• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

134 Courses

Beginners Course on ESP32 and IoT

5.0(2)

By Studyhub UK

Embark on a captivating journey into the realm of IoT and ESP32 with our 'Beginners Course on ESP32 and IoT.' This course is your gateway to unraveling the secrets of ESP32, a versatile microcontroller, and delving into the exciting world of Internet of Things (IoT). Imagine yourself seamlessly navigating the course introduction, understanding ESP32 board intricacies, and mastering digital inputs and outputs. With hands-on tasks and real-world applications, this course transforms complex concepts into an engaging learning experience. Picture yourself confidently interfacing sensors, controlling devices over WiFi, and even creating your own IoT projects with Adafruit and Alexa integration. From the fundamentals of serial communication to the intricacies of MQTT protocol, this course is a comprehensive exploration of ESP32 and IoT. Each module is crafted to empower beginners with practical knowledge, making the learning process dynamic and enjoyable. Join us in this transformative journey, where the power of IoT and ESP32 becomes an exciting landscape waiting to be explored. Learning Outcomes * Acquire a comprehensive understanding of ESP32, from board basics to practical applications. * Master digital input and output interfaces, including serial communication, relay switching, and capacitive touch inputs. * Explore sensor interfacing and network communication, enabling you to control devices over WiFi. * Dive into the world of IoT, learning about protocols like MQTT and creating projects with Thingspeak, Adafruit, and Alexa integration. * Develop practical skills to apply IoT concepts, from weather monitoring to creating your own Alexa-based IoT projects. WHY CHOOSE THIS BEGINNERS COURSE ON ESP32 AND IOT COURSE? 1. Unlimited access to the course for a lifetime. 2. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. 3. Structured lesson planning in line with industry standards. 4. Immerse yourself in innovative and captivating course materials and activities. 5. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. 6. Flexibility to complete the Course at your own pace, on your own schedule. 7. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. 8. Unlock career resources for CV improvement, interview readiness, and job success. WHO IS THIS BEGINNERS COURSE ON ESP32 AND IOT COURSE FOR? * Technology enthusiasts eager to explore IoT and ESP32 from scratch. * Students and beginners with a keen interest in microcontrollers and Internet of Things. * Hobbyists looking to enhance their skills in sensor interfacing and network communication. * DIY enthusiasts aiming to create their own IoT projects with real-world applications. * Anyone curious about the convergence of technology, connectivity, and IoT possibilities. CAREER PATH * IoT Developer: £35,000 - £55,000 * Embedded Systems Engineer: £40,000 - £60,000 * Hardware Engineer: £30,000 - £50,000 * Automation Engineer: £35,000 - £55,000 * IoT Solutions Architect: £45,000 - £70,000 * Technical Consultant (IoT): £40,000 - £65,000 PREREQUISITES This Beginners Course on ESP32 and IoT does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Beginners Course on ESP32 and IoT was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. CERTIFICATION After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. COURSE CURRICULUM Introduction To ESP32 Course Introduction and Agenda 00:03:00 Getting Started with ESP32 inside Arduino 00:13:00 Getting to Know about ESP32 Board 00:11:00 Things Needed for This Course 00:02:00 Getting Started with ESP32 inside Arduino 00:13:00 Input / Output Interfaces With ESP32 Serial Communication Basics on ESP32 00:07:00 Serial Data Print using ESP32 00:12:00 Serial Data Read using ESP32 00:09:00 Digital Outputs with ESP32 00:12:00 Accepting Logic Inputs, Pull-up and Pull-down concepts 00:06:00 Read Digital Inputs on ESP32 00:13:00 Practice Tasks with Digital Input on ESP32 00:06:00 Switching Circuit - DC Load Switching 00:06:00 Relay Switching Circuit interfacing with ESP32 00:17:00 Relay Switching Circuit with ESP32 - 2 00:07:00 Reading Capacitive Touch Inputs on ESP32 00:10:00 Sensor And Network Interfacing DHT22 Sensor Interfacing with ESP32 00:17:00 ESP32 Wifi Based Device Control 00:14:00 ESP32 Weather Monitoring over Wifi (LAN) 00:07:00 ESP32 Weather Monitoring over Wifi (LAN) - Code Explained 00:07:00 Internet Of Things What is the Internet of things? 00:16:00 IoT Protocols and thingspeak 00:13:00 Sending Values to Thingspeak from ESP32 00:11:00 Data Visualizations in Thingspeak 00:05:00 Analytics in Thingspeak 00:16:00 What is MQTT Protocol? 00:10:00 Adafruit IoT Project - Part 1 00:11:00 Adafruit IoT Project - Part 2 00:09:00 Adafruit IoT Project - Part 3 00:08:00 Adafruit IoT Project - Part 4 00:06:00 Alexa Based Lamp Control 00:12:00 Conclusion Concluding Remarks 00:01:00

