Microsoft security training course description A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment. What will you learn Use Microsoft security tools. Secure Microsoft servers. Secure Microsoft desktops. Secure Microsoft networks. Microsoft security training course details Who will benefit: Technical server support staff. Technical desktop support staff. Technical network staff. Technical security staff. Prerequisites: Supporting Windows server 2016 Networking Microsoft systems. Duration 3 days Microsoft security training course contents Introduction Security threats, Microsoft defaults, admin accounts, security patches, patch management, patch tools. Hands on: Studying Microsoft defaults, applying security patches. Microsoft security tools Microsoft updates, WSUS, Inventory tool, baseline security analyser, URLscan, EventCombMT, Cipher security tool, Port reporter, PortQry. Tools hackers use. Hands on: Using Microsoft security tools. Server security Checklists, core server security, AD, Member server security, Domain controller security, Specific roles. Hands on Hardening Microsoft servers, security templates. Active Directory Admin authority in AD, group policy, trust and authentication. Desktop security Checklists, core client security, anti virus software, anti spyware software, firewalls, securing clients with AD, securing clients with group policy, software restriction policies. Hands on Securing Microsoft desktops. Network security Checklist, IP security, VPNs, PKI, certificate authorities, RAS, RRAS, IAS. Hands on: VPN configuration, IAS configuration. Monitoring Auditing, authorisation and logons, tracking, system monitoring, detecting attacks. Hands on: Monitoring Microsoft systems. Summary Microsoft security response centre, security advisories.
Cyber Security training course description The reliance of the world on the Internet and computer systems means the protection of information systems is vitally important. This is even more important smart devices and the Internet of Things increase the number of devices. This Cyber Security provides a concise overview on the threats and attacks that can happen along with the counter measures that can be taken. What will you learn Recognise the different types of attack. Describe the attacks that can be made against information systems. Describe the counter measures available. Cyber Security training course details Who will benefit: Non-technical staff working with computers. Prerequisites: None. Duration 1 day Cyber Security training course contents What is Cyber Security? Computer security, Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Attacks Physical access, Social engineering, Privilege escalation, Malware, Trojans, worms, viruses, rootkits, Backdoors, Denial of Service (DOS), Distributed DOS, Eavesdropping, Spoofing, Man the middle tampering. Countermeasures Prevention, detection, response. Physical, user accounts, Firewalls, IDS, AAA, authentication, cryptography, encryption, data integrity. Cyber security standards ETSI, ISO 27001, 27002, NIST, ISA/IEC 62443.
Oracle Database 12c Admin training course description This Oracle Database 12c Administration course is designed to give the Oracle database administrator practical experience in administering, monitoring, tuning and troubleshooting an Oracle 12c database. Database administrators will gain an understanding of the architecture and processes of the Oracle database server. They will be able to ensure the integrity and availability of a company's data within the Oracle environment. They will be able to monitor the performance of the database, allocate resources with the Resource Manager and Schedule jobs. What will you learn Administer an Oracle database instance. Monitor an Oracle database. Configure the Oracle network environment. Create and manage database storage structures. Manage users, profiles, privileges and roles. Manage undo data and temporary segments. Monitor and resolve lock conflicts. Maintain database security. Implement database auditing. Monitor the performance of the Database. Load and unload data. Use the job scheduler. Configure a database for backup and recovery. Oracle Database 12c Admin training course details Who will benefit: This Oracle Database 12c Administration course is for anyone who needs to administer, monitor and support an Oracle 12c database. Prerequisites: An understanding of relational database concepts and good operating system knowledge. They should have attended the Oracle SQL course or have a good working knowledge of Oracle SQL. Knowledge of the usage of PL/SQL packages is highly recommended. Duration 5 days Oracle Database 12c Admin training course contents Introduction to Oracle database 12c Overview of the Oracle database 12c, Overview of the Oracle Cloud, Relational database concepts, database administration tasks. Oracle Database 12c Architecture Overview of the Oracle database architecture, The Oracle database instance, Oracle Database memory structures, Process architecture and structures, Server and client processes, The Oracle database storage architecture, Connect to the Oracle database instance. Administer a database instance Administrative tools available to a DBA, Use SQL*Plus in Oracle to manage a database instance, Use SQL Developer to manage a database instance, Administer the database using Enterprise Manager (EM), Overview of the Enterprise Manager framework, Access Enterprise Manager Database Express, The Enterprise Manager Database Express Home Page, Enterprise Manager Cloud Control, Initialization parameter files. Configure the Oracle network environment Overview of network configuration, Oracle