• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

124 Educators providing Shell courses

Courses matching "Shell"

Show all 410

CompTIA Linux+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for IT professionals whose primary job responsibility is the management of servers and other devices running the Linux operating system. A typical student in this course should have at least nine months of hands-on Linux experience and at least one and a half years of IT experience in other computing environments. The target student should wish to expand their skillset to support their career in Linux system administration and operation. This course is also designed for students who are seeking the CompTIA Linux+ certification and who want to prepare for Exam XK0-005. The Linux+ certification can validate the student's understanding and skill in configuring, monitoring, and supporting Linux systems. Overview In this course, you will configure, operate, and troubleshoot Linux systems. You will: - Perform basic Linux tasks. - Manage users and groups. - Manage permissions and ownership. - Manage storage. - Manage files and directories. - Manage kernel modules. - Manage the Linux boot process. - Manage system components. - Manage devices. - Manage networking. - Manage packages and software. - Secure Linux systems. - Write and execute Bash shell scripts. - Automate tasks. - Plan and perform a Linux installation. The Official CompTIA© Linux+© courseware builds on your existing experience with systems operations and administration to provide you with the knowledge and skills required to configure, manage, operate, and troubleshoot a Linux environment by using security best practices, scripting, and automation. This course will also prepare you for the Exam XKO-005. 1 - PERFORMING BASIC LINUX TASKS * Identify the History and Development of Linux * Enter Shell Commands * Get Help Using Linux 2 - MANAGING USERS AND GROUPS * Assume Superuser Privileges * Create, Modify, and Delete Users * Create, Modify, and Delete Groups * Query Users and Groups * Configure Account Profiles 3 - MANAGING PERMISSIONS AND OWNERSHIP * Modify File and Directory Permissions * Modify File and Directory Ownership * Configure Special Permissions and Attributes * Troubleshoot Permissions Issues 4 - MANAGING STORAGE * Create Partitions * Manage Logical Volumes * Mount File Systems * Manage File Systems * Navigate the Linux Directory Structure * Troubleshoot Storage Issues 5 - MANAGING FILES AND DIRECTORIES * Create and Edit Text Files * Search for Files * Perform Operations on Files and Directories * Process Text Files * Manipulate File Output 6 - MANAGING KERNEL MODULES * Explore the Linux Kernel * Install and Configure Kernel Modules * Monitor Kernel Modules 7 - MANAGING THE LINUX BOOT PROCESS * Configure Linux Boot Components * Configure GRUB 2 8 - MANAGING SYSTEM COMPONENTS * Configure Localization Options * Configure GUIs * Manage Services * Troubleshoot Process Issues * Troubleshoot CPU and Memory Issues 9 - MANAGING DEVICES * Identify the Types of Linux Devices * Configure Devices * Monitor Devices * Troubleshoot Hardware Issues 10 - MANAGING NETWORKING * Identify TCP/IP Fundamentals * Identify Linux Server Roles * Connect to a Network * Configure DHCP and DNS Client Services * Configure Cloud and Virtualization Technologies * Troubleshoot Networking Issues 11 - MANAGING PACKAGES AND SOFTWARE * Identify Package Managers * Manage RPM Packages with YUM * Manage Debian Packages with APT * Configure Repositories * Acquire Software * Build Software from Source Code * Troubleshoot Software Dependency Issues 12 - SECURING LINUX SYSTEMS * Implement Cybersecurity Best Practices * Implement Identity and Access Management Methods * Configure SELinux or AppArmor * Configure Firewalls * Implement Logging Services * Back Up, Restore, and Verify Data 13 - WORKING WITH BASH SCRIPTS * Customize the Bash Shell Environment * Identify Scripting and Programming Fundamentals * Write and Execute a Simple Bash Script * Incorporate Control Statements in Bash Scripts 14 - AUTOMATING TASKS * Schedule Jobs * Implement Version Control Using Git * Identify Orchestration Concepts 15 - INSTALLING LINUX * Prepare for Linux Installation * Perform the Installation ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Linux Plus Certification (Exam XK0-005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Linux Plus Certification (Exam XK0-005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Linux+
Delivered Online6 days, Jun 17th, 13:00 + 3 more
£2475

