• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

6250 Systems courses

Advanced Phlebotomy - Skills & Techniques (GPT005)

4.6(39)

By Geopace Training

The UK's first and only Level 4 qualification in Phlebotomy (equivalent to Ireland Level 6) FDSc (Foundation Degree Level) qualification Nationally Recognised certificate Dually accredited: Open College Network and CPD Covers both aspirated and evacuated systems Covers specialised blood collection systems & methods Classroom or Virtual Classroom learning options Comprehensive Training Kit is provided when booking our Virtual Classroom option (yours to keep) Complete your training from beginner to advanced level This course either follows on from our Introduction to Phlebotomy Course or can be combined with our introductory course as part of a course package (see below) Available to candidates who have completed (or are currently enrolled to complete) our Introduction to Phlebotomy Course or have previous phlebotomy practical experience.

Advanced Phlebotomy - Skills & Techniques (GPT005)
Delivered in Liverpool + 21 more locations or Online3 hours, May 11th, 16:30 + 52 more
£195

Certified Information Systems Auditor (CISA)

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THE INTENDED AUDIENCE FOR THIS COURSE IS INFORMATION SYSTEMS SECURITY PROFESSIONALS, INTERNAL REVIEW AUDITORS, AND OTHER INDIVIDUALS WHO HAVE AN INTEREST IN ASPECTS OF INFORMATION SYSTEMS AUDIT, CONTROLS, AND SECURITY. OVERVIEW UPON SUCCESSFUL COMPLETION OF THIS COURSE, STUDENTS WILL BE ABLE TO: - IMPLEMENT INFORMATION SYSTEMS AUDIT SERVICES IN ACCORDANCE WITH INFORMATION SYSTEMS AUDIT STANDARDS, GUIDELINES, AND BEST PRACTICES. - EVALUATE AN ORGANIZATIONS STRUCTURE, POLICIES, ACCOUNTABILITY, MECHANISMS, AND MONITORING PRACTICES. - EVALUATE INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT, AND IMPLEMENTATION. - EVALUATE THE INFORMATION SYSTEMS OPERATIONS, MAINTENANCE, AND SUPPORT OF AN ORGANIZATION; AND EVALUATE THE BUSINESS CONTINUITY AND DISASTER RECOVERY PROCESSES USED TO PROVIDE ASSURANCE THAT IN THE EVENT OF A DISRUPTION, IT SERVICES ARE MAINTAINED. - DEFINE THE PROTECTION POLICIES USED TO PROMOTE THE CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY OF INFORMATION ASSETS. DESCRIPTION IN THIS COURSE, STUDENTS WILL EVALUATE ORGANIZATIONAL POLICIES, PROCEDURES, AND PROCESSES TO ENSURE THAT AN ORGANIZATIONS INFORMATION SYSTEMS ALIGN WITH ITS OVERALL BUSINESS GOALS AND OBJECTIVES. 1 - THE PROCESS OF AUDITING INFORMATION SYSTEMS * ISACA Information Systems Auditing Standards and Guidelines * Fundamental Business Processes * Develop and Implement an Information Systems Audit Strategy * Plan an Audit * Conduct an Audit * The Evidence Life Cycle * Communicate Issues, Risks, and Audit Results * Support the Implementation of Risk Management and Control Practices 2 - IT GOVERNANCE AND MANAGEMENT * Evaluate the Effectiveness of IT Governance * Evaluate the IT Organizational Structure and HR Management * Evaluate the IT Strategy and Direction * Evaluate IT Policies, Standards, and Procedures * Evaluate the Effectiveness of Quality Management Systems * Evaluate IT Management and Monitoring of Controls * IT Resource Investment, Use, and Allocation Practices * Evaluate IT Contracting Strategies and Policies * Evaluate Risk Management Practices * Performance Monitoring and Assurance Practices * Evaluate the Organizations Business Continuity Plan 3 - INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT, AND IMPLEMENTATION * Evaluate the Business Case for Change * Evaluate Project Management Frameworks and Governance Practices * Development Life Cycle Management * Perform Periodic Project Reviews * Evaluate Control Mechanisms for Systems * Evaluate Development and Testing Processes * Evaluate Implementation Readiness * Evaluate a System Migration * Perform a Post-Implementation System Review 4 - INFORMATION SYSTEMS OPERATIONS, MAINTENANCE, AND SUPPORT * Perform Periodic System Reviews * Evaluate Service Level Management Practices * Evaluate Third-Party Management Practices * Evaluate Operations and End User Management Practices * Evaluate the Maintenance Process * Evaluate Data Administration Practices * Evaluate the Use of Capacity and Performance Monitoring Methods * Evaluate Change, Configuration, and Release Management Practices * Evaluate Problem and Incident Management Practices * Evaluate the Adequacy of Backup and Restore Provisions 5 - PROTECTION OF INFORMATION ASSETS * Information Security Design * Encryption Basics * Evaluate the Functionality of the IT Infrastructure * Evaluate Network Infrastructure Security * Evaluate the Design, Implementation, and Monitoring of Logical Access Controls * Risks and Controls of Virtualization * Evaluate the Design, Implementation, and Monitoring of Data Classification Process * Evaluate the Design, Implementation, and Monitoring of Physical Access Controls * Evaluate the Design, Implementation, and Monitoring of Environmental Controls