Beginners Course on ESP32 and IoT
Delivered Online On Demand
£10.99

Internet of Things (IoT) and IT For Recruiters at QLS Level 5 & 7 Course

By One Education

Imagine a world where every device in your home, from your toaster to your thermostat, is connected to the internet and can communicate with each other. This is the Internet of Things (IoT), and it's changing the way we live and work. As a recruiter, staying on top of this technology is essential to your success. But where do you even start? Enter the IoT and IT for Recruiters Bundle, a comprehensive package of seven courses designed to equip you with the knowledge and skills you need to navigate this exciting and ever-evolving field. This bundle includes two QLS-endorsed courses, Internet of Things and IT for Recruiters that will provide you with a deep understanding of the fundamentals of IoT and the role of IT in the recruitment industry. Plus, you'll receive hardcopy certificates upon completion, giving you tangible proof of your expertise. But that's not all. The bundle also includes five relevant CPD QS-accredited courses that will expand your knowledge and expertise in IT administration, networking, and helpdesk support. With these courses, you'll gain a well-rounded understanding of the key concepts and practices that drive IT in the recruitment industry, and you'll be able to apply this knowledge to your everyday work. Whether you're a seasoned recruiter looking to stay up to date with the latest technology trends or you're just starting out and want to build a strong foundation of IT knowledge, the IoT and IT for Recruiters bundle have everything you need. Don't miss out on this opportunity to take your skills to the next level and stay ahead of the curve in this exciting field. Learning Outcomes: * Gain a deep understanding of the fundamentals of IoT and its application in the recruitment industry * Develop an understanding of the role of IT in the recruitment industry and its various applications * Develop knowledge and skills in IT administration and networking, including CompTIA IT Fundamentals * Learn IT helpdesk support and troubleshooting skills * Develop advanced knowledge in Windows 10 troubleshooting * Gain a well-rounded understanding of the key concepts and practices that drive IT in the recruitment industry QLS Endorsed Courses: * Course 01: Advanced Diploma in Internet of Things (IoT) at QLS Level 7 * Course 02: Diploma in IT For Recruiters at QLS Level 5 CPD QS Accredited Courses: * Course 03: IT Administration and Networking * Course 04: CompTIA IT Fundamentals ITF+ (FCO-U61) * Course 05: Recruitment: IT Basics for IT Recruiters * Course 06: IT Helpdesk Administrator Training * Course 07: Advanced Training on Windows 10 The IoT and IT for Recruiters Bundle is the ultimate package for recruiters looking to gain a comprehensive understanding of the latest technology trends and their application in the recruitment industry. This bundle includes two QLS-endorsed courses that will provide you with a deep understanding of the fundamentals of IoT and the role of IT in the recruitment industry. You will also receive hardcopy certificates upon completion, giving you tangible proof of your expertise. In addition to the QLS-endorsed courses, the bundle includes five relevant CPD QS-accredited courses that will expand your knowledge and expertise in IT administration, networking, and helpdesk support. With these courses, you'll gain a well-rounded understanding of the key concepts and practices that drive IT in the recruitment industry, and you'll be able to apply this knowledge to your everyday work. Certification Learners will qualify for the highly sought-after QLS Endorsed Certificate after successfully passing the assessment at the conclusion of each endorsed course. The Quality Licence Scheme is a credible and renowned endorsement that marks high quality and excellence in the UK. It is well accepted and sought after by industry experts and recruiters. Learners who purchase this bundle will receive TWO Hardcopy QLS Certificates at their door! CPD 40 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? * Recruiters looking to enhance their knowledge of the latest technology trends in the recruitment industry * Individuals looking to build a strong foundation of IT knowledge * Experienced IT professionals looking to develop their knowledge of the recruitment industry * Professionals looking to expand their knowledge of IoT and its applications CAREER PATH * IT Recruiter: £21,000 - £41,000 * IT Administrator: £18,000 - £35,000 * IT Helpdesk Support: £16,000 - £28,000 * IT Network Engineer: £22,000 - £50,000 * IT Project Manager: £30,000 - £70,000 * IT Director: £70,000+ CERTIFICATES CERTIFICATE OF COMPLETION Hard copy certificate - Included

