• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

134 Courses

SC-200T00 Microsoft Security Operations Analyst

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. Prerequisites Basic understanding of Microsoft 365 Fundamental understanding of Microsoft security, compliance, and identity products Intermediate understanding of Windows 10 Familiarity with Azure services, specifically Azure SQL Database and Azure Storage Familiarity with Azure virtual machines and virtual networking Basic understanding of scripting concepts. 1 - INTRODUCTION TO MICROSOFT 365 THREAT PROTECTION * Explore Extended Detection & Response (XDR) response use cases * Understand Microsoft Defender XDR in a Security Operations Center (SOC) * Explore Microsoft Security Graph * Investigate security incidents in Microsoft Defender XDR 2 - MITIGATE INCIDENTS USING MICROSOFT 365 DEFENDER * Use the Microsoft Defender portal * Manage incidents * Investigate incidents * Manage and investigate alerts * Manage automated investigations * Use the action center * Explore advanced hunting * Investigate Microsoft Entra sign-in logs * Understand Microsoft Secure Score * Analyze threat analytics * Analyze reports * Configure the Microsoft Defender portal 3 - PROTECT YOUR IDENTITIES WITH MICROSOFT ENTRA ID PROTECTION * Microsoft Entra ID Protection overview * Detect risks with Microsoft Entra ID Protection policies * Investigate and remediate risks detected by Microsoft Entra ID Protection 4 - REMEDIATE RISKS WITH MICROSOFT DEFENDER FOR OFFICE 365 * Automate, investigate, and remediate * Configure, protect, and detect * Simulate attacks 5 - SAFEGUARD YOUR ENVIRONMENT WITH MICROSOFT DEFENDER FOR IDENTITY * Configure Microsoft Defender for Identity sensors * Review compromised accounts or data * Integrate with other Microsoft tools 6 - SECURE YOUR CLOUD APPS AND SERVICES WITH MICROSOFT DEFENDER FOR CLOUD APPS * Understand the Defender for Cloud Apps Framework * Explore your cloud apps with Cloud Discovery * Protect your data and apps with Conditional Access App Control * Walk through discovery and access control with Microsoft Defender for Cloud Apps * Classify and protect sensitive information * Detect Threats 7 - RESPOND TO DATA LOSS PREVENTION ALERTS USING MICROSOFT 365 * Describe data loss prevention alerts * Investigate data loss prevention alerts in Microsoft Purview * Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps 8 - MANAGE INSIDER RISK IN MICROSOFT PURVIEW * Insider risk management overview * Create and manage insider risk policies * Investigate insider risk alerts * Take action on insider risk alerts through cases * Manage insider risk management forensic evidence * Create insider risk management notice templates 9 - INVESTIGATE THREATS BY USING AUDIT FEATURES IN MICROSOFT DEFENDER XDR AND MICROSOFT PURVIEW STANDARD * Explore Microsoft Purview Audit solutions * Implement Microsoft Purview Audit (Standard) * Start recording activity in the Unified Audit Log * Search the Unified Audit Log (UAL) * Export, configure, and view audit log records * Use audit log searching to investigate common support issues 10 - INVESTIGATE THREATS USING AUDIT IN MICROSOFT DEFENDER XDR AND MICROSOFT PURVIEW (PREMIUM) * Explore Microsoft Purview Audit (Premium) * Implement Microsoft Purview Audit (Premium) * Manage audit log retention policies * Investigate compromised email accounts using Purview Audit (Premium) 11 - INVESTIGATE THREATS WITH CONTENT SEARCH IN MICROSOFT PURVIEW * Explore Microsoft Purview eDiscovery solutions * Create a content search * View the search results and statistics * Export the search results and search report * Configure search permissions filtering * Search for and delete email messages 12 - PROTECT AGAINST THREATS WITH MICROSOFT DEFENDER FOR ENDPOINT * Practice security administration * Hunt threats within your network 13 - DEPLOY THE MICROSOFT DEFENDER FOR ENDPOINT ENVIRONMENT * Create your environment * Understand operating systems compatibility and features * Onboard devices * Manage access * Create and manage roles for role-based access control * Configure device groups * Configure environment advanced features 14 - IMPLEMENT WINDOWS SECURITY ENHANCEMENTS WITH MICROSOFT DEFENDER FOR ENDPOINT * Understand attack surface reduction * Enable attack surface reduction rules 15 - PERFORM DEVICE INVESTIGATIONS IN MICROSOFT DEFENDER FOR ENDPOINT * Use the device inventory list * Investigate the device * Use behavioral blocking * Detect devices with device discovery 16 - PERFORM ACTIONS ON A DEVICE USING MICROSOFT DEFENDER FOR ENDPOINT * Explain device actions * Run Microsoft Defender antivirus scan on devices * Collect investigation package from devices * Initiate live response session 17 - PERFORM EVIDENCE AND ENTITIES INVESTIGATIONS USING MICROSOFT DEFENDER FOR ENDPOINT * Investigate a file * Investigate a user account * Investigate an IP address * Investigate a domain 18 - CONFIGURE AND MANAGE AUTOMATION USING MICROSOFT DEFENDER FOR ENDPOINT * Configure advanced features * Manage automation upload and folder settings * Configure automated investigation and remediation capabilities * Block at risk devices 19 - CONFIGURE FOR ALERTS AND DETECTIONS IN MICROSOFT DEFENDER FOR ENDPOINT * Configure advanced features * Configure alert notifications * Manage alert suppression * Manage indicators 20 - UTILIZE VULNERABILITY MANAGEMENT IN MICROSOFT DEFENDER FOR ENDPOINT * Understand vulnerability management * Explore vulnerabilities on your devices * Manage remediation 21 - PLAN FOR CLOUD WORKLOAD PROTECTIONS USING MICROSOFT DEFENDER FOR CLOUD * Explain Microsoft Defender for Cloud * Describe Microsoft Defender for Cloud workload protections * Enable Microsoft Defender for Cloud 22 - CONNECT AZURE ASSETS TO MICROSOFT DEFENDER FOR CLOUD * Explore and manage your resources with asset inventory * Configure auto provisioning * Manual log analytics agent provisioning 23 - CONNECT NON-AZURE RESOURCES TO MICROSOFT DEFENDER FOR CLOUD * Protect non-Azure resources * Connect non-Azure machines * Connect your AWS accounts * Connect your GCP accounts 24 - MANAGE YOUR CLOUD SECURITY