• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

36 Statistics courses in Cowdenbeath

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Wireshark Certified Network Analyst

5.0(3)

By Systems & Network Training

WCNA TRAINING COURSE DESCRIPTION Wireshark is a free network protocol analyser. This hands-on course provides a comprehensive tour of using Wireshark to troubleshoot networks. The course concentrates on the information needed in order to pass the WCNA exam. Students will gain the most from this course only if they already have a sound knowledge of the TCP/IP protocols. WHAT WILL YOU LEARN * Analyse packets and protocols in detail. * Troubleshoot networks using Wireshark. * Find performance problems using Wireshark. * Perform network forensics. WCNA TRAINING COURSE DETAILS * Who will benefit: Technical staff looking after networks. * Prerequisites: TCP/IP Foundation for engineers * Duration 5 days WCNA TRAINING COURSE CONTENTS * What is Wireshark? Network analysis, troubleshooting, network traffic flows. Hands on Download/install Wireshark. * Wireshark introduction Capturing packets, libpcap, winpcap, airpcap. Dissectors and plugins. The menus. Right click. Hands on Using Wireshark. * Capturing traffic Wireshark and switches and routers. Remote traffic capture. Hands on Capturing packets. * Capture filters Applying, identifiers, qualifiers, protocols, addresses, byte values. File sets, ring buffers. Hands on Capture filters. * Preferences Configuration folders. Global and personal configurations. Capture preferences, name resolution, protocol settings. Colouring traffic. Profiles. Hands on Customising Wireshark. * Time Packet time, timestamps, packet arrival times, delays, traffic rates, packets sizes, overall bytes. Hands on Measuring high latency. * Trace file statistics Protocols and applications, conversations, packet lengths, destinations, protocol usages, strams, flows. Hands on Wireshark statistics. * Display filters Applying, clearing, expressions, right click, conversations, endpoints, protocols, combining filters, specific bytes, regex filters. Hands on Display traffic. * Streams Traffic reassembly, UDP and TCP conversations, SSL. Hands on Recreating streams. * Saving Filtered, marked and ranges. Hands on Export. * TCP/IP Analysis The expert system. DNS, ARP, IPv4, IPv6, ICMP, UDP, TCP. Hands on Analysing traffic. * IO rates and trends Basic graphs, Advanced IO graphs. Round Trip Time, throughput rates. Hands on Graphs. * Application analysis DHCP, HTTP, FTP, SMTP. Hands on Analysing application traffic. * WiFi Signal strength and interference, monitor mode and promiscuous mode. Data, management and control frames. Hands on WLAN traffic. * VoIP Call flows, Jitter, packet loss. RTP, SIP. Hands on Playing back calls. * Performance problems Baselining. High latency, arrival times, delta times. Hands on Identifying poor performance. * Network forensics Host vs network forensics, unusual traffic patterns, detecting scans and sweeps, suspect traffic. Hands on Signatures. * Command line tools Tshark, capinfos, editcap, mergecap, text2pcap, dumpcap. Hands on Command tools.

Wireshark Certified Network Analyst
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Total NetFlow for engineers

5.0(3)

By Systems & Network Training

TOTAL NETFLOW TRAINING COURSE DESCRIPTION A comprehensive hands on course covering NetFlow. The course starts with the basics of flows moving swiftly onto configuring NetFlow and studying the information it provides. WHAT WILL YOU LEARN * Describe NetFlow. * Configure generators and collectors. * Recognise how NetFlow can be used. * Describe the issues in using NetFlow. * Compare NetFlow with SNMP, RMON and sflow. TOTAL NETFLOW TRAINING COURSE DETAILS * Who will benefit: Technical staff working with NetFlow. * Prerequisites: TCP/IP Foundation * Duration 2 days TOTAL NETFLOW FOR ENGINEERS * What is NetFlow? Flows. Where to monitor traffic. Hands on Wireshark flow analysis. * Getting started with NetFlow NetFlow configuration. Hands on Accessing NetFlow data using the CLI. * NetFlow architecture Generators and collectors. When flows are exported. NetFlow reporting products. SolarWinds. Hands on Collector software. * NetFlow features and benefits Real time segment statistics, real time top talkers, traffic matrices. Hands on Traffic analysis with NetFlow. * NetFlow issues NetFlow impact, agent resources, server resources, comparing NetFlow with SNMP, RMON and sflow. Hands on Advanced NetFlow configuration. * Export formats Flow aging timers, NetFlow versions, export formats, templates, IPFIX. Hands on NetFlow packet analysis. * NetFlow MIBs The NetFlow MIB, configuration, retrieving NetFlow statistics. Hands on Integrating NetFlow with SNMP.

