• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1170 Security courses delivered Live Online

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

CompTIA Network+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for entry-level computer support professionals with a basic knowledge of computer hardware, software, and operating systems who wish to increase their knowledge and understanding of networking concepts and acquire the required skills to prepare for a career in network support or administration, or who wish to prepare for the CompTIA Network+ certification. CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT professionals with job roles such as network administrator, network technician, network installer, help desk technician, and IT cable installer. This course is also designed for students who are seeking the CompTIA Network+ certification and who want to prepare for the CompTIA Network+ N10-008 Certification Exam. Overview In this course, you will describe the major networking technologies and systems of modern networks and configure, manage, and troubleshoot modern networks. Explain the OSI and TCP/IP Models. Explain properties of network traffic. Install and configure switched networks. Configure IP networks. Install and configure routed networks. Configure and monitor ports and protocols. Explain network application and storage issues. Monitor and troubleshoot networks. Explain network attacks and mitigations. Install and configure security devices. Explain authentication and access controls. Deploy and troubleshoot cabling solutions. Implement and troubleshoot wireless technologies. Compare and contrast WAN technologies. Use remote access methods. Identify site policies and best practices. CompTIA's Network+ certification is a foundation-level certification designed for IT professionals with around one year of experience, whose job role is focused on network administration. The CompTIA Network+ exam will certify the successful candidate has the knowledge and skills required to troubleshoot, configure, and manage common network devices; establish basic network connectivity; understand and maintain network documentation; identify network limitations and weaknesses; and implement network security, standards, and protocols. The candidate will have a basic understanding of enterprise technologies, including cloud and virtualization technologies. The Official CompTIA© Network+© (Exam N10-008): will teach you the fundamental principles of installing, configuring, and troubleshooting network technologies and help you to progress a career in network administration. In this course, you will build on your existing user-level knowledge and experience with personal computer operating systems and networks to master the fundamental skills and concepts that you will need to use on the job in any type of networking career. Prerequisites * CompTIA A+ Certification (Exams 220-1001 and 220-1002) 1 - EXPLAINING THE OSI AND TCP/IP MODELS * Topic A: Explain OSI Model Layers * Topic B: Explain the TCP/IP Suite 2 - EXPLAINING PROPERTIES OF NETWORK TRAFFIC * Topic A: Explain Media Types and Access Methods * Topic B: Deploy Ethernet Standards * Topic C: Configure and Monitor Network Interfaces 3 - INSTALLING AND CONFIGURING SWITCHED NETWORKS * Topic A: Install and Configure Hubs and Bridges * Topic B: Install and Configure Switches * Topic C: Compare and Contrast Network Topologies * Topic D: Compare and Contrast Network Types 4 - CONFIGURING IP NETWORKS * Topic A: Configure IPv4 Addressing Components * Topic B: Test IP Interfaces with Command Line Tools * Topic C: Configure IPv4 Subnets * Topic D: Configure Private and Public IPv4 Addressing Schemes * Topic E: Configure IPv6 Addressing Components * Topic F: Configure DHCP Services 5 - INSTALLING AND CONFIGURING ROUTED NETWORKS * Topic A: Explain Characteristics of Routing * Topic B: Install and Configure Routers 6 - CONFIGURING AND MONITORING PORTS AND PROTOCOLS * Topic A: Explain the Uses of Ports and Protocols * Topic B: Use Port Scanners and Protocol Analyzers * Topic C: Explain the Use of Name Resolution Services * Topic D: Configure DNS and IPAM Services 7 - EXPLAINING NETWORK APPLICATION AND STORAGE SERVICES * Topic A: Explain the Uses of Network Applications * Topic B: Explain the Uses of Voice Services and Advanced Networking Devices * Topic C: Explain the Uses of Virtualization and Network Storage Services * Topic D: Summarize the Concepts of Cloud Services 8 - MONITORING AND TROUBLESHOOTING NETWORKS * Topic A: Monitor Network Interfaces and Logs * Topic B: Explain Network Troubleshooting Methodology * Topic C: Troubleshoot Common Network Services Issues 9 - EXPLAINING NETWORKING ATTACKS AND MITIGATIONS * Topic A: Summarize Common Networking Attacks * Topic B: Explain the Characteristics of VLANs * Topic C: Explain the Characteristics of NAT and Port Forwarding 10 - INSTALLING AND CONFIGURING SECURITY DEVICES * Topic A: Install and Configure Firewalls and Proxies * Topic B: Explain the Uses of IDS/IPS and UTM 11 - EXPLAINING AUTHENTICATION AND ACCESS CONTROLS * Topic A: Explain Authentication Controls and Attacks * Topic B: Explain the Uses of Authentication Protocols and Directory Services * Topic C: Explain the Uses of Port Security and NAC * Topic D: Implement Network Device Hardening * Topic E: Explain Patch Management and Vulnerability Scanning Processes 12 - DEPLOYING AND TROUBLESHOOTING CABLING SOLUTIONS * Topic A: Deploy Structured Cabling Systems * Topic B: Deploy Twisted Pair Cabling Solutions * Topic C: Test and Troubleshoot Twisted Pair Cabling Solutions * Topic D: Deploy Fiber Optic Cabling Solutions 13 - IMPLEMENTING AND TROUBLESHOOTING WIRELESS TECHNOLOGIES * Topic A: Install and Configure Wireless Technologies * Topic B: Troubleshoot Wireless Performance Issues * Topic C: Secure and Troubleshoot Wireless Connectivity 14 - COMPARING AND CONTRASTING WAN TECHNOLOGIES * Topic A: Compare and Contrast WAN Core Service Types * Topic B: Compare and Contrast WAN Subscriber Service Types * Topic C: Compare and Contrast WAN Framing Service Types * Topic D: Compae and Contrast Wireless and IoT WAN Technologies 15 - USING REMOTE ACCESS METHODS * Topic A: Use Remote Access VPNs * Topic B: Use Remote Access Management Methods 16 - IDENTIFYING SITE POLICIES AND BEST PRACTICES * Topic A: Manage Networks with Documentation and Diagrams * Topic B: Summarize the Purposes of Physical Security Devices * Topic C: Compare and Contrast Business Continuity and Disaster Recovery Concepts * Topic D: Identify Policies and Best Practices

