• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5675 Certification Body (CB) courses delivered Online

BRCGS Food Safety Issue 9 - Lead Auditor (5 Days)

5.0(7)

By Ask Sonia Limited

Official BRCGS Food Safety Issue 9 Lead Auditor training course. Delivered online (Zoom) by a live BRCGS Approved Training Partner & Virtual Trainer. Exam and Certificate fee included in the price.

BRCGS Food Safety Issue 9 - Lead Auditor (5 Days)
Delivered Online + more
£975

BRCGS Food Safety Issue 9 - For Auditors (3 Days)

5.0(37)

By Ask Sonia Limited

Official BRCGS Food Safety Issue 9 course. Delivered online (Zoom) by a live BRCGS Approved Training Partner. Exam and Certificate fee included in the price.

BRCGS Food Safety Issue 9 - For Auditors (3 Days)
Delivered Online + more
£800

Microsoft Office Specialist 2019 Certification Bundle with 5 Exams and Simulators

By Hudson

The Microsoft Office Specialist (MOS) is a globally recognised qualification. Having a Microsoft Office Specialist certification on your CV demonstrates that you have gained the necessary expertise to competently use Microsoft applications, giving you a competitive advantage when job hunting as well as in the workplace. It will significantly increase your confidence, skills and employability. It will serve to objectively validate your IT skills and assist in your advancement in your chosen career.

Microsoft Office Specialist 2019 Certification Bundle with 5 Exams and Simulators
Delivered Online On Demand
£1,395

Integrating Linux and Microsoft

5.0(3)

By Systems & Network Training

Integrating Linux and Microsoft course description This course is designed for the enterprise-level Linux professional and represents the highest level of professional, distribution-neutral Linux certification within the industry. LPIC-3 300 covers administering Linux enterprise-wide with an emphasis on mixed environments. What will you learn Configure and troubleshoot OpenLDAP. Use OpenLDAP as an authentication backend. Manage software packages. Use Samba - Share configuration - User and group management - Domain integration - Name services - with Linux and Windows clients Integrating Linux and Microsoft course details Who will benefit: Enterprise-level Linux professionals. Prerequisites: Delegates must have an active LPIC-2 certification to receive LPIC-3 certification, but the LPIC-2 and LPIC-3 exams may be taken in any order. Duration 5 days Integrating UNIX and Microsoft course contents OPENLDAP CONFIGURATION OpenLDAP replication Replication concepts, OpenLDAP replication, replication log files, replica hubs, LDAP referrals, LDAP sync replication. Securing the Directory Securing the directory with SSL and TLS, Firewall considerations, Unauthenticated access methods, User/password authentication methods, Maintanence of SASL user DB, certificates. OpenLDAP Server Performance Tuning Measure OpenLDAP performance, Tune software configuration to increase performance, indexes. OPENLDAP AS AN AUTHENTICATION BACKEND LDAP Integration with PAM and NSS Configure PAM to use LDAP for authentication, NSS to retrieve information from LDAP and PAM modules in UNIX. Integrating LDAP with Active Directory and Kerberos Kerberos integration with LDAP, Cross platform authentication, Single sign-on concepts, Integration and compatibility limitations between OpenLDAP and Active Directory. SAMBA BASICS Samba Concepts and Architecture Samba daemons and components, key issues regarding heterogeneous network, Identify key TCP/UDP ports used with SMB/CIFS, Knowledge of Samba3 and Samba4 differences. Configure Samba Samba server configuration file structure, variables and configuration parameters, Troubleshoot and debug configuration problems. Regular Samba Maintenance Monitor and interact with running Samba daemons, Perform regular backups of Samba configuration and state data. Troubleshooting Samba Samba logging, Backup TDB files, Restore TDB files, Identify TDB file corruption, Edit / list TDB file content. Internationalization Internationalization character codes and code pages, differences in the name space between Windows and Linux/Unix with respect to share, names, user/group/computer naming in a non-English environment. SAMBA SHARE CONFIGURATION Linux File System and Share/Service Permissions File / directory permission control, Samba interaction with Linux file system permissions and ACLs, Use Samba VFS to store Windows ACLs. Print Services Printer sharing, integration between Samba and CUPS, Manage Windows print drivers and configure downloading of print drivers, security concerns with printer sharing. SAMBA USER AND GROUP MANAGEMENT Managing User Accounts and Groups User and group accounts, mappings, user account management tools, smbpasswd, file/directory ownership of objects. Authentication, Authorization and Winbind Local password database, password synchronization, passdb backends, Convert between passdb backends, Integrate Samba with LDAP, Winbind service, PAM and NSS. SAMBA DOMAIN INTEGRATION Samba as a PDC and BDC Domain membership and trust relationships, Create and maintain a PDC and BDC with Samba3/4, Add computers to an existing domain, logon scripts, roaming profiles, system policies. Samba4 as an AD compatible Domain Samba 4 as an AD DC, smbclient, how Samba integrates with AD services: DNS, Kerberos, NTP, LDAP. Configure Samba as a Domain Member Server Joining Samba to NT4 and AD domains, obtain a TGT from a KDC. SAMBA NAME SERVICES NetBIOS and WINS WINS concepts, NetBIOS concepts, local master browser, domain master browser, Samba as a WINS server, name resolution, WINS replication, NetBIOS browsing and browser elections, NETBIOS name types. Active Directory Name Resolution DNS for Samba4 as an AD Domain Controller, DNS forwarding with the internal DNS server of Samba4. WORKING WITH LINUX AND WINDOWS CLIENTS CIFS Integration SMB/CIFS concepts, remote CIFS shares from a Linux client, securely storing CIFS credentials, features and benefits of CIFS, permissions and file ownership of remote CIFS shares. Working with Windows Clients browse lists and SMB clients from Windows, Share file/print resources from Windows, the smbclient program, the Windows net utility.