Internet of Things (IoT) and IT For Recruiters at QLS Level 5 & 7 Course
Delivered Online On Demand
£300

Internet of Things (IoT) and IT For Recruiters at QLS Level 5 & 7 Course

By One Education

Imagine a world where every device in your home, from your toaster to your thermostat, is connected to the internet and can communicate with each other. This is the Internet of Things (IoT), and it's changing the way we live and work. As a recruiter, staying on top of this technology is essential to your success. But where do you even start? Enter the IoT and IT for Recruiters Bundle, a comprehensive package of seven courses designed to equip you with the knowledge and skills you need to navigate this exciting and ever-evolving field. This bundle includes two QLS-endorsed courses, Internet of Things and IT for Recruiters that will provide you with a deep understanding of the fundamentals of IoT and the role of IT in the recruitment industry. Plus, you'll receive hardcopy certificates upon completion, giving you tangible proof of your expertise. But that's not all. The bundle also includes five relevant CPD QS-accredited courses that will expand your knowledge and expertise in IT administration, networking, and helpdesk support. With these courses, you'll gain a well-rounded understanding of the key concepts and practices that drive IT in the recruitment industry, and you'll be able to apply this knowledge to your everyday work. Whether you're a seasoned recruiter looking to stay up to date with the latest technology trends or you're just starting out and want to build a strong foundation of IT knowledge, the IoT and IT for Recruiters bundle have everything you need. Don't miss out on this opportunity to take your skills to the next level and stay ahead of the curve in this exciting field. Learning Outcomes: * Gain a deep understanding of the fundamentals of IoT and its application in the recruitment industry * Develop an understanding of the role of IT in the recruitment industry and its various applications * Develop knowledge and skills in IT administration and networking, including CompTIA IT Fundamentals * Learn IT helpdesk support and troubleshooting skills * Develop advanced knowledge in Windows 10 troubleshooting * Gain a well-rounded understanding of the key concepts and practices that drive IT in the recruitment industry QLS Endorsed Courses: * Course 01: Advanced Diploma in Internet of Things (IoT) at QLS Level 7 * Course 02: Diploma in IT For Recruiters at QLS Level 5 CPD QS Accredited Courses: * Course 03: IT Administration and Networking * Course 04: CompTIA IT Fundamentals ITF+ (FCO-U61) * Course 05: Recruitment: IT Basics for IT Recruiters * Course 06: IT Helpdesk Administrator Training * Course 07: Advanced Training on Windows 10 The IoT and IT for Recruiters Bundle is the ultimate package for recruiters looking to gain a comprehensive understanding of the latest technology trends and their application in the recruitment industry. This bundle includes two QLS-endorsed courses that will provide you with a deep understanding of the fundamentals of IoT and the role of IT in the recruitment industry. You will also receive hardcopy certificates upon completion, giving you tangible proof of your expertise. In addition to the QLS-endorsed courses, the bundle includes five relevant CPD QS-accredited courses that will expand your knowledge and expertise in IT administration, networking, and helpdesk support. With these courses, you'll gain a well-rounded understanding of the key concepts and practices that drive IT in the recruitment industry, and you'll be able to apply this knowledge to your everyday work. Certification Learners will qualify for the highly sought-after QLS Endorsed Certificate after successfully passing the assessment at the conclusion of each endorsed course. The Quality Licence Scheme is a credible and renowned endorsement that marks high quality and excellence in the UK. It is well accepted and sought after by industry experts and recruiters. Learners who purchase this bundle will receive TWO Hardcopy QLS Certificates at their door! CPD 40 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? * Recruiters looking to enhance their knowledge of the latest technology trends in the recruitment industry * Individuals looking to build a strong foundation of IT knowledge * Experienced IT professionals looking to develop their knowledge of the recruitment industry * Professionals looking to expand their knowledge of IoT and its applications CAREER PATH * IT Recruiter: £21,000 - £41,000 * IT Administrator: £18,000 - £35,000 * IT Helpdesk Support: £16,000 - £28,000 * IT Network Engineer: £22,000 - £50,000 * IT Project Manager: £30,000 - £70,000 * IT Director: £70,000+ CERTIFICATES CERTIFICATE OF COMPLETION Hard copy certificate - Included