AZ-040T00 Automating Administration with Powershell

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT Professionals who are already experienced in general Windows Server, Windows client, Azure, and Microsoft 365 administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of PowerShell or any scripting language is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Microsoft Exchange Server, Microsoft SharePoint Server, and Microsoft SQL Server. This course provides students with the fundamental knowledge and skills to use PowerShell for administering and automating administration of Windows servers. This course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports. This course provides prerequisite skills supporting a broad range of Microsoft products, including Windows Server, Windows Client, Microsoft Azure, and Microsoft 365. In keeping with that goal, this course will not focus on any one of those products, although Windows Server, which is the common platform for all of those products, will serve as the example for the techniques this course teaches. Prerequisites Before attending this course, students must have: * -Experience with Windows networking technologies and implementation. * - Experience with Windows Server administration, maintenance, and troubleshooting. 1 - REVIEW WINDOWS POWERSHELL * Learn about Windows PowerShell * Get familiar with Windows PowerShell applications * Identify factors to install and use Windows PowerShell * Configure the Windows PowerShell console * Configure the Windows PowerShell Integrated Scripting Environment (ISE) * Use Visual Studio Code with PowerShell 2 - UNDERSTAND THE COMMAND SYNTAX IN WINDOWS POWERSHELL * Discover the structure of PowerShell cmdlets * Discover the parameters for using PowerShell cmdlets * Review the tab completion feature in PowerShell * Display the About files content in PowerShell 3 - FIND COMMANDS AND GET-HELP IN WINDOWS POWERSHELL * Define modules in PowerShell * Find cmdlets in PowerShell * Use command aliases in PowerShell * Use Show-Command and Get-Help in PowerShell * Interpret the help file contents and update the local help content in PowerShell 4 - MANAGE ACTIVE DIRECTORY DOMAIN SERVICES USING POWERSHELL CMDLETS * Manage user accounts in PowerShell * Manage groups and group memberships in PowerShell * Manage computer accounts in PowerShell * Manage organizational units and Active Directory objects in PowerShell 5 - MANAGE NETWORK SERVICE SETTINGS FOR WINDOWS DEVICES USING POWERSHELL CMDLETS * Manage IP addresses in PowerShell * Manage IP routing in PowerShell * Manage DNS clients in PowerShell * Manage Windows Firewall settings in PowerShell 6 - MANAGE WINDOWS SERVER SETTINGS USING POWERSHELL CMDLETS * Automate management tasks using the Group Policy management cmdlets * Manage server roles and services using PowerShell cmdlets * Manage Hyper-V Virtual Machines using PowerShell cmdlets * Manage Internet Information Services using PowerShell cmdlets 7 - MANAGE SETTINGS FOR A LOCAL WINDOWS MACHINE USING POWERSHELL CMDLETS * Manage Windows 10 using PowerShell * Manage permissions with PowerShell 8 - UNDERSTAND THE WINDOWS POWERSHELL PIPELINE * Review Windows PowerShell pipeline and its output * Discover object members in PowerShell * Control the formatting of pipeline output 9 - SELECT, SORT, AND MEASURE OBJECTS USING THE PIPELINE * Sort and group objects by property in the pipeline * Measure objects in the pipeline * Select a set of objects in the pipeline * Select object properties in the pipeline * Create and format calculated properties in the pipeline 10 - FILTER OBJECTS OUT OF THE PIPELINE * Learn about the comparison operators in PowerShell * Review basic filter syntax in the pipeline * Review advanced filter syntax in the pipeline * Optimize the filter performance in the pipeline 11 - ENUMERATE OBJECTS IN THE PIPELINE * Learn about enumerations in the pipeline * Review basic syntax to enumerate objects in the pipeline * Review advanced syntax to enumerate objects in the pipeline 12 - SEND AND PASS DATA AS OUTPUT FROM THE PIPELINE * Write pipeline data to a file * Convert pipeline