Total NetFlow for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1727

Wireshark 101 for engineers

5.0(3)

By Systems & Network Training

WIRESHARK 101 TRAINING COURSE DESCRIPTION Wireshark is a free network protocol analyser. This hands-on course focuses on troubleshooting networks using the Wireshark protocol analyser. The course concentrates on the product and students will gain from the most from this course only if they already have a sound knowledge of the TCP/IP protocols WHAT WILL YOU LEARN * Download and install Wireshark. * Capture and analyse packets with Wireshark. * Configure capture and display filters. * Customise Wireshark. * Troubleshoot networks using Wireshark. WIRESHARK 101 TRAINING COURSE DETAILS * Who will benefit: Technical staff looking after networks. * Prerequisites: TCP/IP Foundation for engineers * Duration 2 days WIRESHARK 101 TRAINING COURSE CONTENTS * What is Wireshark? Protocol analysers, Wireshark features, versions, troubleshooting techniques with Wireshark. * Installing Wireshark Downloading Wireshark, UNIX issues, Microsoft issues, the role of winpcap, promiscuous mode, installing Wireshark. Wireshark documentation and help. Hands on Downloading and installing Wireshark. * Capturing traffic Starting and stopping basic packet captures, the packet list pane, packet details pane, packet bytes pane, interfaces, using Wireshark in a switched architecture. Hands on Capturing packets with Wireshark. * Troubleshooting networks with Wireshark Common packet flows. Hands on Analysing a variety of problems with Wireshark. * Capture filters Capture filter expressions, capture filter examples (host, port, network, protocol), primitives, combining primitives, payload matching. Hands on Configuring capture filters. * Working with captured packets Live packet capture, saving to a file, capture file formats, reading capture files from other analysers, merging capture files, finding packets, going to a specific packet, display filters, display filter expressions. Hands on Saving captured data, configuring display filters. * Analysis and statistics with Wireshark Enabling/disabling protocols, user specified decodes, following TCP streams, protocol statistics, conversation lists, endpoint lists, I/O graphs, protocol specific statistics. Hands on Using the analysis and statistics menus. * Command line tools Tshark, capinfos, editcap, mergecap, text2pcap, idl2eth. Hands on Using tshark. * Advanced issues 802.11 issues, management frames, monitor mode, packet reassembling, name resolution, customising Wireshark. Hands on Customising name resolution.

Wireshark 101 for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1497

Total SIPp for engineers

5.0(3)

