• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

114 Basic Security Training (BST) courses in Cardiff delivered Online

WM153 IBM MQ V9 System Administration (using Windows for labs)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is designed for technical professionals who require the skills to administer IBM© MQ queue managers on distributed operating systems, in the Cloud, or on the IBM© MQ Appliance. Overview After completing this course, you should be able to:Describe the IBM© MQ deployment optionsPlan for the implementation of IBM© MQ on-premises or in the CloudUse IBM© MQ commands and the IBM© MQ Explorer to create and manage queue managers, queues, and channelsUse the IBM© MQ sample programs and utilities to test the IBM© MQ networkEnable a queue manager to exchange messages with another queue managerConfigure client connections to a queue managerUse a trigger message and a trigger monitor to start an application to process messagesImplement basic queue manager restart and recovery proceduresUse IBM© MQ troubleshooting tools to identify the cause of a problem in the IBM© MQ networkPlan for and implement basic IBM© MQ security featuresUse accounting and statistics messages to monitor the activities of an IBM© MQ systemDefine and administer a simple queue manager cluster This course provides technical professionals with the skills that are needed to administer IBM© MQ queue managers on distributed operating systems and in the Cloud. In addition to the instructor-led lectures, you participate in hands-on lab exercises that are designed to reinforce lecture content. The lab exercises use IBM© MQ V9.0, giving you practical experience with tasks such as handling queue recovery, implementing security, and problem determination. Note: This course does not cover any of the features of MQ for z/OS or MQ for IBM© i. Course introductionIBM© MQ reviewIBM© MQ installation and deployment optionsCreating a queue manager and queuesExercise: Using commands to create a queue manager and queuesIntroduction to IBM© MQ ExplorerExercise: Using IBM© MQ Explorer to create queue managers and queuesTesting the IBM© MQ implementationExercise: Using IBM© MQ sample programs to test the configurationImplementing distributed queuingExercise: Connecting queue managersIBM© MQ clientsExercise: Connecting an IBM© MQ clientImplementing trigger messages and monitorsExercise: Implementing a trigger monitorDiagnosing problemsExercise: Running an IBM© MQ traceImplementing basic security in IBM© MQExercise: Controlling access to IBM© MQBacking up and restoring IBM© MQ messages and object definitionsExercise: Using a media image to restore a queueExercise: Backing up and restoring IBM© MQ object definitionsIntroduction to queue manager clustersExercise: Implementing a basic clusterMonitoring and configuring IBM© MQ for performanceExercise: Monitoring IBM© MQ for performanceCourse summary

WM153 IBM MQ V9 System Administration (using Windows for labs)
Delivered OnlineFlexible Dates
Price on Enquiry

OE98 Introduction to IBM i for New Users

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for new users employed in a data processing environment who are new to Power Systems with IBM i. Overview After completing this course, you should be able to:Explain the functions supported by IBM i operating systemsExplain Power System with IBM i models and generationsExplain which applications are supportedSign on / off the systemUse the display station keyboardUse the online help that is availableUse the different interfaces available for IBM iUnderstand how objects are managedEnter control language (CL) commandsSend and receive messages and work with message queuesManage work and outputExplain basic security concepts on IBM i In this classroom course, you will learn basic concepts and skills you need to be productive users on Power Systems with IBM i. With plenty of hands-on lab exercises, we show everything from signing onto the available user interfaces; green screen environment and IBM Navigator for i.You will learn how objects are managed on the system and how you display these objects. You will learn to use control language (CL) commands (fast path) and how to work with and manage messages on the system. Students will also learn how to the system manages work and how you manage your printouts. Lastly, students will also get a basic overview of security. Introduction and overview to IBM iUsing the 5250 emulation interfaceOverview of IBM I Access Client SolutionsUsing IBM Navigator for iUsing the messages function on IBM iUsing CL commands on IBM iManaging objects on IBM iManaging your work on IBM iIBM i security overviewAdditional education Additional course details: Nexus Humans OE98 Introduction to IBM i for New Users training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the OE98 Introduction to IBM i for New Users course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

OE98 Introduction to IBM i for New Users
Delivered OnlineFlexible Dates
Price on Enquiry