objects to other forms of data representation in PowerShell * Control additional output options in PowerShell 13 - PASS PIPELINE OBJECTS * Pipeline parameter binding * Identify ByValue parameters * Pass data by using ByValue * Pass data by using ByPropertyName * Identify ByPropertyName parameters * Use manual parameters to override the pipeline * Use parenthetical commands * Expand property values 14 - CONNECT WITH DATA STORES USING POWERSHELL PROVIDERS * Define Windows PowerShell providers * Review the built-in providers in PowerShell * Access provider help in PowerShell 15 - USE POWERSHELL DRIVES IN POWERSHELL * Explain PowerShell drives in PowerShell * Use PowerShell drive cmdlets in PowerShell * Manage the file system in PowerShell * Manage the registry in PowerShell * Work with certificates in PowerShell * Work with other PowerShell drives in PowerShell 16 - REVIEW CIM AND WMI * Review architecture of CIM and WMI * Review repositories in CIM and WMI * Locate online class documentation by using CIM and WMI cmdlets 17 - QUERY CONFIGURATION INFORMATION BY USING CIM AND WMI * List local repository namespaces and classes by using CIM and WMI * Query instances by using commands and WMI Query Language * Connect to remote computers by using CIM and WMI cmdlets * Query repository classes from remote computers by using CIMSession objects 18 - QUERY AND MANIPULATE REPOSITORY OBJECTS BY USING CIM AND WMI METHODS * Discover methods of repository objects by using CIM and WMI * Locate class methods and documentation by using CIM and WMI * Invoke methods of repository objects by using CIM and WMI 19 - MANAGE VARIABLES IN WINDOWS POWERSHELL SCRIPTS * Define variables in Windows PowerShell scripts * Create variable names in Windows PowerShell scripts * Assign values and types to variables in Windows PowerShell scripts * Identify the methods and properties of variables in Windows PowerShell scripts * Use string variables and methods in Windows PowerShell scripts * Use date variables and methods in Windows PowerShell scripts 20 - WORK WITH ARRAYS AND HASH TABLES IN WINDOWS POWERSHELL SCRIPTS * Define an array in Windows PowerShell scripts * Work with array lists in Windows PowerShell scripts * Define hash tables in Windows PowerShell Scripts * Work with hash tables in Windows PowerShell scripts 21 - CREATE AND RUN SCRIPTS BY USING WINDOWS POWERSHELL * Review Windows PowerShell scripts * Modify scripts in the PowerShell Gallery * Create scripts using Windows PowerShell * Review the PowerShellGet module in Windows PowerShell * Run scripts and set the execution policy in Windows PowerShell * Review Windows PowerShell and AppLocker * Sign the scripts digitally in Windows PowerShell 22 - WORK WITH SCRIPTING CONSTRUCTS IN WINDOWS POWERSHELL * Review and use the ForEach loop in Windows PowerShell scripts * Review and use the If construct in Windows PowerShell scripts * Review and use the Switch construct in Windows PowerShell scripts * Review the For construct in Windows PowerShell scripts * Review other loop constructs in Windows PowerShell scripts * Review Break and Continue in Windows PowerShell scripts 23 - IMPORT DATA IN DIFFERENT FORMATS FOR USE IN SCRIPTS BY USING WINDOWS POWERSHELL CMDLETS * Use the Get-Content command in Windows PowerShell scripts * Use the Import-Csv cmdlet in Windows PowerShell scripts * Use the Import-Clixml cmdlet in Windows PowerShell scripts * Use the ConvertFrom-Json cmdlet in Windows PowerShell scripts 24 - USE METHODS TO ACCEPT USER INPUTS IN WINDOWS POWERSHELL SCRIPTS * Identify values that might change in Windows PowerShell scripts * Use the Read-Host cmdlet in Windows PowerShell scripts * Use the Get-Credential cmdlet in Windows PowerShell scripts * Use the Out-GridView cmdlet in Windows PowerShell scripts * Pass parameters to a Windows PowerShell script 25 - TROUBLESHOOT SCRIPTS AND HANDLE ERRORS IN WINDOWS POWERSHELL * Interpret error messages generated for Windows PowerShell commands * Add output to Windows PowerShell scripts * Use breakpoints in Windows PowerShell scripts * Interpret error actions for Windows PowerShell commands 26 - USE FUNCTIONS AND