CompTIA Network+
Delivered Online6 days, May 20th, 08:30 + 22 more
£2475

Architecting on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for solutions architects, solution-design engineers, developers seeking an understanding of AWS architecting and individuals seeking the AWS Solutions Architect-Associate certification. Overview Identify AWS architecting basic practices. Explore using the AWS management tools: The AWS Console, Command Line Interface (CLI), and CloudFormation in a lab environment. Examine the enforcement of accounts security using policies. Identify the elements that build an elastic, secure, virtual network that includes private and public subnets. Practice building an AWS core networking infrastructure. Determine strategies for a layered security approach to Virtual Private Cloud (VPC) subnets. Identify strategies to select the appropriate compute resources based on business use-cases. Practice building a VPC and adding an Elastic Cloud Compute (EC2) instance in a lab environment. Practice installing an Amazon Relational Database Service (RDS) instance and an Application Load Balancer (ALB) in the VPC you created. Compare and contrast AWS storage products and services, based on business scenarios. Compare and contrast the different types of AWS database services based on business needs. Practice building a highly available, auto-scaling database layer in a lab. Explore the business value of AWS monitoring solutions. Identify the role of monitoring, event driven load balancing, and auto scaling responses, based on usage and needs. Identify and discuss AWS automation tools that will help you build, maintain and evolve your infrastructure. Discuss network peering, VPC endpoints, gateway and routing solutions based on use-cases. Discuss hybrid networking configurations to extend and secure your infrastructure. Discuss the benefits of microservices as an effective decoupling strategy to power highly available applications at scale. Explore AWS container services for the rapid implementation of an infrastructure-agnostic, portable application environment. Identify the business and security benefits of AWS serverless services based on business examples. Practice building a serverless infrastructure in a lab environment. Discuss the ways in which AWS edge services address latency and security. Practice building a CloudFront deployment with an S3 backend in a lab environment. Explore AWS backup, recovery solutions, and best practices to ensure resiliency and business continuity. Build a highly available and secure cloud architecture based on a business problem, in a project-based facilitator-guided lab. Architecting on AWS is for solutions architects, solution-design engineers, and developers seeking an understanding of AWS architecting. In this course, you will learn to identify services and features to build resilient, secure and highly available IT solutions on the AWS Cloud. Architectural solutions differ depending on industry, types of applications, and business size. AWS Authorized Instructors emphasize best practices using the AWS Well-Architected Framework, and guide you through the process of designing optimal IT solutions, based on real-life scenarios. The modules focus on account security, networking, compute, storage, databases, monitoring, automation, containers, serverless architecture, edge services, and backup and recovery. At the end of the course, you will practice building a solution and apply what you have learned with confidence. Prerequisites * AWS Cloud Practitioner Essentials classroom or digital training, or * Working knowledge of distributed systems * Familiarity with general networking concepts * Familiarity with IP addressing * Working knowledge of multi-tier architectures * Familiarity with cloud computing concepts 0 - INTRODUCTIONS & COURSE MAP REVIEW * Welcome and course outcomes 1 - ARCHITECTING FUNDAMENTALS REVIEW * AWS Services and Infrastructure * Infrastructure Models * AWS API Tools * Securing your infrastructure * The Well-Architected Framework * Hands-on lab: Explore Using the AWS API Tools to Deploy an EC2 Instance 2 - ACCOUNT SECURITY * Security Principals * Identity and Resource-Based Policies * Account Federation * Introduction to Managing Multiple Accounts 3 - NETWORKING, PART 1 * IP Addressing * Amazon Virtual Private Cloud (VPC), Patterns and Quotas * Routing * Internet Access * Network Access Control Lists (NACLs) * Security Groups 4 - COMPUTE * Amazon Elastic Cloud Compute (EC2) * EC2 Instances and Instance Selection * High Performance Computing on AWS * Lambda and EC2, When to Use Which * Hands-On Lab: Build Your Amazon VPC Infrastructure 5 - STORAGE * Amazon S3, Security, Versioning and Storage Classes * Shared File Systems * Data Migration Tools 6 - DATABASE SERVICES * AWS Database Solutions * Amazon Relational Database Services (RDS) * DynamoDB, Features and Use Cases * Redshift, Features, Use Cases and Comparison with RDS * Caching and Migrating Data * Hands-on Lab: Create a Database Layer in Your Amazon VPC Infrastructure 7 - MONITORING AND SCALING * Monitoring: CloudWatch, CloudTrail, and VPC Flow Logs * Invoking Events 8 - AUTOMATION * CloudFormation * AWS Systems Manager 9 - CONTAINERS * Microservices * Monitoring Microservices with X-Ray * Containers 10 - NETWORKING PART 2 * VPC Peering & Endpoints * Transit Gateway * Hybrid Networking * Route 53 11 - SERVERLESS ARCHITECTURE * Amazon API Gateway * Amazon SQS, Amazon SNS * Amazon Kinesis Data Streams & Kinesis Firehose * Step Functions * Hands-on Lab: Build a Serverless Architecture 12 - EDGE SERVICES * Edge Fundamentals * Amazon CloudFront * AWS Global Accelerator * AWS Web Application Firewall (WAF), DDoS and Firewall Manager * AWS Outposts * Hands-On Lab: Configure an Amazon CloudFront Distribution with an Amazon S3 Origin 13 - BACKUP AND RECOVERY * Planning for Disaster Recovery * AWS Backup * Recovery Strategie ADDITIONAL COURSE DETAILS: Nexus Humans Architecting on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting on AWS
Delivered Online4 days, May 20th, 08:30 + 6 more
£2025

