Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone who is new to software development and wants, or needs, to gain an understanding of the fundamentals of coding and basics of C++ and object-oriented programming concepts. This course is for Non-Developers, or anyone who wants to have a basic understanding of and learn how to code C++ applications and syntax Overview Companies are constantly challenged to keep their applications, development projects, products, services (and programmers!) up to speed with the latest industry tools, skills, technologies and practices to stay ahead in the ever-shifting markets that make up today's fiercely competitive business landscape. The need for application, web and mobile developers and coders is seemingly endless as technologies regularly change and grow to meet the modern needs of demanding industries and clients. C++ and Programming Basics for Non-Programmers is a five-day, basic-level training course geared for IT candidates who have little or no prior experience in computer programming. Throughout this gentle introduction to programming and C++, students will learn to create applications and libraries using C++ using best practices and sound OO development techniques for writing object-oriented programs in C++. Special emphasis is placed on object-oriented concepts and best practices throughout the training. Fundamentals of the Program Development Cycle Computer Architecture The Notion of Algorithms Source Code vs. Machine Code Compile-Time vs. Run-Time Software Program Architecture Standalone Client/Server Distributed Web-Enabled IDE (Interactive Development Environment) Concepts Looping Constructs Counter-Controlled Repetition Sentinel-Controlled Repetition Nested Control Constructs break and continue Statements Structured Programming Best Practices Writing Methods (Functions) Static vs. Dynamic Allocation Declaring Methods Declaring Methods with Multiple Parameters Method-Call Stack Scope of Declarations Argument Promotion and Casting Designing Methods for Reusability Method Overloading Arrays Purpose of Arrays Declaring and Instantiating Arrays Passing Arrays to Methods Multidimensional Arrays Variable-Length Argument Lists Using Command-Line Arguments Using Environment Variables Deeper Into Classes and Objects Controlling Access to Class Members Referencing the Current Object Using this Overloading Constructors Default and No-Argument Constructors Composition of Classes Garbage Collection and Destructors The finalize Method Static Class Members Defining Classes Using Inheritance Application Development Fundamentals Structure of a C++ Program Memory Concepts Fundamental Data Type Declarations Fundamental I/O Concepts Fundamental Operators Arithmetic Operators Logical Operators Precedence and Associativity Building and Deploying a C++ Program Superclasses and Subclasses Advantages of Using Inheritance protected Class Members Constructors in Subclasses Increasing Convenience by Using Polymorphism Purpose of Polymorphic Behavior The Concept of a Signature Abstract Classes and Methods final Methods and Classes Purpose of Interfaces Using and Creating Interfaces Common Interfaces of the C++ API Files and Streams Concept of a Stream Class File Sequential Access Object Serialization to/from Sequential Access Files Fundamental Searching and Sorting Introduction to Searching Algorithms Linear Search Binary Search Introduction to Sorting Algorithms Selection Sort Insertion Sort Merge Sort Fundamental Data Structures Dynamic Memory Allocation Linked Lists Stacks Queues Trees Exception Handling Types of Exceptions Exception Handling Overview Introduction to Classes and Objects Classes, Objects and Methods Object Instances Declaring and Instantiating a C++ Object Declaring Methods set and get Methods Initiating Objects with Constructors Primitive Types vs. Reference Types Flow Control Conditional Constructs Exception Class Hierarchy Extending Exception Classes When to Throw or Assert Exceptions Formatted Output printf Syntax Conversion Characters Specifying Field Width and Precision Using Flags to Alter Appearance Printing Literals and Escape Sequences Formatting Output with Class Formatter Strings, Characters and Regular Expressions Fundamentals of Characters and Strings String Class String Operations StringBuilder Class Character Class StringTokenizer Class Regular Expressions Regular Expression Syntax Pattern Class Matcher Class Fundamental GUI Programming Concepts Overview of Swing Components Displaying Text and Graphics in a Window Event Handling with Nested Classes GUI Event Types and Listener Interfaces Mouse Event Handling Layout Managers Additional course details: Nexus Humans C Plus Plus and Programming Basics for Non-Programmers (TTCP2000) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C Plus Plus and Programming Basics for Non-Programmers (TTCP2000) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone