• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

36 Statistics courses in Kirkby

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Wireshark Certified Network Analyst

5.0(3)

By Systems & Network Training

WCNA TRAINING COURSE DESCRIPTION Wireshark is a free network protocol analyser. This hands-on course provides a comprehensive tour of using Wireshark to troubleshoot networks. The course concentrates on the information needed in order to pass the WCNA exam. Students will gain the most from this course only if they already have a sound knowledge of the TCP/IP protocols. WHAT WILL YOU LEARN * Analyse packets and protocols in detail. * Troubleshoot networks using Wireshark. * Find performance problems using Wireshark. * Perform network forensics. WCNA TRAINING COURSE DETAILS * Who will benefit: Technical staff looking after networks. * Prerequisites: TCP/IP Foundation for engineers * Duration 5 days WCNA TRAINING COURSE CONTENTS * What is Wireshark? Network analysis, troubleshooting, network traffic flows. Hands on Download/install Wireshark. * Wireshark introduction Capturing packets, libpcap, winpcap, airpcap. Dissectors and plugins. The menus. Right click. Hands on Using Wireshark. * Capturing traffic Wireshark and switches and routers. Remote traffic capture. Hands on Capturing packets. * Capture filters Applying, identifiers, qualifiers, protocols, addresses, byte values. File sets, ring buffers. Hands on Capture filters. * Preferences Configuration folders. Global and personal configurations. Capture preferences, name resolution, protocol settings. Colouring traffic. Profiles. Hands on Customising Wireshark. * Time Packet time, timestamps, packet arrival times, delays, traffic rates, packets sizes, overall bytes. Hands on Measuring high latency. * Trace file statistics Protocols and applications, conversations, packet lengths, destinations, protocol usages, strams, flows. Hands on Wireshark statistics. * Display filters Applying, clearing, expressions, right click, conversations, endpoints, protocols, combining filters, specific bytes, regex filters. Hands on Display traffic. * Streams Traffic reassembly, UDP and TCP conversations, SSL. Hands on Recreating streams. * Saving Filtered, marked and ranges. Hands on Export. * TCP/IP Analysis The expert system. DNS, ARP, IPv4, IPv6, ICMP, UDP, TCP. Hands on Analysing traffic. * IO rates and trends Basic graphs, Advanced IO graphs. Round Trip Time, throughput rates. Hands on Graphs. * Application analysis DHCP, HTTP, FTP, SMTP. Hands on Analysing application traffic. * WiFi Signal strength and interference, monitor mode and promiscuous mode. Data, management and control frames. Hands on WLAN traffic. * VoIP Call flows, Jitter, packet loss. RTP, SIP. Hands on Playing back calls. * Performance problems Baselining. High latency, arrival times, delta times. Hands on Identifying poor performance. * Network forensics Host vs network forensics, unusual traffic patterns, detecting scans and sweeps, suspect traffic. Hands on Signatures. * Command line tools Tshark, capinfos, editcap, mergecap, text2pcap, dumpcap. Hands on Command tools.

Wireshark Certified Network Analyst
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Total NetFlow for engineers

5.0(3)

By Systems & Network Training

TOTAL NETFLOW TRAINING COURSE DESCRIPTION A comprehensive hands on course covering NetFlow. The course starts with the basics of flows moving swiftly onto configuring NetFlow and studying the information it provides. WHAT WILL YOU LEARN * Describe NetFlow. * Configure generators and collectors. * Recognise how NetFlow can be used. * Describe the issues in using NetFlow. * Compare NetFlow with SNMP, RMON and sflow. TOTAL NETFLOW TRAINING COURSE DETAILS * Who will benefit: Technical staff working with NetFlow. * Prerequisites: TCP/IP Foundation * Duration 2 days TOTAL NETFLOW FOR ENGINEERS * What is NetFlow? Flows. Where to monitor traffic. Hands on Wireshark flow analysis. * Getting started with NetFlow NetFlow configuration. Hands on Accessing NetFlow data using the CLI. * NetFlow architecture Generators and collectors. When flows are exported. NetFlow reporting products. SolarWinds. Hands on Collector software. * NetFlow features and benefits Real time segment statistics, real time top talkers, traffic matrices. Hands on Traffic analysis with NetFlow. * NetFlow issues NetFlow impact, agent resources, server resources, comparing NetFlow with SNMP, RMON and sflow. Hands on Advanced NetFlow configuration. * Export formats Flow aging timers, NetFlow versions, export formats, templates, IPFIX. Hands on NetFlow packet analysis. * NetFlow MIBs The NetFlow MIB, configuration, retrieving NetFlow statistics. Hands on Integrating NetFlow with SNMP.