POSTURE MANAGEMENT? * Explore Secure Score * Explore Recommendations * Measure and enforce regulatory compliance * Understand Workbooks 25 - EXPLAIN CLOUD WORKLOAD PROTECTIONS IN MICROSOFT DEFENDER FOR CLOUD * Understand Microsoft Defender for servers * Understand Microsoft Defender for App Service * Understand Microsoft Defender for Storage * Understand Microsoft Defender for SQL * Understand Microsoft Defender for open-source databases * Understand Microsoft Defender for Key Vault * Understand Microsoft Defender for Resource Manager * Understand Microsoft Defender for DNS * Understand Microsoft Defender for Containers * Understand Microsoft Defender additional protections 26 - REMEDIATE SECURITY ALERTS USING MICROSOFT DEFENDER FOR CLOUD * Understand security alerts * Remediate alerts and automate responses * Suppress alerts from Defender for Cloud * Generate threat intelligence reports * Respond to alerts from Azure resources 27 - CONSTRUCT KQL STATEMENTS FOR MICROSOFT SENTINEL * Understand the Kusto Query Language statement structure * Use the search operator * Use the where operator * Use the let statement * Use the extend operator * Use the order by operator * Use the project operators 28 - ANALYZE QUERY RESULTS USING KQL * Use the summarize operator * Use the summarize operator to filter results * Use the summarize operator to prepare data * Use the render operator to create visualizations 29 - BUILD MULTI-TABLE STATEMENTS USING KQL * Use the union operator * Use the join operator 30 - WORK WITH DATA IN MICROSOFT SENTINEL USING KUSTO QUERY LANGUAGE * Extract data from unstructured string fields * Extract data from structured string data * Integrate external data * Create parsers with functions 31 - INTRODUCTION TO MICROSOFT SENTINEL * What is Microsoft Sentinel? * How Microsoft Sentinel works * When to use Microsoft Sentinel 32 - CREATE AND MANAGE MICROSOFT SENTINEL WORKSPACES * Plan for the Microsoft Sentinel workspace * Create a Microsoft Sentinel workspace * Manage workspaces across tenants using Azure Lighthouse * Understand Microsoft Sentinel permissions and roles * Manage Microsoft Sentinel settings * Configure logs 33 - QUERY LOGS IN MICROSOFT SENTINEL * Query logs in the logs page * Understand Microsoft Sentinel tables * Understand common tables * Understand Microsoft Defender XDR tables 34 - USE WATCHLISTS IN MICROSOFT SENTINEL * Plan for watchlists * Create a watchlist * Manage watchlists 35 - UTILIZE THREAT INTELLIGENCE IN MICROSOFT SENTINEL * Define threat intelligence * Manage your threat indicators * View your threat indicators with KQL 36 - CONNECT DATA TO MICROSOFT SENTINEL USING DATA CONNECTORS * Ingest log data with data connectors * Understand data connector providers * View connected hosts 37 - CONNECT MICROSOFT SERVICES TO MICROSOFT SENTINEL * Plan for Microsoft services connectors * Connect the Microsoft Office 365 connector * Connect the Microsoft Entra connector * Connect the Microsoft Entra ID Protection connector * Connect the Azure Activity connector 38 - CONNECT MICROSOFT DEFENDER XDR TO MICROSOFT SENTINEL * Plan for Microsoft Defender XDR connectors * Connect the Microsoft Defender XDR connector * Connect Microsoft Defender for Cloud connector * Connect Microsoft Defender for IoT * Connect Microsoft Defender legacy connectors 39 - CONNECT WINDOWS HOSTS TO MICROSOFT SENTINEL * Plan for Windows hosts security events connector * Connect using the Windows Security Events via AMA Connector * Connect using the Security Events via Legacy Agent Connector * Collect Sysmon event logs 40 - CONNECT COMMON EVENT FORMAT LOGS TO MICROSOFT SENTINEL * Plan for Common Event Format connector * Connect your external solution using the Common Event Format connector 41 - CONNECT SYSLOG DATA SOURCES TO MICROSOFT SENTINEL * Plan for syslog data collection * Collect data from Linux-based sources using syslog * Configure the Data Collection Rule for Syslog Data Sources * Parse syslog data with KQL 42 - CONNECT THREAT INDICATORS TO MICROSOFT SENTINEL * Plan for threat intelligence connectors * Connect the threat intelligence TAXII connector * Connect the threat intelligence platforms connector * View your threat indicators with KQL 43 - THREAT DETECTION WITH MICROSOFT SENTINEL ANALYTICS * What is Microsoft Sentinel Analytics? * Types of analytics rules * Create an analytics rule from templates * Create an analytics rule from wizard * Manage analytics rules 44 - AUTOMATION IN MICROSOFT SENTINEL * Understand automation options * Create automation rules 45 - THREAT RESPONSE WITH MICROSOFT SENTINEL PLAYBOOKS * What are Microsoft Sentinel playbooks? * Trigger a playbook in real-time * Run playbooks on demand 46 - SECURITY INCIDENT MANAGEMENT IN MICROSOFT SENTINEL * Understand incidents * Incident evidence and entities * Incident management 47 - IDENTIFY THREATS WITH BEHAVIORAL ANALYTICS * Understand behavioral analytics * Explore entities * Display entity behavior information * Use Anomaly detection analytical rule templates 48 - DATA NORMALIZATION IN MICROSOFT SENTINEL * Understand data normalization * Use ASIM Parsers * Understand parameterized KQL functions * Create an ASIM Parser * Configure Azure Monitor Data Collection Rules 49 - QUERY, VISUALIZE, AND MONITOR DATA IN MICROSOFT SENTINEL * Monitor and visualize data * Query data using Kusto Query Language * Use default Microsoft Sentinel Workbooks * Create a new Microsoft Sentinel Workbook 50 - MANAGE CONTENT IN MICROSOFT SENTINEL * Use solutions from the content hub * Use repositories for deployment 51 - EXPLAIN THREAT HUNTING CONCEPTS IN MICROSOFT SENTINEL * Understand cybersecurity threat hunts * Develop a hypothesis * Explore MITRE ATT&CK 52 - THREAT HUNTING WITH MICROSOFT SENTINEL * Explore creation and management of threat-hunting queries * Save key findings with bookmarks * Observe threats over time with livestream 53 - USE SEARCH JOBS IN MICROSOFT SENTINEL * Hunt with a Search Job * Restore historical data 54 - HUNT FOR THREATS USING NOTEBOOKS IN MICROSOFT SENTINEL * Access Azure Sentinel data with external tools * Hunt with notebooks * Create a notebook * Explore notebook code

