IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death⦠keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.
Ensuring that you provide the level of service that your customers want to be delivered through your people. This programme develops the skills and behaviours that enhance the experience that your customers receive.
This half day course looks at practical methods of saving time and prioritising work so that participants are more productive. It considers a wide range of strategies to overcome some of the physical and mental barriers for those working in an office or home environment.
A half day course for those who find themselves taking and presenting minutes for different kinds of meetings. The session will provide practical tips on how to write minutes that are clear and more concise and how to save time during the minute-taking process. It will be a useful session for both novice and experienced minute takers.
There are multiple steps and proven strategies that will help you write your Business Administration thesis impressively.
Develop a deep understanding of electricity pricing and marginal cost analysis with EnergyEdge's virtual instructor-led training course. Enroll now for a rewarding learning journey!
This course is for anyone wishing to understand their strengths and development areas and those who are seeking assistance to progress their careers and convey their abilities confidently.
This half day or whole day course is designed to support both novice and experienced trustees in providing effective governance within their organisations. It considers their roles and responsibilities in general before looking at particular areas in more detail. The half day course covers all the essential information; the whole day session includes specific exercises and case studies to develop the participants’ problem-solving skills.
This half day course is designed to help managers and supervisors to develop or hone their interviewing skills and ensure that your organisation’s recruitment processes are rigorous but fair. It will cover how to develop an efficient recruitment process, how to read a CV or application form to ensure that you choose the right candidates for interview, how to organise and conduct the interview process and the follow-up procedures. It can be adapted to cover the needs of organisations, statutory agencies or small businesses. Although scheduled as a half day course, it can be extended to cover a whole day to include some role play interviews.
DevOps demystified training course description This course is an introduction to DevOps. The course emphasizes communication, collaboration , integration, and automation to improve the workflow between developers and IT operations professionals. Improved workflows lead to more opportunities to design software and services in a more agile fashion. This course is a basis for discovering the most important DevOps concepts and to understand the principles and methods behind this. The course will leave you with the inspiration to be the advocate of change. What will you learn Explain DevOps principles. Describe the relationship between Agile , Lean and IT Service Management ( ITSM). Describe methods for automation and technology factors. Describe considerations when changing. Describe challenges, risks and critical success factors. DevOps demystifieds training course details Who will benefit: Non-technical staff involved with DevOps. Prerequisites: None. Duration 1 day DevOps demystified training course contents Why DevOps? From a business perspective From an IT perspective Stereotypes of Dev and Ops: perception and reality What is DevOps? Introduction DevOps Goals DevOps Added value of DevOps Proven Results DevOps for businesses DevOps principles (The Three Ways) DevOps and other frameworks DevOps and Agile DevOps and Lean DevOps and IT Service Management DevOps culture Characteristics of a DevOps culture Organizational Considerations DevOps DevOps stakeholders DevOps roles DevOps teams DevOps organizational structures DevOps methods Continuous Integration Continuous delivery Continuous deployment Value stream mapping Kanban Theory of Constraints Improvement Kata Deming's quality circle ITSM processes DevOps and Automation Methods for DevOps automation Longevity and tools categories DevOps applications Transitioning to a DevOps culture Implementation Challenges, risks and critical success factors Measuring DevOps successes