• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

220 Courses

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is open to engineers, administrators, and security-minded users of public, private, and hybrid cloud infrastructures responsible for implementing security in cloud environments: Security architects Cloud architects Security engineers Cloud engineers System engineers Cisco integrators and partners Overview After taking this course, you should be able to: Contrast the various cloud service and deployment models. Implement the Cisco Security Solution for SaaS using Cisco Cloudlock Micro Services. Deploy cloud security solutions using Cisco AMP for Endpoints, Cisco Umbrella, and Cisco Cloud Email Security. Define Cisco cloud security solutions for protection and visibility using Cisco virtual appliances and Cisco Stealthwatch Cloud. Describe the network as a sensor and enforcer using Cisco Identity Services Engine (ISE), Cisco Stealthwatch Enterprise, and Cisco TrustSec. Implement Cisco Firepower NGFW Virtual (NGFWv) and Cisco Stealthwatch Cloud to provide protection and visibility in AWS environments. Explain how to protect the cloud management infrastructure by using specific examples, defined best practices, and AWS reporting capabilities. This course shows you how to implement Cisco© cloud security solutions to secure access to the cloud, workloads in the cloud, and software as a service (SaaS) user accounts, applications, and data. This course covers usage of Cisco Cloudlock, Cisco Umbrella?, Cisco Cloud Email Security, Cisco Advanced Malware Protection (AMP) for Endpoints, Cisco Stealthwatch© Cloud and Enterprise, Cisco Firepower© NGFW (next-generation firewall), and more. INTRODUCING THE CLOUD AND CLOUD SECURITY * Describe the Evolution of Cloud Computing * Explain the Cloud Service Models * Explore the Security Responsibilities Within the Infrastructure as a Service (IaaS) Service Model * Explore the Security Responsibilities Within the Platform as a Service (PaaS) Service Model * Explore the Security Responsibilities Within the SaaS Service Model * Describe Cloud Deployment Models * Describe Cloud Security Basics IMPLEMENTING THE CISCO SECURITY SOLUTION FOR SAAS ACCESS CONTROL * Explore Security Challenges for Customers Using SaaS * Describe User and Entity Behavior Analytics, Data Loss Prevention (DLP), and Apps Firewall * Describe Cloud Access Security Broker (CASB) * Describe Cisco CloudLock as the CASB * Describe OAuth and OAuth Attacks DEPLOYING CISCO CLOUD-BASED SECURITY SOLUTIONS FOR ENDPOINTS AND CONTENT SECURITY * Describe Cisco Cloud Security Solutions for Endpoints * Describe AMP for Endpoints Architecture * Describe Cisco Umbrella * Describe Cisco Cloud Email Security * Design Comprehensive Endpoint Security INTRODUCING CISCO SECURITY SOLUTIONS FOR CLOUD PROTECTION AND VISIBILITY * Describe Network Function Virtualization (NFV) * Describe Cisco Secure Architectures for Enterprises (Cisco SAFE) * Describe Cisco NGFWv/Cisco Firepower Management Center Virtual * Describe Cisco ASAv * Describe Cisco Services Router 1000V * Describe Cisco Stealthwatch Cloud * Describe Cisco Tetration Cloud Zero-Trust Model DESCRIBING THE NETWORK AS THE SENSOR AND ENFORCER * Describe Cisco Stealthwatch Enterprise * Describe Cisco ISE Functions and Personas * Describe Cisco TrustSec * Describe Cisco Stealthwatch and Cisco ISE Integration * Describe Cisco Encrypted Traffic Analytics (ETA) IMPLEMENTING CISCO SECURITY SOLUTIONS IN AWS * Explain AWS Security Offerings * Describe AWS Elastic Compute Cloud (EC2) and Virtual Private Cloud (VPC) * Discover Cisco Security Solutions in AWS * Explain Cisco Stealthwatch Cloud in AWS DESCRIBING CLOUD SECURITY MANAGEMENT * Describe Cloud Management and APIs * Explain API Protection * Illustrate an API Example: Integrate to ISE Using pxGrid * Identify SecDevOps Best Practices * Illustrate a Cisco Cloud Security Management Tool Example: Cisco Defense Orchestrator * Illustrate a Cisco Cloud Security Management Tool Example: Cisco CloudCenter? * Describe Cisco Application Centric Infrastructure (ACI) * Describe AWS Reporting Tools ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Learn Ethical Hacking From A-Z: Beginner To Expert