PL-300T00 Microsoft Power BI Data Analyst

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The audience for this course are data professionals and business intelligence professionals who want to learn how to accurately perform data analysis using Power BI. This course is also targeted toward those individuals who develop reports that visualize data from the data platform technologies that exist on both in the cloud and on-premises. This course covers the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI. The course will show how to access and process data from a range of data sources including both relational and non-relational sources. Finally, this course will also discuss how to manage and deploy reports and dashboards for sharing and content distribution. Prerequisites Understanding core data concepts. Knowledge of working with relational data in the cloud. Knowledge of working with non-relational data in the cloud. Knowledge of data analysis and visualization concepts. DP-900T00 Microsoft Azure Data Fundamentals is recommended 1 - DISCOVER DATA ANALYSIS * Overview of data analysis * Roles in data * Tasks of a data analyst 2 - GET STARTED BUILDING WITH POWER BI * Use Power BI * Building blocks of Power BI * Tour and use the Power BI service 3 - GET DATA IN POWER BI * Get data from files * Get data from relational data sources * Create dynamic reports with parameters * Get data from a NoSQL database * Get data from online services * Select a storage mode * Get data from Azure Analysis Services * Fix performance issues * Resolve data import errors 4 - CLEAN, TRANSFORM, AND LOAD DATA IN POWER BI * Shape the initial data * Simplify the data structure * Evaluate and change column data types * Combine multiple tables into a single table * Profile data in Power BI * Use Advanced Editor to modify M code 5 - DESIGN A SEMANTIC MODEL IN POWER BI * Work with tables * Create a date table * Work with dimensions * Define data granularity * Work with relationships and cardinality * Resolve modeling challenges 6 - ADD MEASURES TO POWER BI DESKTOP MODELS * Create simple measures * Create compound measures * Create quick measures * Compare calculated columns with measures 7 - ADD CALCULATED TABLES AND COLUMNS TO POWER BI DESKTOP MODELS * Create calculated columns * Learn about row context * Choose a technique to add a column 8 - USE DAX TIME INTELLIGENCE FUNCTIONS IN POWER BI DESKTOP MODELS * Use DAX time intelligence functions * Additional time intelligence calculations 9 - OPTIMIZE A MODEL FOR PERFORMANCE IN POWER BI * Review performance of measures, relationships, and visuals * Use variables to improve performance and troubleshooting * Reduce cardinality * Optimize DirectQuery models with table level storage * Create and manage aggregations 10 - DESIGN POWER BI REPORTS * Design the analytical report layout * Design visually appealing reports * Report objects * Select report visuals * Select report visuals to suit the report layout * Format and configure visualizations * Work with key performance indicators 11 - CONFIGURE POWER BI REPORT FILTERS * Apply filters to the report structure * Apply filters with slicers * Design reports with advanced filtering techniques * Consumption-time filtering * Select report filter techniques * Case study - Configure report filters based on feedback 12 - ENHANCE POWER BI REPORT DESIGNS FOR THE USER EXPERIENCE * Design reports to show details * Design reports to highlight values * Design reports that behave like apps * Work with bookmarks * Design reports for navigation * Work with visual headers * Design reports with built-in assistance * Tune report performance * Optimize reports for mobile use 13 - PERFORM ANALYTICS IN POWER BI * Explore statistical summary * Identify outliers with Power BI visuals * Group and bin data for analysis * Apply clustering techniques * Conduct time series analysis * Use the Analyze feature * Create what-if parameters * Use specialized visuals 14 - CREATE AND MANAGE WORKSPACES IN POWER BI * Distribute a report or dashboard * Monitor usage and performance * Recommend a development life cycle strategy * Troubleshoot data by viewing its lineage * Configure data protection 15 - MANAGE SEMANTIC MODELS IN POWER BI * Use a Power BI gateway to connect to on-premises data sources * Configure a semantic model scheduled refresh * Configure incremental refresh settings * Manage and promote semantic models * Troubleshoot service connectivity * Boost performance with query caching (Premium) 16 - CREATE DASHBOARDS IN POWER BI * Configure data alerts * Explore data by asking questions * Review Quick insights * Add a dashboard theme * Pin a live report page to a dashboard * Configure a real-time dashboard * Set mobile view 17 - IMPLEMENT ROW-LEVEL SECURITY * Configure row-level security with the static method * Configure row-level security with the dynamic method ADDITIONAL COURSE DETAILS: Nexus Humans PL-300T00: Microsoft Power BI Data Analyst training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PL-300T00: Microsoft Power BI Data Analyst course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