By Systems & Network Training

TOTAL SIPP COURSE DESCRIPTION SIPp is a robust performance testing tool designed for evaluating the SIP protocol. This comprehensive course takes you on a journey from the initial installation of SIPp to mastering fundamental scenarios, exploring diverse architectures, delving into statistics analysis, and crafting XML scenario files. WHAT WILL YOU LEARN * Monitor SIP traffic with SIPp. * Use SIPp for performance testing. * Use the standard SIPp scenarios. * Create custom scenarios in XML for SIPp. TOTAL SIPP COURSE DETAILS * Who will benefit: Those working with SIP. * Prerequisites: Definitive SIP for engineers * Duration 2 days TOTAL SIPP COURSE CONTENTS * Introduction What is SIPp? SIP review: UAC, UAS, INVITE, BYE. Sample SIP call flows. Hands on Wireshark, SIP call flow. * Installing SIPp Getting SIPp, installing SIPp. * Using SIPp Running sipp. sipp with uas scenario, sipp with uac scenario. The integrated scenarios. Online help. Hands on uac, uas. * Controlling SIPp Hot keys, commands, UDP socket. Running SIPp in the background. Traffic control. SIPp performance testing. Hands on Changing call rates, remote control, pausing traffic. * Monitoring SIP traffic Scenario screen, statistics. Response times, counters. Hands on Monitoring SIP traffic. * More integrated scenarios SIPp and media and RTP. 3PCC. 3PCC extended. Transport modes: UDP, TCP, TLS, SCTP, IPv6 mono and multi socket. Hands on Third Party Call Control. * XML What is XML? Content, markup, elements, attributes. Start tags, end tags. Hands on Displaying embedded scenarios, looking at the XML files of the integrated scenarios. * Creating your own XML scenarios scenario, message commands, send, recv, nop, pause, sendCmd, recvCmd, common sipp scenario attributes, command specific sipp scenario attributes. XML DTD, jEdit. Hands on uac and uas scenario XML files. * Recv actions Log and warning, exec, variables, variable types, variable scope. External variables. Hands on RTP streaming, Change a calls network destination, injection files. * Regular expressions What is an RE. POSIX 1003.2. Re injection. Validation. Hands on regex example.

Total SIPp for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1727

Session Border Controllers for engineers

5.0(3)

By Systems & Network Training

SESSION BORDER CONTROLLERS COURSE DESCRIPTION A hands on course covering Session Border Controllers with a focus on the technical workings of features commonly found in Session Border Controllers. Hands on practicals follow each major theory session. WHAT WILL YOU LEARN * Explain how Session Border Controllers work. * Explain the SIP call flow using a SBC. * Deploy Session Border Controllers * Describe the features found in Session Border Controllers. SESSION BORDER CONTROLLERS COURSE DETAILS * Who will benefit: Technical staff working with SIP. * Prerequisites: Definitive SIP for engineers * Duration 2 days SESSION BORDER CONTROLLERS COURSE CONTENTS * SIP review Signalling, media, RTP, SIP, peer to peer, SIP proxies, SIP call flows. Hands on: SIP packet analysis. * Session Border Controllers What is a SBC? SBC features, peering scenario, access scenario, NNI SBC, UNI SBC, enterprise SBC. Hands on: SBC call flows * SBC topology hiding Header privacy, B2BUA. Hands on: Header analysis. * Session control Call admissions, QoS, statistics and billing, redundancy and scalability. Hands on: SBC session control * SBC and NAT NAT traversal, STUN, ICE, NAT and SIP, NAT and RTP. Hands on: SBC and NAT traversal. * SBC and security DoS, access control, encryption, authentication, toll fraud, regulatory issues, lawful intercept. Hands on: Security. * Interoperability mediation Manipulating SIP headers, IMS, IETF, TISPAN, SIP-I. SBC interworking.

Session Border Controllers for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

Definitive Ethernet LANS for engineers

5.0(3)