Internet of Things (IoT) and IT For Recruiters at QLS Level 5 & 7 Course
Delivered Online On Demand
£300

Functional Skills IT with Microsoft Excel, IoT & ICT Training

By NextGen Learning

Are you ready to embark on an enlightening journey of wisdom with the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle, and pave your way to an enriched personal and professional future? If so, then Step into a world of knowledge with our bundle - Functional Skills IT with Microsoft Excel, IoT & ICT Training. Delve into eight immersive CPD Accredited courses, each a simple course: Course 1: IT Administration and Networking Course 2: Microsoft Excel Course Course 3: ICT: Information and Communication Technology Course 4: Start an IT Asset Department Course 5: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 6: Recruitment: IT Basics for IT Recruiters Course 7: Web Application Penetration Testing Course Course 8: Internet of Things Traverse the vast landscapes of theory, unlocking new dimensions of understanding at every turn. Let the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle illuminate your path to wisdom. The Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle offers a comprehensive exploration into a rich tapestry of vast knowledge across eight carefully curated courses. The journey is designed to enhance your understanding and critical thinking skills. Each course within the bundle provides a deep-dive into complex theories, principles, and frameworks, allowing you to delve into the nuances of the subject matter at your own pace. In the framework of the Functional Skills IT with Microsoft Excel, IoT & ICT Training package, you are bestowed with complimentary PDF certificates for all the courses included in this bundle, all without any additional charge. Adorn yourself with the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle, empowering you to traverse your career trajectory or personal growth journey with self-assurance. Register today and ignite the spark of your professional advancement! So, don't wait further and join the Functional Skills IT with Microsoft Excel, IoT & ICT Training community today and let your voyage of discovery begin! Learning Outcomes: Upon completion of the Functional Skills IT with Microsoft Excel, IoT & ICT Training Bundle, you will be able to: * Attain a holistic understanding in the designated areas of study with the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle. * Establish robust bases across each course nestled within the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle. * Decipher intricate concepts through the articulate content of the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle. * Amplify your prowess in interpreting, scrutinising, and implementing theories. * Procure the capacity to engage with the course material on an intellectual and profound level. * Become proficient in the art of problem-solving across various disciplines. Stepping into the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle is akin to entering a world overflowing with deep theoretical wisdom. Each course within this distinctive bundle is an individual journey, meticulously crafted to untangle the complex web of theories, principles, and frameworks. Learners are inspired to explore, question, and absorb, thus enhancing their understanding and honing their critical thinking skills. Each course invites a personal and profoundly enlightening interaction with knowledge. The Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle shines in its capacity to cater to a wide range of learning needs and lifestyles. It gives learners the freedom to learn at their own pace, forging a unique path of discovery. More than just an educational journey, the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle fosters personal growth, enabling learners to skillfully navigate the complexities of the world. The Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle also illuminates the route to a rewarding career. The theoretical insight acquired through this bundle forms a strong foundation for various career opportunities, from academia and research to consultancy and programme management. The profound understanding fostered by the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle allows learners to make meaningful contributions to their chosen fields. Embark on the Functional Skills IT with Microsoft Excel, IoT & ICT Training journey and let knowledge guide you towards a brighter future. CPD 100 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? * Individuals keen on deepening their firm understanding in the respective fields. * Students pursuing higher education looking for comprehensive theory modules. * Professionals seeking to refresh or enhance their knowledge. * Anyone with a thirst for knowledge and a passion for continuous learning. REQUIREMENTS Without any formal requirements, you can delightfully enrol in this Functional Skills IT with Microsoft Excel, IoT & ICT Training Bundle. CAREER PATH Armed with the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle, your professional journey can reach new heights. The comprehensive theoretical knowledge from this bundle can unlock diverse career opportunities across several fields. Whether it's academic research, consultancy, or programme management, this bundle lays a solid groundwork. CERTIFICATES CPD CERTIFICATE OF COMPLETION Digital certificate - Included 8 Digital Certificates Are Included With This Bundle CPD QUALITY STANDARD HARDCOPY CERTIFICATE (FREE UK DELIVERY) Hard copy certificate - £9.99 Hardcopy Transcript: £9.99

