Duration 3 Days 18 CPD hours This course is intended for Information System Owners Analysts Ethical Hackers ISSOs Cyber Security Managers IT Engineers Overview Upon completion, the Certified Vulnerability Assessor candidate will be able to competently take the exam. This course provides a solid understanding of the tools an IT engineer needs to review an Information System. In this course, you will learn the importance of vulnerability assessments and how they are used to prevent serious cyber break-ins. Lessons include understanding malware and viruses and how they can infiltrate an organization?s network. After you take this course, you will be able to assess a company?s security posture and perform a basic vulnerability test.ÿPlus, you will be able to generate reports to guide new security implementation. Course Outline Why Vulnerability Assessment Vulnerability Types Assessing the Network Assessing Web Servers and Applications Assessing Remote and VPN Services Vulnerability Assessments & Tools of the Trade Output Analysis
Duration 5 Days 30 CPD hours Exploring Oracle Database ArchitectureOracle Database Management ToolsManaging the Database InstanceConfiguring the Oracle Network EnvironmentAdministering User SecurityManaging Database Storage StructuresManaging SpaceManaging Undo DataManaging Data ConcurrencyImplementing Oracle Database AuditingBackup and Recovery: ConceptsBackup and Recovery: ConfigurationPerforming Database BackupsPerforming Database RecoveryMoving DataDatabase MaintenanceManaging PerformanceManaging Performance: SQL TuningUsing Database Resource ManagerUsing Oracle Scheduler to Automate Tasks Additional course details: Nexus Humans Oracle Database 12c - Administration I Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database 12c - Administration I Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for System Administrator Administrator Java EE Developer Web Administrator Technical Consultant Security Administrators Technical Administrator Overview Configure WebLogic features including domain templates, system start up, crash recovery, work managers, multi data sources, security policies, and automatic JTA migration Configure Coherence features Perform a rolling upgrade of WebLogic Server Write and run WLST scripts Deploy shared libraries and applications using deployment plans and versioning Configure SSL for WebLogic Server This Oracle WebLogic Server 12c: Administration II is a continuation of the Oracle WebLogic Server 12c: Administration I course. This Oracle WebLogic Server 12c: Administration II is a continuation of the Oracle WebLogic Server 12c: Administration I course.
Duration 3 Days 18 CPD hours This course is intended for This course is appropriate for anyone needing to interface with an Oracle database or those needing a general understanding of Oracle database functionality. That would include end users, business analysts, application developers and database administrators. Overview Working in a hands-on learning environment led by our expert pracitioner you'll learn how to: Add Data, Retrieve, Sort and Organize a SQL Database Combine Data, Set Operators and Subqueries Manipulate Data and Data Definition Languages in SQL Work with Data Dictionary Views and Create Sequences, Indexes and Views Use Database Objects and Subqueries Perform Data and access control Perform other Advanced Level Database operations. Oracle 19C SQL Programming Fundamentals Is a three-day, hands-on course designed to equip you with the fundamental skills needed to set up, run and manage SQL databases using Oracle Database Technology. You will also be discovering all the tools and concepts required to organize data efficiently. Our engaging instructors and mentors are highly-experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working within in a hands-on learning environment, guided by our expert team, attendees will develop a practical approach to Oracle Database Technology. Throughout the course, you will learn the key elements of a database, and the way Oracle systems facilitate their induction in the system. You?ll also learn the tools and strategies you can implement to store, retrieve, compare and organize data according to your requirements. You?ll also explore the process of creating simple to complex reports from existing data. By the end of this course, you will also have hands-on knowledge of SQL systems that are required to proceed to other advanced to professional programs. Adding Data, Retrieving, Sorting and Organizing a SQL Database The building blocks of a database. How to add data to the database. The process of retrieving data using SQL functions. Multiple methods of sorting and organizing data. Using SQL functions to get the required simple to complex output. Various strategies for using functions and conditions to organize data. Combining Data, Set Operators And Subqueries Consolidating data using multiple functions and group operators. Fetching intelligent data reports using simple functions. Fetching data from multiple sources in the tables. Using Subqueries to compile data as required. Using Set operators to create smart data reports. Data Manipulation and Data Definition Languages in SQL Describing and managing data transaction using Data Definition Language. Categorize and review data tables using Data Definition Language. Data Dictionary Views and Creating Sequences, Indexes and Views How to manage and query Data Dictionary Views. The process of creating and using Sequences. How to create various types of Synonyms and Indexes. Creating simple and complex views and retrieving data. Understanding and using Database Objects and Subqueries Core concept and application of Schema Objects. Fetching required data with Subqueries. Using Subqueries to organize Data in SQL. Data and access control Assigning and revoking data access. Managing data access control according to user levels. Performing Advanced Level Database operations. Using advanced functions and performing data queries. Creating and managing time zone-based databases.