PL-300T00 Microsoft Power BI Data Analyst
Delivered Online4 days, May 20th, 08:30 + 19 more
£1785

Level 3 Award in Education & Training (AET) Course

By Canary Wharf Academy

Course Overview: Our Level 3 Award in Education and Training (AET) is perfect for those looking to enter the adult teaching industry in the UK and beyond. This course provides a comprehensive understanding of teaching roles, planning inclusive sessions, assessment principles, and creating supportive learning environments. Delivered online or in-class with full tutor support, our course materials are accessible anytime, anywhere, through our student portal. Sector Covered: This qualification is highly sought-after across various industries, including healthcare, beauty, education, security, and more. From healthcare professionals to educators and trainers, the Level 3 AET equips individuals with the necessary skills to excel in their respective fields. Course Outlines: * Understanding teacher/trainer roles and responsibilities * Building effective relationships in education and training * Implementing inclusive teaching approaches * Principles of assessment * Creating safe and supportive learning environments * Motivating learners * Planning, delivering, and evaluating teaching sessions * Exploring different assessment methods * Managing potential problems in teaching * Utilizing teaching equipment and aids * Practical teaching sessions (Teaching concepts and techniques) Entry Requirement: Basic functional skills (Numeracy, Literacy, ICT) are required. However, individuals with experience or competence may opt for the distance learning course. How it Works: With our self-study method and tutor support, our online or distance learning option provides flexibility. Upon enrollment, you'll receive all necessary materials and access to the student portal. Complete assignments within 12 weeks, and upon finishing earlier, receive your certificate promptly. A 1-day micro-teach on your chosen topic is required, where you'll showcase your teaching abilities. Corporate or Group Booking: Enjoy special discounts for corporate or group bookings. Our experienced trainers can conduct sessions at your location. Contact us to arrange corporate or group training. Assessment: No formal examination is required. Instead, submit a portfolio at the end of the course. Course Fee: * Distance Learning Online: £197.00 (all inclusive) * Webinar (Zoom) Live Class: £259.99 (all inclusive) * Face-to-Face Class: £279.99 (inside London) / £329.99 (outside London) (all inclusive) Book Now [https://canarywharfacademy.co.uk/level-3-aet-course/]

Level 3 Award in Education & Training (AET) Course
Delivered Online or in personTwo days, May 20th, 09:00
£197

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites * CompTIA Network+ Certification 1 - SECURITY AND RISK MANAGEMENT * Security Governance Principles * Compliance * Professional Ethics * Security Documentation * Risk Management * Threat Modeling * Business Continuity Plan Fundamentals * Acquisition Strategy and Practice * Personnel Security Policies * Security Awareness and Training 2 - ASSET SECURITY * Asset Classification * Privacy Protection * Asset Retention * Data Security Controls * Secure Data Handling 3 - SECURITY ENGINEERING * Security in the Engineering Lifecycle * System Component Security * Security Models * Controls and Countermeasures in Enterprise Security * Information System Security Capabilities * Design and Architecture Vulnerability Mitigation * Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems * Cryptography Concepts * Cryptography Techniques * Site and Facility Design for Physical Security * Physical Security Implementation in Sites and Facilities 4 - INFORMATION SECURITY MANAGEMENT GOALS * Organizational Security * The Application of Security Concepts 5 - INFORMATION SECURITY CLASSIFICATION AND PROGRAM DEVELOPMENT * Information Classification * Security Program Development 6 - RISK MANAGEMENT AND ETHICS * Risk Management * Ethics 7 - SOFTWARE DEVELOPMENT SECURITY * Software Configuration Management * Software Controls * Database System Security 8 - CRYPTOGRAPHY * Ciphers and Cryptography * Symmetric-Key Cryptography * Asymmetric-Key Cryptography * Hashing and Message Digests * Email, Internet, and Wireless Security * Cryptographic Weaknesses 9 - PHYSICAL SECURITY * Physical Access Control * Physical Access Monitoring * Physical Security Methods * Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online6 days, May 20th, 13:00 + 9 more
£3395