By Apex Learning

OVERVIEW This comprehensive course on Learn Ethical Hacking From A-Z: Beginner To Expert will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Learn Ethical Hacking From A-Z: Beginner To Expert comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. HOW WILL I GET MY CERTIFICATE? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. WHO IS THIS COURSE FOR? There is no experience or previous qualifications required for enrolment on this Learn Ethical Hacking From A-Z: Beginner To Expert. It is available to all students, of all academic backgrounds. REQUIREMENTS Our Learn Ethical Hacking From A-Z: Beginner To Expert is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. CAREER PATH Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- * Open doors of opportunities * Increase your adaptability * Keep you relevant * Boost confidence And much more! COURSE CURRICULUM 17 sections • 105 lectures • 11:51:00 total length •Course Overview: 00:08:00 •About Your Instructors: 00:03:00 •Section Overview: 00:03:00 •Current Cybersecurity Market: 00:09:00 •The 3 Types of Hackers: 00:05:00 •The 4 Elements of Security: 00:04:00 •Ethical Hacker Terminology: 00:04:00 •Common Methods of Hacking: 00:08:00 •Cybersecurity & Ethical Hacking Overview: 00:03:00 •Ethical Hacking vs Penetration Testing: 00:06:00 •Job Opportunities in Cybersecurity: 00:01:00 •Who is This Course is For?: 00:01:00 •Networking Section Overview: 00:12:00 •How Data Travels Across The Internet: 00:02:00 •Understanding Ports and Protocols: 00:08:00 •Understanding IP Addresses: Public & Private: 00:02:00 •What Are Subnets?: 00:03:00 •The Average Network vs Remote Based: 00:06:00 •Hacking Lab Section Overview: 00:09:00 •Understanding Virtual Machines: 00:03:00 •Setup Your Kali Linux Machine: 00:10:00 •VN Setup & Testing Vulnerable Systems: 00:23:00 •Linux+Python+Bash+Powershell Section Overview: 00:06:00 •Linux Basics: 00:11:00 •Working With Directories & Moving Files: 00:03:00 •Installing & Updating Application Files: 00:02:00 •Linux Text Editors: 00:04:00 •Searching For Files: 00:02:00 •Bash Scripting Basics: 00:09:00 •Python Basics: 00:11:00 •Remaining Anonymous Section Overview: 00:06:00 •TOR Browser Overview: 00:06:00 •Anonsurf Overview: 00:03:00 •Changing Mac Addresses: 00:03:00 •Using a Virtual Private Network/Server (VPN, VPS): 00:04:00 •WiFi Hacking Section Overview: 00:06:00 •WiFi Hacking System Setup: 00:09:00 •WEP Hacking Attack #1: 00:09:00 •WEP Hacking Attack #2: 00:04:00 •WPA/WPA2 Hacking: 00:10:00 •Reconnaissance Section Overview: 00:04:00 •Passive Recon vs Active Recon: 00:01:00 •Recon-ng Overview: 00:15:00 •Whois Enumeration: 00:02:00 •DNS Enumeration Overview: 00:02:00 •Netcraft.com DNS Information: 00:03:00 •Google Hacking: 00:05:00 •Shodan.io Overview: 00:02:00 •Securityheaders.com (Analyze HTTPS Headers of website): 00:02:00 •Ssllabs.com/ssltest (Look for SSL issues on website): 00:02:00 •Pastebin.com (Sensitive Information): 00:01:00 •NMAP Port Scanning (Discover open ports, OS, Services, Vulnerabilities, etc.): 00:15:00 •Netcat Overview + SMB/NFSEnumeration: 00:14:00 •Nikto & Sparta Web Application Scanner: 00:06:00 •SMPT Enumeration + Nessus/Openvas Scanners: 00:05:00 •Launching Attacks Overview: 00:10:00 •Analyzing Information Gathered: 00:04:00 •Taking Advantage of Telenet: 00:06:00 •Searching & Understanding Exploits: 00:06:00 •Copy Exploits From Searchsploit: 00:03:00 •Understanding Exploits: 00:04:00 •Launching Exploits: 00:24:00 •Brute Force Attacks: 00:07:00 •How To Crack Passwords: 00:04:00 •ARP Spoofing Overview: 00:21:00 •Introduction To Cryptography: 00:14:00 •Post Exploitation Section Overview: 00:03:00 •Privilege Escalation: 00:29:00 •Transferring Files in/out of Victim, Creating Custom Malware + Evading Antivirus: 00:27:00 •Installing a Keylogger: 00:03:00 •Installing a Backdoor: 00:07:00 •Website & Web Application Hacking Overview: 00:06:00 •Web Application Scanning: 00:08:00 •Directory Buster Hacking Tool: 00:03:00 •Nikto Web App Hacking Tool: 00:03:00 •SQLmap and SQL Ninja Overview: 00:01:00 •How To Execute Brute Force Attacks: 00:13:00 •Using Command Injection: 00:03:00 •Malicious File Upload: 00:10:00 •Local & Remote File Inclusion: 00:10:00 •SQL Injection Overview: 00:19:00 •Using Cross Site Request Forgery: 00:11:00 •Cross Site Scripting Overview: 00:12:00 •Mobile Phone Hacking Section Overview: 00:11:00 •Mobile Attack Vectors: 00:02:00 •Mobile Hacking Using URLs: 00:02:00 •Jail Breaking and Rooting Considerations: 00:01:00 •Privacy Issues (Geo Location): 00:01:00 •Mobile Phone Data Security: 00:02:00 •Getting Your Name Out There Section Overview: 00:02:00 •Building A Brand: 00:09:00 •Personal Branding: 00:13:00 •Setup Your Website and Blog: 00:11:00 •Writing a Book: 00:10:00 •Starting a Podcast: 00:08:00 •Networking Overview: 00:06:00 •Making Money Section Overview: 00:02:00 •Bug Bounty Programs: 00:04:00 •How To Start Freelancing: 00:11:00 •How To Start Client Consulting: 00:09:00 •Potential Salary & Cybersecurity Roadmap: 00:10:00 •Books Recommendations: 00:03:00 •Places to Practice Hacking for Free: 00:03:00 •Resources - Learn Ethical Hacking From A-Z: Beginner To Expert: 00:00:00 •Assignment - Learn Ethical Hacking From A-Z: Beginner To Expert: 00:00:00

Learn Ethical Hacking From A-Z: Beginner To Expert
Delivered Online On Demand
£12

CompTIA ITF+ (FCO-U61)

5.0(2)