Total NetFlow for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1727

Wireshark 101 for engineers

5.0(3)

By Systems & Network Training

WIRESHARK 101 TRAINING COURSE DESCRIPTION Wireshark is a free network protocol analyser. This hands-on course focuses on troubleshooting networks using the Wireshark protocol analyser. The course concentrates on the product and students will gain from the most from this course only if they already have a sound knowledge of the TCP/IP protocols WHAT WILL YOU LEARN * Download and install Wireshark. * Capture and analyse packets with Wireshark. * Configure capture and display filters. * Customise Wireshark. * Troubleshoot networks using Wireshark. WIRESHARK 101 TRAINING COURSE DETAILS * Who will benefit: Technical staff looking after networks. * Prerequisites: TCP/IP Foundation for engineers * Duration 2 days WIRESHARK 101 TRAINING COURSE CONTENTS * What is Wireshark? Protocol analysers, Wireshark features, versions, troubleshooting techniques with Wireshark. * Installing Wireshark Downloading Wireshark, UNIX issues, Microsoft issues, the role of winpcap, promiscuous mode, installing Wireshark. Wireshark documentation and help. Hands on Downloading and installing Wireshark. * Capturing traffic Starting and stopping basic packet captures, the packet list pane, packet details pane, packet bytes pane, interfaces, using Wireshark in a switched architecture. Hands on Capturing packets with Wireshark. * Troubleshooting networks with Wireshark Common packet flows. Hands on Analysing a variety of problems with Wireshark. * Capture filters Capture filter expressions, capture filter examples (host, port, network, protocol), primitives, combining primitives, payload matching. Hands on Configuring capture filters. * Working with captured packets Live packet capture, saving to a file, capture file formats, reading capture files from other analysers, merging capture files, finding packets, going to a specific packet, display filters, display filter expressions. Hands on Saving captured data, configuring display filters. * Analysis and statistics with Wireshark Enabling/disabling protocols, user specified decodes, following TCP streams, protocol statistics, conversation lists, endpoint lists, I/O graphs, protocol specific statistics. Hands on Using the analysis and statistics menus. * Command line tools Tshark, capinfos, editcap, mergecap, text2pcap, idl2eth. Hands on Using tshark. * Advanced issues 802.11 issues, management frames, monitor mode, packet reassembling, name resolution, customising Wireshark. Hands on Customising name resolution.

Wireshark 101 for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1497

Total SIPp for engineers

5.0(3)

By Systems & Network Training

TOTAL SIPP COURSE DESCRIPTION SIPp is a robust performance testing tool designed for evaluating the SIP protocol. This comprehensive course takes you on a journey from the initial installation of SIPp to mastering fundamental scenarios, exploring diverse architectures, delving into statistics analysis, and crafting XML scenario files. WHAT WILL YOU LEARN * Monitor SIP traffic with SIPp. * Use SIPp for performance testing. * Use the standard SIPp scenarios. * Create custom scenarios in XML for SIPp. TOTAL SIPP COURSE DETAILS * Who will benefit: Those working with SIP. * Prerequisites: Definitive SIP for engineers * Duration 2 days TOTAL SIPP COURSE CONTENTS * Introduction What is SIPp? SIP review: UAC, UAS, INVITE, BYE. Sample SIP call flows. Hands on Wireshark, SIP call flow. * Installing SIPp Getting SIPp, installing SIPp. * Using SIPp Running sipp. sipp with uas scenario, sipp with uac scenario. The integrated scenarios. Online help. Hands on uac, uas. * Controlling SIPp Hot keys, commands, UDP socket. Running SIPp in the background. Traffic control. SIPp performance testing. Hands on Changing call rates, remote control, pausing traffic. * Monitoring SIP traffic Scenario screen, statistics. Response times, counters. Hands on Monitoring SIP traffic. * More integrated scenarios SIPp and media and RTP. 3PCC. 3PCC extended. Transport modes: UDP, TCP, TLS, SCTP, IPv6 mono and multi socket. Hands on Third Party Call Control. * XML What is XML? Content, markup, elements, attributes. Start tags, end tags. Hands on Displaying embedded scenarios, looking at the XML files of the integrated scenarios. * Creating your own XML scenarios scenario, message commands, send, recv, nop, pause, sendCmd, recvCmd, common sipp scenario attributes, command specific sipp scenario attributes. XML DTD, jEdit. Hands on uac and uas scenario XML files. * Recv actions Log and warning, exec, variables, variable types, variable scope. External variables. Hands on RTP streaming, Change a calls network destination, injection files. * Regular expressions What is an RE. POSIX 1003.2. Re injection. Validation. Hands on regex example.