SC-200T00 Microsoft Security Operations Analyst
Delivered Online5 days, Jul 29th, 13:00 + 2 more
£2380

Cisco Understanding Cisco Industrial IoT Networking Foundation (INFND)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Operational Technology (OT) Engineers IT engineers Generalists, including managers, project leads, and solutions and business architects Overview Define what IIoT is and identify IIoT architectures. Identify IIoT market verticals, and their motivations and requirements. Explore Cisco IIoT networking devices, how they are different from other devices, and use common administrative tools for managing them. Explore industrial communications protocols for control and automation, and how they have been adapted to run on top of a TCP/IP network infrastructure. Describe wireless protocols used in IIoT environments, including architectures and devices used. Understand the TCP/IP protocol stack and how it is used with other protocols in IIoT environments. Discuss network protocols for clock synchronization between network devices, and describe available tools for IIoT network administration. Discuss wireless technologies used in a core LAN, and their relevance to IIoT implementations. Explore field WAN technologies and how they are used in IIoT environments. Explore legacy protocols and explain the methods available to transport non-routable protocols over modern networks. Explain fundamental concepts of Quality of Service (QoS) related to IIoT network environments. Discuss Multiprotocol Label Switching (MPLS) operation, components, terminology, and features, and explore its use in IIoT environments. Explore Layer 2 and Layer 3 VPN technologies and describe the way they can be used on IIoT deployments. Describe Dense Wave Division Multiplexing (DWDM) technology and its use in IIoT environments. Explore Layer 1 and Layer 2 high availability technologies and redundancy mechanisms. Describe Layer 3 high availability and the need for Layer 3 redundancy in IIoT deployments The Understanding Cisco Industrial IoT Networking Foundation (INFND) v1.0 course gives you an overview of the protocols, applications, and network infrastructure you need to support and manage Industrial Internet of Things (IIoT) solutions. You will learn about IIoT industry verticals and how different protocols are used within them. The course also covers configuring and verifying the protocols on Cisco© IIoT networking devices. COURSE INTRODUCTION. DEFINING INDUSTRIAL INTERNET OF THINGS EXAMINING COMMON IIOT VERTICALS. EXAMINING CISCO IIOT NETWORKING DEVICES. EXAMINING AND CONFIGURING INDUSTRIAL COMMUNICATION PROTOCOLS. DESCRIBING WIRELESS IIOT PROTOCOLS. EXPLAINING AND CONFIGURING TCP/IP PROTOCOLS, ADDRESSING, AND SEGMENTATION. EXAMINING NETWORK SERVICES AND ADMINISTRATION. EXAMINING AND CONFIGURING WIRELESS CORE LAN TECHNOLOGIES. DESCRIBING FIELD WAN TECHNOLOGIES. EXAMINING AND CONFIGURING TRANSPORTATION OF LEGACY PROTOCOLS. DESCRIBING, CONFIGURING, AND VERIFYING QUALITY OF SERVICE (QOS) FOR IIOT PROTOCOLS. EXAMINING AND VERIFYING MPLS AND IIOT. CONFIGURING AND EXPLAINING VPN TECHNOLOGY AND IIOT. DESCRIBING DWDM. CONFIGURING AND DEFINING LAYER 1 AND LAYER 2 HIGH AVAILABILITY TECHNOLOGIES. DEFINING AND CONFIGURING LAYER 3 HIGH AVAILABILITY TECHNOLOGIES LAB OUTLINE * Connect to the Cisco IIoT Devices. Use Industrial Protocols with Cisco Industrial Ethernet Switches. Configure an 802.11 Client. Configure an IPv6 Address. Configure Layer 2 Network Address Translation (NAT) and IP Addressing in an Example IoT Deployment.