By Studyhub UK

The CompTIA ITF+ (FCO-U61) course provides foundational knowledge and skills in IT fundamentals. It covers various aspects of computer usage, hardware, data storage, operating systems, network connectivity, security, troubleshooting, and software development. This course is designed to equip learners with a comprehensive understanding of IT concepts to prepare for entry-level IT roles. LEARNING OUTCOMES: 1. Acquire an understanding of diverse computer uses in various scenarios. 2. Gain insights into the components and operations of system hardware. 3. Develop proficiency in managing device ports, peripherals, and mobile configurations. 4. Enhance knowledge in data storage, file management, and application software usage. 5. Master the essentials of network connectivity, IT security, and computer maintenance. WHY BUY THIS COMPTIA ITF+ (FCO-U61)? 1. Unlimited access to the course for a lifetime. 2. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. 3. Structured lesson planning in line with industry standards. 4. Immerse yourself in innovative and captivating course materials and activities. 5. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. 6. Flexibility to complete the Course at your own pace, on your own schedule. 7. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. 8. Unlock career resources for CV improvement, interview readiness, and job success. CERTIFICATION After studying the course materials of the CompTIA ITF+ (FCO-U61) there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. WHO IS THIS COURSE FOR? * Individuals starting their journey in the IT field. * Students seeking foundational knowledge in computing. * Career changers aiming to enter the IT sector. * Aspiring IT professionals desiring a comprehensive understanding of computers. * Individuals interested in acquiring a broad IT skill set. PREREQUISITES This CompTIA ITF+ (FCO-U61) does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA ITF+ (FCO-U61) was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. CAREER PATH * IT Support Specialist: £20,000 - £30,000 per annum * Network Administrator: £25,000 - £40,000 per annum * Systems Analyst: £30,000 - £50,000 per annum * Database Administrator: £30,000 - £50,000 per annum * Software Developer: £25,000 - £45,000 per annum * Cybersecurity Analyst: £30,000 - £55,000 per annum COURSE CURRICULUM Section 01: How People Use Computers Introduction to IT Fundamentals 00:03:00 The Case for Computer Literacy 00:03:00 Features Common to Every Computing Device 00:02:00 Common General-Purpose Computing Devices 00:02:00 Networks of Computing Devices 00:04:00 Remotely-Accessed Computer Systems 00:04:00 Specialized Computer Systems 00:02:00 Specialty I/O Devices 00:01:00 Section 02: System Hardware CPUs 00:03:00 Passive and Active Cooling 00:03:00 RAM and Active Memory 00:05:00 Motherboards 00:03:00 Power Supplies 00:03:00 AMA - Ask Me Anything about System Hardware 00:07:00 Section 03: Device Ports and Peripherals Ports and Connectors 00:03:00 General Use I/O Devices 00:02:00 AMA - Ask Me Anything about I/O, Ports and Peripherals 00:07:00 Section 04: Data Storage and Sharing Basics of Binary 00:04:00 Storage Technologies 00:04:00 Mass Storage Variation 00:03:00 AMA - Ask Me Anything about Data Storage and Sharing 00:07:00 Section 05: Understanding Operating Systems Operating System Functions 00:04:00 Operating System Interfaces 00:05:00 AMA - Ask Me Anything about Understanding OS's 00:05:00 Section 06: Setting Up and Configuring a PC Preparing the Work Area 00:02:00 Setting up a Desktop PC 00:01:00 Completing PC Setup 00:04:00 AMA - Ask Me Anything about Setting up and Configuring a PC 00:09:00 Section 07: Setting Up and Configuring a Mobile Device Personalizing a Tablet 00:08:00 AMA - Ask Me Anything about Mobile Devices Part 1 00:07:00 AMA - Ask Me Anything about Mobile Devices Part 2 00:07:00 Section 08: Managing Files File Management Tools 00:02:00 File Manipulation 00:06:00 Backups 00:03:00 AMA - Ask Me Anything about Managing Files 00:08:00 Section 09: Using and Managing Application Software Walking Survey of Applications 00:03:00 Managing Applications 00:03:00 Applications and Extensions 00:04:00 AMA - Ask Me Anything about Working with Applications 00:07:00 Section 10: Configuring Network and Internet Connectivity Wi-Fi Setup 00:06:00 Going High Speed 00:03:00 Setting Up and Sharing Printers 00:05:00 AMA - Ask Me Anything about Networks and Internet Connectivity Part 1 00:07:00 AMA - Ask Me Anything about Networks and Internet Connectivity Part 2 00:05:00 Section 11: IT Security Threat Mitigation Physical Security 00:05:00 Dealing with Malware 00:03:00 Password Management 00:03:00 Clickworthy 00:03:00 Perils of Public Internet 00:02:00 AMA - Ask Me Anything about IT Threat Mitigation Part 1 00:07:00 AMA - Ask Me Anything about IT Threat Mitigation Part 2 00:08:00 Section 12: Computer Maintenance and Management Power Management 00:03:00 Cleaning and Maintaining Computers 00:03:00 Trash it or Stash it? 00:02:00 AMA - Ask Me Anything about Computer Maintenance and Management 00:11:00 Section 13: IT Troubleshooting Troubleshooting 00:03:00 AMA - Ask Me Anything about Troubleshooting Computers Part 1 00:10:00 AMA - Ask Me Anything about Troubleshooting Computers Part 2 00:11:00 Section 14: Understanding Databases Introduction to Databases 00:06:00 Database Details 00:06:00 AMA - Ask Me Anything about Databases 00:06:00 Section 15: Developing and Implementing Software Introduction to Programming 00:04:00 Programming with a PBJ Sandwich 00:08:00 AMA - Ask Me Anything about Programming 00:04:00

