Troubleshooting Access to Encrypted Files. Hands on Troubleshooting Printer Access Issues * Troubleshooting Resource Access for Non Domain Member Clients Configuring and Troubleshooting Device Registration, Configuring and Troubleshooting Work Folders, Configuring and Troubleshooting OneDrive Access. Hands on Troubleshooting Resource Access for Clients that are not Domain Members. Troubleshooting Device Registration, Work Folders and OneDrive for Business. * Troubleshooting Applications Troubleshooting Desktop App Installation Issues, Desktop Apps, Managing Windows Store Apps, Troubleshooting Access to Company Web Applications. Hands on Troubleshooting Desktop Apps, AppLocker Policy Application & Application Compatibility issue. Hands on Troubleshooting Access to Company Web Applications, Internet Explorer Issue & Microsoft Edge. * Maintaining Windows 10 Managing & Troubleshooting Windows Activation, Troubleshooting Performance, Applying Applications. Hands on Monitoring and Troubleshooting Performance. * Recovering Data and Operating System File Recovery in Windows 10, Recovering an OS. Hands on Recovering Data, Recovering Data from Azure Backup, Recovering Deleted File by Using File History. Hands on Provisioning Computer to Comply with Company Standards, Provision Computer to Comply with Company Standards.

Supporting Windows 10
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Windows certificates for engineers

5.0(3)

By Systems & Network Training

WINDOWS CERTIFICATES TRAINING COURSE DESCRIPTION A hands-on training course concentrating solely on PKI using Windows certificates. WHAT WILL YOU LEARN * Explain how PKI works. * Install windows certificates. * Configure windows certificates. * Troubleshoot windows certificates. WINDOWS CERTIFICATES TRAINING COURSE DETAILS * Who will benefit: Technical security staff. * Prerequisites: Windows server. * Duration 3 days WINDOWS CERTIFICATES TRAINING COURSE CONTENTS * PKI Symmetric encryption, asymmetric encryption, authentication, digital signing, hashing, certificates, Certification Authorities, Root CA, Intermediate CA, policy CA, Issuing CA, Certificate Revocation Lists. Hands on Inspecting a certificate. * Policies and PKI Security policy, certification policy. * CA hierarchy Impact of CAs on Active Directory, CA architecture, number of tiers, issuing CA organisation, CA configuration files. CA security. Hands on CA installation PKI health tool, monitoring. * Certificate revocation When to revoke, OCSP. Hands on Revoking certificates. * Certificate validation Discovery, validation, checks, revocation checking, certificate chains, certification publication. Hands on Event viewer. * Certificate templates Version 1, version 1, default, modifying templates. Hands on Template management. * Roles Criteria roles, CA administrator, Certificate manager, Backup operator, Auditor. Other PKI management roles. * Disaster recovery Backups, recovery. Hands on certutil. * Issuing certificates The certificate enrolment process, enrolment methods, manual enrolment, automatic enrolment. * Trust between organisations Creating Trust, CTLs, common root CA, cross certification, bridge CA. * Web servers and certificates SSL encryption, certificate authentication. Hands on Web servers. * VPN Hands on Certificate deployment for VPN. * WiFi Hands on 802.1X

Windows certificates for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497

Introduction to the Junos Operating System

5.0(3)

By Systems & Network Training

JUNOS OPERATING SYSTEM TRAINING COURSE DESCRIPTION This course provides students with the foundational knowledge required to work with the Junos OS and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Delegates will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 15.1X49. WHAT WILL YOU LEARN * Describe the design architecture of the Junos OS. * Navigate within the Junos CLI and perform tasks within the CLI operational and configuration modes. * Configure and monitor network interfaces. * Navigate within the Junos J-Web interface. * Identify where you might use firewall filters. * Explain basic routing operations and concepts. * Identify key factors in Juniper Networks' security. JUNOS OPERATING SYSTEM TRAINING COURSE DETAILS * Who will benefit: This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. * Prerequisites: TCP/IP foundation for engineers * Duration 3 days JUNOS OPERATING SYSTEM TRAINING COURSE CONTENTS * Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices * User Interface Options-The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode * User Interface Options-The J-Web Interface The J-Web GUI Configuration Lab 1: User Interface Options * Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Lab 2: Initial System Configuration * Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Lab 3: Secondary System Configuration * Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Lab 4: Operational Monitoring and Maintenance * Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups * Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Lab 5: Routing Fundamentals * Routing Policy Routing Policy Overview Case Study: Routing Policy Lab 6: Routing Policy * Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Lab 7: Firewall Filters * Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS Lab 8: Class of Service * JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC * Juniper Security Concepts Security Challenges Juniper's Security Focus * Appendix A: IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration

Introduction to the Junos Operating System
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2367

Microsoft Active Directory

5.0(3)