CompTIA Advanced Security Practitioner (CASP+)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted toward an IT Professional that has the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. Students should have a minimum of 10 years experience including at least 5 years of hands-on technical security experience. Overview Upon successful completion of this course, students will be able to: Identify enterprise security fundamentals. Apply enterprise security technology solutions. Implement security design and solutions. Manage risk, policies and procedures within an enterprise. Integrate security solutions within an enterprise. Conduct security research and analysis. In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security. Prerequisites * CompTIA Cybersecurity Analyst (CySA+) Certification 1 - ENTERPRISE SECURITY ARCHITECTURE * The Basics of Enterprise Security * The Enterprise Structure * Enterprise Security Requirements 2 - ENTERPRISE SECURITY TECHNOLOGY * Common Network Security Components and Technologies * Communications and Collaboration Security * Cryptographic Tools and Techniques * Advanced Authentication 3 - ENTERPRISE RESOURCE TECHNOLOGY * Enterprise Storage Security Issues * Distributed, Shared, and Virtualized Computing * Cloud Computing and Security 4 - SECURITY DESIGN AND SOLUTIONS * Network Security Design * Conduct a Security Assessment * Host Security 5 - APPLICATION SECURITY DESIGN * Application Security Basics * Web Application Security 6 - MANAGING RISK, SECURITY POLICIES, AND SECURITY PROCEDURES * Analyze Security Risk * Implement Risk Mitigation Strategies and Controls * Implement Enterprise-Level Security Policies and Procedures * Prepare for Incident Response and Recovery 7 - ENTERPRISE SECURITY INTEGRATION * The Technology Life Cycle * Inter-Organizational Change * Integrate Enterprise Disciplines to Achieve Secure Solutions 8 - SECURITY RESEARCH AND ANALYSIS * Perform an Industry Trends and Impact Analysis * Perform an Enterprise Security Analysis

CompTIA Advanced Security Practitioner (CASP+)
Delivered Online6 days, May 20th, 13:00 + 3 more
£3295

CompTIA A+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician. This course is also designed for students who are seeking the CompTIA A+ certification and who want to prepare for the CompTIA A+ Core 1 220-1101 Certification Exam and the CompTIA A+ Core 2 220-1102 Certification Exam. Overview On course completion, participants will be able to: Support operating systems. Install and configure PC system unit components and peripheral devices. Install, configure, and troubleshoot display and multimedia devices. Install, configure, and troubleshoot storage devices. Install, configure, and troubleshoot internal system components. Install, configure, and maintain operating systems. Maintain and troubleshoot Microsoft Windows. Explain network infrastructure concepts. Configure and troubleshoot network connections. Manage users, workstations, and shared resources. Implement client virtualization and cloud computing. Implement physical security. Secure workstations and data. Troubleshoot workstation security issues. Support and troubleshoot laptops. Support and troubleshoot mobile devices. Install, configure, and troubleshoot print devices. Implement operational procedures. CompTIA A+ certified professionals are proven problem solvers. They support today's core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today's digital world. It is the only industry recognized credential with performance-based items to prove pros can think on their feet to perform critical IT support tasks in the moment. It is trusted by employers around the world to identify the go-to person in end point management and technical support roles. CompTIA A+ is regularly re-invented by IT experts to ensure that it validates core skills and abilities demanded in the workplace. 1 - INSTALLING MOTHERBOARDS AND CONNECTORS * Explain Cable Types and Connectors * Install and Configure Motherboards * Explain Legacy Cable Types 2 - INSTALLING SYSTEM DEVICES * Install and Configure Power Supplies and Cooling * Select and Install Storage Devices * Install and Configure System Memory * Install and Configure CPUs 3 - TROUBLESHOOTING PC HARDWARE * Apply Troubleshooting Methodology * Configure BIOS/UEFI * Troubleshoot Power and Disk Issues * Troubleshoot System and Display Issues 4 - COMPARING LOCAL NETWORKING HARDWARE * Compare Network Types * Compare Networking Hardware * Explain Network Cable Types * Compare Wireless Networking Types 5 - CONFIGURING NETWORK ADDRESSING AND INTERNET CONNECTIONS * Compare Internet Connection Types * Use Basic TCP/IP Concepts * Compare Protocols and Ports * Compare Network Configuration Concepts 6 - SUPPORTING NETWORK SERVICES * Summarize Services Provided by Networked Hosts * Compare Internet and Embedded Appliances * Troubleshoot Networks 7 - SUMMARIZING VIRTUALIZATION AND CLOUD CONCEPTS * Summarize Client-Side Virtualization * Summarize Cloud Concepts 8 - SUPPORTING MOBILE DEVICES * Set Up Mobile Devices and Peripherals * Configure Mobile Device Apps * Install and Configure Laptop Hardware * Troubleshoot Mobile Device Issues 9 - SUPPORTING PRINT DEVICES * Deploy Printer and Multifunction Devices * Replace Print Device Consumables * Troubleshoot Print Device Issues 10 - CONFIGURING WINDOWS * Configure Windows User Settings * Configure Windows System Settings 11 - MANAGING WINDOWS * Use Management Consoles * Use Performance and Troubleshooting Tools * Use Command-line Tools 12 - IDENTIFYING OS TYPES AND FEATURES * Explain OS Types * Compare Windows Editions 13 - SUPPORTING WINDOWS * Perform OS Installations and Upgrades * Install and Configure Applications * Troubleshoot Windows OS Problems 14 - MANAGING WINDOWS NETWORKING * Manage Windows Networking * Troubleshoot Windows Networking * Configure Windows Security Settings * Manage Windows Shares 15 - MANAGING LINUX AND MACOS * Identify Features of Linux * Identify Features of macOS 16 - CONFIGURING SOHO NETWORK SECURITY * Explain Attacks, Threats, and Vulnerabilities * Compare Wireless Security Protocols * Configure SOHO Router Security * Summarize Security Measures 17 - MANAGING SECURITY SETTINGS * Configure Workstation Security * Configure Browser Security * Troubleshoot Workstation Security Issues 18 - SUPPORTING MOBILE SOFTWARE * Configure Mobile OS Security * Troubleshoot Mobile OS and App Software * Troubleshoot Mobile OS and App Security 19 - USING SUPPORT AND SCRIPTING TOOLS * Use Remote Access Technologies * Implement Backup and Recovery * Explain Data Handling Best Practices * Identify Basics of Scripting 20 - IMPLEMENTING OPERATIONAL PROCEDURES * Implement Best Practice Documentation * Use Proper Communication Techniques * Use Common Safety and Environmental Procedures