By Systems & Network Training

ETHERNET LANS TRAINING COURSE DESCRIPTION THIS COURSE HAS BEEN REPLACED AS PART OF OUR CONTINUOUS CURRICULUM DEVELOPMENT. PLEASE SEE OUR * Definitive Ethernet switching course WHAT WILL YOU LEARN * Describe what Ethernet is and how it works. * Install Ethernet networks * Troubleshoot Ethernet networks * Analyse Ethernet packets * Design Ethernet networks * Recognise the uses of Hubs, Bridges, switches and routers. ETHERNET LANS TRAINING COURSE DETAILS * Who will benefit: Those wishing to find out more about how their LAN works. * Prerequisites: Intro to Data comms & networking. * Duration 3 days ETHERNET LANS TRAINING COURSE CONTENTS * What is Ethernet? LANS, What is Ethernet?, history, standards, the OSI reference model, how Ethernet works, CSMA/CD. Ethernet Cabling UTP, cat 3,4,5, Cat 5e, Cat 6, Cat 7, fibre optic cable, MMF, SMF. Hands on Making a cable. * 802.3 physical specifications Distance limitations, hubs and repeaters, 5-4-3-2-1 rule, 10BaseT, 10BaseF, 100BaseTX, 100BaseFX, 1000BaseSX, 1000BaseT, 10gbe. Hands on Working with hubs. * Ethernet layer 2 Overview, NICS, device drivers, MAC addresses, broadcasts, multicasts, frame formats, Ether II, 802.3, 802.2, SNAP, compatibility, Ethernet type numbers, Ethernet multicast addresses, Ethernet vendor codes. Hands on Installing Ethernet components, analysing MAC headers. * IP and Ethernet ARP Hands on Analysing ARP packets. * Ethernet extensions Full/half duplex, auto negotiation, flow control methods, 802.3ad, 802.3af, 802.3ah. Hands on Configuration of full/half duplex. * Ethernet speed enhancements Encoding, Carrier extension, packet bursting, jumbo frames. * Prioritisation 802.1P, 802.1Q, TOS, WRR, QOS, VLANs. Hands on 802.1p testing * Interconnecting LANS Broadcast domains, Collision domains, What are bridges, transparent bridging, What are switches? STP, VLANS, What are routers? Layer 3 switches, Connecting Ethernet to the WAN. Hands on STP, Analysing Ethernet frames in a routed architecture. * Troubleshooting and maintaining Ethernet Utilisation, performance, TDR and other testers, bottlenecks, statistics, RMON. Hands on Monitoring performance, troubleshooting tools.

Definitive Ethernet LANS for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497

Linux engineer certification 1 (LPIC-2)

5.0(3)

By Systems & Network Training

LINUX ENGINEER CERTIFICATION TRAINING COURSE DESCRIPTION LPIC-2 is the second certification in LPI's multi level professional certification program. This course teaches the skills necessary to pass the LPI 201 exam; the first of two LPIC-2 exams. Specifically, the course covers the administration of Linux systems in small to medium sized mixed networks. WHAT WILL YOU LEARN * Perform advanced administration tasks. * Perform advanced file system administration. LINUX ENGINEER CERTIFICATION TRAINING COURSE DETAILS * Who will benefit: Linux administrators. * Prerequisites: Linux system administration (LPIC-1) * Duration 5 days LINUX ENGINEER CERTIFICATION FUNDAMENTALS TRAINING COURSE CONTENTS * Part I The LPI 201 Exam * Starting a System The Linux Boot Process, Firmware Startup, BIOS Startup, UEFI Startup, Linux Bootloaders, GRUB Legacy, GRUB 2, Alternative Bootloaders, Secure Bootloaders, Process Initialization, SysV Method, systemd Method, Upstart Method, System Recovery, Kernel Failures, Root Drive Failure. * Maintaining the System Fluid Messaging, Static Messaging, System backups, Backup Strategies, Performing Backups, Installing Programs from Source, Obtaining and unpacking Installation Files, Compiling Programs, Resource Usage: Managing, measuring, predicting and troubleshooting. * Mastering the Kernel What Is the Kernel? Kernel Features, Parts of the Kernel, Kernel Versions, Obtaining Source Code, Creating the Configuration File, Compiling and Installing the Kernel, Compiling and Installing Modules, Creating an Initial RAM Disk, Booting the New Kernel, Creating a Kernel Package, Maintaining the Kernel, Working with Module Files, Module Commands, Working with Hardware, Automatically Detecting Hardware, Troubleshooting the Kernel. * Managing the Filesystem The Linux Filesystem, Filesystem Structures, Filesystem Types, Making Filesystems, Attaching Filesystems, Memory-Based Linux Filesystems, the Btrfs Filesystem, Btrfs Subvolumes, Btrfs Snapshots, Optical Filesystems, Swap Filesystems, Network-Based Filesystems, Auto-Mounting, Encrypted Filesystems, Maintaining Linux Filesystems, Adjusting a Filesystem, Checking and Repairing a Filesystem, SMART. * Administering Advanced Storage Devices Configuring RAID, Implementing RAID on Linux, Managing a RAID Array, Adjusting Storage Devices, Looking at Drive Interface Concepts, Testing and Tuning Drives, Implementing iSCSI, Managing Logical Volumes, LVM, Creating Logical Volumes, Supporting Logical Volumes, Understanding the Device Mapper. * Navigating Network Services Networking Basics, The Physical Layer, The Network Layer, The Transport Layer, The Application Layer, Configuring Network Features, Network Configuration Files, Graphical Tools, Command-Line Tools, Basic Network Troubleshooting, Checking the Log Files, the ARP Cache, Sending Test Packets, Testing Network Routes, Testing Client/Server Connectivity, Finding Host Information, Network Security, Advanced Network Troubleshooting, Viewing Open Network Connections, Viewing Network Statistics, Scanning the Network, Capturing Network Traffic.