MODULES IN WINDOWS POWERSHELL SCRIPTS * Review functions in Windows PowerShell scripts * Use variable scope in Windows PowerShell scripts * Create modules in Windows PowerShell scripts * Use the dot sourcing feature in Windows PowerShell 27 - MANAGE SINGLE AND MULTIPLE COMPUTERS BY USING WINDOWS POWERSHELL REMOTING * Review the remoting feature of Windows PowerShell * Compare remoting with remote connectivity * Review the remoting security feature of Windows PowerShell * Enable remoting by using Windows PowerShell * Use one-to-one remoting by using Windows PowerShell * Use one-to-many remoting by using Windows PowerShell * Compare remoting output with local output 28 - USE ADVANCED WINDOWS POWERSHELL REMOTING TECHNIQUES * Review common remoting techniques of Windows PowerShell * Send parameters to remote computers in Windows PowerShell * Set access protection to variables, aliases, and functions by using the scope modifier * Enable multi-hop remoting in Windows PowerShell 29 - MANAGE PERSISTENT CONNECTIONS TO REMOTE COMPUTERS BY USING WINDOWS POWERSHELL SESSIONS * Review persistent connections in Windows PowerShell * Create and manage persistent PSSessions by using Windows PowerShell * Disconnect PSSessions by using Windows PowerShell * Review the feature of implicit remoting in Windows PowerShell 30 - REVIEW AZURE POWERSHELL MODULE * Review Azure PowerShell * Review the benefits of the Azure PowerShell module * Install the Azure PowerShell module * Migrate Azure PowerShell from AzureRM to Azure * Review Microsoft Azure Active Directory module for Windows PowerShell and Azure Active Directory PowerShell for Graph modules 31 - REVIEW THE FEATURES AND TOOLS FOR AZURE CLOUD SHELL * Review the characteristics of Azure Cloud Shell * Review the features and tools of Azure Cloud Shell * Configure and experiment with Azure Cloud Shell 32 - MANAGE AZURE RESOURCES WITH WINDOWS POWERSHELL * Create a new Azure virtual machine by using Windows PowerShell commands * Manage Azure virtual machines by using Windows PowerShell commands * Manage Azure related storage by using Azure PowerShell * Manage Azure subscriptions by using Azure PowerShell 33 - MANAGE USERS, GROUPS, AND LICENSES IN MICROSOFT ENTRA ID BY USING WINDOWS POWERSHELL * Review benefits to manage Microsoft 365 services by using Windows PowerShell * Connect to the Microsoft 365 tenant by using Windows PowerShell * Manage users in Microsoft 365 by using Windows PowerShell * Manage groups in Microsoft 365 by using Windows PowerShell * Manage roles in Microsoft 365 by using Windows PowerShell * Manage licenses in Microsoft 365 by using Windows PowerShell 34 - MANAGE EXCHANGE ONLINE BY USING WINDOWS POWERSHELL * Connect to Exchange Online by using Windows PowerShell * Manage mailboxes in Exchange Online by using Windows PowerShell * Manage resources in Exchange Online by using Windows PowerShell * Manage admin roles in Exchange Online by using Windows PowerShell 35 - MANAGE SHAREPOINT ONLINE BY USING WINDOWS POWERSHELL * Install and connect to SharePoint Online Management Shell by using Windows PowerShell * Manage SharePoint Online users and groups by using Windows PowerShell * Manage SharePoint sites by using Windows PowerShell * Manage SharePoint Online external user sharing by using Windows PowerShell 36 - MANAGE MICROSOFT TEAMS BY USING WINDOWS POWERSHELL * Review Microsoft Teams PowerShell module * Install the Microsoft Teams PowerShell module * Manage teams with Microsoft Teams PowerShell module 37 - CREATE AND MANAGE BACKGROUND JOBS USING WINDOWS POWERSHELL * Define the types of background jobs in Windows PowerShell * Start remote jobs and CIM/WMI jobs in Windows PowerShell * Monitor jobs in Windows PowerShell * Retrieve results for running jobs in Windows PowerShell 38 - CREATE AND MANAGE SCHEDULED JOBS USING WINDOWS POWERSHELL * Create and run Windows PowerShell scripts as scheduled tasks * Define scheduled jobs in Windows PowerShell * Create job option and job trigger objects in Windows PowerShell * Create and register a scheduled job in Windows PowerShell * Retrieve the results from a scheduled job in Windows PowerShell