CompTIA A+
Delivered Online6 days, May 20th, 13:00 + 12 more
£2475

CompTIA A+ Certification (Exams 220-1101 and 220-1102)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted to those seeking A+ Certification and anyone in these roles: IT Support Specialist Helpdesk Technician Field Technician Tier I Support Specialist Desktop Support Specialist Associate Network Engineer Systems Support Technician Junior Systems Administrator Overview At completion of this course, you will be able to: Install and configure end-user devices and software Address connectivity problems Perform basic cybersecurity mitigations Troubleshoot common problems to diagnose and resolve issues Demonstrate basic knowledge of scripting, the cloud, and virtualization CompTIA A+ certified professionals are proven problem solvers. They support today?s core technologies from security to networking to virtualization and more. CompTIA A+ is the industry standard for launching IT careers into today?s digital world. This course, prepares you for the CompTIA A+ Certification exams 220-1101 and 220-1102. LESSON 1: INSTALLING MOTHERBOARDS AND CONNECTORS * Topic 1A: Explain Cable Types and Connectors * Topic 1B: Install and Configure Motherboards * Topic 1C: Explain Legacy Cable Types LESSON 2: INSTALLING SYSTEM DEVICES * Topic 2A: Install and Configure Power Supplies and Cooling * Topic 2B: Select and Install Storage Devices * Topic 2C: Install and Configure System Memory * Topic 2D: Install and Configure CPUs LESSON 3: TROUBLESHOOTING PC HARDWARE * Topic 3A: Apply Troubleshooting Methodology * Topic 3B: Configure BIOS/UEFI * Topic 3C: Troubleshoot Power and Disk Issues * Topic 3D: Troubleshoot System and Display Issues LESSON 4: COMPARING LOCAL NETWORKING HARDWARE * Topic 4A: Compare Network Types * Topic 4B: Compare Networking Hardware * Topic 4C: Explain Network Cable Types * Topic 4D: Compare Wireless Networking Types LESSON 5: CONFIGURING NETWORK ADDRESSING AND INTERNET CONNECTIONS * Topic 5A: Compare Internet Connection Types * Topic 5B: Use Basic TCP/IP Concepts * Topic 5C: Compare Protocols and Ports * Topic 5D: Compare Network Configuration Concepts LESSON 6: SUPPORTING NETWORK SERVICES * Topic 6A: Summarize Services Provided by Networked Hosts * Topic 6B: Compare Internet and Embedded Appliances * Topic 6C: Troubleshoot Networks LESSON 7: SUMMARIZING VIRTUALIZATION AND CLOUD CONCEPTS * Topic 7A: Summarize Client-Side Virtualization * Topic 7B: Summarize Cloud Concepts LESSON 8: SUPPORTING MOBILE DEVICES * Topic 8A: Set Up Mobile Devices and Peripherals * Topic 8B: Configure Mobile Device Apps * Topic 8C: Install and Configure Laptop Hardware * Topic 8D: Troubleshoot Mobile Device Issues LESSON 9: SUPPORTING PRINT DEVICES * Topic 9A: Deploy Printer and Multifunction Devices * Topic 9B: Replace Print Device Consumables * Topic 9C: Troubleshoot Print Device Issues LESSON 10: CONFIGURING WINDOWS * Topic 10A: Configure Windows User Settings * Topic 10B: Configure Windows System Settings LESSON 11: MANAGING WINDOWS * Topic 11A: Use Management Consoles * Topic 11B: Use Performance and Troubleshooting Tools * Topic 11C: Use Command-line Tools LESSON 12: IDENTIFYING OS TYPES AND FEATURES * Topic 12A: Explain OS Types * Topic 12B: Compare Windows Editions LESSON 13: SUPPORTING WINDOWS * Topic 13A: Perform OS Installations and Upgrades * Topic 13B: Install and Configure Applications * Topic 13C: Troubleshoot Windows OS Problems LESSON 14: MANAGING WINDOWS NETWORKING * Topic 14A: Manage Windows Networking * Topic 14B: Troubleshoot Windows Networking * Topic 14C: Configure Windows Security Settings * Topic 14D: Manage Windows Shares LESSON 15: MANAGING LINUX AND MACOS * Topic 15A: Identify Features of Linux * Topic 15B: Identify Features of macOS LESSON 16: CONFIGURING SOHO NETWORK SECURITY * Topic 16A: Explain Attacks, Threats, and Vulnerabilities * Topic 16B: Compare Wireless Security Protocols * Topic 16C: Configure SOHO Router Security * Topic 16D: Summarize Security Measures LESSON 17: MANAGING SECURITY SETTINGS * Topic 17A: Configure Workstation Security * Topic 17B: Configure Browser Security * Topic 17C: Troubleshoot Workstation Security Issues LESSON 18: SUPPORTING MOBILE SOFTWARE * Topic 18A: Configure Mobile OS Security * Topic 18B: Troubleshoot Mobile OS and App Software * Topic 18C: Troubleshoot Mobile OS and App Security LESSON 19: USING SUPPORT AND SCRIPTING TOOLS * Topic 19A: Use Remote Access Technologies * Topic 19B: Implement Backup and Recovery * Topic 19C: Explain Data Handling Best Practices * Topic 19D: Identify Basics of Scripting LESSON 20: IMPLEMENTING OPERATIONAL PROCEDURES * Topic 20A: Implement Best Practice Documentation * Topic 20B: Use Proper Communication Techniques * Topic 20C: Use Common Safety and Environmental Procedures