Certified Information Systems Auditor (CISA)
Delivered Online6 days, May 13th, 13:00 + 2 more
£3250

Certified Data Centre Professional (CDCP)

By Nexus Human

DURATION 2 DAYS 12 CPD HOURS THIS COURSE IS INTENDED FOR THE PRIMARY AUDIENCE FOR THIS COURSE IS ANY IT, FACILITIES OR DATA CENTRE PROFESSIONAL WHO WORKS IN AND AROUND THE DATA CENTRE AND WHO HAS THE RESPONSIBILITY TO ACHIEVE AND IMPROVE THE AVAILABILITY AND MANAGEABILITY OF THE DATA CENTRE. OVERVIEW AFTER COMPLETION OF THE COURSE THE PARTICIPANT WILL BE ABLE TO:? CHOOSE AN OPTIMUM SITE FOR MISSION-CRITICAL DATA CENTRE BASED ON CURRENT AND FUTURE NEEDS? DESCRIBE ALL COMPONENTS THAT ARE IMPORTANT FOR HIGH AVAILABILITY IN A DATA CENTRE AND HOW TO EFFECTIVELY SETUP THE DATA CENTRE? NAME AND APPLY THE VARIOUS INDUSTRY STANDARDS? DESCRIBE THE VARIOUS TECHNOLOGIES FOR UPS, FIRE SUPPRESSION, COOLING, MONITORING SYSTEMS, CABLING STANDARDS, ETC, AND TO SELECT AND APPLY THEM EFFECTIVELY TO COST-EFFICIENTLY ENHANCE THE HIGH-AVAILABILITY OF THE DATA CENTRE.? REVIEW THE ELECTRICAL DISTRIBUTION SYSTEM TO AVOID COSTLY DOWNTIME? ENHANCE COOLING CAPABILITIES AND EFFICIENCY IN THE DATA CENTRE BY USING EXISTING AND NEW TECHNIQUES AND TECHNOLOGIES FOR THE INCREASED COOLING REQUIREMENTS OF THE FUTURE? DESIGN A HIGHLY RELIABLE AND SCALABLE NETWORK ARCHITECTURE AND LEARN HOW TO ENSURE INSTALLERS APPLY PROPER TESTING TECHNIQUES? CREATE EFFECTIVE MAINTENANCE CONTRACTS WITH EQUIPMENT SUPPLIERS ENSURING THE BEST RETURN ON INVESTMENT? SETUP EFFECTIVE DATA CENTRE MONITORING ENSURING THE RIGHT PEOPLE GET THE RIGHT MESSAGE? ENSURE PROPER SECURITY MEASURES, BOTH PROCEDURAL AND TECHNICAL, ARE ESTABLISHED TO SAFEGUARD YOUR COMPANY'S VALUABLE INFORMATION IN THE DATA CENTRE DESCRIPTION THE COURSE WILL ADDRESS HOW TO SETUP AND IMPROVE KEY ASPECTS SUCH AS POWER, COOLING, SECURITY, CABLING, SAFETY, ETC., TO ENSURE A HIGH AVAILABLE DATA CENTRE. IT WILL ALSO ADDRESS KEY OPERATIONS AND MAINTENANCE ASPECTS. THE DATA CENTRE, IT?S IMPORTANCE AND CAUSES FOR DOWNTIME DATA CENTRE STANDARDS AND BEST PRACTICES DATA CENTRE LOCATION, BUILDING AND CONSTRUCTION * Selecting appropriate sites and buildings and how to avoid pitfalls Various components of an effective data centre and supporting facilities setup RAISED FLOOR/SUSPENDED CEILING * Uniform, concentrated and rolling load definitions Applicable standards Raised Floor guidelines Signal Reference Grid, grounding of racks Disability act and regulations Suspended ceiling usage and requirements LIGHT * Standards Light fixture types and placement Emergency lighting, Emergency Power Supply (EPS) POWER INFRASTRUCTURE * Power infrastructure layout from generation to rack level ATS and STS systems Redundancy levels and techniques Three-phase and single-phase usage Power distribution options within the computer room Power cabling versus bus bar trunking Bonding versus grounding Common Mode Noise and isolation transformers Distribution boards, form factors and IP-protection grades Power quality guidelines Real power versus apparent power How to size and calculate load in the data centre Generators Static and dynamic UPS systems, selection criteria, how they operate and energy efficiency option Battery types, correct selection and testing Thermo-graphics ELECTRO MAGNETIC FIELDS * Electrical fields and magnetic fields definitions and units of measurements Sources of EMF Effects of EMF on human health and equipment (H)EMP Standards EMF shielding solutions EQUIPMENT RACKS * Rack standards, properties and selection criteria Security considerations Power rail/strip options COOLING INFRASTRUCTURE * Temperature and humidity recommendations Cooling measurement units and conversion rates Sensible and latent heat definitions Differences between comfort and precision cooling Overview of different air conditioner technologies Raised floor versus non-raised floor cooling Placement of air conditioner units and limitations to be observed Supplemental cooling options Cold aisle/hot aisle containment WATER SUPPLY * Importance of water supply and application areas Backup water supply techniques DESIGNING A SCALABLE NETWORK INFRASTRUCTURE * The importance of a Structured Cabling System Planning considerations Copper and Fiber cable technology and standards ANSI/TIA-942 Cabling hierarchy and recommendations Testing and verification SAN storage cabling Network redundancy Building-to-building connectivity Network monitoring system requirements FIRE SUPPRESSION * Standards for fire suppression Detection systems Various total flooding fire suppression techniques and systems, their benefits and disadvantages Handheld extinguishers Signage and safety Regulatory requirements and best practices DATA CENTRE MONITORING * Data centre monitoring requirements EMS versus BMS Water leak detection systems Notification options and considerations OPERATIONAL SECURITY AND SAFETY PRACTICES * Data centre security layers Physical, infrastructure and organisational security Safety measures and essential signage LABELLING * Choosing a labelling scheme Recommended labelling practices Network labelling DOCUMENTATION * How to setup proper documentation Document management policies and procedures CLEANING * Cleaning practices for the data centre MTBF/MTTR * Standards and definitions Calculation models The ?real? value MAINTENANCE CONTRACTS/SLA/OLA EXAM: CERTIFIED DATA CENTRE PROFESSIONAL ADDITIONAL COURSE DETAILS: Nexus Humans Certified Data Centre Professional (CDCP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Centre Professional (CDCP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Data Centre Professional (CDCP)
Delivered Online3 days, May 13th, 07:00 + 6 more
£1500