Aviation Safety and Security Training

By Compete High

Aviation Safety and Security Training   In an ever-evolving aviation landscape, ensuring the safety and security of passengers, crew, and assets is paramount. Introducing our comprehensive 'Aviation Safety and Security Training' program, meticulously designed to equip aviation professionals with the knowledge and skills necessary to navigate the complexities of the industry confidently.   Module 1: Introduction to Aviation Safety and Security Dive into the fundamentals that underpin aviation safety and security. This module provides a broad overview of the historical context, key concepts, and the critical role played by individuals in maintaining a robust safety and security environment.   Module 2: Aircraft Safety Unravel the intricacies of aircraft safety protocols and procedures. From pre-flight checks to emergency response strategies, this module ensures that participants are well-versed in the latest advancements and best practices, fostering a culture of safety from the ground up.   Module 3: Air Traffic Control Explore the critical link between ground control and airborne safety. This module delves into the world of air traffic control, emphasizing coordination, communication, and decision-making to guarantee seamless operations and avoid potential hazards in congested airspace.   Module 4: Aviation Regulations and Standards Navigate the complex web of international and local regulations governing aviation. Stay abreast of the latest changes, understand compliance requirements, and ensure that your operations align with the highest safety standards set by regulatory bodies.   Module 5: Safety Management Systems Equip yourself with the tools to implement and manage a robust Safety Management System (SMS). Learn how to identify, assess, and mitigate risks, fostering a proactive approach to safety that goes beyond compliance, creating a culture of continuous improvement.   Module 6: Human Factors in Aviation Safety Recognize the impact of human factors on aviation safety. Explore psychological, social, and organizational elements influencing decision-making and performance. Armed with this knowledge, participants will be better equipped to identify and address human-related challenges, minimizing the potential for errors.   Why Choose Our Aviation Safety and Security Training? Comprehensive Curriculum: Covering a broad spectrum of topics, our program ensures a holistic understanding of aviation safety and security. Industry Experts: Delivered by seasoned professionals with extensive experience in aviation safety, our training guarantees practical insights and real-world applications. Interactive Learning: Engage in hands-on exercises, case studies, and simulations, fostering active participation and knowledge retention. Customizable Solutions: Tailored to meet the unique needs of your organization, ensuring relevance and applicability. Stay Ahead of the Curve: Our training program is regularly updated to align with the latest industry developments, regulations, and technological advancements.   Elevate your team's capabilities, instill a safety-first culture, and ensure that your organization remains at the forefront of aviation safety and security. Enroll in our 'Aviation Safety and Security Training' today to chart a course for safer skies tomorrow. Course Curriculum Module 1_ Introduction to Aviation Safety and Security Introduction to Aviation Safety and Security 00:00 Module 2_ Aircraft Safety. Aircraft Safety. 00:00 Module 3_ Air Traffic Control Air Traffic Control.docx 00:00 Module 4_ Aviation Regulations and Standards Aviation Regulations and Standards 00:00 Module 5_ Safety Management Systems Safety Management Systems 00:00 Module 6_ Human Factors in Aviation Safety Human Factors in Aviation Safety 00:00