Total SIPp for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1727

Session Border Controllers for engineers

5.0(3)

By Systems & Network Training

SESSION BORDER CONTROLLERS COURSE DESCRIPTION A hands on course covering Session Border Controllers with a focus on the technical workings of features commonly found in Session Border Controllers. Hands on practicals follow each major theory session. WHAT WILL YOU LEARN * Explain how Session Border Controllers work. * Explain the SIP call flow using a SBC. * Deploy Session Border Controllers * Describe the features found in Session Border Controllers. SESSION BORDER CONTROLLERS COURSE DETAILS * Who will benefit: Technical staff working with SIP. * Prerequisites: Definitive SIP for engineers * Duration 2 days SESSION BORDER CONTROLLERS COURSE CONTENTS * SIP review Signalling, media, RTP, SIP, peer to peer, SIP proxies, SIP call flows. Hands on: SIP packet analysis. * Session Border Controllers What is a SBC? SBC features, peering scenario, access scenario, NNI SBC, UNI SBC, enterprise SBC. Hands on: SBC call flows * SBC topology hiding Header privacy, B2BUA. Hands on: Header analysis. * Session control Call admissions, QoS, statistics and billing, redundancy and scalability. Hands on: SBC session control * SBC and NAT NAT traversal, STUN, ICE, NAT and SIP, NAT and RTP. Hands on: SBC and NAT traversal. * SBC and security DoS, access control, encryption, authentication, toll fraud, regulatory issues, lawful intercept. Hands on: Security. * Interoperability mediation Manipulating SIP headers, IMS, IETF, TISPAN, SIP-I. SBC interworking.

Session Border Controllers for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

Definitive Ethernet LANS for engineers

5.0(3)

By Systems & Network Training

ETHERNET LANS TRAINING COURSE DESCRIPTION THIS COURSE HAS BEEN REPLACED AS PART OF OUR CONTINUOUS CURRICULUM DEVELOPMENT. PLEASE SEE OUR * Definitive Ethernet switching course WHAT WILL YOU LEARN * Describe what Ethernet is and how it works. * Install Ethernet networks * Troubleshoot Ethernet networks * Analyse Ethernet packets * Design Ethernet networks * Recognise the uses of Hubs, Bridges, switches and routers. ETHERNET LANS TRAINING COURSE DETAILS * Who will benefit: Those wishing to find out more about how their LAN works. * Prerequisites: Intro to Data comms & networking. * Duration 3 days ETHERNET LANS TRAINING COURSE CONTENTS * What is Ethernet? LANS, What is Ethernet?, history, standards, the OSI reference model, how Ethernet works, CSMA/CD. Ethernet Cabling UTP, cat 3,4,5, Cat 5e, Cat 6, Cat 7, fibre optic cable, MMF, SMF. Hands on Making a cable. * 802.3 physical specifications Distance limitations, hubs and repeaters, 5-4-3-2-1 rule, 10BaseT, 10BaseF, 100BaseTX, 100BaseFX, 1000BaseSX, 1000BaseT, 10gbe. Hands on Working with hubs. * Ethernet layer 2 Overview, NICS, device drivers, MAC addresses, broadcasts, multicasts, frame formats, Ether II, 802.3, 802.2, SNAP, compatibility, Ethernet type numbers, Ethernet multicast addresses, Ethernet vendor codes. Hands on Installing Ethernet components, analysing MAC headers. * IP and Ethernet ARP Hands on Analysing ARP packets. * Ethernet extensions Full/half duplex, auto negotiation, flow control methods, 802.3ad, 802.3af, 802.3ah. Hands on Configuration of full/half duplex. * Ethernet speed enhancements Encoding, Carrier extension, packet bursting, jumbo frames. * Prioritisation 802.1P, 802.1Q, TOS, WRR, QOS, VLANs. Hands on 802.1p testing * Interconnecting LANS Broadcast domains, Collision domains, What are bridges, transparent bridging, What are switches? STP, VLANS, What are routers? Layer 3 switches, Connecting Ethernet to the WAN. Hands on STP, Analysing Ethernet frames in a routed architecture. * Troubleshooting and maintaining Ethernet Utilisation, performance, TDR and other testers, bottlenecks, statistics, RMON. Hands on Monitoring performance, troubleshooting tools.