CompTIA A+ Certification (Exams 220-1101 and 220-1102)
Delivered Online6 days, May 20th, 13:00 + 12 more
£2475

CompTIA A+ Part 1

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician. This course is also designed for students who are seeking the CompTIA A+ certification. Overview Install and configure mobile devices Compare and contrast networking hardware Configure internet connections and wireless networking Troubleshoot hardware and networks Install motherboards, RAM, storage devices, CPUs and add-on cards Deploy and configure connected devices Summarize cloud-computing concepts and virtualization CompTIA A+ certified professionals are proven problem solvers. They support today's core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today's digital world. It is the only industry-recognized credential with performance-based items to prove pros can think on their feet to perform critical IT support tasks in the moment. It is trusted by employers around the world to identify the go-to person in end-point management and technical support roles. CompTIA A+ is regularly re-invented by IT experts to ensure that it validates core skills and abilities demanded in the workplace. Prerequisites While there are no prerequisites for this course, please ensure you have the right level of experience to be successful in this training. LESSON 1: INSTALLING MOTHERBOARDS AND CONNECTORS * Topic 1A: Explain Cable Types and Connectors * Topic 1B: Install and Configure Motherboards * Topic 1C: Explain Legacy Cable Types LESSON 2: INSTALLING SYSTEM DEVICES * Topic 2A: Install and Configure Power Supplies and Cooling * Topic 2B: Select and Install Storage Devices * Topic 2C: Install and Configure System Memory * Topic 2D: Install and Configure CPUs LESSON 3: TROUBLESHOOTING PC HARDWARE * Topic 3A: Apply Troubleshooting Methodology * Topic 3B: Configure BIOS/UEFI * Topic 3C: Troubleshoot Power and Disk Issues * Topic 3D: Troubleshoot System and Display Issues LESSON 4: COMPARING LOCAL NETWORKING HARDWARE * Topic 4A: Compare Network Types * Topic 4B: Compare Networking Hardware * Topic 4C: Explain Network Cable Types * Topic 4D: Compare Wireless Networking Types LESSON 5: CONFIGURING NETWORK ADDRESSING AND INTERNET CONNECTIONS * Topic 5A: Compare Internet Connection Types * Topic 5B: Use Basic TCP/IP Concepts * Topic 5C: Compare Protocols and Ports * Topic 5D: Compare Network Configuration Concepts LESSON 6: SUPPORTING NETWORK SERVICES * Topic 6A: Summarize Services Provided by Networked Hosts * Topic 6B: Compare Internet and Embedded Appliances * Topic 6C: Troubleshoot Networks LESSON 7: SUMMARIZING VIRTUALIZATION AND CLOUD CONCEPTS * Topic 7A: Summarize Client-Side Virtualization * Topic 7B: Summarize Cloud Concepts * Lesson 8: Supporting Mobile Devices * Topic 8A: Set Up Mobile Devices and Peripherals * Topic 8B: Configure Mobile Device Apps * Topic 8C: Install and Configure Laptop Hardware * Topic 8D: Troubleshoot Mobile Device Issues LESSON 9: SUPPORTING PRINT DEVICES * Topic 9A: Deploy Printer and Multifunction Devices * Topic 9B: Replace Print Device Consumables * Topic 9C: Troubleshoot Print Device Issues