Aviation Safety and Security Training
Delivered Online On Demand6 hours
£4.99

Cybersecurity Essentials

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Cybersecurity Essentials provides foundational knowledge in cybersecurity and is recommended for all non-technical professionals who wish to develop an understanding of cyber safety. Overview After completing this course, students will be able to: Identify and reduce human errors that put organizations at risk for a cyber-attacks. Define Ransomware, Phishing, and Data Breaches to understand the differences. Identify the motives of hackers. Assess how data breaches occur. Develop a plan on how to protect accounts and privacy. Create a strong and secure password. Work in a secure manner while using remote Wi-Fi access. Safely use Virtual Private Networks (VPN). Identify vulnerabilities in home networks to keep them secure. Identity different social engineering techniques e.g. phishing, vishing. Detect social engineering attempts and prevent potential breaches. Prevent hackers from accessing a Mobile phone. Cybersecurity Essentials was developed using unparalleled learning methodology that prepares cadets for the Israeli Cyber and Intelligence Unit. It is designed to tackle human error by helping develop an advanced understanding and skills to protect individuals and organizations against the most common cyber threats. INTRODUCTION TO CYBERSECURITY Introduction to the world of cybersecurity; basic terminology, and why cybersecurity is so important. Review of famous cyber-attacks. ACCOUNTS & CREDENTIALS SECURITY One of the most common elements linking cyber-attacks is compromised or weak credentials. Learn different ways hackers can acquire passwords, and what to do when accounts have been compromised. How to prevent such attacks including best protection methods and password management and introduction to tools for testing and creating strong passwords. REMOTE SECURITY: WI-FI & VPN Evaluate main risks that arise when using public and non-protected Wi-Fi networks. Differentiate between private and public Wi-Fi networks, define what a VPN is and how to use it, and how to browse safely in remote environments. SOCIAL ENGINEERING How hackers take advantage of ?human-based vulnerabilities?. Define social engineering and the different types of attacks that can leverage social engineering, such as phishing or vishing. Learn how to detect social engineering attempts and prevent future breaches. MOBILE SECURITY Minimize the risk of an attack on mobile device and understand basic security principles for mobile applications. Learn how to protect photos, browsing history, text messages, and confidential business information such as emails, documents, access permission and more. Additional course details: Nexus Humans Cybersecurity Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cybersecurity Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cybersecurity Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

WM156G IBM MQ V9.1 System Administration (using Windows for labs)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for technical professionals who require the skills to administer IBM MQ. Overview After completing this course, you should be able to: Describe the IBM MQ deployment options Create and manage queue managers, queues, and channels Use the IBM MQ sample programs and utilities to test the IBM MQ network Configure distributed queuing Configure MQ client connections to a queue manager Define and administer a queue manager cluster Administer Java Message Service (JMS) in MQ Implement basic queue manager restart and recovery procedures Use IBM MQ troubleshooting tools to identify the cause of a problem in the IBM MQ network Manage IBM MQ security Monitor the activities and performance of an IBM MQ system This course is also available as self-paced virtual (e-learning) course IBM MQ V9.1 System Administration (ZM156G). This option does not require any travel.This course teaches you how to customize, operate, administer, and monitor IBM MQ on-premises on distributed operating systems. The course covers configuration, day-to-day administration, problem recovery, security management, and performance monitoring. In addition to the instructor-led lectures, the hands-on exercises provide practical experience with distributed queuing, working with MQ clients, and implementing clusters, publish/subscribe messaging. You also learn how to implement authorization, authentication, and encryption, and you learn how to monitor performance. Introducing IBM MQ Exercise Getting started with IBM MQ Working with IBM MQ administration tools Exercise Working with IBM MQ administration tools Configuring distributed queuing Exercise Implementing distributed queuing Managing clients and client connections Exercise Connecting an IBM MQ client Advanced IBM MQ client features Working with queue manager clusters Exercise Implementing a basic cluster Publish/subscribe messaging Exercise Configuring publish/subscribe message queuing Implementing basic security in IBM MQ Exercise Controlling access to IBM MQ Securing IBM MQ channels with TLS Exercise Securing channels with TLS Authenticating channels and connections Exercise Implementing connection authentication Supporting JMS with IBM MQ Diagnosing problems Running an IBM MQ trace Backing up and restoring IBM MQ messages and object definitions Using a media image to restore a queue Backing up and restoring IBM MQ object definitions High availability Monitoring and configuring IBM MQ for performance Monitoring IBM MQ for performance Monitoring resources with the IBM MQ Console Additional course details: Nexus Humans WM156G IBM MQ V9.1 System Administration (using Windows for labs) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WM156G IBM MQ V9.1 System Administration (using Windows for labs) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

WM156G IBM MQ V9.1 System Administration (using Windows for labs)
Delivered OnlineFlexible Dates
Price on Enquiry

Security Officer Training Course

4.7(160)