Unvented Course (G3 - Cylinders)

5.0(39)

By City Training Group

Gain your unvented qualification smoothly with our friendly City Training team

Unvented Course (G3 - Cylinders)
Delivered In-Person in Cardiff4 hours, May 13th, 07:00 + 6 more
£199

C01M01 - FD&FA Fundamentals - BS 5839-1 (classroom)

By Ember Compliance

This is a gateway course for all further learning in FD&FA systems.

C01M01 - FD&FA Fundamentals - BS 5839-1 (classroom)
Delivered In-Person in BroxburnFull day, May 13th, 08:00 + 3 more
£185

Medical Terminology Training Courses - Level 3

By Mediterm Training

This course leads to the Mediterm Advanced Certificate in Medical Terminology (Level 3), the highest qualification in Medical Terminology, and can be studied flexibly over 20 weeks

Medical Terminology Training Courses - Level 3
Delivered Online20 weeks, May 13th, 08:00 + 1 more
£425

Medical Terminology Training Courses - Level 2

By Mediterm Training

This course leads to the Mediterm Intermediate Award in Medical Terminology (Level 2), studied over approximately 12 weeks (taking more or less time dependent on learner requirements). This course is suitable for those already working in healthcare or those who wish to start a new career in healthcare.

Medical Terminology Training Courses - Level 2
Delivered Online12 weeks, May 13th, 08:00 + 1 more
£325