Functional Skills IT with Microsoft Excel, IoT & ICT Training
Delivered Online On Demand
£41

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - INTRODUCTION TO ZERO TRUST AND BEST PRACTICE FRAMEWORKS * Zero Trust initiatives * Zero Trust technology pillars part 1 * Zero Trust technology pillars part 2 2 - DESIGN SOLUTIONS THAT ALIGN WITH THE CLOUD ADOPTION FRAMEWORK (CAF) AND WELL-ARCHITECTED FRAMEWORK (WAF) * Define a security strategy * Cloud Adoption Framework secure methodology * Design security with Azure Landing Zones * The Well-Architected Framework security pillar 3 - DESIGN SOLUTIONS THAT ALIGN WITH THE MICROSOFT CYBERSECURITY REFERENCE ARCHITECTURE (MCRA) AND MICROSOFT CLOUD SECURITY BENCHMARK (MCSB) * Design solutions with best practices for capabilities and controls * Design solutions with best practices for attack protection 4 - DESIGN A RESILIENCY STRATEGY FOR COMMON CYBERTHREATS LIKE RANSOMWARE * Common cyberthreats and attack patterns * Support business resiliency * Ransomware protection * Configurations for secure backup and restore * Security updates 5 - CASE STUDY: DESIGN SOLUTIONS THAT ALIGN WITH SECURITY BEST PRACTICES AND PRIORITIES * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 6 - DESIGN SOLUTIONS FOR REGULATORY COMPLIANCE * Translate compliance requirements into a security solution * Address compliance requirements with Microsoft Purview * Address privacy requirements with Microsoft Priva * Address security and compliance requirements with Azure policy * Evaluate infrastructure compliance with Defender for Cloud 7 - DESIGN SOLUTIONS FOR IDENTITY AND ACCESS MANAGEMENT * Design cloud, hybrid and multicloud access strategies (including Azure AD) * Design a solution for external identities * Design modern authentication and authorization strategies * Align conditional access and Zero Trust * Specify requirements to secure Active Directory Domain Services (AD DS) * Design a solution to manage secrets, keys, and certificates 8 - DESIGN SOLUTIONS FOR SECURING PRIVILEGED ACCESS * The enterprise access model * Design identity governance solutions * Design a solution to secure tenant administration * Design a solution for cloud infrastructure entitlement management (CIEM) * Design a solution for privileged access workstations and bastion services 9 - DESIGN SOLUTIONS FOR SECURITY OPERATIONS * Design security operations capabilities in hybrid and multicloud environments * Design centralized logging and auditing * Design security information and event management (SIEM) solutions * Design solutions for detection and response * Design a solution for security orchestration, automation, and response (SOAR) * Design security workflows * Design threat detection coverage 10 - CASE STUDY: DESIGN SECURITY OPERATIONS, IDENTITY AND COMPLIANCE CAPABILITIES * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 11 - DESIGN SOLUTIONS FOR SECURING MICROSOFT 365 * Evaluate security posture for collaboration and productivity workloads * Design a Microsoft 365 Defender solution * Design configurations and operational practices for Microsoft 365 12 - DESIGN SOLUTIONS FOR SECURING APPLICATIONS * Design and implement standards to secure application development * Evaluate security posture of existing application portfolios * Evaluate application threats with threat modeling * Design security lifecycle strategy for applications * Secure access for workload identities * Design a solution for API management and security * Design a solution for secure access to applications 13 - DESIGN SOLUTIONS FOR SECURING AN ORGANIZATION'S DATA * Design a solution for data discovery and classification using Microsoft Purview * Design a solution for data protection * Design data security for Azure workloads * Design security for Azure Storage * Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - CASE STUDY: DESIGN SECURITY SOLUTIONS FOR APPLICATIONS AND DATA * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 15 - SPECIFY REQUIREMENTS FOR SECURING SAAS, PAAS, AND IAAS SERVICES * Specify security baselines for SaaS, PaaS, and IaaS services * Specify security requirements for web workloads * Specify security requirements for containers and container orchestration 16 - DESIGN SOLUTIONS FOR SECURITY POSTURE MANAGEMENT IN HYBRID AND MULTICLOUD ENVIRONMENTS * Evaluate security posture by using Microsoft Cloud Security Benchmark * Design integrated posture management and workload protection * Evaluate security posture by using Microsoft Defender for Cloud * Posture evaluation with Microsoft Defender for Cloud secure score * Design cloud workload protection with Microsoft Defender for Cloud * Integrate hybrid and multicloud environments with Azure Arc * Design a solution for external attack surface management 17 - DESIGN SOLUTIONS FOR SECURING SERVER AND CLIENT ENDPOINTS * Specify server security requirements * Specify requirements for mobile devices and clients * Specify internet of things (IoT) and embedded device security requirements * Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT * Specify security baselines for server and client endpoints * Design a solution for secure remote access 18 - DESIGN SOLUTIONS FOR NETWORK SECURITY * Design solutions for network segmentation * Design solutions for traffic filtering with network security groups * Design solutions for network posture management * Design solutions for network monitoring 19 - CASE STUDY: DESIGN SECURITY SOLUTIONS FOR INFRASTRUCTURE * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough ADDITIONAL COURSE DETAILS: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered Online5 days, Jul 29th, 13:00 + 1 more
£2380