AZ-040T00 Automating Administration with Powershell
Delivered Online5 days, Jun 17th, 15:00 + 8 more
£2975

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - INTRODUCTION TO ETHICAL HACKING * Information Security Overview * Cyber Kill Chain Concepts * Hacking Concepts * Ethical Hacking Concepts * Information Security Controls * Information Security Laws and Standards 2 - 2 - FOOT-PRINTING AND RECONNAISSANCE * Footprinting Concepts * Footprinting through Search Engines * Footprinting through Web Services * Footprinting through Social Networking Sites * Website Footprinting * Email Footprinting * Who is Footprinting * DNS Footprinting * Network Footprinting * Footprinting through Social Engineering * Footprinting Tools * Footprinting Countermeasures 3 - SCANNING NETWORKS * Network Scanning Concepts * Scanning Tools * Host Discovery * Port and Service Discovery * OS Discovery (Banner Grabbing/OS Fingerprinting) * Scanning Beyond IDS and Firewall * Draw Network Diagrams 4 - ENUMERATION * Enumeration Concepts * NetBIOS Enumeration * SNMP Enumeration * LDAP Enumeration * NTP and NFS Enumeration * SMTP and DNS Enumeration * Other Enumeration Techniques * Enumeration Countermeasures 5 - VULNERABILITY ANALYSIS * Vulnerability Assessment Concepts * Vulnerability Classification and Assessment Types * Vulnerability Assessment Solutions and Tools * Vulnerability Assessment Reports 6 - SYSTEM HACKING * System Hacking Concepts * Gaining Access * Escalating Privileges * Maintaining Access * Clearing Logs 7 - MALWARE THREATS * Malware Concepts * APT Concepts * Trojan Concepts * Virus and Worm Concepts * Fileless Malware Concepts * Malware Analysis * Countermeasures * Anti-Malware Software 8 - SNIFFING * Sniffing Concepts * Sniffing Technique: MAC Attacks * Sniffing Technique: DHCP Attacks * Sniffing Technique: ARP Poisoning * Sniffing Technique: Spoofing Attacks * Sniffing Technique: DNS Poisoning * Sniffing Tools * Countermeasures * Sniffing Detection Techniques 9 - SOCIAL ENGINEERING * Social Engineering Concepts * Social Engineering Techniques * Insider Threats * Impersonation on Social Networking Sites * Identity Theft * Countermeasures 10 - DENIAL-OF-SERVICE * DoS/DDoS Concepts * DoS/DDoS Attack Techniques * BotnetsDDoS Case Study * DoS/DDoS Attack Tools * Countermeasures * DoS/DDoS Protection Tools 11 - SESSION HIJACKING * Session Hijacking Concepts * Application Level Session Hijacking * Network Level Session Hijacking * Session Hijacking Tools * Countermeasures 12 - EVADING IDS, FIREWALLS, AND HONEYPOTS * IDS, IPS, Firewall, and Honeypot Concepts * IDS, IPS, Firewall, and Honeypot Solutions * Evading IDS * Evading Firewalls * IDS/Firewall Evading Tools * Detecting Honeypots * IDS/Firewall Evasion Countermeasures 13 - HACKING WEB SERVERS * Web Server Concepts * Web Server Attacks * Web Server Attack Methodology * Web Server Attack Tools * Countermeasures * Patch Management * Web Server Security Tools 14 - HACKING WEB APPLICATIONS * Web Application Concepts * Web Application Threats * Web Application Hacking Methodology * Web API, Webhooks, and Web Shell * Web Application Security 15 - SQL INJECTION * SQL Injection Concepts * Types of SQL Injection * SQL Injection Methodology * SQL Injection Tools * Evasion Techniques * Countermeasures 16 - HACKING WIRELESS NETWORKS * Wireless Concepts * Wireless Encryption * Wireless Threats * Wireless Hacking Methodology * Wireless Hacking Tools * Bluetooth Hacking * Countermeasures * Wireless Security Tools 17 - HACKING MOBILE PLATFORMS * Mobile Platform Attack Vectors * Hacking Android OS * Hacking iOS * Mobile Device Management * Mobile Security Guidelines and Tools 18 - IOT AND OT HACKING * IoT Hacking * IoT Concepts * IoT Attacks * IoT Hacking Methodology * IoT Hacking Tools * Countermeasures * OT Hacking * OT Concepts * OT Attacks * OT Hacking Methodology * OT Hacking Tools * Countermeasures 19 - CLOUD COMPUTING * Cloud Computing Concepts * Container Technology * Serverless Computing * Cloud Computing Threats * Cloud Hacking * Cloud Security 20 - CRYPTOGRAPHY * Cryptography Concepts * Encryption Algorithms * Cryptography Tools * Public Key Infrastructure (PKI) * Email Encryption * Disk Encryption * Cryptanalysis * Countermeasures ADDITIONAL COURSE DETAILS: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online6 days, Jun 17th, 13:00 + 5 more
£3495

Complete Bash Shell Scripting

By Packt

This course will show you how you can use Bash shell scripting to automate repetitive tasks. With the help of exciting projects, you will cover the basic and advanced concepts and commands of shell scripting and learn how to write error-free shell scripts in Ubuntu.