CompTIA Linux+

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS DESIGNED FOR IT PROFESSIONALS WHOSE PRIMARY JOB RESPONSIBILITY IS THE MANAGEMENT OF SERVERS AND OTHER DEVICES RUNNING THE LINUX OPERATING SYSTEM. A TYPICAL STUDENT IN THIS COURSE SHOULD HAVE AT LEAST NINE MONTHS OF HANDS-ON LINUX EXPERIENCE AND AT LEAST ONE AND A HALF YEARS OF IT EXPERIENCE IN OTHER COMPUTING ENVIRONMENTS. THE TARGET STUDENT SHOULD WISH TO EXPAND THEIR SKILLSET TO SUPPORT THEIR CAREER IN LINUX SYSTEM ADMINISTRATION AND OPERATION. THIS COURSE IS ALSO DESIGNED FOR STUDENTS WHO ARE SEEKING THE COMPTIA LINUX+ CERTIFICATION AND WHO WANT TO PREPARE FOR EXAM XK0-005. THE LINUX+ CERTIFICATION CAN VALIDATE THE STUDENT'S UNDERSTANDING AND SKILL IN CONFIGURING, MONITORING, AND SUPPORTING LINUX SYSTEMS. OVERVIEW IN THIS COURSE, YOU WILL CONFIGURE, OPERATE, AND TROUBLESHOOT LINUX SYSTEMS. YOU WILL: - PERFORM BASIC LINUX TASKS. - MANAGE USERS AND GROUPS. - MANAGE PERMISSIONS AND OWNERSHIP. - MANAGE STORAGE. - MANAGE FILES AND DIRECTORIES. - MANAGE KERNEL MODULES. - MANAGE THE LINUX BOOT PROCESS. - MANAGE SYSTEM COMPONENTS. - MANAGE DEVICES. - MANAGE NETWORKING. - MANAGE PACKAGES AND SOFTWARE. - SECURE LINUX SYSTEMS. - WRITE AND EXECUTE BASH SHELL SCRIPTS. - AUTOMATE TASKS. - PLAN AND PERFORM A LINUX INSTALLATION. DESCRIPTION THE OFFICIAL COMPTIA© LINUX+© COURSEWARE BUILDS ON YOUR EXISTING EXPERIENCE WITH SYSTEMS OPERATIONS AND ADMINISTRATION TO PROVIDE YOU WITH THE KNOWLEDGE AND SKILLS REQUIRED TO CONFIGURE, MANAGE, OPERATE, AND TROUBLESHOOT A LINUX ENVIRONMENT BY USING SECURITY BEST PRACTICES, SCRIPTING, AND AUTOMATION. THIS COURSE WILL ALSO PREPARE YOU FOR THE EXAM XKO-005. 1 - PERFORMING BASIC LINUX TASKS * Identify the History and Development of Linux * Enter Shell Commands * Get Help Using Linux 2 - MANAGING USERS AND GROUPS * Assume Superuser Privileges * Create, Modify, and Delete Users * Create, Modify, and Delete Groups * Query Users and Groups * Configure Account Profiles 3 - MANAGING PERMISSIONS AND OWNERSHIP * Modify File and Directory Permissions * Modify File and Directory Ownership * Configure Special Permissions and Attributes * Troubleshoot Permissions Issues 4 - MANAGING STORAGE * Create Partitions * Manage Logical Volumes * Mount File Systems * Manage File Systems * Navigate the Linux Directory Structure * Troubleshoot Storage Issues 5 - MANAGING FILES AND DIRECTORIES * Create and Edit Text Files * Search for Files * Perform Operations on Files and Directories * Process Text Files * Manipulate File Output 6 - MANAGING KERNEL MODULES * Explore the Linux Kernel * Install and Configure Kernel Modules * Monitor Kernel Modules 7 - MANAGING THE LINUX BOOT PROCESS * Configure Linux Boot Components * Configure GRUB 2 8 - MANAGING SYSTEM COMPONENTS * Configure Localization Options * Configure GUIs * Manage Services * Troubleshoot Process Issues * Troubleshoot CPU and Memory Issues 9 - MANAGING DEVICES * Identify the Types of Linux Devices * Configure Devices * Monitor Devices * Troubleshoot Hardware Issues 10 - MANAGING NETWORKING * Identify TCP/IP Fundamentals * Identify Linux Server Roles * Connect to a Network * Configure DHCP and DNS Client Services * Configure Cloud and Virtualization Technologies * Troubleshoot Networking Issues 11 - MANAGING PACKAGES AND SOFTWARE * Identify Package Managers * Manage RPM Packages with YUM * Manage Debian Packages with APT * Configure Repositories * Acquire Software * Build Software from Source Code * Troubleshoot Software Dependency Issues 12 - SECURING LINUX SYSTEMS * Implement Cybersecurity Best Practices * Implement Identity and Access Management Methods * Configure SELinux or AppArmor * Configure Firewalls * Implement Logging Services * Back Up, Restore, and Verify Data 13 - WORKING WITH BASH SCRIPTS * Customize the Bash Shell Environment * Identify Scripting and Programming Fundamentals * Write and Execute a Simple Bash Script * Incorporate Control Statements in Bash Scripts 14 - AUTOMATING TASKS * Schedule Jobs * Implement Version Control Using Git * Identify Orchestration Concepts 15 - INSTALLING LINUX * Prepare for Linux Installation * Perform the Installation ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Linux Plus Certification (Exam XK0-005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Linux Plus Certification (Exam XK0-005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Linux+
Delivered Online6 days, May 13th, 13:00 + 4 more
£2475