By Janets

Learn how to establish and enforce security policies and procedures in the workplace with the Security Officer Training Course. This security risk management program is ideal for beginners who are new to this field. You will get a complete overview of the role and responsibilities of a security officer, and on completion, will be equipped with the skills and knowledge to kick-start your career. Throughout this security management course, you will explore the basic principles of security and the fundamental principles of security governance. You will also develop your understanding of the different types of crimes, prevention strategies and organisation security models. Learning Outcomes of The Security Officer Training Course:  Understand the basics of security management, planning and implementing Explore the fundamental principles of security governance and the accountability framework Expand your knowledge of the different types of crimes and crime prevention tactics Familiarise with the role and responsibilities of a security office Learn about the different types of organisational security models Get a detailed overview of security risk management and how to conduct a risk assessment Understand how to effectively manage and report cases of domestic and sexual violence in the workplace Explore prevention strategies for domestic and violent abuse Why choose this course Earn an e-certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Benefit from instant feedback through mock exams and multiple-choice assessments Get 24/7 help or advice from our email and live chat teams Full Tutor Support on Weekdays Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Mock exams Multiple-choice assessment Certification After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for £9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for £15.99, which will reach your doorsteps by post.

Security Officer Training Course
Delivered Online On Demand4 hours 45 minutes
£5.99

Introduction to Linux Systems Administration (TTLX2220)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This is an introductory-level systems administration course geared for Systems Administrators and users who wish to learn how to how to install, configure and maintain an Enterprise Linux system in a networked environment. Overview This course is about 50% lab to lecture ratio, combining expert instructor-led discussions with practical hands-on skills that emphasize current techniques, best practices and standards. Working in this hands-on lab environment, guided by our expert practitioner, attendees will explore Installing the Linux operating system and configuring peripherals Performing and modifying startup and shutdown processes Configuring and maintaining basic networking services Creating and maintaining system users and groups Understanding and administering file permissions on directories and regular files Planning and creating disk partitions and file systems Performing maintenance on file systems Identifying and managing Linux processes Automating tasks with cron Performing backups and restoration of files Working with system log files Troubleshooting system problems Analyzing and taking measures to increase system performance Configuring file sharing with NFS Configuring Samba for file sharing with the Windows clients Setting up a basic Web server Understanding the components for setting up a LAMP server Implementing basic security measures Linux System Administration is a comprehensive hands-on course that teaches students how to install, configure and maintain an Enterprise Linux system in a networked environment. This lab-intensive class explores core administrative tasks such as: creating and managing users, creating and maintaining file systems, determining and implementing security measures and performing software installation and package management. Linux networking topics include installing and supporting SSH, NFS, Samba and the Apache Web server. Students will explore common security issues, as well as several tools, such as the PAM modules that help secure the operating system and network environment. Upon successful completion of this course, students will be prepared to maintain Linux systems in a networked business environment. Although the course includes installing and configuring a CentOS 7 / RHEL 7 Linux system, much of the course content also applies to