Net Listener configuration and management, Oracle Net naming methods, Tools for configuring and managing the Oracle network, Using the Net Configuration Assistant, Configure client connections with Net Manager, View listener configuration, Start and stop the Oracle listener, Use TNSPING to test Oracle Net connectivity, Connect to the database, Configure Net Services with Enterprise Manager. Storage Structures Overview of data storage, The database block, Overview of tablespaces and datafiles, Use Enterprise Manager to view the storage structure of the database, Create and alter tablespace commands, Temporary tablespaces, Create and manage datafiles, Use OMF, Drop tablespaces and datafiles. Manage users Predefined database administration accounts, User accounts, Create a user account, User authentication, Change a user's password, Manage a user account, Drop a user account, Monitor user information, Terminate user sessions. Manage profiles and resources Overview of user profiles, Profile resource parameters, Create profile command, Manage passwords with profiles, Control resource usage with profiles, Maintain profiles. Manage privileges Database access, Oracle supplied roles, System and object level privileges, The grant and revoke commands, Create, modify and drop roles, Use predefined roles. Database auditing Overview of database security, Overview of database auditing, Security compliance, Standard auditing, Unified audit trail, Separation of audit responsibilities with the AUDIT_ADMIN and AUDIT_VIEWER roles, Configure the audit trail, Specify audit options. Data concurrency and lock conflicts Levels of locking in Oracle, Methods used to acquire locks, Data concurrency, Possible causes of contention, DML locks, Prevent locking problems, Detect lock contention, Resolve conflicts. Undo management Undo data overview, Monitor and administer undo, Configure undo retention, Switch undo tablespaces, Specify the retention period, Guarantee undo retention, Retention period for flashback queries, View undo space information, Use the undo advisor, Size the undo tablespace, Alter an undo tablespace to a fixed size. Proactive database management Database Maintenance, View the alert log, The Automatic Workload Repository, Statistic levels, The Automatic Database Diagnostic Monitoring, Monitor an Oracle database, Use the Advisors, Set up notification rules/ Performance management Tuning information sources, Performance monitoring, Tuning activities, Performance planning, Instance tuning, Performance tuning methodology, Performance tuning data, Monitoring performance, Managing memory. SQL tuning SQL tuning, The Oracle Optimizer, SQL Plan directives, Adaptive execution plans, SQL Advisors, Automatic SQL Tuning results, Implement automatic tuning recommendations , SQL Tuning Advisor. Moving data Create directory objects , Data Pump architecture, Data Pump data dictionary views, Data Pump interactive mode, Data Pump API, Use Data Pump to export and import data, Overview of SQL Loader, Command line parameters, Record filtering, Control file keywords, Datafiles, SQL Loader data paths, External Tables. Automate tasks with the scheduler Introduction to the Scheduler, Access Rights, Scheduler components and workflow, Create a Job, Job Classes, Use time based, event based schedules, Create an event based schedule. Managing resources with Resource Manager Overview of the Database Resource Manage, Use the Resource Manager, Create Resource Plans, The default maintenance resource manager plan, Create Resource Plan Directives, Allocate resources for Resource Plans. Manage space Overview of space management, Block space management within segments, Segment types, Allocate extents, Allocate space, Row chaining and migration, Create tables without segments. Backup and recovery configuration Oracle backup solutions, Oracle suggested backup strategy, Overview of database backup, restore and recover, Flashback technology, Types of failure ,Instance recovery, Tune instance recovery, The MTTR Advisor, Media failure, Configure a database for recoverability Oracle support The Enterprise Manager Support Workbench, Register for security updates, Work with Oracle Support, My Oracle Support integration, Log Service Requests, Manage patches, Apply a patch
Securing Kubernetes training course description This course introduces concepts, procedures, and best practices to harden Kubernetes based systems and container-based applications against security threats. It deals with the main areas of cloud-native security: Kubernetes cluster setup, Kubernetes cluster hardening, hardening the underlying operating system and networks, minimizing microservices vulnerabilities, obtaining supply chain security as well as monitoring, logging, and runtime security. What will you learn Harden Kubernetes systems and clusters. Harden containers. Configure and use Kubernetes audit logs. Securing Kubernetes training course details Who will benefit: Technical staff working with Kubernetes Prerequisites: Kubernetes_for_engineers_course.htm Definitive Docker for engineers Duration 2 days Securing Kubernetes training course contents This course does not only deal with the daily security administration of Kubernetes-based systems but also prepares delegates for the official Certified Kubernetes Security Specialist (CKS) exams of the Cloud Native Computing Foundation (CNCF). Structure: 50% theory 50% hands on lab exercise Module 1: User and authorization management Users and service accounts in Kubernetes Authenticating users Managing authorizations with RBAC Module 2: Supply chain security Vulnerabilit checking for images Image validation in Kubernetes Reducing image footprint Secure image registries Module 3: Validating cluster setup and penetration testing Use CIS benchmark to review the security configuration of Kubernetes components. Modify the cluster components' configuration to match the CIS Benchmark. Penetration testing Kubernetes for known vulnerabilities. Module 4: System hardening Use kernel hardening tools Setup appropriate OS level security domains Container runtime sandboxes Limit network access Module 5: Monitoring and logging Configure Kubernetes audit logs Configure Audit Policies Monitor applications behaviour with Falco