CompTIA Network+

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS INTENDED FOR ENTRY-LEVEL COMPUTER SUPPORT PROFESSIONALS WITH A BASIC KNOWLEDGE OF COMPUTER HARDWARE, SOFTWARE, AND OPERATING SYSTEMS WHO WISH TO INCREASE THEIR KNOWLEDGE AND UNDERSTANDING OF NETWORKING CONCEPTS AND ACQUIRE THE REQUIRED SKILLS TO PREPARE FOR A CAREER IN NETWORK SUPPORT OR ADMINISTRATION, OR WHO WISH TO PREPARE FOR THE COMPTIA NETWORK+ CERTIFICATION. COMPTIA NETWORK+ IS THE FIRST CERTIFICATION IT PROFESSIONALS SPECIALIZING IN NETWORK ADMINISTRATION AND SUPPORT SHOULD EARN. NETWORK+ IS AIMED AT IT PROFESSIONALS WITH JOB ROLES SUCH AS NETWORK ADMINISTRATOR, NETWORK TECHNICIAN, NETWORK INSTALLER, HELP DESK TECHNICIAN, AND IT CABLE INSTALLER. THIS COURSE IS ALSO DESIGNED FOR STUDENTS WHO ARE SEEKING THE COMPTIA NETWORK+ CERTIFICATION AND WHO WANT TO PREPARE FOR THE COMPTIA NETWORK+ N10-008 CERTIFICATION EXAM. OVERVIEW IN THIS COURSE, YOU WILL DESCRIBE THE MAJOR NETWORKING TECHNOLOGIES AND SYSTEMS OF MODERN NETWORKS AND CONFIGURE, MANAGE, AND TROUBLESHOOT MODERN NETWORKS. EXPLAIN THE OSI AND TCP/IP MODELS. EXPLAIN PROPERTIES OF NETWORK TRAFFIC. INSTALL AND CONFIGURE SWITCHED NETWORKS. CONFIGURE IP NETWORKS. INSTALL AND CONFIGURE ROUTED NETWORKS. CONFIGURE AND MONITOR PORTS AND PROTOCOLS. EXPLAIN NETWORK APPLICATION AND STORAGE ISSUES. MONITOR AND TROUBLESHOOT NETWORKS. EXPLAIN NETWORK ATTACKS AND MITIGATIONS. INSTALL AND CONFIGURE SECURITY DEVICES. EXPLAIN AUTHENTICATION AND ACCESS CONTROLS. DEPLOY AND TROUBLESHOOT CABLING SOLUTIONS. IMPLEMENT AND TROUBLESHOOT WIRELESS TECHNOLOGIES. COMPARE AND CONTRAST WAN TECHNOLOGIES. USE REMOTE ACCESS METHODS. IDENTIFY SITE POLICIES AND BEST PRACTICES. DESCRIPTION COMPTIA'S NETWORK+ CERTIFICATION IS A FOUNDATION-LEVEL CERTIFICATION DESIGNED FOR IT PROFESSIONALS WITH AROUND ONE YEAR OF EXPERIENCE, WHOSE JOB ROLE IS FOCUSED ON NETWORK ADMINISTRATION. THE COMPTIA NETWORK+ EXAM WILL CERTIFY THE SUCCESSFUL CANDIDATE HAS THE KNOWLEDGE AND SKILLS REQUIRED TO TROUBLESHOOT, CONFIGURE, AND MANAGE COMMON NETWORK DEVICES; ESTABLISH BASIC NETWORK CONNECTIVITY; UNDERSTAND AND MAINTAIN NETWORK DOCUMENTATION; IDENTIFY NETWORK LIMITATIONS AND WEAKNESSES; AND IMPLEMENT NETWORK SECURITY, STANDARDS, AND PROTOCOLS. THE CANDIDATE WILL HAVE A BASIC UNDERSTANDING OF ENTERPRISE TECHNOLOGIES, INCLUDING CLOUD AND VIRTUALIZATION TECHNOLOGIES. THE OFFICIAL COMPTIA© NETWORK+© (EXAM N10-008): WILL TEACH YOU THE FUNDAMENTAL PRINCIPLES OF INSTALLING, CONFIGURING, AND TROUBLESHOOTING NETWORK TECHNOLOGIES AND HELP YOU TO PROGRESS A CAREER IN NETWORK ADMINISTRATION. IN THIS COURSE, YOU WILL BUILD ON YOUR EXISTING USER-LEVEL KNOWLEDGE AND EXPERIENCE WITH PERSONAL COMPUTER OPERATING SYSTEMS AND NETWORKS TO MASTER THE FUNDAMENTAL SKILLS AND CONCEPTS THAT YOU WILL NEED TO USE ON THE JOB IN ANY TYPE OF NETWORKING CAREER. PREREQUISITES * COMPTIA A+ CERTIFICATION (EXAMS 220-1001 AND 220-1002) 1 - EXPLAINING THE OSI AND TCP/IP MODELS * Topic A: Explain OSI Model Layers * Topic B: Explain the TCP/IP Suite 2 - EXPLAINING PROPERTIES OF NETWORK TRAFFIC * Topic A: Explain Media Types and Access Methods * Topic B: Deploy Ethernet Standards * Topic C: Configure and Monitor Network Interfaces 3 - INSTALLING AND CONFIGURING SWITCHED NETWORKS * Topic A: Install