• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

220 Courses

Raising Healthy Children Course Level 3

4.3(43)

By John Academy

DESCRIPTION:  Raising children can be a difficult task if you are not skilled or willing to learn. To know how to raise them healthily, you need to learn and know the skills in child raising. You need to learn about child psychology, social behaviour, child safety online, and healthy lifestyle. All of these lessons could help you succeed in raising healthy children without sacrificing your own happiness. WHO IS THE COURSE FOR? * Teachers or professionals who are working with kids * Anyone who loves to become a teacher and likes children in general ENTRY REQUIREMENT: * This course is available to all learners, of all academic backgrounds.  * Learners should be aged 16 or over to undertake the qualification. * Good understanding of English language, numeracy and ICT are required to attend this course. ASSESSMENT: * At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. * Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. CERTIFICATION: * After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at a cost of £39 or in PDF format at a cost of £24. * PDF certificate's turnaround time is 24 hours and for the hardcopy certificate, it is 3-9 working days. WHY CHOOSE US? * Affordable, engaging & high-quality e-learning study materials; * Tutorial videos/materials from the industry leading experts; * Study in a user-friendly, advanced online learning platform; * Efficient exam systems for the assessment and instant result; * The UK & internationally recognised accredited qualification; * Access to course content on mobile, tablet or desktop from anywhere anytime; * The benefit of career advancement opportunities; * 24/7 student support via email. CAREER PATH: The Raising Healthy Children Course Level 3 will be useful and would be beneficial for every kind of occupations and careers like: * Child Care Specialist * Child and Family Social Worker * Early Educator * Paediatric Nurse * Pediatric Physical Therapist. Module 1: Raising Children Raising Children Who Succeed 01:00:00 How Do We Define Success? 00:30:00 What The Children Don't Need 01:00:00 What They Do Need 01:00:00 The Legacy of Books 01:00:00 The Power of Role Models 01:00:00 Teaching Social Skills 01:00:00 Money, Money, Money 00:30:00 Module 2: Child Psychology The Basics On Nurturing Your Child 00:30:00 Build Your Child's Self Esteem 00:30:00 Catch The Good And Not Always The Bad 00:30:00 Demonstrate The Love Is Unconditional 00:30:00 Make Rules And Be Consistent 01:00:00 Make Special Time For Your Child 00:30:00 Always Set An Example 00:30:00 Don't Dominate A Conversation 00:30:00 Learn To Be A Good Communicator 01:00:00 An Unnourished Child has A Long Road Ahead 00:30:00 Module 3: Social Behavior Training The Three Modes of Management 01:00:00 What Are Gentle Measures? 01:00:00 There Must be Authority 01:00:00 Gentle Punishment Of Disobedience 01:00:00 The Philosophy of Punishment Action 01:00:00 Rewarding Obedience 01:00:00 The Art of Training Delivery 01:00:00 Methods Exemplified 03:00:00 Della and The Dolls 01:00:00 The Child With The Parent 01:00:00 The Parent With The Child 01:00:00 Difference Between Commendation and Encouragement 01:00:00 Faults of Immaturity 01:00:00 Activities for kids Early Learning 01:00:00 The Role of Imagination in Children`s development 01:00:00 Truth and Falsehood 01:00:00 Judgement and Reasoning 01:00:00 Wishes and Requests 01:00:00 Children`s Questions 01:00:00 The Use of Money 01:00:00 Corporal Punishment 01:00:00 Gratitude in Children 01:00:00 Religious Training 01:00:00 Conclusion 00:15:00 Module 4: Child Safety Online Introduction to Child Safety 00:30:00 Warning Signs 01:00:00 Parental Monitoring 00:15:00 Monitoring and Protection Software 01:00:00 Tips to Avoid Sexual Predators 00:30:00 The Truth About Online Content 01:00:00 Identity Theft 00:30:00 Spyware And Malware 01:00:00 The Children's Online Privacy Protection Act (COPPA) 00:15:00 Privacy Policy 00:15:00 Social Networking Safety 01:00:00 Additional Rules For Child Safety Online 00:30:00 Warnings For Children Online 00:15:00 Additional Tips For Parents 01:00:00 Module 5: Healthy Lifestyle for Children Strong Kids Basics 00:30:00 Child Obesity Is A Serious Issue 00:30:00 The Benefits Of An Active Lifestyle 01:00:00 Shut Off The TV And Video Games 01:00:00 Outdoor Activities For Your Kids 01:00:00 Keep An Eye On Nutrition 01:00:00 Final Exam Mock Exam-Raising Healthy Children Course Level 3 00:30:00 Mock Exam Final Exam-Raising Healthy Children Course Level 3 00:30:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Raising Healthy Children Course Level 3
Delivered Online On Demand
£25

IT Support Technician

By Apex Learning

IT Support Technician | Functional Skills IT | Encryption | Cloud Computing ( CompTIA Cloud+ (CV0-002)) | Cyber Security | Data Center Training | Cisco ASA Firewall and much more...