Duration 3 Days 18 CPD hours This course is intended for This course is introductory-level, but technical in nature. In order to participate in the hands-pon labs you should have a basic understanding of database principles, basic scripting skills (in relation to Oracle) and basic analytics skills. Overview This course is approximately 50% hands-on lab to lecture ratio, combining engaging expert lessons, demos and group discussions with real-world, skills-focused machine-based labs and exercises. Working in a hands-on learning environment led by our expert facilitator, you'll explore: Core concepts of regular PDBs Creating a CDB, and then using different methods to create PDBs. How to start and shut down a CDB and how to open and close a PDB. Security aspects in CDBs and PDBs in various areas like privileges and roles, lockdown profiles, auditing, Database Vault, and encryption. Availability through backup, duplicate, recovery, and flashback topics and then performance, monitoring, and resources allocation management in CDBs and PDBs. How you can move data from a non-CDB environment to a PDB. How to move data between PDBs by using utilities such as the export and import features of Oracle Data Pump, SQL*Loader, external tables, and Oracle Recovery Manager. The multitenant architecture enables you to have many pluggable databases inside a single Oracle Database instance. Oracle Database 19c Multitenant Architecture is a three-day hands-on course that explores the multitenant architecture and the different types of pluggable databases (PDBs) in multitenant container databases (CDBs). Multitenant Architecture CDB Basics CDB and Regular PDBs Application PDBs and Application Installation PDB Creation PDB Creation CDB and PDB Management Storage Security Security Backup and Duplicate Recovery and Flashback Performance Resources Allocation Data Movement Data Movement Upgrade Methods Miscellaneous Additional course details: Nexus Humans Oracle 19c Database Multitenant Architecture (TTOR20719) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 19c Database Multitenant Architecture (TTOR20719) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for IS Security Owners Security Officers Ethical Hackers Information Owners Penetration Testers System Owners and Managers Cyber Security Engineers Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam. To protect an information system you need to be able to see that system through the eyes of the attacker.ÿThe Certified Professional Ethical Hackerÿcertification course is the foundational training to Mile2?s line of penetration testing courses because it teaches you to think like a hacker.ÿ Therefore, you can set up dynamic defenses to prevent intrusion. First, you will learn the value of vulnerability assessments.ÿ Then, you will discover how to use those assessments to make powerful changes in an information system?s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack. Course Introduction Introduction to Ethical Hacking Linux Fundamentals Protocols Cryptography Password Cracking Malware Security Devices Information Gathering ? Passive Reconnaissance Social Engineering Active Reconnaissance Vulnerability Assessment Network Attacks Hacking Servers Hacking Web Technologies Hacking Wireless Technologies Maintaining Access and Covering Tracks
Duration 5 Days 30 CPD hours This course is intended for Database Administrators Data Warehouse Administrator Support Engineer Technical Consultant Technical Administrator Overview Describe Oracle Database backup methods and recovery operations that can be used to resolve database failure. Describe the Oracle Database architecture components related to backup and recovery operations. Plan effective backup and recovery procedures. Configure the database for recoverability. Use Recovery Manager (RMAN) to create backups and perform recovery operations. Use the Data Recovery Advisor to diagnose and repair failures. Use Oracle Flashback Technologies to recover from human error. Perform an encrypted database backup and restore. Perform tablespace point-in-time recovery. Describe additional high availability features such as Oracle Data Guard. This Oracle Database 12c: Backup and Recovery Workshop will teach you how to evaluate your own recovery requirements. You'll develop appropriate strategies for backup, restore and recovery procedures from provided scenarios. This Oracle Database 12c: Backup and Recovery Workshop will teach you how to evaluate your own recovery requirements. You'll develop appropriate strategies for backup, restore and