Oracle, Ubuntu, Scientific and other current versions of mainstream Linux distributions. Labs include user and group maintenance, system backups and restoration, software management, administration tasks automation, file system creation and maintenance, managing remote access, working with cron, and configuring basic file sharing and Web services, as well as working with system logging utilities such as rsyslog and much more. System Administration Overview UNIX, Linux and Open Source Duties of the System Administrator Superusers and the Root Login Sharing Superuser Privileges with Others (su and sudo Commands) TCP/IP Networking Fundamentals Online Help Installation and Configuration Planning: Hardware and Software Considerations Site Planning Installation Methods and Types Installation Classes Partitions Logical Volume Manager - LVM File System Overview Swap Partition Considerations Other Partition Considerations The Linux Boot Loader: grub Software Package Selection Adding and Configuring Peripherals Printers Graphics Controllers Basic Networking Configuration Booting to Recovery Mode Booting and Shutting Down Linux Boot Sequence The systemd Daemon The systemctl Command Targets vs. Run Levels Modifying a Target Service Unit Scripts Changing System States Booting into Rescue Mode Shutdown Commands Managing Software and Devices Identifying Software Packages Using rpm to Manage Software Using yum to Manage Software Installing and Removing Software Identifying Devices Displaying Device and System Information (PCI, USB) Plug and Play Devices Device Configuration Tools Managing Users and Groups Setting Policies User File Management The /etc/passwd file The /etc/shadow file The /etc/group file The /etc/gshadow file Adding Users Modifying User Accounts Deleting User Accounts Working with Groups Setting User Environments Login Configuration Files The Linux File System Filesystem Types Conventional Directory Structure Mounting a File System The /etc/fstab File Special Files (Device Files) Inodes Hard File Links Soft File Links Creating New File Systems with mkfs The lost+found Directory Repairing File Systems with fsck The Journaling Attribute File and Disk Management Tools Linux File Security File Permissions Directory Permissions Octal Representation Changing Permissions Setting Default Permissions Access Control Lists (ACLs) The getfacl and setfacl commands SUID Bit SGID Bit The Sticky Bit Controlling Processes Characteristics of Processes Parent-Child Relationship Examining Running Processes Background Processes Controlling Processes Signaling Processes Killing Processes Automating Processes cron and crontab at and batch System Processes (Daemons) Working with the Linux Kernel Linux Kernel Components Types of Kernels Kernel Configuration Options Recompiling the Kernel Shell Scripting Overview Shell Script Fundamentals Bash Shell Syntax Overview Shell Script Examples System Backups Backup Concepts and Strategies User Backups with the tar Command System Backup Options The xfsdump and xfsrestore Commands Troubleshooting the System Common Problems and Symptoms Troubleshooting Steps Repairing General Boot Problems Repairing the GRUB 2 Boot Loader Hard Drive Problems Restoring Shared Libraries System Logs and rsyslogd Basic Networking Networking Services Overview NetworkManager Introduction Network Configuration Files Locations and Formats Enabling and Restarting Network Services with systemtcl Configuring Basic Networking Manually Configuring Basic Networking with NetworkManager LAMP Server Basics LAMP Overview Configuring the Apache Web Server Common Directives Apache Virtual Hosting Configuring an Open Source Database MySQL MariaDB PHP Basics Perl CGI Scripting Introduction to System Security Security Overview Maintaining System Security Server Access Physical Security Network Security Security Tools Port Probing with nmap Intrusion Detection and Prevention PAM Security Modules Scanning the System Maintaining File Integrity Using Firewalls Introduction to firewalld The Samba File Sharing Facility Configure Samba for Linux to Linux/UNIX File Sharing Configure Samba for Linux to Windows File Sharing Use the smbclient Utility to Transfer Files Mount/Connect Samba Shares to Linux and Windows Clients Networked File Systems (NFS) Using NFS to Access Remote File Systems Configuring the NFS Server Configuring the NFS Client Exporting File Systems from the NFS Server to the NFS Client