who is new to software development and wants, or needs, to gain an understanding of programming fundamentals and object-oriented programming concepts. They will typically be high school students, post-secondary school students, or career changers, with no prior programming experience. They might want to gain an understanding of the core programming fundamentals before moving on to more advanced courses such as Programming in C#. Overview Explain core programming fundamentals such as computer storage and processing. Explain computer number systems such as binary. Create and use variables and constants in programs. Explain how to create and use functions in a program. Create and use decisions structures in a computer program. Create and use repetition (loops) in a computer program. Explain pseudocode and its role in programming. Explain the basic computer data structures such as arrays, lists, stacks, and queues. Implement object-oriented programming concepts. Create and use classes in a computer program. Implement encapsulation, inheritance, and polymorphism. Describe the base class library (BCL) in the .NET Framework. Explain the application security concepts. Implement simple I/O in a computer program. Identify application errors and explain how to debug an application and handle errors. Identify the performance considerations for applications. In this 5-day course, students will learn the basics of computer programming through the use of Microsoft Visual Studio 2022 and the Visual C# and Visual Basic programming languages. The course assumes no prior programming experience and introduces the concepts needed to progress to the intermediate courses on programming, Programming in C#. The focus will be on core programming concepts such as computer storage, data types, decision structures, and repetition by using loops. The course also covers an introduction to object-oriented programming covering classes, encapsulation, inheritance, and polymorphism. Coverage is also included around exception handling, application security, performance, and memory management. 1 - Introduction to Core Programming Concepts Computer Data Storage and Processing Application Types Application Lifecycle Code Compilation 2 - Core Programming Language Concepts Syntax Data Types Variables and Constants 3 - Program Flow Introduction to Structured Programming Concepts Introduction to Branching Using Functions Using Decision Structures Introducing Repetition 4 - Algorithms and Data Structures Understand How to Write Pseudocode Algorithm Examples Introduction to Data Structures 5 - Error Handling and Debugging Introduction to Program Errors Introduction to Structured Error Handling Introduction to Debugging 6 - Introduction to Object-Oriented Programming Introduction to Complex Structures Introduction to Structs Introduction to Classes Introducing Encapsulation 7 - More Object-Oriented Programming Introduction to Inheritance Introduction to Polymorphism Introduction to .NET and the Base Class Library 8 - Introduction to Application Security Authentication and Authorization Code Permissions on Computers Introducing Code Signing 9 - Core I/O Programming Using Console I/O Using File I/O 10 - Application Performance and Memory Management Value Types vs Reference Types Converting Types The Garbage Collector Additional course details: Nexus Humans 55337 Introduction to Programming training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55337 Introduction to Programming course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. Course Outline Information Security Threats and Vulnerabilities Information Security Attacks Network Security Fundamentals Identification, Authentication, and Authorization Network Security Controls: Administrative Controls Network Security Controls: Physical Controls Network Security Controls: Technical Controls Network Security Assessment Techniques and Tools Application Security Virtualization and Cloud Computing Wireless Network Security Mobile Device Security Internet of Things (IoT) and Operational Technology (OT) Security Cryptography Data Security Network Troubleshooting Network Traffic Monitoring Network Log Monitoring and Analysis Incident Response Computer Forensics Business Continuity and Disaster Recovery Risk Management
Learn how to administer vaccines or injections ... Nationally Recognised Qualification Includes IM, ID and Sub-Cut Injection methods OCN Accredited - Level 4 (Foundation Degree - FDSc) Covers all steps to safely perform a vaccination Use same techniques and skills for aesthetic therapies Includes B12, Vitamin C and other treatments Essential qualification for all injections Basic understanding of English language required OPEN TO ALL APPLICANTS