D-Link switches training course description A hands on course covering the product specifics of D-Link switches. Installation, configuration, maintenance and troubleshooting are all covered in a practical oriented way. What will you learn Install D-Link switches. Use the command line interface and the web based interface to manage D-Link switches. Configure and troubleshoot D-Link switches. Perform software upgrades and maintain configurations using TFTP. D-Link switches training course details Who will benefit: Anyone working with D-Link switches. Particularly aimed at engineers and technicians supporting D-Link switches. Prerequisites: None. Duration 2 days D-Link switches training course content Introduction How Ethernet works with hubs, How Ethernet works with switches. Installing D-link switches. Hands on Building a network with a hub, building a network with a D-Link switch. Basic troubleshooting The D-Link switch range, LEDs, cabling issues, factory resets, default settings. Hands on Building a network with multiple D-link switches. Configuration methods Managed vs. unmanaged switches, Console port access, telnet, web based access, SNMP, saving configurations, NVRAM, switch stacks. Hands on Accessing the switch using the CLI, IP address configuration, telnet. Command line interface Users, privileges, the CLI, online help. Hands on Basic commands, user accounts, displaying the switch configuration. Web based interface Getting started, basic format. Hands on Configuring the switch using the web interface. Port configuration Common port configuration tasks, link aggregation. Hands on Configuring ports. STP configuration What is STP? 802.1D vs. 802.1W (RSTP), configuring STP. Hands on Enabling and disabling STP, changing STP versions, configuring STP. VLAN configuration What are VLANS? 802.1Q, tagged/untagged, creating VLANS, applying VLANS. Hands on Setting up VLANS, setting up 802.1Q, Inter VLAN traffic. Housekeeping TFTP, upload download, updating firmware, updating configuration files, BOOTP/DHCP for IP addresses. Hands on Using TFTP to configure a D-Link switch. SNMP Switch configuration, D-View, other NMS's. Hands on Using SNMP to manage a D-link switch putting it all together: troubleshooting.
Work Breakdown Structures It's amazing how often project managers begin the project planning process by making an outlined list of every task they believe will be required to complete a project and then proclaim they have created the work breakdown structure (WBS) for the project. The result is a list of hundreds, or even thousands of tasks, many of them having durations of a few days or a few hours. Essentially, what they have done is create a 'to do' list, which they then use as a 'checklist' to measure progress. This approach leads to, and even encourages, micromanagement of the resources working on the project without consideration of more critical aspects of project management such as: requirements management, risk management, procurement management, estimating, scheduling, executing, and controlling. Further, it makes it impossible to see the big picture, at levels of detail, in keeping with the needs of sponsors, clients, project and functional managers, team leaders, and project performers. Join us for this exciting program and learn how to use the WBS to make better-informed business decisions. What You Will Learn You will learn how to: Describe the need for a project WBS Describe the WBS role in the project Gain practical experience in the development, decomposition, and use of the WBS Determine the appropriate level of detail in the WBS. Explain how the WBS integrates with project requirements, risk, procurement, estimating, scheduling, and overall project execution. Provide the basic tools to enhance efficient re-use of key information in your future projects Foundation Concepts Key definitions History of the WBS Importance of the WBS Overall structure Terminology Other breakdown structures WBS tools WBS & Scope Project scope management processes Specification of the project objectives WBS design based on project deliverable WBS decomposition process and 'The 100% rule' Work Packages and Control Accounts WBS & Risk Risk management planning and WBS Risk identification to enhance the WBS Risk analysis and the WBS Risk responses and updating the WBS Implementing risk response and Monitoring risks and the WBS WBS & Estimating Use of WBS in the estimating process Components and work packages Sizing and algorithmic estimates WBS & Scheduling Component Scheduling - High-Level Milestones WBS activity decomposition WBS elements dependencies Work Package Level Schedules Responsibility assignment matrix WBS & Execution and Control Earned Value Management and tracking of work performance Progress reports, forecasts, and corrective and preventive actions used to manage work performance Necessary information to close out a project