IT Support Technician
Delivered Online On Demand
£49

Perfect Parenting Skills Training

By iStudy UK

Raise your Child the best way you possibly can Raising healthy children sounds pretty simple: Good nutrition and 60 minutes of physical activity a day protects kids from obesity, diabetes, and a host of chronic diseases later in life. However it is more complicated than that. So learn how to effectively raise your child in a healthy way with this useful course. These days though, health-conscious parents have to compete against any number of unhealthy temptations. One hour of physical activity a day may seem like a lot. But those 60 minutes can happen in short bursts throughout the day. This ensure that your child is active and having healthy exercise regularly. Different parents support their kids' physical activity in different ways. What matters most is that your kids know how much you value and support their active pursuits. So learn all you can with this course and keep your children healthy and active. Make yourself a better by keeping an eye on your children's activity and whether they are living a healthy life. COURSE HIGHLIGHTS Perfect Parenting Skills Training is an award winning and the best selling course that has been given the CPD Certification & IAO accreditation. It is the most suitable course anyone looking to work in this or relevant sector. It is considered one of the perfect courses in the UK that can help students/learners to get familiar with the topic and gain necessary skills to perform well in this field. We have packed Perfect Parenting Skills Training into several modules for teaching you everything you need to become successful in this profession. To provide you ease of access, this course is designed for both part-time and full-time students. You can become accredited in just 20/30 hours and it is also possible to study at your own pace. We have experienced tutors who will help you throughout the comprehensive syllabus of this course and answer all your queries through email. For further clarification, you will be able to recognize your qualification by checking the validity from our dedicated website. WHY YOU SHOULD CHOOSE PERFECT PARENTING SKILLS TRAINING * Lifetime access to the course * No hidden fees or exam charges * CPD Accredited certification on successful completion * Full Tutor support on weekdays (Monday - Friday) * Efficient exam system, assessment and instant results * Download Printable PDF certificate immediately after completion * Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. * Improve your chance of gaining professional skills and better earning potential. WHO IS THIS COURSE FOR? Perfect Parenting Skills Training is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. REQUIREMENTS Our Perfect Parenting Skills Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. CAREER PATH You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. Module 1: Raising Children Raising Children Who Succeed FREE 01:00:00 How Do We Define Success? FREE 01:00:00 What The Children Don't Need 01:00:00 What They Do Need 01:00:00 The Legacy of Books 01:00:00 The Power of Role Models 01:00:00 Teaching Social Skills 01:00:00 Money, Money, Money 01:00:00 Module 2: Child Psychology The Basics On Nurturing Your Child 00:30:00 Build Your Child's Self Esteem 01:00:00 Catch The Good And Not Always The Bad 01:00:00 Demonstrate The Love Is Unconditional 01:00:00 Make Rules And Be Consistent 01:00:00 Make Special Time For Your Child 00:30:00 Always Set An Example 01:00:00 Don't Dominate A Conversation 00:30:00 Learn To Be A Good Communicator 01:00:00 An Unnourished Child has A Long Road Ahead 00:30:00 Module 3: Social Behavior Training The Three Modes of Management FREE 01:00:00 What Are Gentle Measures? FREE 01:00:00 There Must be Authority 01:00:00 Gentle Punishment Of Disobedience 01:00:00 The Philosophy of Punishment Action 01:00:00 Rewarding Obedience 01:00:00 The Art of Training Delivery 01:00:00 Methods Exemplified 03:00:00 Della and The Dolls 01:00:00 The Child With The Parent 01:00:00 The Parent With The Child 01:00:00 Difference Between Commendation and Encouragement 01:00:00 Faults of Immaturity 01:00:00 Activities for kids Early Learning 01:00:00 The Role of Imagination in Children`s development 01:00:00 Truth and Falsehood 01:00:00 Judgement and Reasoning 01:00:00 Wishes and Requests 01:00:00 Children`s Questions 01:00:00 The Use of Money 01:00:00 Corporal Punishment 01:00:00 Gratitude in Children 01:00:00 Religious Training 01:00:00 Conclusion 00:15:00 Module 4: Child Safety Online Introduction to Child Safety 00:30:00 Warning Signs 01:00:00 Parental Monitoring 00:30:00 Monitoring and Protection Software 01:00:00 Tips to Avoid Sexual Predators 00:30:00 The Truth About Online Content 00:30:00 Identity Theft 00:30:00 Spyware And Malware 01:00:00 The Children's Online Privacy Protection Act (COPPA) 00:30:00 Privacy Policy 00:15:00 Social Networking Safety 01:00:00 Additional Rules For Child Safety Online 01:00:00 Warnings For Children Online 00:15:00 Additional Tips For Parents 01:00:00 Module 5: Healthy Lifestyle for Children Strong Kids Basics FREE 00:30:00 Child Obesity Is A Serious Issue FREE 00:30:00 The Benefits Of An Active Lifestyle 00:30:00 Shut Off The TV And Video Games 01:00:00 Outdoor Activities For Your Kids 00:30:00 Keep An Eye On Nutrition 01:00:00 Final Exam Mock Exam-Perfect Parenting Skills Training 00:30:00 Mock Exam Final Exam-Perfect Parenting Skills Training 00:30:00