Linux engineer certification 1 (LPIC-2)
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797

How to recover from a poor Ofsted inspection outcome

By Marell Consulting Limited

Get a clear strategy for bouncing back after a poor Ofsted inspection outcome; develop your DfE action plan; know what to expect from a progress monitoring inspection.

How to recover from a poor Ofsted inspection outcome
Delivered in-person, on-request, onlineDelivered Online & In-Person in Birmingham
£997

Securing UNIX systems

5.0(3)

By Systems & Network Training

SECURING UNIX SYSTEMS TRAINING COURSE DESCRIPTION This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. WHAT WILL YOU LEARN * Secure UNIX accounts. * Secure UNIX file systems. * Secure UNIX access through the network. SECURING UNIX SYSTEMS COURSE DETAILS * Who will benefit: Linux technical staff needing to secure their systems. * Prerequisites: Linux system administration (LPIC-1) * Duration 5 days SECURING UNIX SYSTEMS COURSE CONTENTS * Cryptography * Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. * Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. * Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. * DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. * Host Security * Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. * Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. * User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. * FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. * Access Control * Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. * Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. * etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. * Network Security * Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. * Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. * Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd * Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Securing Linux systems

5.0(3)

By Systems & Network Training

SECURING LINUX SYSTEMS TRAINING COURSE DESCRIPTION This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. WHAT WILL YOU LEARN * Secure Linux accounts. * Secure Linux file systems. * Secure Linux access through the network. SECURING LINUX SYSTEMS TRAINING COURSE DETAILS * Who will benefit: Linux technical staff needing to secure their systems. * Prerequisites: Linux system administration (LPIC-1) * Duration 5 days SECURING LINUX SYSTEMS TRAINING COURSE CONTENTS * Cryptography * Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. * Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. * Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. * DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. * Host Security * Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. * Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. * User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. * FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. * Access Control * Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. * Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. * etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. * Network Security * Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. * Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. * Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd * Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Educators matching "Statistics"

Show all 8
IT Professional Training, Edinburgh

it professional training, edinburgh

0.0(5)

Edinburgh

IT Professional Training, is very well known for providing the best Free (Fully Funded) IT computer courses in Edinburgh and Glasgow. Call us 0131 552 5558, 0141 429 2922IT Professional Training is very well known for providing the best IT courses & services in the industry, and we are committed to that mission. We are based in Edinburgh and Glasgow, and offer a wide range of IT courses that enable people to get jobs in IT or upgrade their existing IT skills. We are one of the kind who have brought Part-Time Fully Funded Professional IT Courses for students and professionals in Edinburgh, Glasgow and surroundings with an ambition to help young people to get their desired job or develop extra skills while studying in College and University, for an unemployed to get industry level skills and for professionals to take their skills to next level. We are a Professional training college in Glasgow, offering free IT computer courses. Join us & enhance your IT skills! IT Professional Training not only train individuals for IT jobs but also provide hands on experience in the form of apprenticeships. This lets the people we train start their IT career with great confidence. Our e-learning courses allow you to save time & learn more effectively. Learn about computer courses and IT courses. We are also the only Edinburgh based College who are offering HNC and HND Computing subjects in a January session and we are the only other college other than Edinburgh College for students to do HNC/HND Computing and have SAAS funding, bursary and student loan etc. One area that we particularly pride ourselves in is our commitment to providing a lab-based practical, and a hands on live-experience which make us superior to others. We offer training for all levels, from basic IT through to advanced specialist subjects. Benefits of IT Training Training in IT provides a wider range of skills, which can help differentiate you in the competitive jobs market. At IT Professional Training we specialise in IT training. You may be worried about the future, not happy with your current job, or simply not fulfilling your true potential with our IT training, you will have greater opportunities. IT Professional Training can help lead you to a brighter tomorrow.