Cisco Understanding Cisco Industrial IoT Networking Foundation (INFND)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Introduction to Cloud Computing

By OnlineCoursesLearning.com

Prologue to IoT - Internet of Things Finding out about the Internet of Things is indispensable for each and every individual who needs to improve the manner in which they convey and get modern on the most energizing innovation accessible. IoT can improve the manner in which you work, play and carry on with your life and is fundamental information for organizations and people. This course covers all you require to think about IoT, including a full definition and extensive examination of the various gadgets accessible. From the total manual for Smart Home, Smart Environments and Smart Vehicle answers for an examination of the innovation which unites everything, this course is a definitive early on manual for IoT. You Will Learn A full meaning of IoT and the various gadgets included A thorough manual for Home Automation (Smart Home) arrangements Viable uses of IoT, including Smart Environments and Vehicles The different advancements used to empower IoT gadgets and items Advantages of Taking This Course You will improve efficiency and benefit through IoT advancement You will save time and exertion via mechanizing your associations You will draw in new business by staying current and pertinent You will settle on educated IoT decisions by seeing how it functions and what it can accomplish

Introduction to Cloud Computing
Delivered Online On Demand
£50

Greek Language Summer Camp

5.0(14)

By The Greek Online School

The Greek Language Summer Camp is a great way for your child to greatly improve their Greek and have fun with other international children. Our program is for children aged 6-15 years and aims to develop children’s speaking skills and boost their confidence when speaking Greek. Young learners are usually faster to learn and grasp foreign languages, especially some aspects of languages like the pronunciation and new vocabulary. This is precisely why close contact with a Greek speaking environment and native Greek speakers is the perfect opportunity for children to engage in the Greek language fast and absorb new skills very quickly.

Greek Language Summer Camp
Delivered In-Person11 days, Jul 25th, 08:00
£1255

Diploma in Essential IT Skills at QLS Level 2, 5 & 7 Course

By One Education

Are you ready to unlock the power of the digital age? In today's world, technology has become an indispensable part of our lives. From smart homes to automated workplaces, it's impossible to ignore the impact of IT. But did you know that the history of IT dates back to the 19th century? It all started with the invention of the telegraph and has since evolved into a vast and complex system that underpins our modern society. If you're looking to gain essential IT skills or to advance your career in the field, look no further than the Diploma in Essential IT Skills at QLS Level 2, 5 & 7. This comprehensive program offers three QLS-endorsed courses, including Internet of Things, Start an IT Asset Department, and Recruitment: IT Basics for IT Recruiters. In addition, there are five CPD QS accredited relevant courses and five CPD QS accredited career development courses to help you hone your skills and achieve your goals. The Internet of Things course will equip you with the knowledge and skills to design and implement interconnected devices and systems, while the Start an IT Asset Department course provides an in-depth understanding of IT asset management, including procurement, inventory management, and disposition. Recruitment: IT Basics for IT Recruiters, on the other hand, offers practical training on how to recruit and select IT professionals. But that's not all. The program also includes five CPD QS accredited relevant courses covering topics such as cybersecurity, cloud computing, and project management. And for those looking to advance their careers, there are five CPD QS accredited career development courses that focus on leadership, communication, and personal development. QLS Endorsed Courses: * Course 01: Advanced Diploma in Internet of Things (IoT) at QLS Level 7 * Course 02: Award in Start an IT Asset Department at QLS Level 2 * Course 03: Diploma in Recruitment: IT Basics for IT Recruiters at QLS Level 5 CPD QS Accredited Courses: * Course 04: CompTIA IT Fundamentals ITF+ (FCO-U61) * Course 05: IT Administration and Networking * Course 06: IT Helpdesk Administrator Training * Course 07: CompTIA Network+ Certification (N10-007) * Course 08: Cloud Computing / CompTIA Cloud+ (CV0-002) Take your career to the next level with our bundle that includes not only technical courses but also five guided courses focused on personal development and career growth. * Course 09: Leadership and Management Course * Course 10: Career Development and Passion * Course 11: Professional CV Writing * Course 12: Boost Your Confidence and Self-Esteem * Course 13: Public Speaking: Confident Delivery Skills Learning Outcomes: * Develop knowledge and practical skills in Internet of Things, IT asset management and IT recruitment basics. * Understand the concepts of Raspberry Pi, Microsoft Azure, Thingspeak, Adafruit IO and IOT security. * Learn the fundamentals of IT administration and networking. * Understand the basics of IT helpdesk administration and Cloud Computing. * Develop knowledge and skills in asset tracking, populating the database, daily operations and reports. * Gain knowledge and practical skills in IT technologies such as programming languages, databases and frameworks. * Learn how to become a successful IT recruiter. The Quality Tools and Methods, Lean Six Sigma: Toolkit & Quality Management bundle offers three QLS courses along with five CPD-QS accredited courses. The Internet of Things course covers the basics of Raspberry Pi, Microsoft Azure, Thingspeak, Adafruit IO and IOT security. Start an IT Asset Department course provides insights into the IT asset management team and activities, asset tracking tool, populating the database, daily operations and reports. Recruitment: IT Basics for IT Recruiters course covers IT fundamentals, IT terms/basics, IT positions, IT technologies programming languages and frameworks, databases, and recruiter training. This bundle also includes IT Fundamentals, IT administration and networking, IT helpdesk administrator training, CompTIA Network+ certification, and Cloud Computing/CompTIA Cloud+ (CV0-002). Certification Learners will qualify for the highly sought-after QLS Endorsed Certificate after successfully passing the assessment at the conclusion of each endorsed course. The Quality Licence Scheme is a credible and renowned endorsement that marks high qualityand excellence in the UK. It is well accepted and sought after by industry experts and recruiters. Learners who purchase this bundle will receive Three Hardcopy QLS Certificates at their door! CPD 40 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? This course is ideal for individuals who want to develop skills and knowledge in IT asset management, IT recruitment basics, and Internet of Things. CAREER PATH * IT Asset Manager: £35,000 - £70,000 per year * IT Recruiter: £20,000 - £50,000 per year * Network Administrator: £20,000 - £40,000 per year * Help Desk Analyst: £18,000 - £30,000 per year * Cloud Engineer: £35,000 - £75,000 per year CERTIFICATES CERTIFICATE OF COMPLETION Hard copy certificate - Included