Introduction to Virtualization course description A comprehensive tour of virtualization. The course concentrates on the actual technologies involved as opposed to any one vendor solution. What will you learn Explain the concepts of virtualization. Partition servers. Create Virtual Machines. Introduction to Virtualization course details Who will benefit: Anyone looking for an introduction to Virtualization. Prerequisites: None. Duration 2 days Introduction to Virtualization course contents Virtualization Concepts What is Virtualisation? What are virtual machines (VMs)? Virtualisation Landscape. Network Virtualisation. Suitability for Organisations. Advantages of deploying Virtualisation. Downsides of deploying Virtualisation. Overview of Virtualisation products. Hypervisors What is a hypervisor? Difference between type 1 and 2 hypervisors. Available hypervisors. Hypervisors and device drivers. Hands on: Installing Oracle VirtualBox on Windows. Creating/Importing/Configuring VMs. Virtualization Hosts Hardware and resource requirements. Installation of the hypervisor. Hands on: Installing Hyper-V role into Windows Server. Creating/Importing/Configuring VMs. Virtual Machines Creating virtual machines. Resource requirements. Settings. Installation of the guest OS. Additional tools/ extensions for hypervisor integration. VM files and their uses. Virtual hard disk and their formats. Hardware pass through. Hands on: Connecting to VMWare ESXi via WebGUI and using ESXi to create/import/configure VMs. VM Snapshots/Checkpoints What is a snapshot? How to use them and how they impact performance? Creating/deleting/merging of snapshots. Hands on: Using ESXi to create/manage snapshots. Command Line use on the Hypervisor Interacting with the hypervisor through the command line. Simple commands to configure the hypervisor and VMs. Simple scripts. Hands on: Connecting to VMWare ESXi via PowerCLI to manipulate VMs and snaphshots. Virtualization Storage Different types of storage: local vs remote. Local and remote storage technologies. Configuring storage. Hands on: Using ESXi to deploy VMs on remote NFS storage. Virtual Networking How is networking done in virtualization environments. What is a virtual switch and vNIC and what are their performance characteristics? NIC teaming and trunking in the virtual world. Port groups and isolation. Physical NICs and their use in virtual switches. Hands on: Using ESXi to create and configure vswitches and networking. Templates and clones What is a template? What is a clone? When to use templates and clones to optimize VM deployment. Migrating/Importing VMs What is migration? Migrating compute and storage. Importing VMs from files or physical machines. Hands on: Using VMWare vCenter Server to clone/ template/migrate VMs, tag resources, create local user accounts and assign permissions. VMs and Backups Taking backups of your VMs. Restoring your VMs from backups. Virtualization and Licensing Different licensing models and costs. Containerization Concepts What is a container and how is it different from a virtual machine. When to use containers. Docker and Kubernetes
Work Breakdown Structures: In-House Training It's amazing how often project managers begin the project planning process by making an outlined list of every task they believe will be required to complete a project and then proclaim they have created the work breakdown structure (WBS) for the project. The result is a list of hundreds, or even thousands of tasks, many of them having durations of a few days or a few hours. Essentially, what they have done is create a 'to do' list, which they then use as a 'checklist' to measure progress. This approach leads to, and even encourages, micromanagement of the resources working on the project without consideration of more critical aspects of project management such as: requirements management, risk management, procurement management, estimating, scheduling, executing, and controlling. Further, it makes it impossible to see the big picture, at levels of detail, in keeping with the needs of sponsors, clients, project and functional managers, team leaders, and project performers. Join us for this exciting program and learn how to use the WBS to make better-informed business decisions. What You Will Learn You will learn how to: Describe the need for a project WBS Describe the WBS role in the project Gain practical experience in the development, decomposition, and use of the WBS Determine the appropriate level of detail in the WBS. Explain how the WBS integrates with project requirements, risk, procurement, estimating, scheduling, and overall project execution. Provide the basic tools to enhance efficient re-use of key information in your future projects Foundation Concepts Key definitions History of the WBS Importance of the WBS Overall structure Terminology Other breakdown structures WBS tools WBS & Scope Project scope management processes Specification of the project objectives WBS design based on project deliverable WBS decomposition process and 'The 100% rule' Work Packages and Control Accounts WBS & Risk Risk management planning and WBS Risk identification to enhance the WBS Risk analysis and the WBS Risk responses and updating the WBS Implementing risk response and Monitoring risks and the WBS WBS & Estimating Use of WBS in the estimating process Components and work packages Sizing and algorithmic estimates WBS & Scheduling Component Scheduling - High-Level Milestones WBS activity decomposition WBS elements dependencies Work Package Level Schedules Responsibility assignment matrix WBS & Execution and Control Earned Value Management and tracking of work performance Progress reports, forecasts, and corrective and preventive actions used to manage work performance Necessary information to close out a project