CompTIA ITF+ (FCO-U61)
Delivered Online On Demand
£10.99

Blockchain Security Training

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Blockchain Architects Blockchain DevelopersApplication Developers Blockchain System AdministratorsNetwork Security Architects Cyber Security ExpertsIT Professionals w/cyber security experience Overview Those who attend the Security for Blockchain Professionals course and pass the exam certification will have a demonstrated knowledge of:Identifying and differentiating between security threats and attacks on a Blockchain network.Blockchain security methods, best practices, risk mitigation, and more.All known (to date) cyber-attack vectors on the Blockchain.Performing Blockchain network security risk analysis.A complete understanding of Blockchain?s inherent security features and risks.An excellent knowledge of best security practices for Blockchain System/Network Administrators.Demonstrating appropriate Blockchain data safeguarding techniques. This course covers all known aspects of Blockchain security that exist in the Blockchain environment today and provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. FUNDAMENTAL BLOCKCHAIN SECURITY CRYPTOGRAPHY FOR THE BLOCKCHAIN HASH FUNCTIONS * Public Key Cryptography * Elliptic Curve Cryptography * A Brief Introduction to Blockchain The Blocks * The Chains * The Network * Promises of the Blockchain * Blockchain Security Assumptions Digital Signature Security * Hash Function Security * Limitations of Basic Blockchain Security Public Key Cryptography Review * Real-Life Public Key Protection * Cryptography and Quantum Computers * Lab 1 (Tentative) Finding Hash Function Collisions Reversible hash function * Hash function with poor non-locality * Hash function with small search space * Breaking Public Key Cryptography Brute Forcing a Short Private Key * Brute Forcing a Poorly-Chosen Private Key CONSENSUS IN THE BLOCKCHAIN * Blockchain Consensus and Byzantine Generals Blockchain Networking Review * Byzantine Generals Problem Relation to Blockchain * Byzantine Fault Tolerance * Introduction to Blockchain Consensus Security Blockchain Consensus Breakthrough * Proof of Work What is Proof of Work? * How does Proof of Work Solve BGP? * Proof of Work Security Assumptions * Attacking Proof of Work * Proof of Stake What is Proof of Stake? * How does Proof of Stake Solve BGP? * Proof of Stake Security Assumptions * Attacking Proof of Stake * General Attacks on Blockchain Consensus * Other Blockchain Consensus Algorithms * Lab 2 (Tentative) Attacking Proof of Work Performing a 51% Attack * Performing a Selfish Mining Attack * Attacking Proof of Stake Performing a XX% Attack * Performing a Long-Range Attack * Malleable Transaction Attacks ADVANCED BLOCKCHAIN SECURITY MECHANISMS ARCHITECTURAL SECURITY MEASURES PERMISSIONED BLOCKCHAINS * Checkpointing * Advanced Cryptographic Solutions Multiparty Signatures * Zero-Knowledge Proofs * Stealth Addresses * Ring Signatures * Confidential Transactions * Lab 3 (Tentative) Permissioned Blockchains * 51% on a Checkpointed Blockchain * Data mining on a blockchain with/without stealth addresses * Zero-Knowledge Proof Simulation * Trying to fake knowledge of a ZKP * Module 4: Blockchain for Business Introduction to Ethereum Security What is Ethereum * Consensus in Ethereum * Smart Contracts in Ethereum * Ethereum Security * Pros and Cons of Ethereum Blockchains * Introduction to Hyperledger Security What is Hyperledger * Consensus in Hyperledger * Smart Contracts in Hyperledger * Hyperledger Security * Pros and Cons of Hyperledger Blockchains * Introduction to Corda Security What is Corda * Consensus in Corda * Smart Contracts in Corda * Corda Security * Pros and Cons of Corda Blockchains * Lab 4 BLOCKCHAIN RISK ASSESSMENT WHAT ARE THE RISKS OF THE BLOCKCHAIN? * Information Security * Information Sensitivity Data being placed on blockchain * Risks of disclosure * Regulatory Requirements Data encryption * Data control * PII protection * Blockchain Architectural Design Public and Private Blockchains * Open and Permissioned Blockchains * Choosing a Blockchain Architecture * Lab 5 * Exploring public/private open/permissioned blockchains? BASIC BLOCKCHAIN SECURITY BLOCKCHAIN ARCHITECTURE * User Security Protecting Private Keys * Malware * Update * Node Security * Configuring MSPs * Network Security * Lab 6 (TBD) SMART CONTRACT SECURITY INTRODUCTION TO SMART CONTRACTS * Smart Contract Security Considerations Turing-Complete * Lifetime * External Software * Smart Contract Code Auditing Difficulties * Techniques * Tools * Lab 7 (Tentative) * Try a couple of smart contract code auditing tool against different contracts with built-in vulnerabilities * Module 8: Security Implementing Business Blockchains Ethereum Best Practices * Hyperledger Best Practices * Corda Best Practices * Lab 8 NETWORK-LEVEL VULNERABILITIES AND ATTACKS INTRODUCTION TO BLOCKCHAIN NETWORK ATTACKS * 51% Attacks * Denial of Service Attacks * Eclipse Attacks * Routing Attacks * Sybil Attacks * Lab 9 * Perform different network-level attacks SYSTEM-LEVEL VULNERABILITIES AND ATTACKS INTRODUCTION TO BLOCKCHAIN SYSTEM VULNERABILITIES * The Bitcoin Hack * The Verge Hack * The EOS Vulnerability * Lab 10 SMART CONTRACT VULNERABILITIES AND ATTACKS INTRODUCTION TO COMMON SMART CONTRACT VULNERABILITIES * Reentrancy * Access Control * Arithmetic * Unchecked Return Values * Denial of Service * Bad Randomness * Race Conditions * Timestamp Dependence * Short Addresses * Lab 11 * Exploiting vulnerable smart contracts SECURITY OF ALTERNATIVE DLT ARCHITECTURES WHAT ARE ALTERNATIVE DLT ARCHITECTURES? * Introduction to Directed Acyclic Graphs (DAGs) * DAGs vs. Blockchains * Advantages of DAGs * DAG Vulnerabilities and Security * Lab 12 * Exploring a DAG network

Blockchain Security Training
Delivered on-request, onlineDelivered Online
Price on Enquiry