Definitive Ethernet LANS for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497

Linux engineer certification 1 (LPIC-2)

5.0(3)

By Systems & Network Training

LINUX ENGINEER CERTIFICATION TRAINING COURSE DESCRIPTION LPIC-2 is the second certification in LPI's multi level professional certification program. This course teaches the skills necessary to pass the LPI 201 exam; the first of two LPIC-2 exams. Specifically, the course covers the administration of Linux systems in small to medium sized mixed networks. WHAT WILL YOU LEARN * Perform advanced administration tasks. * Perform advanced file system administration. LINUX ENGINEER CERTIFICATION TRAINING COURSE DETAILS * Who will benefit: Linux administrators. * Prerequisites: Linux system administration (LPIC-1) * Duration 5 days LINUX ENGINEER CERTIFICATION FUNDAMENTALS TRAINING COURSE CONTENTS * Part I The LPI 201 Exam * Starting a System The Linux Boot Process, Firmware Startup, BIOS Startup, UEFI Startup, Linux Bootloaders, GRUB Legacy, GRUB 2, Alternative Bootloaders, Secure Bootloaders, Process Initialization, SysV Method, systemd Method, Upstart Method, System Recovery, Kernel Failures, Root Drive Failure. * Maintaining the System Fluid Messaging, Static Messaging, System backups, Backup Strategies, Performing Backups, Installing Programs from Source, Obtaining and unpacking Installation Files, Compiling Programs, Resource Usage: Managing, measuring, predicting and troubleshooting. * Mastering the Kernel What Is the Kernel? Kernel Features, Parts of the Kernel, Kernel Versions, Obtaining Source Code, Creating the Configuration File, Compiling and Installing the Kernel, Compiling and Installing Modules, Creating an Initial RAM Disk, Booting the New Kernel, Creating a Kernel Package, Maintaining the Kernel, Working with Module Files, Module Commands, Working with Hardware, Automatically Detecting Hardware, Troubleshooting the Kernel. * Managing the Filesystem The Linux Filesystem, Filesystem Structures, Filesystem Types, Making Filesystems, Attaching Filesystems, Memory-Based Linux Filesystems, the Btrfs Filesystem, Btrfs Subvolumes, Btrfs Snapshots, Optical Filesystems, Swap Filesystems, Network-Based Filesystems, Auto-Mounting, Encrypted Filesystems, Maintaining Linux Filesystems, Adjusting a Filesystem, Checking and Repairing a Filesystem, SMART. * Administering Advanced Storage Devices Configuring RAID, Implementing RAID on Linux, Managing a RAID Array, Adjusting Storage Devices, Looking at Drive Interface Concepts, Testing and Tuning Drives, Implementing iSCSI, Managing Logical Volumes, LVM, Creating Logical Volumes, Supporting Logical Volumes, Understanding the Device Mapper. * Navigating Network Services Networking Basics, The Physical Layer, The Network Layer, The Transport Layer, The Application Layer, Configuring Network Features, Network Configuration Files, Graphical Tools, Command-Line Tools, Basic Network Troubleshooting, Checking the Log Files, the ARP Cache, Sending Test Packets, Testing Network Routes, Testing Client/Server Connectivity, Finding Host Information, Network Security, Advanced Network Troubleshooting, Viewing Open Network Connections, Viewing Network Statistics, Scanning the Network, Capturing Network Traffic.

Linux engineer certification 1 (LPIC-2)
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797

How to recover from a poor Ofsted inspection outcome

By Marell Consulting Limited

Get a clear strategy for bouncing back after a poor Ofsted inspection outcome; develop your DfE action plan; know what to expect from a progress monitoring inspection.