and Configure Hubs and Bridges * Topic B: Install and Configure Switches * Topic C: Compare and Contrast Network Topologies * Topic D: Compare and Contrast Network Types 4 - CONFIGURING IP NETWORKS * Topic A: Configure IPv4 Addressing Components * Topic B: Test IP Interfaces with Command Line Tools * Topic C: Configure IPv4 Subnets * Topic D: Configure Private and Public IPv4 Addressing Schemes * Topic E: Configure IPv6 Addressing Components * Topic F: Configure DHCP Services 5 - INSTALLING AND CONFIGURING ROUTED NETWORKS * Topic A: Explain Characteristics of Routing * Topic B: Install and Configure Routers 6 - CONFIGURING AND MONITORING PORTS AND PROTOCOLS * Topic A: Explain the Uses of Ports and Protocols * Topic B: Use Port Scanners and Protocol Analyzers * Topic C: Explain the Use of Name Resolution Services * Topic D: Configure DNS and IPAM Services 7 - EXPLAINING NETWORK APPLICATION AND STORAGE SERVICES * Topic A: Explain the Uses of Network Applications * Topic B: Explain the Uses of Voice Services and Advanced Networking Devices * Topic C: Explain the Uses of Virtualization and Network Storage Services * Topic D: Summarize the Concepts of Cloud Services 8 - MONITORING AND TROUBLESHOOTING NETWORKS * Topic A: Monitor Network Interfaces and Logs * Topic B: Explain Network Troubleshooting Methodology * Topic C: Troubleshoot Common Network Services Issues 9 - EXPLAINING NETWORKING ATTACKS AND MITIGATIONS * Topic A: Summarize Common Networking Attacks * Topic B: Explain the Characteristics of VLANs * Topic C: Explain the Characteristics of NAT and Port Forwarding 10 - INSTALLING AND CONFIGURING SECURITY DEVICES * Topic A: Install and Configure Firewalls and Proxies * Topic B: Explain the Uses of IDS/IPS and UTM 11 - EXPLAINING AUTHENTICATION AND ACCESS CONTROLS * Topic A: Explain Authentication Controls and Attacks * Topic B: Explain the Uses of Authentication Protocols and Directory Services * Topic C: Explain the Uses of Port Security and NAC * Topic D: Implement Network Device Hardening * Topic E: Explain Patch Management and Vulnerability Scanning Processes 12 - DEPLOYING AND TROUBLESHOOTING CABLING SOLUTIONS * Topic A: Deploy Structured Cabling Systems * Topic B: Deploy Twisted Pair Cabling Solutions * Topic C: Test and Troubleshoot Twisted Pair Cabling Solutions * Topic D: Deploy Fiber Optic Cabling Solutions 13 - IMPLEMENTING AND TROUBLESHOOTING WIRELESS TECHNOLOGIES * Topic A: Install and Configure Wireless Technologies * Topic B: Troubleshoot Wireless Performance Issues * Topic C: Secure and Troubleshoot Wireless Connectivity 14 - COMPARING AND CONTRASTING WAN TECHNOLOGIES * Topic A: Compare and Contrast WAN Core Service Types * Topic B: Compare and Contrast WAN Subscriber Service Types * Topic C: Compare and Contrast WAN Framing Service Types * Topic D: Compae and Contrast Wireless and IoT WAN Technologies 15 - USING REMOTE ACCESS METHODS * Topic A: Use Remote Access VPNs * Topic B: Use Remote Access Management Methods 16 - IDENTIFYING SITE POLICIES AND BEST PRACTICES * Topic A: Manage Networks with Documentation and Diagrams * Topic B: Summarize the Purposes of Physical Security Devices * Topic C: Compare and Contrast Business Continuity and Disaster Recovery Concepts * Topic D: Identify Policies and Best Practices