Integrating Linux and Microsoft
Delivered in Internationally or OnlineFlexible Dates
£3,697

Complete CompTIA Certification Bundle (6 Courses, 6 Live Labs, 6 Exams)

By Hudson

The Computing Technology Industry Association (CompTIA) is the association representing the international technology community. Its goal is to provide a unified voice, global advocacy and leadership, and to advance industry growth through standards, professional competence, and education and business solutions. In order to most efficiently serve the industry and its members, CompTIA has developed specialized initiatives and programs dedicated to major areas within the IT industry. They include, convergence technology, e-commerce, IT training, software services, certification, public policy and workforce development. This bundle offers incredible value for money for anyone looking to get CompTIA certified. It includes 6 separate certification courses, spanning a variety of disciplines and technical fields from IT technician skills, to networking, and IT security, plus more!

Complete CompTIA Certification Bundle (6 Courses, 6 Live Labs, 6 Exams)
Delivered Online On Demand
£1,495

Windows certificates for engineers

5.0(3)

By Systems & Network Training

Windows certificates training course description A hands-on training course concentrating solely on PKI using Windows certificates. What will you learn Explain how PKI works. Install windows certificates. Configure windows certificates. Troubleshoot windows certificates. Windows certificates training course details Who will benefit: Technical security staff. Prerequisites: Windows server. Duration 3 days Windows certificates training course contents PKI Symmetric encryption, asymmetric encryption, authentication, digital signing, hashing, certificates, Certification Authorities, Root CA, Intermediate CA, policy CA, Issuing CA, Certificate Revocation Lists. Hands on Inspecting a certificate. Policies and PKI Security policy, certification policy. CA hierarchy Impact of CAs on Active Directory, CA architecture, number of tiers, issuing CA organisation, CA configuration files. CA security. Hands on CA installation PKI health tool, monitoring. Certificate revocation When to revoke, OCSP. Hands on Revoking certificates. Certificate validation Discovery, validation, checks, revocation checking, certificate chains, certification publication. Hands on Event viewer. Certificate templates Version 1, version 1, default, modifying templates. Hands on Template management. Roles Criteria roles, CA administrator, Certificate manager, Backup operator, Auditor. Other PKI management roles. Disaster recovery Backups, recovery. Hands on certutil. Issuing certificates The certificate enrolment process, enrolment methods, manual enrolment, automatic enrolment. Trust between organisations Creating Trust, CTLs, common root CA, cross certification, bridge CA. Web servers and certificates SSL encryption, certificate authentication. Hands on Web servers. VPN Hands on Certificate deployment for VPN. WiFi Hands on 802.1X