Perfect Parenting Skills Training
Delivered Online On Demand
£25

C)CSA: Cybersecurity Analyst Mile 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security Professionals Incident Handling Professionals Anyone in a Security Operations Center Forensics Experts Cybersecurity Analysts Overview Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time. Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today's needs. When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today's exploits. This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time.Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today?s needs.When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today?s exploits.This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. BLUE TEAM?PRINCIPLES * Network Architecture?and how it lays the groundwork * Defensive Network * Security Data Locations?and how they tie together * Security?Operations?Center * The People, Processes, and Technology * Triage and Analysis * Digital Forensics * Incident Handling * Vulnerability Management * Automation, Improvement, and Tuning DIGITAL?FORENSICS * Investigative Theory and?Processes * Digital Acquisition * Evidence Protocols * Evidence Presentation * Computer Forensics?Laboratory * Protocols * Processing Techniques * Specialized?Artifacts * Advanced Forensics for Today?s?Exploitations MALWARE ANALYSIS * Creating the Safe Environment * Static Analysis * Dynamic Analysis * Behavior Based Analysis * What is different about?Ransomware? * Manual Code Reversing TRAFFIC ANALYSIS * Manual Analysis Principles * Automated?Analysis Principles * Signatures?compared to?Behaviors * Application Protocols Analysis Principles * Networking Forensics ASSESSING THE CURRENT STATE OF DEFENSE WITH THE?ORGANIZATION * Network Architecture and Monitoring * Endpoint Architecture and Monitoring * Automation, Improvement, and continuous?monitoring LEVERAGING SIEM FOR ADVANCED ANALYTICS * Architectural Benefits * Profiling and?Baselining * Advanced Analytics DEFEATING THE RED TEAM WITH PURPLE TEAM TACTICS * Penetration Testing?with full knowledge * Reconnaissance * Scanning * Enumeration * Exploitation * Lateral Movement ADDITIONAL COURSE DETAILS: Nexus Humans C)CSA: Cybersecurity Analyst Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)CSA: Cybersecurity Analyst Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)CSA: Cybersecurity Analyst Mile 2
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Implementing Cisco SD-WAN Solutions (ENSDWI) v2.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System installers System integrators System administrators Network administrators Solutions designers Overview After taking this course, you should be able to: Describe the Cisco SD-WAN solution and how modes of operation differ in traditional WAN versus SD-WAN Describe options for Cisco SD-WAN cloud and on-premises deployment Explain how to deploy WAN Edge devices Review the Zero-Touch Provisioning (ZTP) process and examine technical specifics for on-premises deployment Review the device configuration template and describe new features of device configuration templates Describe options for providing scalability, high availability, and redundancy Explain how dynamic routing protocols are deployed in an SD-WAN environment, on the service side and transport side Describe Cisco SD-WAN policy concepts, which includes how policies are defined, attached, distributed, and applied Define and implement advanced control policies, such as policies for custom topologies and service insertion Identify and implement advanced data policies, such as policies for traffic engineering and QoS Define and implement an Application-Aware Routing (AAR) policy Implement Direct Internet Access (DIA) and Cisco SD-WAN Cloud OnRamp options Describe Cisco SD-WAN security components and integration Describe how to design pure and hybrid Cisco SD-WAN solutions, as well as how to perform a migration to Cisco SD-WAN Describe Cisco SD-WAN Day-2 operations, such as monitoring, reporting, logging, troubleshooting, and upgrading Describe Cisco SD-WAN support for multicast The Implementing Cisco SD-WAN Solutions (ENSDWI) v2.0 course gives you training about how to design, deploy, configure, and manage your Cisco© Software-Defined WAN (SD-WAN) solution in a large-scale live network, including how to migrate from legacy WAN to SD-WAN. You will learn best practices for configuring routing protocols in the data center and the branch, as well as how to implement advanced control, data, and application-aware policies. The course also covers SD-WAN deployment and migration options, placement of controllers, how to deploy WAN Edge devices, and how to configure Direct Internet Access (DIA) breakout. The course looks at the different Cisco SD-WAN security options available, such as application-aware enterprise firewall, Intrusion Prevention System (IPS), URL filtering, Cisco Advanced Malware Protection (AMP), Secure Sockets Layer/Transport Layer Security (SSL/TLS) proxy, and Cisco Umbrella© Secure Internet Gateway (SIG). This course helps you prepare to take the Implementing Cisco SD-WAN Solutions (300-415 ENSDWI) exam which is part of the CCNP© Enterprise certification. You will also earn 32 Continuing Education (CE) credits toward recertification. COURSE OUTLINE * Examining the Cisco SD WAN Architecture * Examining Cisco SD-WAN Deployment Options * Deploying WAN Edge Devices * Onboarding WAN Edge Devices with ZTP and PnP * Using Device Configuration Templates * Exploring Redundancy, High Availability, and Scalability * Enabling Service-Side and Transport-Side Routing * Understanding Cisco SD-WAN Policy Configuration Basics * Defining Advanced Control Policies * Implementing AAR * Examining Direct Internet Access and Cloud Deployment Options * Exploring Cisco SD-WAN Security * Designing and Migrating to Cisco SD-WAN * Performing Cisco SD-WAN Network Management and Troubleshooting * Examining Cisco SD-WAN Multicast Support LAB OUTLINE * Deploy Cisco SD-WAN Controllers * Add a WAN Edge Router Using ZTP * Deploy Cisco SD-WAN Device Using Configuration Templates * Configure Cisco SD-WAN Controller Affinity * Implement Service Side Routing Protocols * Implement Transport Location (TLOC) Extensions * Implement Control Policies * Implement Data Policies * Implement Application-Aware Routing * Implement Branch and Regional Internet Breakouts * Migrate Branch Sites * Perform Cisco SD-WAN Software Upgrade ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Implementing Cisco SD-WAN Solutions (ENSDWI) v2.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco SD-WAN Solutions (ENSDWI) v2.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco SD-WAN Solutions (ENSDWI) v2.0
Delivered on-request, onlineDelivered Online
Price on Enquiry

CompTIA CySA+ Cybersecurity Analyst (CS0-002)