Introduction to Linux Systems Administration (TTLX2220)
Delivered OnlineFlexible Dates
Price on Enquiry

Network Security on an Ubuntu Linux Server

By Compete High

🔒 Unlock the Power of Network Security on an Ubuntu Linux Server! 🔒 Are you ready to safeguard your digital fortress? Dive into the world of Network Security with our comprehensive online course tailored specifically for Ubuntu Linux Server users! 🛡️ What You'll Learn:     Master the fundamentals of network security protocols and practices. Implement robust firewall configurations on your Ubuntu Linux Server. Discover advanced encryption techniques to secure your data transmission. Harden your server against cyber threats and unauthorized access. Learn best practices for intrusion detection and prevention. Explore real-world scenarios and case studies for hands-on learning.   👨‍💻 Who Is This Course For? IT professionals seeking to enhance their network security skills. System administrators responsible for securing Ubuntu Linux Servers. Beginners eager to delve into the world of cybersecurity on Linux systems.   🚀 Why Choose Our Course? Expert-led tutorials designed for all skill levels. Practical demonstrations and step-by-step guidance. Access to a supportive online community and forums. Updated content reflecting the latest industry standards. Lifetime access to course materials for continuous learning.   🎓 Take control of your server's security and fortify your knowledge in Ubuntu Linux network security! Enroll now and fortify your digital defenses today! Course Curriculum Module 1- Secure an Ubuntu Linux Server from Hackers Today! Secure an Ubuntu Linux Server from Hackers Today! 00:00 Module 2- Choosing a server host and setup Choosing a server host and setup 00:00 Module 3- Accessing the Ubuntu Linux server with putty Accessing the Ubuntu Linux server with putty 00:00 Module 4- How to download Putty for Windows How to download Putty for Windows 00:00 Module 5- Using a password manager like LastPass Using a password manager like LastPass 00:00 Module 6- Changing the password with passwd Changing the password with passwd 00:00 Module 7- Adding a new user with adduser Adding a new user with adduser 00:00 Module 8- Signing in with the added user Signing in with the added user 00:00 Module 9- Usermod to give the user sudo or root privileges Usermod to give the user sudo or root privileges 00:00 Module 10- Verify sudo access on user Verify sudo access on user 00:00 Module 11- Key basic Linux commands cd pwd and ls Key basic Linux commands cd pwd and ls 00:00 Module 12- Updating with apt-get update Draft Lesson 00:00 Module 13- Installing nano text editor Installing nano text editor 00:00 Module 14- Updating sshd_config with nano to PermitRootLogin no Updating sshd_config with nano to PermitRootLogin no 00:00 Module 15- Changing the SSH port from 22 to another number Changing the SSH port from 22 to another number 00:00 Module 16- Setting up RSA login by generating keys with puttygen Setting up RSA login by generating keys with puttygen 00:00 Module 17- Disabling password logins and ipv6 listening Disabling password logins and ipv6 listening 00:00 Module 18- Locked out of server and have to start over! Locked out of server and have to start over! 00:00 Module 19- Back in with a fresh install! Back in with a fresh install! 00:00 Module 20- Installing fail2ban to block IPs from repeated failed logins Installing fail2ban to block IPs from repeated failed logins 00:00 Module 21- Install UFW or Uniform Fire Wall to block some DDOS attacks and hacking attempts Install UFW or Uniform Fire Wall to block some DDOS attacks and hacking attempts 00:00 Module 22- Install and configure ntp to sync time Install and configure ntp to sync time 00:00 Module 23- Thank you very much for watching this complete Ubuntu Linux server security setup tutorial Thank you very much for watching this complete Ubuntu Linux server security setup tutorial 00:00

Network Security on an Ubuntu Linux Server
Delivered Online On Demand1 hour 20 minutes
£4.99

Security Guard Online Course

By Compete High

🌐 Security Guard Online Course - Empowering Protectors of Safety!   Welcome to the Security Guard Online Course, your gateway to a fulfilling and impactful career in the field of security. Designed to equip you with the essential skills and knowledge needed in today's dynamic security landscape, this comprehensive course covers five crucial modules, ensuring you emerge as a proficient and confident security professional.   📚 Module 1: Introduction to Security Guard Training Embark on your security journey with a solid foundation. Module 1 introduces you to the fundamental principles of security guard training. Gain insights into the role, responsibilities, and ethical considerations of a security guard. Understand the importance of maintaining a professional demeanor and establishing a positive presence.   🎙️ Module 2: Communication Skills for Security Guards Effective communication is the cornerstone of successful security operations. Module 2 hones your verbal and written communication skills, empowering you to interact confidently with both colleagues and the public. Learn to de-escalate situations, gather information efficiently, and document incidents accurately.   🚨 Module 3: Access Control and Patrolling Master the art of access control and patrolling in Module 3. Explore techniques for securing premises, monitoring access points, and conducting thorough patrols. Acquire the skills to detect and respond to potential security threats, ensuring a safe and secure environment for all.   🚑 Module 4: Emergency Response Procedures Preparedness is key in the security field. Module 4 delves into emergency response procedures, equipping you with the knowledge to handle various crises effectively. From medical emergencies to security breaches, learn the protocols to safeguard lives and property with composure and efficiency.   🔒 Module 5: Security Technology Stay ahead of the curve with Module 5, where you'll explore the latest advancements in security technology. From CCTV systems to access control tools, understand how technology enhances security measures. Gain hands-on experience with cutting-edge tools and platforms to elevate your capabilities as a security professional.   🌟 Why Choose Our Course? Flexible Learning: Access modules at your convenience, allowing you to balance your training with other commitments. Expert Instructors: Learn from industry experts with years of practical experience in security operations. Interactive Content: Engaging videos, simulations, and real-world scenarios make learning both enjoyable and effective. Career Advancement: Position yourself for career growth with a recognized certification in security guard training. 🛡️ Enroll Now and Step into a Secure Future! Invest in your future as a guardian of safety. Enroll in the Security Guard Online Course today and embark on a journey towards a rewarding and impactful career. Secure your spot now, and let's build a safer world together! Course Curriculum Module 1_ Introduction to Security Guard Training Introduction to Security Guard Training 00:00 Module 2_ Communication Skills for Security Guards Communication Skills for Security Guards 00:00 Module 3_ Access Control and Patrolling Access Control and Patrolling 00:00 Module 4_ Emergency Response Procedures Emergency Response Procedures 00:00 Module 5_ Security Technology Security Technology 00:00