Java training course description A comprehensive introduction of the Java language and environment. It is important to note that the course will assume that the delegates are already familiar with the C language as this enables more advanced features of the Java language to be covered in the course. The course will also give an overview of areas related to programming in Java. What will you learn Describe the Java architecture. Write Java applets and applications. Debug Java programs. Examine existing code and determine its function. Use multimedia extensions, the awt, multithreading, exceptions within Java Java training course details Who will benefit: Those wishing to program in Java. Prerequisites: Complete C programming Duration 5 days Java training course contents Review of UNIX fundamentals What is Java? What Java is, history of Java, reasons for success. The Java Virtual Machine, Bytecodes, getting up and running with Java, Java resources. Simple Java applications. C features in Java Java data structures, Java flow control, differences from C, arrays, strings and packages. OO features in Java Java classes and objects, inheritance, overloading, packages. Differences from C++. Java applets Applications vs. applets, HTML, the applet tag, applet methods, life cycle, testing and debugging. Multimedia applets Images, sounds, fonts, colours and animation. Java products The JDK in detail, other development environments. Javabeans and JDBC overviews. Abstract Window Toolkit JFC and Swing versus AWT. Event handling (JDK 1.1), GUIs, panels, buttons, lists, scrollbars, text areas, frames⦠Exception handling and multithreading Handling exceptions. Starting, pausing, stopping threads, producers, consumers, monitoring. More standard classes Java file I/O, Streams, The system class. The networking model, java.net classes. Security and Java Types of attack, the security manager, craplets, securing the network. Integrating legacy code with Java
Delegates with existing Agile project delivery experience can choose to take the Certification Assessment without enrolling on the course. Get your Continuing Professional Development recognised with a UK CPD Certification Service accredited C-ASDM certificate. Frequently Asked Questions I will receive my certificate as soon as I have completed the course You will initially receive an Assessment Completion report after completing the assessment. The report details the certification status: 'Pass' or 'Fail', and also includes information on which questions were answered incorrectly. The certificate is issued by the CPD Certification Service approximately four to six weeks after completing the certification assessment. A CPD certification is recognised by employers Yes! CPD certification is recognised by private and public sector employers, and in central government departments as a valuable way to evaluate the skills of an individual. Listing your CPD certification as well as the number of CPD Points you have achieved on your CV is essentially showcasing your achievements in continuing your professional development. One CPD Point is equivalent to an hour of training CPD points are units that quantify time, and the quality of learning and development activities. Delegates will earn 3 CPD Points upon successful completion of the CPD-ASE Certification Assessment, but will 13 CPD Points after completing the two-day course. My CPD certificate will expire after three years Your certificate will not expire however, best practice suggests a renewal after three years. You can do this by enroling in the C-ASDM course to ensure your knowledge of Agile as a Delivery Method is up to date. I will receive my certificate as soon as I have completed the course You will initially receive an Assessment Completion report after completing the assessment. The report details the certification status: 'Pass' or 'Fail', and also includes information on which questions were answered incorrectly. Your certificate is issued by the CPD Certification Service approximately four to six weeks after successfully completing and passing the C-ASDM Certification Assessment. A CPD certification is recognised by employers Yes! CPD certification is recognised by private and public sector employers, and in central government departments as a valuable way to evaluate the skills of an individual, and the quality of the learning activities. Listing your CPD certification as well as the number of CPD Points you have achieved on your CV is essentially showcasing your achievements in continuing your professional development. One CPD Point is equivalent to an hour of training CPD points are units that quantify time, and the quality of learning and development activities. Delegates will earn 3 CPD Points upon successful completion of the C-ASDM Certification Assessment, but will 13 CPD Points after completing the two-day course. My CPD certificate will expire after three years Your certificate will not expire however, best practice suggests a renewal after three years. You can do this by enrolling on the C-ASDM course to ensure your knowledge as Agile as a Delivery Method is up to date. Service Features Certification Agile Scrum as a Delivery Method - Essentials (C-ASDM) On-going support Email support No Telephone support No Webchat support No Online support No Community Support Delegates who achieve the pass mark for CPD certification are additionally offered access to our private 'Certified Scrum Practitioners’ Guild', a private Slack community of like-minded Agile professionals.