By Systems & Network Training

MICROSOFT ACTIVE DIRECTORY COURSE DESCRIPTION A thorough understanding of this system is essential for anyone managing enterprise MS networks. Essential theory is complimented with a high level of hands on practice allowing delegates to observe the idiosyncrasies of Active Directory and Group Policy at first hand. Delegates learn the fundamental theory of AD and progress onto building a multi-domain network in the classroom. The course includes troubleshooting methods, and essential maintenance procedures. This course is designed to teach you the skills needed for day to day management of these technologies. WHAT WILL YOU LEARN * Install AD on multiple PCs. * Use the tools to create and manage objects. * Create appropriate group policies to restrict selected user's desktops and network access. * Install DNS to support Active Directory without loosing Internet Connectivity. * Maintain and troubleshoot AD problems * Backup Active Directory. MICROSOFT ACTIVE DIRECTORY COURSE DETAILS * Who will benefit: Technical staff working with AD based networks. * Prerequisites: Supporting Windows server. * Duration 3 days MICROSOFT ACTIVE DIRECTORY COURSE CONTENTS * Introduction to Active Directory Network authentication methods, Active Directory defined, AD naming conventions, network management with AD, AD structures: Domains, Organisational Units, Forests & Trees, Sites, The Global Catalogue. Windows 2003 new features, installing AD. Hands on Installing an AD network. * Windows overview Management methods Server management tools, installing the additional tools, Terminal Server: Administration mode, Administrator accounts in AD, Local Security Policy. Hands on Install the management tools, Management using Terminal Services. * Creating & Managing Objects (a quick look) AD management tools, AD users and computers, Creating & managing OUs, User Accounts and groups, controlling access to AD objects, moving objects, Publishing resources, locating objects in AD, delegating authority. Hands on Creating a control OU structure and delegating authority. * Introduction to Group Policies What are Group Policies? Where Group Policy data is stored, security, Group Policy flow. Hands on Implementing Group Policies * Working with Group Policies Local security templates, administrative templates, scripts, folder redirection, software deployment. Hands on Scripts, redirecting the start menu, creating a secure, robust desktop environment. * Implementing DNS DNS basics, troubleshooting, implementing DNS zones. Hands on Building a unified DNS solution. * Maintaining and managing the AD database AD support tools, database internal structure, replication, replication tools, Single Operations Masters, tools for maintenance, maintenance techniques, Backing up AD, Directory Services restore mode, NTDSUtil, Authoritative & non-authoritative restoration, rebuilding. Hands on NTDSUtil.

Microsoft Active Directory
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1877

Securing Microsoft systems

5.0(3)

By Systems & Network Training

MICROSOFT SECURITY TRAINING COURSE DESCRIPTION A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment. WHAT WILL YOU LEARN * Use Microsoft security tools. * Secure Microsoft servers. * Secure Microsoft desktops. * Secure Microsoft networks. MICROSOFT SECURITY TRAINING COURSE DETAILS * Who will benefit: Technical server support staff. Technical desktop support staff. Technical network staff. Technical security staff. * Prerequisites: Supporting Windows server 2016 Networking Microsoft systems. * Duration 3 days MICROSOFT SECURITY TRAINING COURSE CONTENTS * Introduction Security threats, Microsoft defaults, admin accounts, security patches, patch management, patch tools. Hands on: Studying Microsoft defaults, applying security patches. * Microsoft security tools Microsoft updates, WSUS, Inventory tool, baseline security analyser, URLscan, EventCombMT, Cipher security tool, Port reporter, PortQry. Tools hackers use. Hands on: Using Microsoft security tools. * Server security Checklists, core server security, AD, Member server security, Domain controller security, Specific roles. Hands on Hardening Microsoft servers, security templates. * Active Directory Admin authority in AD, group policy, trust and authentication. * Desktop security Checklists, core client security, anti virus software, anti spyware software, firewalls, securing clients with AD, securing clients with group policy, software restriction policies. Hands on Securing Microsoft desktops. * Network security Checklist, IP security, VPNs, PKI, certificate authorities, RAS, RRAS, IAS. Hands on: VPN configuration, IAS configuration. * Monitoring Auditing, authorisation and logons, tracking, system monitoring, detecting attacks. Hands on: Monitoring Microsoft systems. * Summary Microsoft security response centre, security advisories.

Securing Microsoft systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497
123...8

Educators matching "Policy"

Show all 4
The Secret Cake Kitchen

the secret cake kitchen

5.0(1)

Liverpool

The Secret Cake Kitchen, (“the Company”, “us”, “we”, or “our”), operates the website www.thesecretcakekitchen.com. We may change or add to this privacy notice, so we encourage you to come back and read it periodically. The Secret Cake Kitchen, is the data controller that resides in 100 Albany Road, Walton, Liverpool L9 0HA. This privacy notice governs the website The Secret Cake Kitchen informs you of our policies regarding the collection, use, and disclosure of personal data when you use our Service and the choices you have associated with that data. Your privacy is very important to us. We use your data to provide and improve our site. By using the site, you agree to the collection and use of information in accordance with this policy. Unless otherwise defined in this Privacy Policy, terms used in this Privacy Policy have the same meanings as in our Terms and Conditions, accessible from https://www.thesecretcakekitchen.com/contact DATA WE COLLECT While using our site, we may ask you to provide us with certain personal data that can be used to contact or identify you (“Personal Data”). Personal Data may include, but is not limited to: · Email address · First name and last name · Phone number · Address, State, Province, ZIP/Postal code, City For clients who work with the company, we may also collect further, voluntary information to enable us to provide our service in an optimized manner. Some data collected from clients may include: · Sensitive Information · Goals and Aspirations · Business Details · Health Related Information