By Apex Learning

OVERVIEW The demand for skilled cybersecurity professionals is soaring in today's digital landscape. The CompTIA CySA+ Cybersecurity Analyst (CS0-002) course is your gateway to a lucrative and rewarding career in this high-demand industry. This course delves deep into various aspects of cybersecurity, from threat analysis and vulnerability identification to incident response and digital forensics. It's designed to ensure you're ready to excel in the field. This course covers various topics, including threat intelligence, vulnerability identification, incident response, and forensics analysis.  With 60+ hours of engaging content, our expert instructors will equip you with the knowledge and skills required to excel in the CompTIA CySA+ certification exam and kickstart your career in cybersecurity. Enrol in the CompTIA CySA+ Cybersecurity Analyst (CS0-002) course today and secure your future in this high-demand industry! HOW WILL I GET MY CERTIFICATE? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. WHO IS THIS COURSE FOR? There is no experience or previous qualifications required for enrolment on this CompTIA CySA+ Cybersecurity Analyst (CS0-002). It is available to all students, of all academic backgrounds. REQUIREMENTS Our CompTIA CySA+ Cybersecurity Analyst (CS0-002) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. CAREER PATH Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- * Open doors of opportunities * Increase your adaptability * Keep you relevant * Boost confidence And much more! COURSE CURRICULUM 22 sections • 96 lectures • 11:35:00 total length •Introduction: 00:02:00 •All about the Exam: 00:08:00 •What's New on the CompTIA CySA+ Exam?: 00:05:00 •Meet the Instructors: 00:02:00 •Thinking like the Enemy: 00:09:00 •Tools of the Trade: 00:08:00 •Intelligence Sources and Confidence Levels: 00:08:00 •Threat Indicators and Actors: 00:08:00 •Threat Trends: 00:07:00 •Intelligence Cycle and ISACs: 00:06:00 •Attack Frameworks: 00:06:00 •Threat Research: 00:11:00 •Threat Modeling and Intelligence Sharing: 00:06:00 •Vulnerability Identification: 00:07:00 •Scanning Parameters and Criteria: 00:09:00 •Scanning Special Considerations: 00:06:00 •Validation: 00:03:00 •Remediation and Mitigation: 00:08:00 •Inhibitors to Remediation: 00:07:00 •Web Applications Scanners, Part 1: 00:10:00 •Web Applications Scanners, Part 2: 00:05:00 •Scanning: 00:06:00 •Configuring and Executing Scans: 00:08:00 •Vulnerability Scanning: 00:10:00 •Reverse Engineering: 00:08:00 •Enumeration: 00:06:00 •Wireless Assessment Tools: 00:08:00 •Cloud Assessment Tools: 00:04:00 •Mobile and IoT: 00:10:00 •Embedded and Firmware Systems (RTOS, SoC, and FPGA): 00:09:00 •Access and Vehicles Risk: 00:08:00 •Automation and Control Risk: 00:10:00 •Cloud Models: 00:07:00 •Remote Service Invocation (FaaS, IaC, API): 00:10:00 •Cloud Vulnerabilities: 00:06:00 •Injection and Overflow Attacks: 00:09:00 •Injection and Overflow Attacks: 00:09:00 •Exploits: 00:08:00 •Application Vulnerabilities, Part 1: 00:08:00 •Application Vulnerabilities, Part 2: 00:07:00 •Network Architecture and Asset Management: 00:09:00 •Protecting Your Territory: 00:05:00 •Identity and Access Management: 00:11:00 •Encryption and Active Defense: 00:08:00 •Platforms: 00:07:00 •SOA and DevSecOps: 00:09:00 •Secure Software Development: 00:08:00 •Best Coding Practices: 00:04:00 •Trusted Hardware: 00:10:00 •Hardware Encryption: 00:04:00 •Hardware Security: 00:08:00 •Data Analytics: 00:10:00 •Endpoint Security: 00:08:00 •Recon Results, Part 1: 00:13:00 •Recon Results, Part 2: 00:05:00 •Impact Analysis: 00:05:00 •Collective Tools: 00:09:00 •Query Writing: 00:07:00 •E-mail Analysis, Part 1: 00:10:00 •E-mail Analysis, Part 2: 00:08:00 •Permissions: 00:09:00 •Firewalls: 00:08:00 •Intrusion Prevention Rules: 00:05:00 •DLP and Endpoint Detection: 00:05:00 •Threat Hunting and the Hypothesis: 00:06:00 •Threat Hunting Process: 00:07:00 •Results and Benefits: 00:05:00 •Workflow and Scripting: 00:07:00 •API and Malware Signature Creation: 00:08:00 •Threat Feeds and Machine Learning: 00:06:00 •Protocols, Standards, and Software Engineering: 00:05:00 •IR Roles and Responsibilities: 00:08:00 •IR Active Preparation: 00:10:00 •Incident Response Process: 00:07:00 •Network Symptoms: 00:04:00 •Host Symptoms: 00:08:00 •Application Symptoms: 00:04:00 •Digital Forensics: 00:10:00 •Seizure and Acquisitions: 00:05:00 •Forensics Acquisition Tools: 00:09:00 •Mobile, Virtualization, and Cloud: 00:06:00 •Forensics Analysis, Part 1: 00:04:00 •Forensics Analysis, Part 2: 00:08:00 •Packet Capture: 00:12:00 •Data Privacy and Security: 00:06:00 •Nontechnical Controls: 00:09:00 •Technical Controls: 00:08:00 •Business Impact Analysis: 00:05:00 •Risk Identification: 00:05:00 •Risk Calculation and Communication: 00:06:00 •Training: 00:04:00 •Supply Chain Assessment: 00:04:00 •Frameworks: 00:13:00 •Policies and Procedures: 00:05:00 •Controls and Procedures: 00:08:00 •Verification: 00:06:00