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for entry-level computer support professionals with a basic knowledge of computer hardware, software, and operating systems who wish to increase their knowledge and understanding of networking concepts and acquire the required skills to prepare for a career in network support or administration, or who wish to prepare for the CompTIA Network+ certification. CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT professionals with job roles such as network administrator, network technician, network installer, help desk technician, and IT cable installer. This course is also designed for students who are seeking the CompTIA Network+ certification and who want to prepare for the CompTIA Network+ N10-008 Certification Exam. Overview In this course, you will describe the major networking technologies and systems of modern networks and configure, manage, and troubleshoot modern networks. Explain the OSI and TCP/IP Models. Explain properties of network traffic. Install and configure switched networks. Configure IP networks. Install and configure routed networks. Configure and monitor ports and protocols. Explain network application and storage issues. Monitor and troubleshoot networks. Explain network attacks and mitigations. Install and configure security devices. Explain authentication and access controls. Deploy and troubleshoot cabling solutions. Implement and troubleshoot wireless technologies. Compare and contrast WAN technologies. Use remote access methods. Identify site policies and best practices. CompTIA's Network+ certification is a foundation-level certification designed for IT professionals with around one year of experience, whose job role is focused on network administration. The CompTIA Network+ exam will certify the successful candidate has the knowledge and skills required to troubleshoot, configure, and manage common network devices; establish basic network connectivity; understand and maintain network documentation; identify network limitations and weaknesses; and implement network security, standards, and protocols. The candidate will have a basic understanding of enterprise technologies, including cloud and virtualization technologies. The Official CompTIA© Network+© (Exam N10-008): will teach you the fundamental principles of installing, configuring, and troubleshooting network technologies and help you to progress a career in network administration. In this course, you will build on your existing user-level knowledge and experience with personal computer operating systems and networks to master the fundamental skills and concepts that you will need to use on the job in any type of networking career. Prerequisites CompTIA A+ Certification (Exams 220-1001 and 220-1002) 1 - Explaining the OSI and TCP/IP Models Topic A: Explain OSI Model Layers Topic B: Explain the TCP/IP Suite 2 - Explaining Properties of Network Traffic Topic A: Explain Media Types and Access Methods Topic B: Deploy Ethernet Standards Topic C: Configure and Monitor Network Interfaces 3 - Installing and Configuring Switched Networks Topic A: Install and Configure Hubs and Bridges Topic B: Install and Configure Switches Topic C: Compare and Contrast Network Topologies Topic D: Compare and Contrast Network Types 4 - Configuring IP Networks Topic A: Configure IPv4 Addressing Components Topic B: Test IP Interfaces with Command Line Tools Topic C: Configure IPv4 Subnets Topic D: Configure Private and Public IPv4 Addressing Schemes Topic E: Configure IPv6 Addressing Components Topic F: Configure DHCP Services 5 - Installing and Configuring Routed Networks Topic A: Explain Characteristics of Routing Topic B: Install and Configure Routers 6 - Configuring and Monitoring Ports and Protocols Topic A: Explain the Uses of Ports and Protocols Topic B: Use Port Scanners and Protocol Analyzers Topic C: Explain the Use of Name Resolution Services Topic D: Configure DNS and IPAM Services 7 - Explaining Network Application and Storage Services Topic A: Explain the Uses of Network Applications Topic B: Explain the Uses of Voice Services and Advanced Networking Devices Topic C: Explain the Uses of Virtualization and Network Storage Services Topic D: Summarize the Concepts of Cloud Services 8 - Monitoring and Troubleshooting Networks Topic A: Monitor Network Interfaces and Logs Topic B: Explain Network Troubleshooting Methodology Topic C: Troubleshoot Common Network Services Issues 9 - Explaining Networking Attacks and Mitigations Topic