Diploma in Essential IT Skills at QLS Level 2, 5 & 7 Course
Delivered Online On Demand
£399

Diploma in Essential IT Skills at QLS Level 2, 5 & 7 Course

By One Education

Are you ready to unlock the power of the digital age? In today's world, technology has become an indispensable part of our lives. From smart homes to automated workplaces, it's impossible to ignore the impact of IT. But did you know that the history of IT dates back to the 19th century? It all started with the invention of the telegraph and has since evolved into a vast and complex system that underpins our modern society. If you're looking to gain essential IT skills or to advance your career in the field, look no further than the Diploma in Essential IT Skills at QLS Level 2, 5 & 7. This comprehensive program offers three QLS-endorsed courses, including Internet of Things, Start an IT Asset Department, and Recruitment: IT Basics for IT Recruiters. In addition, there are five CPD QS accredited relevant courses and five CPD QS accredited career development courses to help you hone your skills and achieve your goals. The Internet of Things course will equip you with the knowledge and skills to design and implement interconnected devices and systems, while the Start an IT Asset Department course provides an in-depth understanding of IT asset management, including procurement, inventory management, and disposition. Recruitment: IT Basics for IT Recruiters, on the other hand, offers practical training on how to recruit and select IT professionals. But that's not all. The program also includes five CPD QS accredited relevant courses covering topics such as cybersecurity, cloud computing, and project management. And for those looking to advance their careers, there are five CPD QS accredited career development courses that focus on leadership, communication, and personal development. QLS Endorsed Courses: * Course 01: Advanced Diploma in Internet of Things (IoT) at QLS Level 7 * Course 02: Award in Start an IT Asset Department at QLS Level 2 * Course 03: Diploma in Recruitment: IT Basics for IT Recruiters at QLS Level 5 CPD QS Accredited Courses: * Course 04: CompTIA IT Fundamentals ITF+ (FCO-U61) * Course 05: IT Administration and Networking * Course 06: IT Helpdesk Administrator Training * Course 07: CompTIA Network+ Certification (N10-007) * Course 08: Cloud Computing / CompTIA Cloud+ (CV0-002) Take your career to the next level with our bundle that includes not only technical courses but also five guided courses focused on personal development and career growth. * Course 09: Leadership and Management Course * Course 10: Career Development and Passion * Course 11: Professional CV Writing * Course 12: Boost Your Confidence and Self-Esteem * Course 13: Public Speaking: Confident Delivery Skills Learning Outcomes: * Develop knowledge and practical skills in Internet of Things, IT asset management and IT recruitment basics. * Understand the concepts of Raspberry Pi, Microsoft Azure, Thingspeak, Adafruit IO and IOT security. * Learn the fundamentals of IT administration and networking. * Understand the basics of IT helpdesk administration and Cloud Computing. * Develop knowledge and skills in asset tracking, populating the database, daily operations and reports. * Gain knowledge and practical skills in IT technologies such as programming languages, databases and frameworks. * Learn how to become a successful IT recruiter. The Quality Tools and Methods, Lean Six Sigma: Toolkit & Quality Management bundle offers three QLS courses along with five CPD-QS accredited courses. The Internet of Things course covers the basics of Raspberry Pi, Microsoft Azure, Thingspeak, Adafruit IO and IOT security. Start an IT Asset Department course provides insights into the IT asset management team and activities, asset tracking tool, populating the database, daily operations and reports. Recruitment: IT Basics for IT Recruiters course covers IT fundamentals, IT terms/basics, IT positions, IT technologies programming languages and frameworks, databases, and recruiter training. This bundle also includes IT Fundamentals, IT administration and networking, IT helpdesk administrator training, CompTIA Network+ certification, and Cloud Computing/CompTIA Cloud+ (CV0-002). Certification Learners will qualify for the highly sought-after QLS Endorsed Certificate after successfully passing the assessment at the conclusion of each endorsed course. The Quality Licence Scheme is a credible and renowned endorsement that marks high qualityand excellence in the UK. It is well accepted and sought after by industry experts and recruiters. Learners who purchase this bundle will receive Three Hardcopy QLS Certificates at their door! CPD 40 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? This course is ideal for individuals who want to develop skills and knowledge in IT asset management, IT recruitment basics, and Internet of Things. CAREER PATH * IT Asset Manager: £35,000 - £70,000 per year * IT Recruiter: £20,000 - £50,000 per year * Network Administrator: £20,000 - £40,000 per year * Help Desk Analyst: £18,000 - £30,000 per year * Cloud Engineer: £35,000 - £75,000 per year CERTIFICATES CERTIFICATE OF COMPLETION Hard copy certificate - Included

Diploma in Essential IT Skills at QLS Level 2, 5 & 7 Course
Delivered Online On Demand
£399