Complete Bash Shell Scripting
Delivered Online On Demand
£41.99

SUMMER SOLSTICE YOGA RETREAT, MARGATE

By Geny Caloisi

Escape to the shores of Margate for an unforgettable Summer Solstice Yoga Retreat, where each day unfolds with serenity and connection to nature’s rhythms. Set against the backdrop of a stunning sandy beach, this retreat invites you to immerse yourself in a harmonious blend of daily meditation, invigorating yoga sessions, delicious vegetarian food and enlightening Ayurveda teachings. -------------------------------------------------------------------------------- As the sun reaches its zenith, we’ll harness its vibrant energy, embracing the longest days of the year to rejuvenate our bodies and nourish our spirits. Through guided meditation, find a profound sense of inner peace as you synchronize with the sun’s rhythms and connect deeply with your inner self. The yoga sessions, led by Geny, are tailored to align your body, mind, and spirit. Feel the flow of movement as you practice in harmony with the ocean’s whispers, fostering a sense of balance and vitality within. Immerse yourself in the wisdom of Ayurveda, learning ancient practices to harmonise your lifestyle with the seasons. Discover how to align your diet, daily routine, and self-care rituals with the abundant energy of summer, empowering yourself for optimal well-being. Between sessions, indulge in leisurely strolls along the sandy shores, basking in the warm sun and refreshing sea breeze. Let the beauty of Margate’s coastline replenish your soul, offering moments of serenity and connection to nature. It’s only an hour and a half from London! This retreat is a celebration of the summer solstice, a time to embrace the abundant light, find inner balance, and cultivate a deeper connection with yourself and the natural world. Join us on this transformative journey where each day brings an opportunity to gather the sun’s energy and leave feeling refreshed, inspired, and renewed. -------------------------------------------------------------------------------- SCHEDULE: June 20th * Arrive to the house by 15:00 * 17:00 Open Ceremony (on the beach, weather permitting, otherwise in the house) * 18:00 Yoga (on the beach, weather permitting, otherwise in the house) * 19:30 Dinner * Free time to explore Margate nightlife, with amazing beach-facing bars, Michelin-star restaurants and more! June 21st (Summer Solstice Day) * 4:30 am Optional: watch the sunrise on the beach (5 minutes walk) * 7:30  Fruits and teas * 8:00 Meditation * 8:30 – 10:30 Summer solstice Yoga (on the beach, weather permitting, otherwise in the house) * 10:30 –  Brunch * Free time * Hiking Yoga by the sea – this is a separate activity that you can book here * Optional extra activity: touring the Thanet coast  (Margate Caves, Shell Grotto, Broadstairs, Ramsgate Harbour, Pegwell Bay bird sanctuary) June 22nd * 7:30  Fruits and teas * 8:00 Meditation (at the house) * 09:00-10:30 Hiking Yoga (on the beach, weather permitting, otherwise in the house) * 10:30 – Continental breakfast at the house * Free time * Optional extra activity: Stand Up Paddle Board Yoga with Angela (optional extra) * 19:30 Dinner * Free time to explore Margate nightlife, with amazing beach-facing bars, Michelin-star restaurants and more! June 23rd * 7:30  Fruits and teas * 8:00 Meditation * 9:00 – 10:00 Yoga – Closing Ceremony * 10:30 – Brunch * 14:00 – Departure Your Investment: £499 -------------------------------------------------------------------------------- CloudZen in Margate is a charming guest house and yoga retreat centre nestled in a serene setting. It offers a harmonious blend of tranquillity and holistic experiences. The guest house boasts a welcoming ambience and comfortable accommodations that promote relaxation and rejuvenation. The architecture embodies a mix of modern aesthetics and natural elements, perhaps utilizing eco-friendly materials and large windows to invite ample natural light. The rooms are cosy yet spacious, adorned with calming decor and equipped with all the necessary amenities to ensure a comfortable stay. CloudZen’s focal point is the yoga retreat centre, which features fully equipped, serene yoga studios designed for practice and meditation. The retreat’s surroundings likely include a patio with a hot tub and scenic landscapes. Guests can partake in outdoor activities, meditation sessions, nature walks, or even holistic wellness workshops aimed at nurturing the mind, body, and spirit. CloudZen in Margate embodies a holistic approach to well-being. It emphasizes physical health through yoga and meditation and fosters a sense of community and mindfulness in a serene and picturesque setting. https://cheyoga.co.uk/events/vision-board-yoga-and-meditation-weekend-retreat/09e407e9-9915-409a-a835-4d93685ebfb7/ https://cheyoga.co.uk/events/vision-board-yoga-and-meditation-weekend-retreat/27110a5d-f016-4d0c-b96d-0458ab7eb67d/ https://cheyoga.co.uk/events/serene-seaside-retreat-in-margate/attachment/305317254/ https://cheyoga.co.uk/events/serene-seaside-retreat-in-margate/attachment/305340385/ https://cheyoga.co.uk/events/serene-seaside-retreat-in-margate/attachment/305505180/ https://cheyoga.co.uk/events/serene-seaside-retreat-in-margate/attachment/305505437/ https://cheyoga.co.uk/events/serene-seaside-retreat-in-margate/attachment/305317163/ https://cheyoga.co.uk/events/serene-seaside-retreat-in-margate/attachment/305317257/ https://cheyoga.co.uk/events/serene-seaside-retreat-in-margate/attachment/460281137/ https://cheyoga.co.uk/events/serene-seaside-retreat-in-margate/attachment/305362813/ https://cheyoga.co.uk/events/serene-seaside-retreat-in-margate/attachment/460281156/ https://cheyoga.co.uk/events/serene-seaside-retreat-in-margate/attachment/305317251/ https://cheyoga.co.uk/events/serene-seaside-retreat-in-margate/attachment/305317268/ -------------------------------------------------------------------------------- If you have any questions, please email geny@cheyoga.co.uk [geny@cheyoga.co.uk] *Cancellation Policy: The event is 100% refundable for the participant’s cancellation 60+ days before the event start date. The event is 50% refundable if cancelled 30-59 days before the start date.