A: Summarize Common Networking Attacks Topic B: Explain the Characteristics of VLANs Topic C: Explain the Characteristics of NAT and Port Forwarding 10 - Installing and Configuring Security Devices Topic A: Install and Configure Firewalls and Proxies Topic B: Explain the Uses of IDS/IPS and UTM 11 - Explaining Authentication and Access Controls Topic A: Explain Authentication Controls and Attacks Topic B: Explain the Uses of Authentication Protocols and Directory Services Topic C: Explain the Uses of Port Security and NAC Topic D: Implement Network Device Hardening Topic E: Explain Patch Management and Vulnerability Scanning Processes 12 - Deploying and Troubleshooting Cabling Solutions Topic A: Deploy Structured Cabling Systems Topic B: Deploy Twisted Pair Cabling Solutions Topic C: Test and Troubleshoot Twisted Pair Cabling Solutions Topic D: Deploy Fiber Optic Cabling Solutions 13 - Implementing and Troubleshooting Wireless Technologies Topic A: Install and Configure Wireless Technologies Topic B: Troubleshoot Wireless Performance Issues Topic C: Secure and Troubleshoot Wireless Connectivity 14 - Comparing and Contrasting WAN Technologies Topic A: Compare and Contrast WAN Core Service Types Topic B: Compare and Contrast WAN Subscriber Service Types Topic C: Compare and Contrast WAN Framing Service Types Topic D: Compae and Contrast Wireless and IoT WAN Technologies 15 - Using Remote Access Methods Topic A: Use Remote Access VPNs Topic B: Use Remote Access Management Methods 16 - Identifying Site Policies and Best Practices Topic A: Manage Networks with Documentation and Diagrams Topic B: Summarize the Purposes of Physical Security Devices Topic C: Compare and Contrast Business Continuity and Disaster Recovery Concepts Topic D: Identify Policies and Best Practices
Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) Lesson 1: Assessing Cybersecurity Risk Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management Lesson 2: Analyzing the Threat Landscape Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering Lesson 4: Analyzing Attacks on Computing and Network Environments Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques Lesson 6: Assessing the Organization's Security Posture Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing Lesson 7: Collecting Cybersecurity Intelligence Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources Lesson 8: Analyzing Log Data Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis Lesson 9: Performing Active Asset and Network Analysis Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise Lesson 10: Responding to Cybersecurity Incidents Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation Lesson 11: Investigating Cybersecurity Incidents Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation Additional course details: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is designed for people who need output from a database. In some cases, database programs have limited reporting tools, or tools that are not accessible. Learners may or may not have programming or SQL experience. Overview In this course, you will connect to a database to extract data and present it as a report. You will: Identify the elements of the Crystal Reports interface. Create and modify a basic report. Use formulas to calculate and filter data. Build a parameterized report. Group report data. Enhance a report. Create a report using data from an Excel workbook. Distribute data. In this course, students will create a basic report by connecting to a database and modifying the report's presentation. 1 - EXPLORING THE CRYSTAL REPORTS INTERFACE Topic A: Explore Crystal Reports Topic B: Use Crystal Reports Help Topic C: Customize Report Settings 2 - WORKING WITH REPORTS Topic A: Create a Report Topic B: Modify a Report Topic C: Display Specific Report Data Topic D: Work with Report Sections 3 - USING FORMULAS IN REPORTS Topic A: Create a Formula Topic B: Edit a Formula Topic C: Filter Data by Using a Formula Topic D: Work with Advanced Formulas and Functions Topic E: Handle Null Values 4 - BUILDING PARAMETERIZED REPORTS Topic A: Create a Parameter Field Topic B: Use a Range Parameter in a Report Topic C: Create a Prompt 5 - GROUPING REPORT DATA Topic A: Group Report Data Topic B: Modify a Group Report Topic C: Group by Using Parameters Topic D: Create a Parameterized Top N Report 6 - ENHANCING A REPORT Topic A: Format a Report Topic B: Insert Objects in a Report Topic C: Suppress Report Sections Topic D: Use Report Templates 7 - CREATING A REPORT FROM EXCEL DATA Topic A: Create a Report Based on Excel Data Topic B: Modify a Report Generated from Excel Data Topic C: Update Data in a Report Based on Excel Data 8 - DISTRIBUTING DATA Topic A: Export Data Topic B: Create Mailing Labels 9 - APPENDIX Appendix A: Setting Up and Configuring Data Sources Appendix B: Using Report Processing Techniques Appendix C: Using Functions in Formulas