Certified Internet of Things Practitioner

By Mpi Learning - Professional Learning And Development Provider

In this course, students will learn general strategies for planning, designing, developing, implementing, and maintaining an IoT system through various case studies and by assembling and configuring an IoT device to work in a sensor network.

Certified Internet of Things Practitioner
Delivered in-person, on-request, onlineDelivered Online & In-Person in Loughborough
£350

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. COMPUTER FORENSICS IN TODAY?S WORLD * 1.1. Understand the Fundamentals of Computer Forensics * 1.2. Understand Cybercrimes and their Investigation Procedures * 1.3. Understand Digital Evidence * 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security * Operations Center) in Computer Forensics * 1.5. Identify the Roles and Responsibilities of a Forensic Investigator * 1.6. Understand the Challenges Faced in Investigating Cybercrimes * 1.7. Understand Legal Compliance in Computer Forensics * COMPUTER FORENSICS INVESTIGATION PROCESS * 2.1. Understand the Forensic Investigation Process and its Importance * 2.2. Understand the Pre-investigation Phase * 2.3. Understand First Response * 2.4. Understand the Investigation Phase * 2.5. Understand the Post-investigation Phase * UNDERSTANDING HARD DISKS AND FILE SYSTEMS * 3.1. Describe Different Types of Disk Drives and their Characteristics * 3.2. Explain the Logical Structure of a Disk * 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems * 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems * 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools * 3.6 Understand Storage Systems * 3.7. Understand Encoding Standards and Hex Editors * 3.8. Analyze Popular File Formats Using Hex Editor * DATA ACQUISITION AND DUPLICATION * 4.1. Understand Data Acquisition Fundamentals * 4.2. Understand Data Acquisition Methodology * 4.3. Prepare an Image File for Examination * DEFEATING ANTI-FORENSICS TECHNIQUES * 5.1. Understand Anti-forensics Techniques * 5.2. Discuss Data Deletion and Recycle Bin Forensics * 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions * 5.4. Explore Password Cracking/Bypassing Techniques * 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch * 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption * 5.7. Detect Program Packers and Footprint Minimizing Techniques * 5.8. Understand Anti-forensics Countermeasures * WINDOWS FORENSICS * 6.1. Collect Volatile and Non-volatile Information * 6.2. Perform Windows Memory and Registry Analysis * 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers * 6.4. Examine Windows Files and Metadata * 6.5. Understand ShellBags, LNK Files, and Jump Lists * 6.6. Understand Text-based Logs and Windows Event Logs * LINUX AND MAC FORENSICS * 7.1. Understand Volatile and Non-volatile Data in Linux * 7.2. Analyze Filesystem Images Using The Sleuth Kit * 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec * 7.4. Understand Mac Forensics * * NETWORK FORENSICS * 8.1. Understand Network Forensics * 8.2. Explain Logging Fundamentals and Network Forensic Readiness * 8.3. Summarize Event Correlation Concepts * 