VEEAM-VMCE Availability Suite v10.0: Configuration and Management

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v10 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to their own environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Install and configure Veeam Availability Suite into their environment, ensuring data is protected effectively. Adapt with an organization's evolving technical, business and regulatory needs. Ensure recovery is possible, effective, efficient, secure and compliant with business and legal requirements. Provide visibility of the business data assets, and produce effective reports and dashboards to monitor performance and risks. Conduct basic troubleshooting and analysis of their Veeam Availability Suite environment. This three-day, technical deep dive Veeam© Availability Suite? v10: Configuration and Management training course is focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v10 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. INTRODUCTION * Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them * The 3-2-1 Rule and its importance in formulating a successful backup strategy * Identify key Veeam Availability Suite components and describe their usage scenarios BUILDING BACKUP CAPABILITIES * Backup methods, the appropriate use cases and impact on underlying file systems * Create, modify, optimize and delete backup jobs, including NAS Backup jobs. Explore different tools and methods, such as BitLooker? and Deduplication, to maximize environment performance * Global Settings and their usage to prevent production performance bottlenecks, encrypt network traffic data and control network jurisdiction * RESTORING FROM BACKUP * Identify and describe the different restore tools and their features. Ensure you have the confidence to use the correct restore tool at the right time * Using Secure Restore to prevent the restoration of malware * Disaster recovery from backup, respond accordingly to a variety of real-world recovery scenarios BACKUP COPY JOBS * Simple vs Advanced Backup Copy Jobs, how to create and modify them using best practices to ensure efficient recovery * Utilizing tape jobs, how to create and modify REPLICATION * Identify and describe the options available for replication, the use cases and impacts of using * Create, modify and delete replication jobs, outline considerations to ensure success FAILOVER * Identify and describe in detail, failover features and the appropriate usage * Develop, prepare and test failover plans to ensure recovery * Disaster recovery from replica, respond accordingly to a variety of real-world recovery scenarios ADVANCED REPOSITORY CAPABILITIES * Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure * Ensure scalability by integrating off-site S3 storage * Ensure compatibility with existing deduplication appliances TESTING BACKUP AND REPLICATION * Testing backups and replicas to ensure you can recover, what you need, when you need to * Configure Veeam DataLabs? and setup sandbox environments based on backup, replicas and storage snapshots * Using Veeam DataLabs Staged Restore to manage and comply with General Data Protection Regulation (GDPR) legislation before releasing restores to production VEEAM BACKUP ENTERPRISE MANAGER * Manage multiple Veeam Backup & Replication? installations from a single web console, maintaining a view of your entire virtual environment, ensuring data protection of ROBO and Enterprise environments. * Create user and group roles, delegate workloads whilst maintaining data control * Enable encryption password loss protection, helping to restore encrypted data in case of lost or forgotten encryption passwords VEEAM ONE * Monitor your Virtual, Physical and Cloud environments with Veeam ONE? and assess the different views available * Configure Veeam ONE for your specific technical and business requirements, describe the alarm options available and how to customize their usage * Set up, use and customize Veeam ONE Reporter, creating the reports and dashboards you require technically and for the business SUPPORT * Locate, migrate or restore backup configuration * Identify and locate appropriate support resources * Troubleshooting methodology to identify, isolate and remediate support issues ADDITIONAL COURSE DETAILS: Nexus Humans VEEAM-VMCE Availability Suite v10.0: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VEEAM-VMCE Availability Suite v10.0: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VEEAM-VMCE Availability Suite v10.0: Configuration and Management
Delivered on-request, onlineDelivered Online
Price on Enquiry

Ethical Hacking and CompTIA PenTest+ Exam Prep (PT0-002)

By Packt

The course focuses on the five domains that should be known for the CompTIA PenTest+ PT0-002 exam. Learn to successfully plan and scope a pen test engagement with a client, find vulnerabilities, exploit them to get into a network, then report on those findings to the client with the help of this comprehensive course.

Ethical Hacking and CompTIA PenTest+ Exam Prep (PT0-002)
Delivered Online On Demand
£261.99

Veeam Certified Architect v11 (VMCE11-A)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. This includes Senior Engineers and Architects responsible for creating architectures for Veeam environments. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. Design and architect a Veeam solution in a real-world environment Describe best practices, review an existing infrastructure and assess business/project requirements Identify relevant infrastructure metrics and perform component (storage, CPU, memory) quantity sizing Provide implementation and testing guidelines in line with designs Innovatively address design challenges and pain points, matching appropriate Veeam Backup & Replication features with requirements Veeam Certified Architect is the highest level of Veeam technical certifications. Engineers who complete both Veeam Availability Suite v11: Configuration and Management and Veeam Backup & Replication V11: Architecture and Design programs (courses + exams) will be granted with the 'Veeam Certified Architect' (VMCA) title by Veeam. INTRODUCTION VEEAM AVAILABILITY SUITE V11: CONFIGURATION AND MANAGEMENT * Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them * The 3-2-1 Rule and its importance in formulating a successful backup strategy * Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types BUILDING BACKUP CAPABILITIES * Backup methods, the appropriate use cases and impact on underlying file systems * Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance * Ensure efficiency by being able to select appropriate transport modes while being aware of the impact * of various backup functions on the infrastructure BUILDING REPLICATION CAPABILITIES * Identify and describe the options available for replication and impacts of using them * Create and modify replication jobs, outline considerations to ensure success * Introduce the new Continuous Data Protection (CDP) policy SECONDARY BACKUPS * Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery * Discuss using tapes for backups ADVANCED REPOSITORY CAPABILITIES * Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage * Ensure compatibility with existing deduplication appliances * Introduce the new hardened repository PROTECTING DATA IN THE CLOUD * Review how Veeam can protect the data of a cloud native application * Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam * Review how Veeam can be used to protect your Office 365 data RESTORING FROM BACKUP * Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders * Utilize Secure Restore to prevent the restoration of malware * Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production * Identify, describe and utilize the different explores and instant recovery tools and features RECOVERY FROM REPLICA * Identify and describe in detail, failover features and the appropriate usage * Develop, prepare and test failover plans to ensure recovery * Disaster recovery from replica to meet a variety of real-world recovery needs TESTING BACKUP AND REPLICATION * Testing backups and replicas to ensure you can recover, what you need, when you need to * Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots VEEAM BACKUP ENTERPRISE MANAGER AND VEEAM ONE * Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? CONFIGURATION BACKUP * Locate, migrate or restore backup configuration INTRODUCTION VEEAM BACKUP & REPLICATION V11: ARCHITECTURE AND DESIGN * Review the architecture principles * Explore what a successful architecture looks like * Review Veeam?s architecture methodology DISCOVERY * Analyze the existing environment * Uncover relevant infrastructure metrics * Uncover assumptions and risks * Identify complexity in the environment CONCEPTUAL DESIGN * Review scenario and data from discovery phase * Identify logical groups of objects that will share resources based on requirements * Create a set of detailed tables of business and technical requirements, constraints, assumptions and risks * Review infrastructure data with each product component in mind * Create high level design and data flow LOGICAL DESIGN * Match critical components and features of VBR with requirements * Create logical groupings * Determine location of components and relationship to logical grouping * Aggregate totals of component resources needed per logical grouping * Calculate component (storage, CPU, memory) quantity sizing PHYSICAL/TANGIBLE DESIGN * Convert the logical design into a physical design * Physical hardware sizing * Create a list of physical Veeam backup components IMPLEMENTATION AND GOVERNANCE * Review physical design and implantation plan * Review Veeam deployment hardening * Describe the architect?s obligations to the implementation team * Provide guidance on implementation specifics that relate to the design VALIDATION AND ITERATION * Provide framework for how to test the design * Further develop the design according to a modification scenario