Diploma in Essential IT Skills at QLS Level 2, 5 & 7 Course

By One Education

Are you ready to unlock the power of the digital age? In today's world, technology has become an indispensable part of our lives. From smart homes to automated workplaces, it's impossible to ignore the impact of IT. But did you know that the history of IT dates back to the 19th century? It all started with the invention of the telegraph and has since evolved into a vast and complex system that underpins our modern society. If you're looking to gain essential IT skills or to advance your career in the field, look no further than the Diploma in Essential IT Skills at QLS Level 2, 5 & 7. This comprehensive program offers three QLS-endorsed courses, including Internet of Things, Start an IT Asset Department, and Recruitment: IT Basics for IT Recruiters. In addition, there are five CPD QS accredited relevant courses and five CPD QS accredited career development courses to help you hone your skills and achieve your goals. The Internet of Things course will equip you with the knowledge and skills to design and implement interconnected devices and systems, while the Start an IT Asset Department course provides an in-depth understanding of IT asset management, including procurement, inventory management, and disposition. Recruitment: IT Basics for IT Recruiters, on the other hand, offers practical training on how to recruit and select IT professionals. But that's not all. The program also includes five CPD QS accredited relevant courses covering topics such as cybersecurity, cloud computing, and project management. And for those looking to advance their careers, there are five CPD QS accredited career development courses that focus on leadership, communication, and personal development. QLS Endorsed Courses: * Course 01: Advanced Diploma in Internet of Things (IoT) at QLS Level 7 * Course 02: Award in Start an IT Asset Department at QLS Level 2 * Course 03: Diploma in Recruitment: IT Basics for IT Recruiters at QLS Level 5 CPD QS Accredited Courses: * Course 04: CompTIA IT Fundamentals ITF+ (FCO-U61) * Course 05: IT Administration and Networking * Course 06: IT Helpdesk Administrator Training * Course 07: CompTIA Network+ Certification (N10-007) * Course 08: Cloud Computing / CompTIA Cloud+ (CV0-002) Take your career to the next level with our bundle that includes not only technical courses but also five guided courses focused on personal development and career growth. * Course 09: Leadership and Management Course * Course 10: Career Development and Passion * Course 11: Professional CV Writing * Course 12: Boost Your Confidence and Self-Esteem * Course 13: Public Speaking: Confident Delivery Skills Learning Outcomes: * Develop knowledge and practical skills in Internet of Things, IT asset management and IT recruitment basics. * Understand the concepts of Raspberry Pi, Microsoft Azure, Thingspeak, Adafruit IO and IOT security. * Learn the fundamentals of IT administration and networking. * Understand the basics of IT helpdesk administration and Cloud Computing. * Develop knowledge and skills in asset tracking, populating the database, daily operations and reports. * Gain knowledge and practical skills in IT technologies such as programming languages, databases and frameworks. * Learn how to become a successful IT recruiter. The Quality Tools and Methods, Lean Six Sigma: Toolkit & Quality Management bundle offers three QLS courses along with five CPD-QS accredited courses. The Internet of Things course covers the basics of Raspberry Pi, Microsoft Azure, Thingspeak, Adafruit IO and IOT security. Start an IT Asset Department course provides insights into the IT asset management team and activities, asset tracking tool, populating the database, daily operations and reports. Recruitment: IT Basics for IT Recruiters course covers IT fundamentals, IT terms/basics, IT positions, IT technologies programming languages and frameworks, databases, and recruiter training. This bundle also includes IT Fundamentals, IT administration and networking, IT helpdesk administrator training, CompTIA Network+ certification, and Cloud Computing/CompTIA Cloud+ (CV0-002). Certification Learners will qualify for the highly sought-after QLS Endorsed Certificate after successfully passing the assessment at the conclusion of each endorsed course. The Quality Licence Scheme is a credible and renowned endorsement that marks high qualityand excellence in the UK. It is well accepted and sought after by industry experts and recruiters. Learners who purchase this bundle will receive Three Hardcopy QLS Certificates at their door! CPD 40 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? This course is ideal for individuals who want to develop skills and knowledge in IT asset management, IT recruitment basics, and Internet of Things. CAREER PATH * IT Asset Manager: £35,000 - £70,000 per year * IT Recruiter: £20,000 - £50,000 per year * Network Administrator: £20,000 - £40,000 per year * Help Desk Analyst: £18,000 - £30,000 per year * Cloud Engineer: £35,000 - £75,000 per year CERTIFICATES CERTIFICATE OF COMPLETION Hard copy certificate - Included

Diploma in Essential IT Skills at QLS Level 2, 5 & 7 Course
Delivered Online On Demand
£399

CertNexus Internet of Things for Business Professionals (IoTBIZ)

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for This 4-hour course is intended for business leads in project management, marketing and sales who are seeking to grow their organization through IoT technology solutions. This course prepares students for taking the CertNexus IoTBIZ Credential (IOZ-110). Overview This course and associated credential (IOZ-110) will validate your knowledge of IoT terminology and your ability to understand the components of IoT infrastructure, help you uncover challenges for consideration and understand the impact that IoT has on your organization. This includes being able to identify what IoT can do for your organization and the various business and technical challenges that you must address. The Internet of Things (IoT) allows organization to collect an extraordinary volume of data and new analysis tools can enable you to use this data to make well-informed decisions to be made quickly. But before you can successfully plan and implement an IoT solution, you must understand the various factors that will drive your decisions. Putting IoT systems into place can be a complicated proposition with unique considerations distinctly different from traditional IT solutions. This course will familiarize you with IoT components, understand the challenges that you may face, and make design decisions about your IoT projects. Course includes an exam voucher for the IoTBIZ exam (exam IOZ-110). PLANNING AN IOT IMPLEMENTATION * Defining IoT * IoT Infrastructure * Identify Benefits and Challenges of IoT UNDERTAKING AN IOT PROJECT * Identify Real World Applications for IoT * The IoT Development Lifecycle ADDITIONAL COURSE DETAILS: Nexus Humans CertNexus Internet of Things for Business Professionals (IoTBIZ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Internet of Things for Business Professionals (IoTBIZ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Internet of Things for Business Professionals (IoTBIZ)
Delivered on-request, onlineDelivered Online
Price on Enquiry

5G demystified

5.0(3)