recovery procedures from provided scenarios. Additional course details: Nexus Humans Oracle Database 12c - Backup and Recovery Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database 12c - Backup and Recovery Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Threat Intelligence Analyst students will be able to proactively collect threat data and implement strategies to limit exposure to those threats. Additionally, they will be prepared to take the C)TIA exam Everywhere you turn today, you hear about the need for threat intelligence analysis! However, in some cases, it is just a buzzword, while in other cases, threat intelligence is being touted as the remedy toward advanced persistent threats. The real question is, how do we leverage threat intelligence to reduce network vulnerabilities without wasting time and money? The answer is simple, Mile2?s Certified Threat Intelligence Analyst course. Mile2?s CTIA course will help security professionals learn how to make good use of the many sources of threat intelligence. It will aid an individual to understand what threat sources are helpful, which specific threats are targeted and which ones may need minor adjustments to monitor within your organization. Mile2?s CTIA course focuses heavily on hands-on labs, concentrating on discerning and interpreting threats and responding to them.ÿ The CTIA course focuses overall on current significant threats, threat actors, and identification procedures so that cyber-security professionals can implement the best policies and procures for their organizational security posture. Once complete, the student will be competent toward improving a company?s existing security infrastructure. Policies and methodologies learned in the CTIA will allow the student to use threat intelligence concepts to decrease overall company risk. Course Outline Threat Intelligence Basics Cyber Threats Threat Actors Case Studies Threat Identification Proactive Approach
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers DR and BCP Engineers Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Disaster Recovery Engineer students will be able to establish industry acceptable DR & BCP standards with current best practices and policies. Students will also be prepared to competently take the C)DRE exam. A Certified Disaster Recovery Engineer, C)DRE, is the superhero of an information System! When a business is hit by a natural disaster, cybercrime or any other disruptive tragedy, how should the organization react? What if the network infrastructure is taken down? Will the business be able to continue operations? How much will it cost if the business is down during repairs? The answer is found in theÿ Certified Disaster Recovery Engineer certification course. Disaster recovery and business continuity planning is the process of having a professional work with a business to prepare processes, policies, and procedures to follow in the event of a disruption. The C)DRE prepares students to plan and present the latest methodologies and best practices for real-world system recovery. Course Outline Welcome to Disaster Recovery Training Business Impact Analysis Risk Analysis Design & Development Phase (BCP Strategies) IT Recovery Strategies Implementation Phase Testing and Exercise Maintenance and Updating Pandemics Case Studies and Templates
Duration 4 Days 24 CPD hours This course is intended for C - Level Managers IT Managers Cyber Security Personelle Engineers Information Systems Owners ISSO's CISSP Students ISO's Overview Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam. You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture. Certified Security Leadership Officerÿ course is designed for mid and upper-level managers.ÿ If you are an engineer, this course will increase your knowledge in the leading information system security teams. Plus, the C)SLO will give you an essential understanding of current security issues, best practices, and technology. With this knowledge you will then be prepared to manage the security component of an information technology project. As a Security Leadership Officer, you will be the bridge between cybersecurity and business operations. Course Outline Security Management Risk Management Encryption Information Security Access Control Concepts Incident Handling and Evidence Operations Security Network Security Additional course details: Nexus Humans C)SLO-Certified Security Leadership Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)SLO-Certified Security Leadership Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.