Veeam Certified Architect v11 (VMCE11-A)
Delivered on-request, onlineDelivered Online
Price on Enquiry

IT Support Technician Training

5.0(2)

By Studyhub UK

OVERVIEW Uplift Your Career & Skill Up to Your Dream Job - Learning Simplified From Home! Kickstart your career & boost your employability by helping you discover your skills, talents and interests with our special IT Support Technician Training Course. You'll create a pathway to your ideal job as this course is designed to uplift your career in the relevant industry. It provides professional training that employers are looking for in today's workplaces. The IT Support Technician Training Course is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This IT Support Technician Training Course has been designed by industry experts to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This IT Support Technician Training Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into elementary modules, allowing our students to grasp each lesson quickly. At StudyHub, we don't just offer courses; we also provide a valuable teaching process. When you buy a course from StudyHub, you get unlimited Lifetime access with 24/7 dedicated tutor support. WHY BUY THIS IT SUPPORT TECHNICIAN TRAINING? 1. Unlimited access to the course for forever 2. Digital Certificate, Transcript, student ID all included in the price 3. Absolutely no hidden fees 4. Directly receive CPD accredited qualifications after course completion 5. Receive one to one assistance on every weekday from professionals 6. Immediately receive the PDF certificate after passing 7. Receive the original copies of your certificate and transcript on the next working day 8. Easily learn the skills and knowledge from the comfort of your home CERTIFICATION After studying the course materials of the IT Support Technician Training there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. WHO IS THIS COURSE FOR? This IT Support Technician Training course is ideal for * Students * Recent graduates * Job Seekers * Anyone interested in this topic * People already working in the relevant fields and want to polish their knowledge and skill. PREREQUISITES This IT Support Technician Training does not require you to have any prior qualifications or experience. You can just enrol and start learning.This IT Support Technician Training was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. CAREER PATH As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This IT Support Technician Training is a great way for you to gain multiple skills from the comfort of your home. COURSE CURRICULUM Section 01: How People Use Computers The Case for Computer Literacy 00:03:00 Features Common to Every Computing Device 00:02:00 Common General-Purpose Computing Devices 00:02:00 Networks of Computing Devices 00:04:00 Remotely-Accessed Computer Systems 00:04:00 Specialized Computer Systems 00:02:00 Specialty I/O Devices 00:01:00 Section 02: System Hardware CPUs 00:03:00 Passive and Active Cooling 00:03:00 RAM and Active Memory 00:05:00 Motherboards 00:03:00 Power Supplies 00:03:00 AMA - Ask Me Anything about System Hardware 00:07:00 Section 03: Device Ports and Peripherals Ports and Connectors 00:03:00 General Use I/O Devices 00:02:00 AMA - Ask Me Anything about I/O, Ports and Peripherals 00:07:00 Section 04: Data Storage and Sharing Basics of Binary 00:04:00 Storage Technologies 00:04:00 Mass Storage Variation 00:03:00 AMA - Ask Me Anything about Data Storage and Sharing 00:07:00 Section 05: Understanding Operating Systems Operating System Functions 00:04:00 Operating System Interfaces 00:05:00 AMA - Ask Me Anything about Understanding OS's 00:05:00 Section 06: Setting Up and Configuring a PC Preparing the Work Area 00:02:00 Setting up a Desktop PC 00:01:00 Completing PC Setup 00:04:00 AMA - Ask Me Anything about Setting up and Configuring a PC 00:09:00 Section 07: Setting Up and Configuring a Mobile Device Personalizing a Tablet 00:08:00 AMA - Ask Me Anything about Mobile Devices Part 1 00:07:00 AMA - Ask Me Anything about Mobile Devices Part 2 00:07:00 Section 08: Managing Files File Management Tools 00:02:00 File Manipulation 00:06:00 Backups 00:03:00 AMA - Ask Me Anything about Managing Files 00:08:00 Section 09: Using and Managing Application Software Walking Survey of Applications 00:03:00 Managing Applications 00:03:00 Applications and Extensions 00:04:00 AMA - Ask Me Anything about Working with Applications 00:07:00 Section 10: Configuring Network and Internet Connectivity Wi-Fi Setup 00:06:00 Going High Speed 00:03:00 Setting Up and Sharing Printers 00:05:00 AMA - Ask Me Anything about Networks and Internet Connectivity Part 1 00:07:00 AMA - Ask Me Anything about Networks and Internet Connectivity Part 2 00:05:00 Section 11: IT Security Threat Mitigation Physical Security 00:05:00 Dealing with Malware 00:03:00 Password Management 00:03:00 Clickworthy 00:03:00 Perils of Public Internet 00:02:00 AMA - Ask Me Anything about IT Threat Mitigation Part 1 00:07:00 AMA - Ask Me Anything about IT Threat Mitigation Part 2 00:08:00 Section 12: Computer Maintenance and Management Power Management 00:02:00 Cleaning and Maintaining Computers 00:02:00 Trash it or Stash it? 00:02:00 AMA - Ask Me Anything about Computer Maintenance and Management 00:11:00 Section 13: IT Troubleshooting Troubleshooting 101 00:03:00 AMA - Ask Me Anything about Troubleshooting Computers Part 1 00:10:00 AMA - Ask Me Anything about Troubleshooting Computers Part 2 00:11:00 Section 14: Understanding Databases Introduction to Databases 00:06:00 Database Details 00:06:00 AMA - Ask Me Anything about Databases 00:06:00 Section 15: Developing and Implementing Software Introduction to Programming 00:04:00 Programming with a PBJ Sandwich 00:08:00 AMA - Ask Me Anything about Databases 00:06:00

IT Support Technician Training
Delivered Online On Demand
£10.99

Introduction to Computers and Internet for Beginners

5.0(2)