Security Guard Online Course
Delivered Online On Demand5 hours
£4.99

Security Officer

By Compete High

🔒 Unlock Your Potential with the Security Officer Course! 🔒   Are you ready to step into the world of security with confidence and authority? Look no further than our comprehensive Security Officer Course! 🎓 In today's unpredictable world, the need for vigilant and well-trained security officers has never been greater. Whether you're considering a career change or seeking to enhance your existing skills, this course equips you with the knowledge and expertise needed to succeed in the dynamic field of security. 💼 Why Choose Our Security Officer Course? ✅ Comprehensive Training: Our course covers a wide range of essential topics, from threat assessment and crisis management to security protocols and emergency response strategies. ✅ Expert Instructors: Learn from industry experts with years of experience in security operations, law enforcement, and risk management. Gain insights and practical tips that you won't find in textbooks. ✅ Hands-On Experience: Put your knowledge into action through immersive simulations and practical exercises. Develop the confidence to handle real-world security challenges effectively. ✅ Flexible Learning Options: Whether you prefer to study online at your own pace or participate in interactive classroom sessions, our course offers flexible learning options to suit your schedule and preferences. ✅ Industry Recognition: Our Security Officer Course is recognized and respected by employers across various sectors, giving you a competitive edge in the job market. Who is this for?   👮‍️ Aspiring Security Professionals: If you're passionate about maintaining safety and security in your community, this course provides the perfect foundation for launching your career in security.   👩‍💼 Career Changers: Whether you're transitioning from a different field or seeking new opportunities, our course equips you with the skills and certifications needed to pursue a rewarding career as a security officer.   👨‍👩‍👧‍👦 Community Leaders: Individuals who want to make a positive impact by enhancing security measures within their neighborhoods or organizations will find this course invaluable. Career Path Upon completing our Security Officer Course, you'll be well-prepared to embark on a fulfilling career in security. Here are just a few of the exciting career paths that await you:   🛡️ Security Officer: From corporate offices and retail establishments to educational institutions and government facilities, security officers play a vital role in safeguarding people and property.   🔒 Loss Prevention Specialist: Help businesses minimize losses due to theft, fraud, and other security breaches by implementing effective loss prevention strategies and surveillance techniques.   🚨 Emergency Response Coordinator: Coordinate emergency response efforts and ensure swift and effective action in crisis situations, such as natural disasters, accidents, or security threats.   🕵️ Private Investigator: Conduct investigations, gather evidence, and uncover valuable insights to support legal proceedings or corporate security initiatives. With the demand for skilled security professionals on the rise, there's never been a better time to invest in your future with our Security Officer Course! Don't wait-enroll today and take the first step toward a rewarding career in security. 🌟 Remember, safety and security are not just professions-they're commitments to protecting what matters most. Join us in making a difference and becoming a trusted guardian in your community! 🌐 Course Curriculum Chapter 01 Introduction to Security Management Chapter 01 Introduction to Security Management 00:00 Chapter 02 Security Risk Analysis and Risk Reduction Chapter 02 Security Risk Analysis and Risk Reduction 00:00 Chapter 03 Managing Security Chapter 03 Managing Security 00:00 Chapter 04 Physical Security Management Chapter 04 Physical Security Management 00:00 Chapter 05 Information Security Management Chapter 05 Information Security Management 00:00 Chapter 06 Cybersecurity Chapter 06 Cybersecurity 00:00 Chapter 07 Organisational Security Management Chapter 07 Organisational Security Management 00:00 Chapter 08 Home Security Management Chapter 08 Home Security Management 00:00

Security Officer
Delivered Online On Demand8 hours
£4.99