CompTIA A+ Part 1
Delivered Online6 days, May 20th, 13:00 + 2 more
£2475

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. LESSON 1: SUMMARIZE FUNDAMENTAL SECURITY CONCEPTS * Security Concepts * Security Controls LESSON 2: COMPARE THREAT TYPES * Threat Actors * Attack Surfaces * Social Engineering LESSON 3: EXPLAIN CRYPTOGRAPHIC SOLUTIONS * Cryptographic Algorithms * Public Key Infrastructure * Cryptographic Solutions LESSON 4: IMPLEMENT IDENTITY AND ACCESS MANAGEMENT * Authentication * Authorization * Identity Management LESSON 5: SECURE ENTERPRISE NETWORK ARCHITECTURE * Enterprise Network Architecture * Network Security Appliances * Secure Communications LESSON 6: SECURE CLOUD NETWORK ARCHITECTURE * Cloud Infrastructure * Embedded Systems and Zero Trust Architecture LESSON 7: EXPLAIN RESILIENCY AND SITE SECURITY CONCEPTS * Asset Management * Redundancy Strategies * Physical Security LESSON 8: EXPLAIN VULNERABILITY MANAGEMENT * Device and OS Vulnerabilities * Application and Cloud Vulnerabilities * Vulnerability Identification Methods * Vulnerability Analysis and Remediation LESSON 9: EVALUATE NETWORK SECURITY CAPABILITIES * Network Security Baselines * Network Security Capability Enhancement LESSON 10: ASSESS ENDPOINT SECURITY CAPABILITIES * Implement Endpoint Security * Mobile Device Hardening LESSON 11: ENHANCE APPLICATION SECURITY CAPABILITIES * Application Protocol Security Baselines * Cloud and Web Application Security Concepts LESSON 12: EXPLAIN INCIDENT RESPONSE AND MONITORING CONCEPTS * Incident Response * Digital Forensics * Data Sources * Alerting and Monitoring Tools LESSON 13: ANALYZE INDICATORS OF MALICIOUS ACTIVITY * Malware Attack Indicators * Physical and Network Attack Indicators * Application Attack Indicators LESSON 14: SUMMARIZE SECURITY GOVERNANCE CONCEPTS * Policies, Standards, and Procedures * Change Management * Automation and Orchestration LESSON 15: EXPLAIN RISK MANAGEMENT PROCESSES * Risk Management Processes and Concepts * Vendor Management Concepts * Audits and Assessments LESSON 16: SUMMARIZE DATA PROTECTION AND COMPLIANCE CONCEPTS * Data Classification and Compliance * Personnel Policies ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered Online5 days, May 20th, 15:00 + 26 more
£2475

Educators matching "Security"

Show all 5949
Net Security Training

net security training

3.7(6)

London

Net Security Training is an independent specialist Cyber Security training company whose total focus is the provision of specialised courses and appreticeships catering for Cyber Security and Information Assurance professionals. CyberSecurity, IT Security, Information Risk Management, Compliance and Governance training are the cornerstone of our course offerings. We have invested heavily in establishing our credentials by working with the very best certification and examination bodies. We are approved and/or endorsed by the leading players in the cyber security industry to deliver training to their exact standards. We have been pioneers in commissioning, developing and introducing high end material in to the market place for courses and apprenticeships Longest established Cyber Security Training specialist in the UK, since 2003 11000+ Trained Globally- including FTSE 250 Content developed by industry Professionals Classroom based small, highly interactive sessions – which encourages active learner participation The escalating complexity of Technology and Business needs will always result in companies being exposed to security threats, and most networks will be breached if faced with a sustained attack. The key to minimising the damage hackers do when they inevitably force their way on to corporate networks is to make sure your Cyber Security staff are knowledgeable enough to respond appropriately to minimise the harm Intruders can cause to the Organisation. Our History Net-Security Training is the first specialist Information Security training company in the United Kingdom. We have kept true to this niche market since our incorporation in 2003. In-fact we were the only independent training Partner that VeriSign ever approved in Europe. We have been pioneers in commissioning, developing and introducing high end course materials in to the market place. These include Penetration Testing, Securing Network Perimeter, Public Key Infrastructure, Firewalls, Virtual Private Networks, Computer Hacking, IT Security Principals, Security Awareness and many more. Our history is testament to why we have continued to stay ahead of the curve in our fast moving Industry.