By Systems & Network Training

5G TRAINING COURSE DESCRIPTION This course is designed to give the delegate an understanding of the technologies and interworking requirements of the next generation of cellular communications. It is not a definitive set of descriptions but a possibility of the final deployment. During the course we will investigate the 10 pillars for 5G, which will include various Radio Access Technologies that are required to interwork smoothly. Hence we will look at the 4G Pro features and other RATs. WHAT WILL YOU LEARN * List the ten pillars of 5G deployment. * Explain the 5G Internet and Software Distributed Networks (SDN). * Explain carrier aggregation, the mobile cloud and RAT virtualisation. * Explain an overall picture of 5G architecture. 5G TRAINING COURSE DETAILS * Who will benefit: Anyone who is looking to work with next generation networks. * Prerequisites: Mobile communications demystified * Duration 3 days 5G TRAINING COURSE CONTENTS * Drivers for 5G 5G Road Map, 10 Pillars of 5G, evolving RATs, small cell, o SON, MTCm, mm-wave, backhaul, EE, new spectrum, spectrum sharing, RAN virtualisation. * 4G LTE advanced features *MIMO, Downlink & uplink MIMO R8, MIMO technology in LTE advanced, Downlink 8-layer SU-MIMO, Downlink MU-MIMO, Uplink MU-MIMO, Uplink transmit diversity, Coordinated multi-point operation (CoMP), Independent eNB & remote base station configurations, Downlink CoMP, * Uplink Multi-Cell Reception. * ICIC & eICIC ICIC, Homogeneous to heterogeneous network, eICIC, Macro-pico scenario, Macro-femto scenario, Time orthogonal frequencies. Almost Blank Subframe (ABS). * Carrier aggregation Component carriers (CC), * CC aggregation, Intra-band contiguous solutions, Intra-band non-contiguous solutions, Inter-band non-contiguous solutions, CA bandwidth classes, Aggregated transmission bandwidth configurations (ATBC), Possible carrier aggregation configurations (Rel 9, 10 & 12). * Enhanced Interference Mitigation & Traffic Adaptation (eIMTA) TDD UL-DL reconfiguration for traffic adaptation, Reconfiguration mechanisms, Interference mitigation schemes, Dynamic & flexible resource allocation. * 5G architectures 5G in Europe, horizon 2020 framework, 5G infrastructure PPP, METIS project, innovation centre, 5G in North America, research, company R & D, 5G specifications. * The 5G internet Cloud services, IoT & context awareness, network reconfiguration & virtualization support, hypervisors, SDN, the controller, service-oriented API, OpenFlow switches, SDN operation, SDN control for traffic flow redirection, OpenFlow controllers, how SDN works, application, control and infrastructure layers, a programmable network, how SDN & NFV tie together, SDN's downside, SDN orchestration, Mobility, architectures for distributed mobility management, MEDIEVAL & MEDIVO projects, a clean slate approach, mobility first architecture, network virtualization (VNet), INM, NetInf, ForMux, MEEM, GP & AM, QoS support, network resource provisioning, IntServ, RSVP, DiffServ, CoS, aggregated resource provisioning, SICAP, MARA, Emerging approach for resource over-provisioning, example use case architecture for the 5G internet, integrating SDN/NFV for efficient resource control, control information repository, service admission control policies, network resource provisioning, control enforcement functions, network configurations, network operations. * Small cells for 5G Average spectral efficiency evolution, What are small cells? WiFi & Femto cells as candidate small-cell technologies, Capacity limits & achievable gains with densifications, gains with multi-antenna techniques, gains with small cells, Mobile data demand, approach & methodology, subscriber density projections, traffic demand projections, global mobile data traffic increase modelling, country level backhaul traffic projections, 2020 average spectrum requirement, Small cell challenges, backhaul, spectrum, automation. * Cooperation for next generation wireless networks Cooperative diversity & relaying strategies, Cooperative ARQ & MAC protocols, NCCARQ & PRCSMA packet exchange, Physical layer impact on MAC protocol, NCCARQ overview, PHY layer impact, Performance evaluation, simulation scenario and results. * Mobile clouds; technology & services for future communications platforms Mobile cloud, software, hardware and networking resources, Mobile cloud enablers, mobile user domain, wireless technologies, WWAN WLAN and WPAN range, Bluetooth, IEEE.802.15.4, software stacks, infrared, near field communications (NFC), store & forward vs compute & forward, random/linear network coding. * Security for 5G communications Potential 5G architectures, Security issues & challenges in 5G, user equipment, mobile malware attacks, 5G mobile botnets, attacks on 4G networks, C-RNTI & packet sequence numbers based UE location tracking, false buffer status reports attacks, message insertion attacks, HeNB attacks, physical attacks, attacks on mobile operator's network, user data & identity attacks, DDoS attacks, amplification, HSS saturation, external IP networks.