How to recover from a poor Ofsted inspection outcome
Delivered in-person, on-request, onlineDelivered Online & In-Person in Birmingham
£997

Securing UNIX systems

5.0(3)

By Systems & Network Training

SECURING UNIX SYSTEMS TRAINING COURSE DESCRIPTION This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. WHAT WILL YOU LEARN * Secure UNIX accounts. * Secure UNIX file systems. * Secure UNIX access through the network. SECURING UNIX SYSTEMS COURSE DETAILS * Who will benefit: Linux technical staff needing to secure their systems. * Prerequisites: Linux system administration (LPIC-1) * Duration 5 days SECURING UNIX SYSTEMS COURSE CONTENTS * Cryptography * Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. * Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. * Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. * DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. * Host Security * Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. * Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. * User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. * FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. * Access Control * Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. * Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. * etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. * Network Security * Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. * Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. * Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd * Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Securing Linux systems

5.0(3)

By Systems & Network Training

SECURING LINUX SYSTEMS TRAINING COURSE DESCRIPTION This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. WHAT WILL YOU LEARN * Secure Linux accounts. * Secure Linux file systems. * Secure Linux access through the network. SECURING LINUX SYSTEMS TRAINING COURSE DETAILS * Who will benefit: Linux technical staff needing to secure their systems. * Prerequisites: Linux system administration (LPIC-1) * Duration 5 days SECURING LINUX SYSTEMS TRAINING COURSE CONTENTS * Cryptography * Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. * Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. * Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. * DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. * Host Security * Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. * Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. * User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. * FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. * Access Control * Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. * Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. * etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. * Network Security * Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. * Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. * Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd * Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Educators matching "Statistics"

Show all 11
Calderstones School

calderstones school

Liverpool

I am exceptionally proud to lead and work in such a richly diverse school community in which students with different languages, cultures and religions learn together in harmony. The school's comprehensive nature is something that we value immensely. Our students are encouraged to explore, discover and question through a range of exciting learning opportunities both within and outside the classroom. The staff endeavour to provide a calm and stimulating environment where good behaviour and mutual respect is modelled by everyone and where everyone is valued. We work closely with parents/carers and the wider community to ensure the success of our students. We believe that children deserve the best possible chances in life and that they learn best when there are strong links between home and school. Over the last few years we have spoken constantly about raised expectations and we will continue to push this throughout this academic year, particularly as we look to re-set and recalibrate on the back on the impact of the pandemic. In every aspect of school life, we will raise the bar for students and staff with the view that 'nobody rises to low expectations'. In terms our curriculum delivery, student achievement and progress, their involvement in school and community life, the ways in which students wear the uniform and present their work with pride, the ways in which they speak to each other and the behaviours that they demonstrate within the school and the community in which it resides ... in all of these ways, our expectations will be more ambitious and explicit than ever before. To this end, we have developed a ‘Manifesto for Change’ which sets out the ways in which we aim to continue our journey to excellence and identifies the long-term priorities for the school. One of our main priorities this year will be to ensure, as far as we can, that no child is left behind and that every child is challenged by the curriculum that we have in place. Students should find things difficult, although not impossible, at times. They should struggle at times and be expected to think deeply about the work that they do. They shouldn’t be getting everything right all of the time; if they are, the work is too easy and they’re not being challenged. None of this means that they shouldn’t be enjoying their learning; being challenged can be enjoyable. The curriculum is the bread and butter of our educational offer and should be inspiring a real thirst for learning; we can only do this through supporting and challenging. I hope you enjoy finding out more about our school by browsing our website. Visits are encouraged and welcomed; we would be delighted to show you around our wonderful school.

Winstanley College

winstanley college

Wigan

We aim to ensure all our students finish their courses successfully and grow into well-rounded, confident young people with a lifelong love of learning. We also contribute to the development of an interest in the larger world and the well-being of others. You will be treated as an adult and enjoy a great working relationship with other students and college staff. Winstanley has a pleasant and purposeful culture, allowing you to fulfil your full potential. Louise Tipping Principal Winstanley college is where adult life begins and where you begin to take the first steps towards a successful career. Whatever study or career path you want to follow, we have the right choices for you. We are proud to have nearly 2,000 pupils, making us one of the North West's largest sixth forms. One advantage of our size is that we can offer our students a variety of opportunities that they won't find anywhere else. We want you to enjoy a joyful and well-rounded experience of sixth form education, in addition to working hard in the courses you choose. Many clubs, societies, trips and social events are on offer throughout the academic year. We are proud to have retained an ethos that treats students as individuals, allowing and encouraging them to grow and succeed. I hope you will come and see us at one of our Open Events, where you can talk to staff and students about your own individual needs and aspirations. We hope that you are excited by what you learn about us on this website and we look forward to meeting you.