CompTIA CySA+ Cybersecurity Analyst (CS0-002)
Delivered Online On Demand
£12

Ethical Hacking Complete Course

By Lead Academy

Quality Guarantee: Promising training excellence, satisfaction gurantee Accredited by CPD UK & Quality License Scheme Tutor Support Unlimited support via email, till you complete the course Recognised Certification: Accepted by thousands of professional bodies Start Anytime With 1 year access to the course materials Online Learning Learn from anywhere, whenever you want This course will take you on an exciting journey into the world of cybersecurity. Here you will learn ethical hacking methodologies and methods to identify and address potential security threats. With expert guidance, you will learn penetration testing, data protection and network security. THIS COURSE AT A GLANCE * Accredited by CPD UK * Endorsed by Quality Licence Scheme * Gain a comprehensive understanding of ethical hacking. * Strengthen your skills and knowledge required to become an ethical hacker. * Understand the basic Linux commands. * Learn to create a secure hacking environment. * Gain knowledge about scanning, footprinting and website penetration testing. * Understand the process of wireless cracking. * Learn about the man in the middle attacks. * Learn about system hacking with Metasploit. * Understand the basic authentication brute force. WHY ETHICAL HACKING COMPLETE COURSE RIGHT FOR YOU? This online ethical hacking complete course is the perfect way to kickstart your network security and ethical hacking career. This flexible online course will provide you with a comprehensive understanding of ethical hacking and the skills required to gain proficiency. This professional ethical hacking complete course will also help you understand the process of creating a secure hacking environment by using your expertise in the field. You will also get to have a crash course on Python and coding after taking this course. This popular online course will also help you understand footprinting, scanning, website penetration testing and a lot more. By the end of the course, you will have a theoretical understanding of ethical hacking and the tools and strategies used to become a thriving ethical hacker. ETHICAL HACKING COMPLETE COURSE DETAILS ACCREDITED BY CPD certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Many organisations look for employees with CPD requirements, which means, that by doing this course, you would be a potential candidate in your respective field.   The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. COURSE CURRICULUM INTRODUCTION * Introduction to The Course * VirtualBox Installation * Kali Linux Installation * Enabling Full-Screen BASIC LINUX COMMANDS * Basic Commands Part 1 * Basic Commands Part 2 * Basic Commands Part 3 CREATING A SECURE HACKING ENVIRONMENT * Changing IP Address and Wireless Adapter Setup * Creating a Bootable Kali USB Drive * Essential Networking Terms * Essential Hacking Terms * Additional Kali Tools to Install * Changing Our MAC Address with Macchanger FOOTPRINTING * Google Hacking * Nikto Basics * Whois Tool * Email Harvesting * Shodan * Zone Transfer with Dig SCANNING * Installing Metasploitable * Nmap Part 1 * Nmap Part 2 * Nmap Part 3 * Zenmap * TCP Scans * Nmap Bypassing Defenses * Nmap Scripts Part 1 * Nmap Scripts Part 2 WEBSITE PENETRATION TESTING * Installing OWASP * HTTP Request * HTTP Response * Burpsuite Configuration * Editing Packets in Burpsuite * Whatweb and Dirb * Password Recovery Attack * Burpsuite Login Bruteforce * Hydra Login Bruteforce * Session Fixation * Injection Attacks * Simple Command Injection * Exploiting Command Injection Vulnerability * Finding Blind Command Injection * SQL Basics * Manual SQL Injection Part 1 * Manual SQL Injection Part 2 * SQLmap Basics * XML Injection * Installing XCAT And Preventing Injection Attacks * Reflected XSS * Stored XSS * Changing HTML Code with XSS * XSSer and XSSsniper WIRELESS CRACKING * Wireless Attacking Theory * Enabling Monitor Mode * Capturing Handshake with Airodump * RockYou.txt * Cracking with Aircrack * Cracking with Hashcat * Creating Password Lists with Crunch * Creating Password Lists with Cupp * Rainbow Tables Part 1 * Rainbow Tables Part 2 * Installing Fluxion * Finding and Cracking Hidden Networks * Preventing Wireless Attacks MAN IN THE MIDDLE ATTACKS * ARP Protocol Basics * Man in The Middle Attack Theory * Installing MITMf * Manual ARP Spoofing * Problems While Installing MITMf * HTTP Traffic Sniffing * DNS Spoofing and HTTPS Password Sniffing * Hooking Browsers with BEEF * Screenshotting Targets Browser * Cloning Any Webpage * Ettercap Basics SYSTEM HACKING WITH METASPLOIT * MSFconsole Environment * Bruteforcing SSH with Metasploit * Attacking Tomcat with Metasploit * Getting Meterpreter with Command Injection * PHP Code Injection * 2 Metasploitable Exploits * Wine Installation * Creating Windows Payloads with Msfvenom * Encoders and Hex Editor * Windows 10 Meterpreter Shell * Meterpreter Environment * Windows 10 Privilege Escalation * Preventing Privilege Escalation * Post Exploitation Modules * Getting Meterpreter Over Internet with Port Forwarding * Eternalblue Exploit * Persistence Module * Hacking Over The Internet with Ngrok * Android Device Attack with Venom * The Real Hacking Begins Now! PYTHON CRASH COURSE * Variables * Raw Input * If-Else Statements * For Loops * While Loops * Python Lists * Functions * Classes * Importing Libraries * Files in Python * Try and Except Rule CODING AN ADVANCED BACKDOOR * Theory Behind Reverse Shells * Simple Server Code * Connection with Reverse Shell * Sending and Receiving Messages * Sending Messages with While True Loop * Executing Commands on Target System * Fixing Backdoor Bugs and Adding Functions * First Test Using Our Backdoor * Trying to Connect Every 20 Seconds * Creating Persistence Part 1 * Creating Persistence Part 2 * Changing Directory * Uploading and Downloading Files * Downloading Files from The Internet * Starting Programs Using Our Backdoor * Capturing Screenshot on The Target PC * Embedding Backdoor in an Image Part 1 * Embedding Backdoor in an Image Part 2 * Checking for Administrator Privileges * Adding Help Option CREATING A KEYLOGGER FOR THE BACKDOOR * Importing Pynput * Simple Keylogger * Adding Report Function * Writing Keystrokes to a File * Adding The Keylogger to Our Reverse Shell Part 1 * Adding The Keylogger to Our Reverse Shell Part 2 * Final Project Test BASIC AUTHENTICATION BRUTEFORCER * Printing Banner * Adding Available Options * Starting Threads for Bruteforce * Writing Function to Run The Attack * Bruteforcing Router Login * Bypassing Antivirus with Your Future Programs * Sending Malware with Spoofed Email BONUS - BUILDING A CAREER IN CYBER SECURITY * What will You Learn in This Section? * Why is Ethical Hacking a Valuable Skill? * What is The Best Ethical Hacking Certification? * Tips for Getting Your First Job As an Ethical Hacker * How I Started My Career As an Ethical Hacker * How to Price Your Work WHO SHOULD TAKE THIS COURSE? This ethical hacking complete course has been designed for those who want to build in ethical hacking. Someone looking to add an advantage to their career in the field of ethical hacking or aspiring to establish their career can also opt for this engaging online course. ENTRY REQUIREMENTS * There are no academic entry requirements for this Ethical Hacking Complete course, and it is open to students of all academic backgrounds. * However, you are required to have a laptop/desktop/tablet or smartphone and a good internet connection. ASSESSMENT METHOD This Ethical Hacking Complete Course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner can grasp from each section. In the assessment pass mark is 60%. CERTIFICATION ENDORSED CERTIFICATE FROM QUALITY LICENCE SCHEME After successfully passing the MCQ exam you will be eligible to order the Endorsed Certificate by Quality Licence Scheme. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. It will give you a competitive advantage in your career, making you stand out from all other applicants and employees. There is a Quality Licence Scheme endorsement fee to obtain an endorsed certificate which is £65. CERTIFICATE OF ACHIEVEMENT FROM LEAD ACADEMY After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. FAQS IS CPD A RECOGNISED QUALIFICATION IN THE UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. ARE QLS COURSES RECOGNISED? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. WHEN WILL I RECEIVE MY CERTIFICATE? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. CAN I PAY BY INVOICE? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. CAN I PAY VIA INSTALMENT? Yes, you can pay via instalments at checkout. HOW TO TAKE ONLINE CLASSES FROM HOME? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. DOES AGE MATTER IN ONLINE LEARNING? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. WHEN I WILL GET THE LOGIN DETAILS FOR MY COURSE? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Ethical Hacking Complete Course
Delivered Online On Demand
£25