SUMMER SOLSTICE YOGA RETREAT, MARGATE
Delivered In-Person in Margate3 days, Jun 20th, 14:00
£499

Linux Shell Scripting: A Project-Based Approach to Learning

By Packt

By the end of the course, you will learn to write your very own Linux shell scripts using the concepts in order to avoid repetitive work and save time.

Linux Shell Scripting: A Project-Based Approach to Learning
Delivered Online On Demand
£131.99

Shell Scripting Masterclass

By Course Cloud

COURSE OVERVIEW A shell script is a file containing a series of commands. It is mostly used for automating command line tasks in computer programming. Whether you're interested in shell scripting for command line automations for Mac, Linux, or Unix, this in-depth Shell Scripting Masterclass will teach you all you need to know to get started.  Through video instruction and guidance from an experienced professional, you will learn how to write shell scripts like a pro, as well as take advantage of advanced bash shell features. This course will equip you with the skills to gain a competitive edge in the job market and turn tedious tasks into programs that will build your efficiency and save your precious time. Not only that, but you will learn the shell scripting errors to avoid, as well as explore real-world examples of shell scripts from the instructor's personal collection.   This best selling Shell Scripting Masterclass has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Shell Scripting Masterclass is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Shell Scripting Masterclass is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Shell Scripting Masterclass is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Shell Scripting Masterclass, you will be awarded a certificate of completion  as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Shell Scripting Masterclass will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Shell Scripting Masterclass to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Shell Scripting Masterclass
Delivered Online On Demand
£25

Jq Command Tutorials for Bash Shell Scripting

By Packt

Expedite your journey with the Jq command, which is used to transform JSON data into a more readable format. Print it to the standard output on Linux with the help of this comprehensive hands-on course. This course is for anyone who works with JSON on the command line or uses Bash Shell Scripts.

Jq Command Tutorials for Bash Shell Scripting
Delivered Online On Demand
£14.99

Mastering Bash Shell Scripting: Automate your daily tasks [Updated for 2021]

By Packt

This video course takes a step-by-step and systematic approach to make you familiar with the bash shell scripting. You'll learn how to use the Linux command-line and commands to write and execute shell scripts for automating repetitive computing tasks.

Mastering Bash Shell Scripting: Automate your daily tasks [Updated for 2021]
Delivered Online On Demand
£60.99

Linux Shell Scripting

5.0(2)