5G demystified
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2367

IT Security & Cyber Security

By Apex Learning

11 in 1 "IT Security & Cyber Security" Bundle only at £53 Boost Your Career with Apex Learning and Get Noticed By Recruiters in this Hiring Season! Get Hard Copy + PDF Certificates + Transcript + Student ID Card worth £160 as a Gift - Enrol Now Give a compliment to your career and take it to the next level. This IT Security & Cyber Security bundle will provide you with the essential knowledge to shine in your professional career. Whether you want to develop skills for your next job or elevate your skills for your next promotion, this IT Security & Cyber Security bundle will help you stay ahead of the pack. Throughout the IT Security & Cyber Security programme, it stresses how to improve your competency as a person in your chosen field while also outlining essential career insights in the relevant job sector. Along with this IT Security & Cyber Security course, you will get 10 premium courses, an originalhardcopy, 11 PDF certificates (Main Course + Additional Courses) Student ID card as gifts. This IT Security & Cyber Security Bundle Consists of the following Premium courses: * Course 01: Computer Networks Security * Course 02: Cyber Security Incident Handling and Incident Response * Course 03: CyberSecurity Law Online Course * Course 04: Crash Course on Ecommerce Security * Course 05: Linux Security and Hardening * Course 06: Secure Programming of Web Applications * Course 07: Complete Web Application Penetration Testing & Security * Course 08: Data Protection and Data Security Level 2 * Course 09: Information Management * Course 10: Security Management Advanced Diploma * Course 11: Internet of Things Hacking Enrol now in IT Security & Cyber Security to advance your career, and use the premium study materials from Apex Learning. How will I get my Certificate? After successfully completing the course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. * PDF Certificate: Free (Previously it was £6*11 = £66) * Hard Copy Certificate: Free (For The Title Course: Previously it was £10) The bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your IT Security & Cyber Security expertise and essential knowledge, which will assist you in reaching your goal. Moreover, you can learn from any place in your own time without travelling for classes. Curriculum of Bundle Course 01: Computer Networks Security * Introduction * Section 01: An Introduction to Computer Networks * Section 02: ISO/OSI Model * Section 03: TCP/IP Protocols * Section 04: Wireless Networks * Section 05: Network Security * Section 06: Firewalls and Honeypots * Section 07: Intrusion Detection and Prevention System * Section 08: Wireless Network Security * Section 09: Physical Security and Incident Handling * Section 10: Network Security: Conclusion Course 02: Cyber Security Incident Handling and Incident Response * Cyber Security Incident Handling and Incident Response * Section 01: An Introduction to Incident Handling * Section 02: Preparation for an Incident * Section 03: Identification * Section 04: Containment * Section 05: Eradication * Section 06: Recovery Phase * Section 07: Final Thoughts Course 03: CyberSecurity Law Online Course * Module 01: Introduction to Cyber Law * Module 02: Cyber Law, Cyber Ethics and Online Gambling * Module 03: Cyber Crime, Cyber Security and Trust in Cyberspace * Module 04: Threat Factors: Computer as a Target * Module 05: Threats to Cyber Security by Criminals and Organised Crimes * Module 06: Threats to Cybersecurity by Hacktivists and Nation-States * Module 07: Cyberterrorism * Module 08: An Evolving Threat: The Deep Web * Module 9: Fraud * Module 10: Jurisdiction Course 04: Crash Course on Ecommerce Security * Unit 01: Introduction and Types of Ecommerce * Unit 02: Ecommerce SEO * Unit 03: Ecommerce Demo * Unit 04: Ecommerce Website Vulnerability and Security Risk Scanning * Unit 05: Basic Terms of Ecommerce * Unit 06: Ecommerce Fraud * Unit 07: Ecommerce Fraud Prevention Course 05: Linux Security and Hardening * Unit 01: Course Overview and Downloads * Unit 02: General Security * Unit 03: Physical Security * Unit 04: Account Security * Unit 05: Network Security * Unit 06: File System Security * Unit 07: Additional Resources Course 06: Secure Programming of Web Applications * Section 01: Introduction * Section 02: Well-known Vulnerabilities and Secure Programming * Section 03: Conclusion and Summary Course 07: Complete Web Application Penetration Testing & Security * Unit 01: Introduction * Unit 02: BE PREPARED * Unit 03: WEB APPLICATION TECHNOLOGIES * Unit 04: INFORMATION GATHERING - MAPPING THE APPLICATIONS * Unit 05: CROSS-SITE SCRIPTING ATTACKS - XSS * Unit 06: SQL INJECTION ATTACKS - EXPLOITATIONS * Unit 07: CROSS SITE REQUEST FORGERY - XSRF * Unit 08: AUTHENTICATION & AUTHORIZATION ATTACKS * Unit 09: CLIENT SIDE SECURITY TESTING * Unit 10: FILE RELATED VULNERABILITIES * Unit 11: XML EXTERNAL ENTITY ATTACKS - XXE Course 08: Data Protection and Data Security Level 2 * GDPR Basics * GDPR Explained * Lawful Basis for Preparation * Rights and Breaches * Responsibilities and Obligations Course 09: Information Management * Module 01: Introduction to Information Management * Module 02: Information Management Strategy * Module 03: Databases and Information Management * Module 04: Management Information Systems (MIS) * Module 05: Auditing Information Systems * Module 06: Ethical and Social Issues and Data Protection Course 10: Security Management Advanced Diploma * Module 01: Introduction to Security Management * Module 02: Organisational Security Management * Module 03: Security Risk Analysis and Risk Reduction * Module 04: Physical and Information Security Protection * Module 05: Business Resilience and Crisis Management * Module 06: Cyber Security and Fraud Prevention * Module 07: Security Investigations and Threat Awareness * Module 08: Laws and Regulations Course 11: Internet of Things Hacking * Module 01: IoT Part 1 * Module 02: IoT Part 2 * Module 03: IoT Hacking Tools and Technique * Module 04: IoT Hacking Tools and Technique Part 2 * Module 05: IoT Scenario Part 1 * Module 06: IoT Scenario Part 2 * Module 07: Smart Devices * Module 08: AWS Basics CPD 115 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? Anyone from any background can enrol in this IT Security & Cyber Security bundle. REQUIREMENTS Our IT Security & Cyber Security is fully compatible with PCs, Macs, laptops, tablets and Smartphone devices. CAREER PATH Having this IT Security & Cyber Security expertise will increase the value of your CV and open you up to multiple job sectors. CERTIFICATES CERTIFICATE OF COMPLETION Digital certificate - Included CERTIFICATE OF COMPLETION Hard copy certificate - Included You will get the Hard Copy certificate for the title course (IT: IT Security & Cyber Security) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

IT Security & Cyber Security
Delivered Online On Demand
£53