CompTIA Network+
Delivered Online6 days, May 13th, 13:00 + 23 more
£2475

CertNexus Certified CyberSec First Responder (CFR-410)

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS DESIGNED PRIMARILY FOR CYBERSECURITY PRACTITIONERS PREPARING FOR OR WHO CURRENTLY PERFORM JOB FUNCTIONS RELATED TO PROTECTING INFORMATION SYSTEMS BY ENSURING THEIR AVAILABILITY, INTEGRITY, AUTHENTICATION, CONFIDENTIALITY, AND NON-REPUDIATION. IT IS IDEAL FOR THOSE ROLES WITHIN FEDERAL CONTRACTING COMPANIES AND PRIVATE SECTOR FIRMS WHOSE MISSION OR STRATEGIC OBJECTIVES REQUIRE THE EXECUTION OF DEFENSIVE CYBER OPERATIONS (DCO) OR DOD INFORMATION NETWORK (DODIN) OPERATION AND INCIDENT HANDLING. THIS COURSE FOCUSES ON THE KNOWLEDGE, ABILITY, AND SKILLS NECESSARY TO PROVIDE FOR THE DEFENSE OF THOSE INFORMATION SYSTEMS IN A CYBERSECURITY CONTEXT, INCLUDING PROTECTION, DETECTION, ANALYSIS, INVESTIGATION, AND RESPONSE PROCESSES. OVERVIEW IN THIS COURSE, YOU WILL IDENTIFY, ASSESS, RESPOND TO, AND PROTECT AGAINST SECURITY THREATS AND OPERATE A SYSTEM AND NETWORK SECURITY ANALYSIS PLATFORM. YOU WILL: ASSESS CYBERSECURITY RISKS TO THE ORGANIZATION. ANALYZE THE THREAT LANDSCAPE. ANALYZE VARIOUS RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS. ANALYZE VARIOUS ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS. ANALYZE VARIOUS POST-ATTACK TECHNIQUES. ASSESS THE ORGANIZATION'S SECURITY POSTURE THROUGH AUDITING, VULNERABILITY MANAGEMENT, AND PENETRATION TESTING. COLLECT CYBERSECURITY INTELLIGENCE FROM VARIOUS NETWORK-BASED AND HOST-BASED SOURCES. ANALYZE LOG DATA TO REVEAL EVIDENCE OF THREATS AND INCIDENTS. PERFORM ACTIVE ASSET AND NETWORK ANALYSIS TO DETECT INCIDENTS. RESPOND TO CYBERSECURITY INCIDENTS USING CONTAINMENT, MITIGATION, AND RECOVERY TACTICS. INVESTIGATE CYBERSECURITY INCIDENTS USING FORENSIC ANALYSIS TECHNIQUES. DESCRIPTION THIS COURSE COVERS NETWORK DEFENSE AND INCIDENT RESPONSE METHODS, TACTICS, AND PROCEDURES THAT ARE IN ALIGNMENT WITH INDUSTRY FRAMEWORKS SUCH AS NIST 800-61R2 (COMPUTER SECURITY INCIDENT HANDLING GUIDE), US-CERT'S NATIONAL CYBER INCIDENT RESPONSE PLAN (NCIRP), AND PRESIDENTIAL POLICY DIRECTIVE (PPD)-41 ON CYBER INCIDENT COORDINATION. IT IS IDEAL FOR CANDIDATES WHO HAVE BEEN TASKED WITH THE RESPONSIBILITY OF MONITORING AND DETECTING SECURITY INCIDENTS IN INFORMATION SYSTEMS AND NETWORKS, AND FOR EXECUTING STANDARDIZED RESPONSES TO SUCH INCIDENTS. THE COURSE INTRODUCES TOOLS, TACTICS, AND PROCEDURES TO MANAGE CYBERSECURITY RISKS, DEFEND CYBERSECURITY ASSETS, IDENTIFY VARIOUS TYPES OF COMMON THREATS, EVALUATE THE ORGANIZATION'S SECURITY, COLLECT AND ANALYZE CYBERSECURITY INTELLIGENCE, AND REMEDIATE AND REPORT INCIDENTS AS THEY OCCUR. THIS COURSE PROVIDES A COMPREHENSIVE METHODOLOGY FOR INDIVIDUALS RESPONSIBLE FOR DEFENDING THE CYBERSECURITY OF THEIR ORGANIZATION. THIS COURSE IS DESIGNED TO ASSIST STUDENTS IN PREPARING FOR THE CERTNEXUS CYBERSEC FIRST RESPONDER (EXAM CFR-410) CERTIFICATION EXAMINATION. WHAT YOU LEARN AND PRACTICE IN THIS COURSE CAN BE A SIGNIFICANT PART OF YOUR PREPARATION. IN ADDITION, THIS COURSE AND SUBSEQUENT CERTIFICATION (CFR-410) MEET ALL REQUIREMENTS FOR PERSONNEL REQUIRING DOD DIRECTIVE 8570.01-M POSITION CERTIFICATION BASELINES: CSSP ANALYST CSSP INFRASTRUCTURE SUPPORT CSSP INCIDENT RESPONDER CSSP AUDITOR THE COURSE AND CERTIFICATION ALSO MEET ALL CRITERIA FOR THE FOLLOWING CYBERSECURITY MATURITY MODEL CERTIFICATION (CMMC) DOMAINS: INCIDENT RESPONSE (IR) AUDIT AND ACCOUNTABILITY (AU) RISK MANAGEMENT (RM) LESSON 1: ASSESSING CYBERSECURITY RISK * Topic A: Identify the Importance of Risk Management * Topic B: Assess Risk * Topic C: Mitigate Risk * Topic D: Integrate Documentation into Risk Management LESSON 2: ANALYZING THE THREAT LANDSCAPE * Topic A: Classify Threats * Topic B: Analyze Trends Affecting Security Posture LESSON 3: ANALYZING RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS * Topic A: Implement Threat Modeling * Topic B: Assess the Impact of Reconnaissance * Topic C: Assess the Impact of Social Engineering LESSON 4: ANALYZING ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS * Topic A: Assess the Impact of System Hacking Attacks * Topic B: Assess the Impact of Web-Based Attacks * Topic C: Assess the Impact of Malware * Topic D: Assess the Impact of Hijacking and Impersonation Attacks * Topic E: Assess the Impact of DoS Incidents * Topic F: Assess the Impact of Threats to Mobile Security * Topic G: Assess the Impact of Threats to Cloud Security LESSON 5: ANALYZING POST-ATTACK TECHNIQUES * Topic A: Assess Command and Control Techniques * Topic B: Assess Persistence Techniques * Topic C: Assess Lateral Movement and Pivoting Techniques * Topic D: Assess Data Exfiltration Techniques * Topic E: Assess Anti-Forensics Techniques LESSON 6: ASSESSING THE ORGANIZATION'S SECURITY POSTURE * Topic A: Implement Cybersecurity Auditing * Topic B: Implement a Vulnerability Management Plan * Topic C: Assess Vulnerabilities * Topic D: Conduct Penetration Testing LESSON 7: COLLECTING CYBERSECURITY INTELLIGENCE * Topic A: Deploy a Security Intelligence Collection and Analysis Platform * Topic B: Collect Data from Network-Based Intelligence Sources * Topic C: Collect Data from Host-Based Intelligence Sources LESSON 8: ANALYZING LOG DATA * Topic A: Use Common Tools to Analyze Logs * Topic B: Use SIEM Tools for Analysis LESSON 9: PERFORMING ACTIVE ASSET AND NETWORK ANALYSIS * Topic A: Analyze Incidents with Windows-Based Tools * Topic B: Analyze Incidents with Linux-Based Tools * Topic C: Analyze Indicators of Compromise LESSON 10: RESPONDING TO CYBERSECURITY INCIDENTS * Topic A: Deploy an Incident Handling and Response Architecture * Topic B: Mitigate Incidents * Topic C: Hand Over Incident Information to a Forensic Investigation LESSON 11: INVESTIGATING CYBERSECURITY INCIDENTS * Topic A: Apply a Forensic Investigation Plan * Topic B: Securely Collect and Analyze Electronic Evidence * Topic C: Follow Up on the Results of an Investigation ADDITIONAL COURSE DETAILS: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified CyberSec First Responder (CFR-410)
Delivered Online6 days, May 13th, 13:00 + 2 more
£3495