By Studyhub UK

Delve into the dynamic world of digital exploration with our 'Introduction to Computers and Internet for Beginners' course. Tailored for newcomers, this comprehensive guide illuminates the fundamental pillars of computing, from efficient operating and troubleshooting to mastering quintessential applications. Experience a smooth transition as you acquaint yourself with varying Windows versions and fortify your knowledge base with vital cyber security protocols. By course completion, you'll confidently navigate the digital landscape, equipped with tools and understanding previously unimagined. Learning Outcomes * Gain proficiency in computer operations and troubleshooting techniques. * Utilise essential computer applications with adeptness. * Establish a foundational understanding of tools and networking. * Transition seamlessly between Windows 8 and the novel features of Windows 10. * Uphold best practices for cyber security and online safety. WHY CHOOSE THIS INTRODUCTION TO COMPUTERS AND INTERNET FOR BEGINNERS COURSE? * Unlimited access to the course for a lifetime. * Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. * Structured lesson planning in line with industry standards. * Immerse yourself in innovative and captivating course materials and activities. * Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. * Flexibility to complete the Introduction to Computers and Internet for Beginners Course at your own pace, on your own schedule. * Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. WHO IS THIS INTRODUCTION TO COMPUTERS AND INTERNET FOR BEGINNERS COURSE FOR? * Absolute beginners venturing into the digital domain. * Adults aiming to modernise their tech skills. * Students desiring a robust foundation in computing. * Small business owners looking to manage digital operations. * Individuals prioritising online safety and security. CAREER PATH * Help Desk Support: £18,000 - £30,000 * Computer Technician: £17,000 - £26,000 * IT Support Specialist: £20,000 - £35,000 * Network Administrator (Entry Level): £22,000 - £33,000 * Application Support Analyst: £25,000 - £40,000 * Cyber Security Analyst (Entry Level): £28,000 - £45,000 PREREQUISITES This Introduction to Computers and Internet for Beginners does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Introduction to Computers and Internet for Beginners was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. CERTIFICATION After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. COURSE CURRICULUM Module 01 : Computer Operating and Troubleshooting What is an Operating System 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Hardware and Peripherals 00:07:00 Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Software and Concepts 00:11:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:06:00 Backup and Restore 00:03:00 Module 02 : Key Applications Application Features 01:21:00 Working with Word Processing 00:44:00 Working with Spreadsheets 00:49:00 Making a Presentation 01:08:00 Databases 00:34:00 Collaboration 00:03:00 Module 03 : Tools & Networking Course Introduction 00:02:00 Web Browsers 00:47:00 Networking Terminology 00:35:00 E-mail 00:38:00 Communicating in the Modern World 00:14:00 Protecting Yourself 00:15:00 Web Searching 00:31:00 Protecting Yourself 00:31:00 Module 04 : Windows 8 for PC Identify Components of a Personal Computer IPU 00:08:00 Sign In to Windows 8 00:07:00 Signing In to Windows 8 and Managing Tiles 00:08:00 Navigate the Start Screen 00:18:00 Using the Account ID Menu 00:02:00 Access and Identify the Charms 00:03:00 Viewing the Charms 00:02:00 Modern Apps and Common Navigation Features 00:03:00 Navigating a Modern App 00:07:00 Multitasking with Apps 00:05:00 Working with Multiple Apps 00:05:00 Navigate the Desktop IPU 00:07:00 Navigating The desktop 00:07:00 Manage Files and Folders with File Explorer IPU 00:09:00 Managing Files and Folders 00:15:00 Elements of a Desktop Window 00:12:00 Working with the Elements of a Desktop Window 00:10:00 Creating and Modifying Files with Wordpad 00:14:00 Printing a Document 00:05:00 Navigate Internet Explorer 10 00:08:00 Navigating Internet Explorer 10 00:09:00 Browse the Web 00:12:00 Using Internet Explorer and Share 00:08:00 Customize the Start Screen 00:07:00 Creating Groups on the Start Screen 00:03:00 Changing PC Setting 00:07:00 Customize the Desktop IPU 00:09:00 Personalizing the Desktop 00:11:00 Set Privacy Levels and Passwords 00:05:00 Changing Your Password 00:05:00 Use Windows Defender IPU 00:05:00 Changing Windows Defender Settings 00:06:00 Store and Share Files with SkyDrive 00:03:00 Module 05 : Windows 10 - New Developments What Makes Windows 10 Different? 00:14:00 Primary Feature Overview 00:14:00 Navigating and Using Windows 10 00:36:00 Module 06 : Cyber Security Awareness Course Overview 00:14:00 Types of Security Threats 00:29:00 Social Engineering 00:30:00 Identity Theft 00:29:00 Data Classification 00:28:00 Types of Classifications 00:18:00 Protecting Your Digital Information 00:45:00 Password Management 00:13:00 Malware 00:17:00 Software Detection 00:28:00 Security from End-to-End 00:27:00 Secure E-mail Use 00:21:00 Secure Web Browsing 00:29:00 Piracy 00:16:00 Security Policies 00:17:00 Moving Forward 00:12:00

Introduction to Computers and Internet for Beginners
Delivered Online On Demand
£10.99