8.4. Identify Indicators of Compromise (IoCs) from Network Logs * 8.5. Investigate Network Traffic * 8.6. Perform Incident Detection and Examination with SIEM Tools * 8.7. Monitor and Detect Wireless Network Attacks * INVESTIGATING WEB ATTACKS * 9.1. Understand Web Application Forensics * 9.2. Understand Internet Information Services (IIS) Logs * 9.3. Understand Apache Web Server Logs * 9.4. Understand the Functionality of Intrusion Detection System (IDS) * 9.5. Understand the Functionality of Web Application Firewall (WAF) * 9.6. Investigate Web Attacks on Windows-based Servers * 9.7. Detect and Investigate Various Attacks on Web Applications * DARK WEB FORENSICS * 10.1. Understand the Dark Web * 10.2. Determine How to Identify the Traces of Tor Browser during Investigation * 10.3. Perform Tor Browser Forensics * DATABASE FORENSICS * 11.1. Understand Database Forensics and its Importance * 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server * 11.3. Collect Evidence Files on MSSQL Server * 11.4. Perform MSSQL Forensics * 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory * 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis * 11.7. Perform MySQL Forensics on WordPress Web Application Database * CLOUD FORENSICS * 12.1. Understand the Basic Cloud Computing Concepts * 12.2. Understand Cloud Forensics * 12.3. Understand the Fundamentals of Amazon Web Services (AWS) * 12.4. Determine How to Investigate Security Incidents in AWS * 12.5. Understand the Fundamentals of Microsoft Azure * 12.6. Determine How to Investigate Security Incidents in Azure * 12.7. Understand Forensic Methodologies for Containers and Microservices * INVESTIGATING EMAIL CRIMES * 13.1. Understand Email Basics * 13.2. Understand Email Crime Investigation and its Steps * 13.3. U.S. Laws Against Email Crime * MALWARE FORENSICS * 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware * 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis * 14.3. Understand and Perform Static Analysis of Malware * 14.4. Analyze Suspicious Word and PDF Documents * 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches * 14.6. Analyze Malware Behavior on System Properties in Real-time * 14.7. Analyze Malware Behavior on Network in Real-time * 14.8. Describe Fileless Malware Attacks and How they Happen * 14.9. Perform Fileless Malware Analysis - Emotet * MOBILE FORENSICS * 15.1. Understand the Importance of Mobile Device Forensics * 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices * 15.3. Explain the Steps Involved in Mobile Forensics Process * 15.4. Investigate Cellular Network Data * 15.5. Understand SIM File System and its Data Acquisition Method * 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices * 15.7. Perform Logical Acquisition on Android and iOS Devices * 15.8. Perform Physical Acquisition on Android and iOS Devices * 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report * IOT FORENSICS * 16.1. Understand IoT and IoT Security Problems * 16.2. Recognize Different Types of IoT Threats * 16.3. Understand IoT Forensics * 16.4. Perform Forensics on IoT Devices *

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online6 days, Sept 16th, 13:00 + 1 more
£3495

Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles: Consulting systems engineer IoT Designer Network administrator Network engineer Network manager Sales engineer Systems engineer Technical solutions architect Overview After taking this course, you should be able to: Explain the fundamentals of Cisco IoT and list common devices involved List the common protocols, standards, and data flows of IoT Explain the Cisco IoT, common needs, and the corresponding solutions Explain how programmability can be used to automate and make operations, deployment, and support of Cisco IoT more effective Describe common Cisco IoT applications and how they apply to Cisco IoT use cases Explain the functions and use cases for Cisco security applications and Cisco IoT This course prepares you to develop Internet of Things (IoT) applications for Cisco© IoT edge compute and network architecture. Through a combination of lessons and hands-on experience, you will learn to implement and deploy Cisco IOx applications using Cisco Field Network Director and Cisco Kinetic. This course covers designing, deploying, and troubleshooting edge applications, and understanding the use of management tools, so you can control your industrial network and connected devices at scale. This course will prepare you for the certification exam 300-915 Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT), a concentration in the CCNP DevNet track. COURSE OUTLINES * DEFINING CISCO IOT * IOT NETWORKING AND OTHER DEVICES * EXAMINING IOT PROTOCOLS * EXAMINING IOT STANDARDS * RECOGNIZING CISCO IOT NEEDS AND SOLUTIONS * USING PROGRAMMABILITY WITH CISCO IOT * DESCRIBING CISCO IOT APPLICATIONS: CISCO IOX * DESCRIBING CISCO IOT APPLICATIONS: CISCO KINETIC AND CISCO FIELD NETWORK DIRECTOR * DEFINING CISCO SECURITY APPLICATIONS LAB OUTLINE * Use an MQTT Consumer to Subscribe to Sensor Data Use Cisco IOx Applications to Receive and Process Sensor Data Troubleshoot a Sensor Connection Use and Interpret Freeboard Data Use and Interpret Grafana Data Use and Interpret Kibana Data Cisco IOx Familiarity Lab Develop and Deploy a Cisco IOx Application Troubleshoot Cisco IOx Navigate Cisco Field Network Director Explore Cisco Field Network Director API ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT)
Delivered on-request, onlineDelivered Online
Price on Enquiry

EC-Council Certified Cybersecurity Technician (C|CT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. COURSE OUTLINE * Information Security Threats and Vulnerabilities * Information Security Attacks * Network Security Fundamentals * Identification, Authentication, and Authorization * Network Security Controls: Administrative Controls * Network Security Controls: Physical Controls * Network Security Controls: Technical Controls * Network Security Assessment Techniques and Tools * Application Security * Virtualization and Cloud Computing * Wireless Network Security * Mobile Device Security * Internet of Things (IoT) and Operational Technology (OT) Security * Cryptography * Data Security * Network Troubleshooting * Network Traffic Monitoring * Network Log Monitoring and Analysis * Incident Response * Computer Forensics * Business Continuity and Disaster Recovery * Risk Management

EC-Council Certified Cybersecurity Technician (C|CT)
Delivered Online6 days, Oct 21st, 13:00
£3495

Internet of Things demystified

5.0(3)

By Systems & Network Training

INTERNET OF THINGS TRAINING COURSE DESCRIPTION A concise overview course covering The Internet of Things and the technologies involved. Particular emphasis is placed on the high level architecture of IoT and the benefits achievable. WHAT WILL YOU LEARN * Describe the structure of the IoT * List the technologies involved in IoT. * Explain how IoT works. INTERNET OF THINGS TRAINING COURSE DETAILS * Who will benefit: Non-technical staff working with IoT. * Prerequisites: None. * Duration 1 day INTERNET OF THINGS TRAINING COURSE CONTENTS * What is IoT The Internet, what is IoT? IoT and M2M, IoT technologies, IoT architecture. Wired and wireless communication. IoT applications; Smart houses, smart cities, smart cars, wearable, environment, other domain specific IoTs. * IoT architecture Physical objects, virtual objects, cloud computing, data capture, communications. Big data. * Components Hardware, sensors, actuators, chips, firmware, embedded systems. Open source platforms. Power options: Battery, solar, PoE. * IoT communication RF, ZigBee, Bluetooth, Bluetooth LE, RFID, WiFi, 802.11ah, mobile technologies. Wired. * Arduino (as an example) Microcontrollers, the platform, development, Arduino software, reading from sensors, I2C, SPI. Arduino and the Internet, HTTP, WiFi, GSM. The cloud and IoT: Pachube, nimbits, ThingSpeak * Security in IoT Authentication, Encryption, secure booting, firewalls.

Internet of Things demystified
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£967