Educators matching "Systems"

Show all 1509
Industrial Technology Systems Ltd

industrial technology systems ltd

Middlesbrough

When I sat down to formulate the concept of the company, I had a specific target in mind. My vision was to create a genuine one-stop-shop for all forms of industrial computing and control. I had seen other companies attempt to achieve this and fail, so I was determined that my new company would be successful and able to offer a comprehensive range of services from 24/7 support through to full systems design, for Management Information systems – through a full range of Validation Services and in control systems from the smallest PLC to the largest DCS. I knew from my own experience that what was needed was a company that could deliver, had the right attitude and was flexible enough to respond, whatever the customers’ requirements. It had to make the customer the primary concern, and consistently offer the same level of quality and service on all projects, from small upgrades and support contracts to major capital investments. It was from these initial concepts that ITS was formed in 1991. In the years since then a great deal of hard work and effort has been invested by all the staff of ITS. When I look around the company today, I am proud that we have assembled what I consider to be a superb team of staff. Between them, they are capable of achieving everything initially envisaged. I am also encouraged by the fact that they are now driving the company forward, making it not just a place to work but the place to work. In recent years many people have told me that ITS is an organisation with large company ideas, and I regard this as a compliment. Whilst I realise that we must not lose sight of our roots, it seems right that we are aiming for the top, and our plans must reflect that. It is for this reason that ITS has created an infrastructure not just for today but for the coming years. It is our intention that ITS develops into a world class company and that we continue to improve and equip ourselves for the future. I am confident that ITS can benefit your business, and hope that by visiting this website you will find what you are looking for. If not, please call us. You have my word that we will do whatever it takes to help.