CompTIA Network+ Certification (N10-007)

4.8(12)

By Academy for Health and Fitness

** Trust The 35000+ Students Who Are Learning with Us & Kick Starting Their Career! ** Deal Price is Active; Save Now- £405! Offer Ends Soon; Hurry Up!! Are you looking to improve your current abilities or make a career move? Our unique CompTIA Network+ Certification (N10-007) Course might help you get there! Expand your expertise with high-quality training - study and get an expertly designed, great-value training experience. Learn from industry professionals and quickly equip yourself with the specific knowledge and skills you need to excel in your chosen career through the online training course. This online training course is accredited by CPD with 20 CPD points for professional development. Students can expect to complete this training course in around 23 hours. You'll also get dedicated expert assistance from us to answer any queries you may have while studying our course. The course is broken down into several in-depth modules to provide you with the most convenient and rich learning experience possible. Upon successful completion of the course, you will receive an instant e-certificate as proof of comprehensive skill development and competency. Add these amazing new skills to your resume and boost your employability by simply enrolling on this course. With this comprehensive course, you can achieve your dreams and train for your ideal career. The course provides students with an in-depth learning experience that they can work through at their own pace to enhance their professional development. You'll get a Free Student ID card by enrolling in this course. This ID card entitles you to discounts on bus tickets, movie tickets, and library cards. Enrolling on the course will ensure that you land your dream career faster than you thought possible. Stand out from the crowd and train for the job you want with the program. Experts created the CompTIA Network+ Certification (N10-007) course to provide a rich and in-depth training experience for all students who enrol in it. Enrol in the course right now and you'll have immediate access to all of the course materials. Then, from any internet-enabled device, access the course materials and learn when it's convenient for you. Start your learning journey straight away with this course and take a step toward a brighter future! Why Prefer this CompTIA Network+ Certification (N10-007) Course? * Opportunity to earn a certificate accredited by CPD after completing this course * Student ID card with amazing discounts - completely for FREE! (£10 postal charges will be applicable for international delivery) * Standards-aligned lesson planning * Innovative and engaging content and activities * Assessments that measure higher-level thinking and skills * Complete the program in your own time, at your own pace * Each of our students gets full 24/7 tutor support *** Course Curriculum *** Here is the curriculum breakdown of course: Section 01: Introduction * Introduction Section 02: Network Models * What is a Model? * OSI vs. TCP/IP Model * Walking Through OSI and TCP/IP * Meet the Frame * The MAC Address * Broadcast vs. Unicast * Introduction to IP Addressing * Packets and Ports Section 03: Cabling and Topology * Network Topologies * Coaxial Cabling * Twisted Pair Cabling * Cat Ratings * Fiber Optic Cabling * Fire Ratings * Legacy Network Connections Section 04: Ethernet Basics * What is Ethernet? * Ethernet Frames * Early Ethernet * The Daddy of Ethernet, 10BaseT * Terminating Twisted Pair * Hubs vs. Switches Section 05: Modern Ethernet * 100BaseT * Connecting Switches * Gigabit Ethernet and 10-Gigabit Ethernet * Transceivers * Connecting Ethernet Scenarios Section 06: Installing a Physical Network * Introduction to Structured Cabling * Terminating Structured Cabling * Equipment Room * Alternative Distribution Panels * Testing Cable * Troubleshooting Structured Cabling, Part 1 * Troubleshooting Structured Cabling, Part 2 * Using a Toner and Probe * Wired Connection Scenarios Section 07: TCP/IP Basics * Introduction to IP Addressing and Binary * Introduction to ARP * Classful Addressing * Subnet Masks * Subnetting with CIDR * More CIDR Subnetting Practice * Dynamic and Static IP Addressing * Rogue DHCP Servers * Special IP Addresses * IP Addressing Scenarios Section 08: Routing * Introducing Routers * Understanding Ports * Network Address Translation * Implementing NAT * Forwarding Ports * Tour of a SOHO Router * SOHO vs. Enterprise * Static Routes * Dynamic Routing * RIP * OSPF * BGP Section 09: TCP/IP Applications * TCP and UDP * ICMP and IGMP * Handy Tools * Introduction to Wireshark * Introduction to netstat * Web Servers * FTP * E-mail Servers and Clients * Securing E-mail * Telnet and SSH * Network Time Protocol * Network Service Scenarios Section 10: Network Naming * Understanding DNS * Applying DNS * The Hosts File * Net Command * Windows Name Resolution * Dynamic DNS * DNS Troubleshooting Section 11: Securing TCP/IP * Making TCP/IP Secure * Symmetric Encryption * Asymmetric Encryption * Cryptographic Hashes * Identification * Access Control * AAA * Kerberos/EAP * Single Sign-On * Certificates and Trust * Certificate Error Scenarios Section 12: Advanced Networking Devices * Understanding IP Tunneling * Virtual Private Networks * Introduction to VLANs * InterVLAN Routing * Interfacing with Managed Switches * Switch Port Protection * Port Bonding * Port Mirroring * Quality of Service * IDS vs. IPS * Proxy Servers * Load Balancing * Device Placement Scenarios Section 13: IPv6 * Introduction to IPv6 * IPv6 Addressing * IPv6 in Action * IPv4 and IPv6 Tunneling Section 14: Remote Connectivity * Telephony Technologies * Optical Carriers * Packet Switching * Connecting with Dial-up * Digital Subscriber Line (DSL) * Connecting with Cable Modems * Connecting with Satellites * ISDN and BPL * Remote Desktop Connectivity * Advanced Remote Control Systems Section 15: Wireless Networking * Introduction to 802.11 * 802.11 Standards * Power over Ethernet (PoE) * Antennas * Wireless Security Standards * Implementing Wireless Security * Threats to Your Wireless Network * Retro Threats * Wi-Fi Protected Setup (WPS) * Enterprise Wireless * Installing a Wireless Network * Wireless Scenarios * More Wireless Scenarios Section 16: Virtualization and Cloud Computing * Virtualization Basics * Cloud Ownership * Cloud Implementation * Your First Virtual Machine * NAS and SAN * Platform as a Service (PaaS) * Software as a Service (SaaS) * Infrastructure as a Service (IaaS) Section 17: Mobile Networking * Cellular Technologies * Mobile Connectivity * Deploying Mobile Devices * Mobile Access Control Section 18: Building a Real-World Network * Network Types * Network Design * Power Management * Unified Communications * Network Documentation * Contingency Planning * Predicting Hardware Failure * Backups Section 19: Managing Risk * What is Risk Management? * Security Policies * Change Management1 * User Training * Standard Business Documentation * Mitigating Network Threats * High Availability Section 20: Protecting Your Network * Denial of Service * Malware * Social Engineering * Access Control * Man-in-the-Middle * Introduction to Firewalls * Firewalls * DMZ * Hardening Devices * Physical Security Controls * Testing Network Security * Network Protection Scenarios Section 21: Network Monitoring * SNMP * Documenting Logs * System Monitoring * SIEM (Security Information and Event Management) Section 22: Network Troubleshooting * Network Troubleshooting Theory Assessment Process Once you have completed all the modules in the CompTIA Network+ Certification (N10-007) course, you can assess your skills and knowledge with an optional assignment. Our expert trainers will assess your assignment and give you feedback afterwards. Show off Your New Skills with a Certificate of Completion The learners have to complete the assessment of this course to achieve the CPD accredited certificate. Digital certificates can be ordered for only £10. The learner can purchase printed hard copies inside the UK for £29, and international students can purchase printed hard copies for £39. CPD 20 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? Is This CompTIA Network+ Certification (N10-007) Course Right for You? Anyone interested in learning more about this subject should take this course. This course will help you grasp the basic concepts as well as develop a thorough understanding of the subject. All are welcome to take this course. There are no prerequisites for enrolment, and you can access the course materials from any location in the world. REQUIREMENTS The CompTIA Network+ Certification (N10-007) program does not require any prior knowledge; everyone may participate! This course is open to anyone interested in learning from anywhere in the world. Every student must be over the age of 16 and have a passion for learning and literacy. This 100% online course can be accessed from any internet-connected device, such as a computer, tablet, or smartphone. This course allows you to study at your speed and grow a quality skillset. CAREER PATH After completing this CompTIA Network+ Certification (N10-007) Course, you are to start your career or begin the next phase of your career in this field. Our entire course will help you to gain a position of respect and dignity over your competitors. The certificate enhances your CV and helps you find work in the field concerned.