By Studyhub UK

The 'Linux Shell Scripting' course offers comprehensive training in shell scripting for Linux environments. From creating a local Linux shell scripting environment to network scripting and automation, learners will develop practical skills to automate tasks, process data, and improve efficiency using shell scripts. LEARNING OUTCOMES: 1. Set up a local Linux shell scripting environment for practical learning. 2. Create shell scripts for user and account management, including password generation and handling shell script arguments. 3. Apply Linux programming conventions to maintain clear and efficient code. 4. Develop shell scripts that parse command-line options for flexible user interaction. 5. Utilize shell scripting for data processing, transformation, and reporting tasks. 6. Automate network scripting and distributed systems for enhanced efficiency. 7. Summarize the key concepts and techniques learned throughout the course. 8. Access additional course extras and resources for further exploration and practice. WHY BUY THIS LINUX SHELL SCRIPTING? 1. Unlimited access to the course for forever 2. Digital Certificate, Transcript, student ID all included in the price 3. Absolutely no hidden fees 4. Directly receive CPD accredited qualifications after course completion 5. Receive one to one assistance on every weekday from professionals 6. Immediately receive the PDF certificate after passing 7. Receive the original copies of your certificate and transcript on the next working day 8. Easily learn the skills and knowledge from the comfort of your home CERTIFICATION After studying the course materials of the Linux Shell Scripting there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. WHO IS THIS COURSE FOR? This Linux Shell Scripting course is ideal for * Students * Recent graduates * Job Seekers * Anyone interested in this topic * People already working in the relevant fields and want to polish their knowledge and skill. PREREQUISITES This Linux Shell Scripting does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Linux Shell Scripting was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. CAREER PATH As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This Linux Shell Scripting is a great way for you to gain multiple skills from the comfort of your home. COURSE CURRICULUM Unit 01: Course Introduction Introduction and Course Overview 00:02:00 Course Downloads 00:03:00 Unit 02: Creating a Local Linux Shell Scripting Environment Creating a Local Lab Environment Using Vagrant and VirtualBox - Background 00:16:00 Exercise 1 Instructions - Creating a Local Linux Shell Scripting Lab Environment 00:28:00 Exercise 1 - Walkthrough - Part I - Windows Users Only 00:04:00 Exercise 1 - Walkthrough - Part I - Mac Users Only 00:02:00 Exercise 1 - Walkthrough - Part I - Linux (CentOS/RHEL) Users Only 00:03:00 Exercise 1 - Walkthrough - Part II - All Users 00:23:00 Unit 03: User and Account Creation - Shell Scripting Project 1 Section Introduction 00:03:00 Getting Started with Shell Scripting: Naming, Permissions, Variables, Builtins. 00:35:00 Special Variables, Pseudocode, Command Substitution, if Statement, Conditionals. 00:23:00 Exit Statuses, Return Codes, String Test Conditionals, More Special Variables. 00:18:00 Reading Standard Input, Creating Accounts, Username Conventions, More Quoting. 00:23:00 Exercise 2 - Instructions 00:12:00 Exercise 2 - Walkthrough 00:21:00 Unit 04: Password Generation and Shell Script Arguments - Shell Scripting Project 2 Random Data, Cryptographic Hash Functions, Text and String Manipulation. 00:31:00 Positional Parameters, Arguments, for Loops, Special Parameters 00:30:00 The while Loop, Infinite Loops, Shifting, Sleeping 00:16:00 Exercise 3 - Instructions 00:12:00 Exercise 3 - Walkthrough 00:20:00 Unit 05: Linux Programming Conventions - Shell Scripting Project 3 Advanced Standard Input, Standard Output, and Standard Error - Part I 00:13:00 Advanced Standard Input, Standard Output, and Standard Error - Part II 00:26:00 Exercise 4 - Instructions 00:05:00 Exercise 4 - Walkthrough 00:12:00 Unit 06: Parsing Command Line Options - Shell Scripting Project 4 Case Statements 00:20:00 Functions 00:33:00 Parsing Command Line Options with getopts, Part 1 00:20:00 Parsing Command Line Options with getopts, Part 2 00:18:00 Deleting and Disabling Linux Accounts, Part 1 of 4 (Finding Files) 00:11:00 Deleting and Disabling Linux Accounts, Part 2 of 4 (The userdel command) 00:05:00 Deleting and Disabling Linux Accounts, Part 3 of 4 (Archives with tar) 00:14:00 Deleting and Disabling Linux Accounts, Part 4 of 4 (Disabling Accounts) 00:08:00 Deleting Users - Exercise 5 - Instructions 00:14:00 Deleting Users - Exercise 5 - Walkthrough 00:33:00 Unit 07: Transforming Data / Data Processing / Reporting - Shell Scripting Project 5 Cut and Awk 00:22:00 Cut and Awk Demonstration Script: Open Network Ports 00:10:00 Sort and Uniq 00:18:00 Parsing Log Files - Exercise 6 - Walkthrough 00:15:00 Sed 00:29:00 Unit 08: Network Scripting & Automation of Distributed Systems: Shell Scripting Project 6 Configuring a Mini Network and Scripting for Remote Systems 00:30:00 Scripting Remote Commands - Walkthrough - Part 1 00:26:00 Scripting Remote Commands - Exercise - Instructions 00:12:00 Scripting Remote Commands - Walkthrough - Part 2 00:13:00 Unit 09: Course Summary Summary 00:08:00 Unit 10: Course Extras What Shell Scripting Is and Why You Should Learn It 00:10:00 Resources Resources - Linux Shell Scripting 00:00:00 Assignment Assignment - Linux Shell Scripting 00:00:00

Linux Shell Scripting
Delivered Online On Demand
£10.99