The City Of Edinburgh Music School

the city of edinburgh music school

Edinburgh

One year ago today, we were not sure how we would be delivering educational experiences for our students. Two years ago, the situation was even worse as we were not sure whether we would be able to offer anything meaningful at all in person. The relative normality of this year’s first day of school brings reassurance and joy. So far it seems that everyone has grown over the summer, and our returners look more confident and poised than they did six weeks ago. No doubt they have many stories to share, much better in person than through the various social media platforms that they have been inhabiting. Our new S1 students are excited about starting this new phase in their lives. A few have had to ask for directions to classes, but good for them that they have the confidence to do so. They will bring much to the future of our school and in the blink of an eye they will be in S6 preparing for the next phase. Being Part of the Community The vast majority of our students are showing their pride in being part of the Broughton High School community by wearing school uniform and dress code. That is part of their contribution to their school, and is most welcome. I would emphasise that although school uniform is much less expensive than the designer clothing that teenagers might choose to wear, we are keen to support families who are struggling with the cost of clothing. The best way to access this is via our guidance team, through either a direct phone call or an email to school reception. Academic Success More detailed information will be forthcoming, but I am absolutely delighted to share that the attainment gained by our S4-S6 students last year was outstanding. Despite the many challenges that they had to face, they contributed to the best set of SQA results that the school has ever seen. Better than the exam-free years of 2020 and 2021. Better than any year since statistics have been recorded in the current format. This is particularly remarkable, given that the national pass rates have actually declined this year. This level of academic success is not just down to ability but comes as a result of many factors: hard work and resilience; support from parents and carers; and untiring high quality teaching and regard from staff are some. A massive well done from me and the whole school staff to those young people. Senior Staffing News We welcome Mrs Lisa Evans to our school senior leadership team. Mrs Evans has been a curriculum leader in another Edinburgh school for the past eight years, and was previously an English teacher at Broughton. I am delighted that Mrs Evans is back in the Broughton HS family and we look forward to great things. Recently we also welcomed Mr Steven Frew back to Broughton HS after a few years as a curriculum leader in East Lothian. Mr Frew joined us just before the end of the summer term in the role of Senior Development Officer. One of his key roles is to explore the diversity in our school community and make the most of the opportunities that this provides. This will be fascinating and will provide further impetus to cohesion and success in our school. Mr Frew was also previously with us as a Business Education teacher. It speaks volumes for Broughton HS that staff who have progressed in their career are keen to re-join us further down the line. I am pleased to inform you that Mrs Shona Wallace, Depute Headteacher, has been appointed on an acting basis to the Headship of Craigroyston Community High School. Mrs Wallace will work hard – as she always does – to support the community at Craigroyston. We wish her well, and look forward to her return in the latter part of the academic year. Finally, I would like to thank our parental community for the support you give to our school. We will keep trying together to make things as good as possible for our young people. Most of the time we get it right, and long may that continue. John J Wilson Headteacher *********** Broughton High School aspires to be a learning community known for its excellent learning and teaching. We maximise student achievement; provide support, welfare and inspiration. We are committed to continual improvement. Our students will be confident, successful and able to contribute effectively and responsibly to society. They should foster an interest in life long learning. We are a consistently improving organisation. Our core values are the same - respect, inclusion and integrity in all that we do. Tolerance and a willingness to learn about other cultures have been at the heart of Scottish education for centuries. By embracing the Scottish tradition and developing through a curriculum for excellence we hope to develop as truly global citizens. Broughton High School is developing as a centre of excellence in the wider community with our business partners and neighbours utilising the building during and beyond the school day. The development of partnership working is important to us and we actively pursue their development. In school, it goes without saying that we provide a secure and healthy environment, but we aim for much more. We aspire to personal excellence at all times. In every classroom, on the playing fields, through every note played in the Music School we aim for the highest standards. These can only be achieved if the whole school community works in partnership.