CompTIA IT Fundamentals ITF+ (FCO-U61) Course

By NextGen Learning

OVERVIEW By enroling in CompTIA IT Fundamentals ITF+ (FCO-U61), you can kickstart your vibrant career and strengthen your profound knowledge. You can learn everything you need to know about the topic. The CompTIA IT Fundamentals ITF+ (FCO-U61) course includes all of the most recent information to keep you abreast of the employment market and prepare you for your future. The curriculum for this excellent CompTIA IT Fundamentals ITF+ (FCO-U61) course includes modules at all skill levels, from beginner to expert. You will have the productivity necessary to succeed in your organisation once you have completed our CompTIA IT Fundamentals ITF+ (FCO-U61) Program. So enrol in our CompTIA IT Fundamentals ITF+ (FCO-U61) course right away if you're keen to envision yourself in a rewarding career. DESCRIPTION Enroling in this CompTIA IT Fundamentals ITF+ (FCO-U61) course can improve your CompTIA IT Fundamentals ITF+ (FCO-U61) perspective, regardless of your skill levels in the CompTIA IT Fundamentals ITF+ (FCO-U61) topics you want to master. If you're already a CompTIA IT Fundamentals ITF+ (FCO-U61) expert, this peek under the hood will provide you with suggestions for accelerating your learning, including advanced CompTIA IT Fundamentals ITF+ (FCO-U61) insights that will help you make the most of your time. This CompTIA IT Fundamentals ITF+ (FCO-U61) course will act as a guide for you if you've ever wished to excel at CompTIA IT Fundamentals ITF+ (FCO-U61). WHY CHOOSE US? * This course is accredited by the CPD Quality Standards. * Lifetime access to the whole collection of the learning materials. * Online test with immediate results. * Enroling in the course has no additional cost. * You can study and complete the course at your own pace. * Study for the course using any internet-connected device, such as a computer, tablet, or mobile device. CERTIFICATE OF ACHIEVEMENT Upon successful completion, you will qualify for the UK and internationally-recognised CPD certificate and you can choose to make your achievement formal by obtaining your PDF Certificate at a cost of £4.99 and Hardcopy Certificate for £9.99. WHO IS THIS COURSE FOR? This CompTIA IT Fundamentals ITF+ (FCO-U61) course is a great place to start if you're looking to start a new career in CompTIA IT Fundamentals ITF+ (FCO-U61) field. This training is for anyone interested in gaining in-demand CompTIA IT Fundamentals ITF+ (FCO-U61) proficiency to help launch a career or their business aptitude.  REQUIREMENTS The CompTIA IT Fundamentals ITF+ (FCO-U61) course requires no prior degree or experience. All you require is English proficiency, numeracy literacy and a gadget with stable internet connection. Learn and train for a prosperous career in the thriving and fast-growing industry of CompTIA IT Fundamentals ITF+ (FCO-U61), without any fuss. CAREER PATH This CompTIA IT Fundamentals ITF+ (FCO-U61) training will assist you develop your CompTIA IT Fundamentals ITF+ (FCO-U61) ability, establish a personal brand, and present a portfolio of relevant talents. It will help you articulate a  CompTIA IT Fundamentals ITF+ (FCO-U61) professional story and personalise your path to a new career. Furthermore, developing this CompTIA IT Fundamentals ITF+ (FCO-U61) skillset can lead to numerous opportunities for high-paying jobs in a variety of fields. ORDER YOUR CERTIFICATE To order CPD Quality Standard Certificate, we kindly invite you to visit the following link: COURSE CURRICULUM Introduction To The Course Introduction 00:03:00 Promo 00:01:00 Section 01: How People Use Computers The Case for Computer Literacy 00:03:00 Features Common to Every Computing Device 00:02:00 Common General-Purpose Computing Devices 00:02:00 Networks of Computing Devices 00:04:00 Remotely-Accessed Computer Systems 00:04:00 Specialized Computer Systems 00:02:00 Specialty I/O Devices 00:01:00 Section 02: System Hardware CPUs 00:03:00 Passive and Active Cooling 00:03:00 RAM and Active Memory 00:05:00 Motherboards 00:03:00 Power Supplies 00:03:00 AMA - Ask Me Anything about System Hardware 00:07:00 Section 03: Device Ports And Peripherals Ports and Connectors 00:03:00 General Use I/O Devices 00:02:00 AMA - Ask Me Anything about I/O, Ports and Peripherals 00:07:00 Section 04: Data Storage And Sharing Basics of Binary 00:04:00 Storage Technologies 00:04:00 Mass Storage Variation 00:03:00 AMA - Ask Me Anything about Data Storage and Sharing 00:07:00 Section 05: Understanding Operating Systems Operating System Functions 00:04:00 Operating System Interfaces 00:05:00 AMA - Ask Me Anything about Understanding OS's 00:05:00 Section 06: Setting Up And Configuring A PC Preparing the Work Area 00:02:00 Setting up a Desktop PC 00:01:00 Completing PC Setup 00:04:00 AMA - Ask Me Anything about Setting up and Configuring a PC 00:09:00 Section 07: Setting Up And Configuring A Mobile Device Personalizing a Tablet 00:08:00 AMA - Ask Me Anything about Mobile Devices Part 1 00:07:00 AMA - Ask Me Anything about Mobile Devices Part 2 00:07:00 Section 08: Managing Files File Management Tools 00:02:00 File Manipulation 00:06:00 Backups 00:03:00 AMA - Ask Me Anything about Managing Files 00:08:00 Section 09: Using And Managing Application Software Walking Survey of Applications 00:03:00 Managing Applications 00:03:00 Applications and Extensions 00:04:00 AMA - Ask Me Anything about Working with Applications 00:07:00 Section 10: Configuring Network And Internet Connectivity Wi-Fi Setup 00:06:00 Going High Speed 00:03:00 Setting Up and Sharing Printers 00:05:00 AMA - Ask Me Anything about Networks and Internet Connectivity Part 1 00:07:00 AMA - Ask Me Anything about Networks and Internet Connectivity Part 2 00:05:00 Section 11: IT Security Threat Mitigation Physical Security 00:05:00 Dealing with Malware 00:03:00 Password Management 00:03:00 Clickworthy 00:03:00 Perils of Public Internet 00:02:00 AMA - Ask Me Anything about IT Threat Mitigation Part 1 00:07:00 AMA - Ask Me Anything about IT Threat Mitigation Part 2 00:08:00 Section 12: Computer Maintenance And Management Power Management 00:02:00 Cleaning and Maintaining Computers 00:02:00 Trash it or Stash it? 00:02:00 AMA - Ask Me Anything about Computer Maintenance and Management 00:11:00 Section 13: IT Troubleshooting Troubleshooting 101 00:03:00 AMA - Ask Me Anything about Troubleshooting Computers Part 1 00:10:00 AMA - Ask Me Anything about Troubleshooting Computers Part 2 00:10:00 Section 14: Understanding Databases Introduction to Databases 00:06:00 Database Details 00:06:00 AMA - Ask Me Anything about Databases 00:06:00 Section 15: Developing And Implementing Software Introduction to Programming 00:04:00 Programming with a PBJ Sandwich 00:08:00 AMA - Ask Me Anything about Programming 00:04:00 Order Your Certificate Order Your Certificate 00:00:00

CompTIA IT Fundamentals ITF+ (FCO-U61) Course
Delivered Online On Demand
£20