CompTIA Network+ Certification (N10-007)
Delivered Online On Demand
£12

VASCM-11 Veeam Availability Suite v11: Configuration and Management

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks The Veeam© Availability Suite? v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v11 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. This course is based on Veeam Availability Suite v11. INTRODUCTION * Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them * The 3-2-1 Rule and its importance in formulating a successful backup strategy * Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types BUILDING BACKUP CAPABILITIES * Backup methods, the appropriate use cases and impact on underlying file systems * Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance * Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure BUILDING REPLICATION CAPABILITIES * Identify and describe the options available for replication and impacts of using them * Create and modify replication jobs, outline considerations to ensure success * Introduce the new Continuous Data Protection (CDP) policy SECONDARY BACKUPS * Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery * Discuss using tapes for backups ADVANCED REPOSITORY CAPABILITIES * Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage * Ensure compatibility with existing deduplication appliances * Introduce the new hardened repository PROTECTING DATA IN THE CLOUD * Review how Veeam can protect the data of a cloud native application * Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam * Review how Veeam can be used to protect your Office 365 data RESTORING FROM BACKUP * Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders * Utilize Secure Restore to prevent the restoration of malware * Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production * Identify, describe and utilize the different explores and instant recovery tools and features RECOVERY FROM REPLICA * Identify and describe in detail, failover features and the appropriate usage * Develop, prepare and test failover plans to ensure recovery * Disaster recovery from replica to meet a variety of real-world recovery needs TESTING BACKUP AND REPLICATION * Testing backups and replicas to ensure you can recover, what you need, when you need to * Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots VEEAM BACKUP ENTERPRISE MANAGER AND VEEAM ONE * Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE CONFIGURATION BACKUP * Locate, migrate or restore backup configuration ADDITIONAL COURSE DETAILS: Nexus Humans VASCM-11 Veeam Availability Suite v11: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VASCM-11 Veeam Availability Suite v11: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VASCM-11 Veeam Availability Suite v11: Configuration and Management
Delivered on-request, onlineDelivered Online
Price on Enquiry

Veeam Availability Suite v11: Configuration and Management (VASv11CM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. Students should be experienced professionals with solid knowledge of servers, storage, networking and virtualization. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. The Veeam© Availability Suite? v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v11 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. INTRODUCTION * Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them * The 3-2-1 Rule and its importance in formulating a successful backup strategy * Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types BUILDING BACKUP CAPABILITIES * Backup methods, the appropriate use cases and impact on underlying file systems * Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance * Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure BUILDING REPLICATION CAPABILITIES * Identify and describe the options available for replication and impacts of using them * Create and modify replication jobs, outline considerations to ensure success * Introduce the new Continuous Data Protection (CDP) policy SECONDARY BACKUPS * Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery * Discuss using tapes for backups ADVANCED REPOSITORY CAPABILITIES * Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage * Ensure compatibility with existing deduplication appliances * Introduce the new hardened repository PROTECTING DATA IN THE CLOUD * Review how Veeam can protect the data of a cloud native application * Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam * Review how Veeam can be used to protect your Office 365 data RESTORING FROM BACKUP * Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders * Utilize Secure Restore to prevent the restoration of malware * Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production * Identify, describe and utilize the different explores and instant recovery tools and features RECOVERY FROM REPLICA * Identify and describe in detail, failover features and the appropriate usage * Develop, prepare and test failover plans to ensure recovery * Disaster recovery from replica to meet a variety of real-world recovery needs TESTING BACKUP AND REPLICATION * Testing backups and replicas to ensure you can recover, what you need, when you need to * Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots VEEAM BACKUP ENTERPRISE MANAGER AND VEEAM ONE * Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? CONFIGURATION BACKUP * Locate, migrate or restore backup configuration ADDITIONAL COURSE DETAILS: Nexus Humans Veeam Availability Suite v11: Configuration and Management (VASv11CM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Veeam Availability Suite v11: Configuration and Management (VASv11CM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Veeam Availability Suite v11: Configuration and Management (VASv11CM)
Delivered on-request, onlineDelivered Online
Price on Enquiry