Windows certificates for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,497

TOLES Foundation Certificate in Legal English Skills

By EMG Associates UK Limited

TOLES Foundation Certificate in Legal English Skills Why Attend Legal English is a different language from general English. Just as lawyers in any particular country write in a different language from other people in that country, so do English lawyers. Sentences are often structured differently in legal English. The words lawyers use are often centuries old and no longer commonly used in general English. New prepositions must be learned and practiced. When reading a commercial contract or a letter, there is new technical vocabulary to understand on every page. This course is designed to look at authentic rather than artificial legal context. For this reason, there is a strong focus upon practical and authentic tasks, and upon candidates having a good grasp of terminology from the outset. The course takes account of significant language reforms in the English legal system and the legal profession's continued movement towards clearer use of English as recommended on Legal Practice courses at all major UK universities and legal training centers. The Test of English Legal English Skills (TOLES) governing body is a member of the International Division of the Law Society of England and Wales. Multi-national companies such as Allen & Overy LLP, Baker and McKenzie, PWC, KPMG, Sony Ericsson, European Court of Justice, European Central Bank and many more use TOLES training and exams to prepare their law professionals whose first language is not English for the international legal challenges. On the final day of the course, participants will take their TOLES Exam to earn the TOLES Foundation Certificate in Legal English Skills. Course Methodology The course consists of group discussions as well as individual and team tasks. There will be writing exercises and practice exams at the end of each day, culminating in sitting the TOLES Foundation Exam on the final day of the course. Course Objectives By the end of the course, participants will be able to: Apply correct legal vocabulary when communicating with clients/law professionals and will be familiar with modern legal writing style Recognize common mistakes in English and will be able to identify accurate prepositions and collocations within a legal context, particularly within the context of written contracts Differentiate between the English legal system and the American legal system Recognize improvements in their reading and comprehension skills of legal documents and demonstrate accurate written solutions within a legal context Target Audience This course is useful for law and legal professionals, translators, contract assistants and managers who already possess good general English and are now acquiring legal vocabulary, as well as those who are required to obtain a TOLES certification by their organization. Target Competencies Legal vocabulary and grammar Legal communication Legal comprehension skills Formal written contracts Note The Test of English Legal English Skills (TOLES) governing body is a member of the International Division of the Law Society of England and Wales. Multi-national companies such as Allen & Overy LLP, Baker and McKenzie, PWC, KPMG, Sony Ericsson, European Court of Justice, European Central Bank and many more use TOLES training and exams to prepare their law professionals whose first language is not English for the international legal challenges. The TOLES Foundation level exam tests Legal reading and writing. The focus of the exam is on testing the absolute linguistic accuracy required of lawyers in a modern international office. This means accuracy in two main areas: technical legal vocabulary, and grammar. Vocabulary from commercial deals, company documents, commercial contracts, intellectual property agreements, financial documents and forms of business are tested, as well as legal terminology from other areas. Upon passing the exam, participants will receive the TOLES Foundation Certificate. The Legal Profession Working in law Making a claim in civil court Areas of law Vocabulary check TOLES Foundation Exam practice The Language of Banking A new bank account Working in a bank Loans Vocabulary check TOLES Foundation Exam practice The Language of Contract Law A contract case More about precedent The elements of a contract The end of an offer What is consideration Contract and statute Going to court Vocabulary check TOLES Foundation Exam practice The Language of Employment Law Being an employer An employment contract How can an employment contract end? Acting for an employee Acting for an employer An employment case Vocabulary check TOLES Foundation Exam practice The Language of Tort Law What is the Law of Tort? Types of Tort The duty of care More about negligence A famous case in English law Vocabulary check TOLES Foundation Exam practice Understanding Contracts - Part 1 The style of written contract Understanding formal expressions Understanding technical words Understanding archaic terms Understanding some common words The structure of a contract Vocabulary check TOLES Foundation Exam practice The Language of Business Law Sole traders Partnerships A partnership agreement Limited liability partnerships Companies Public and private limited companies Incorporating a company Vocabulary check TOLES Foundation Exam practice Modern Letter Writing The layout of a letter Dates Complimentary close References Subject lines The body of a letter Putting a letter together The register of letter writing The content of a letter Typical sentences in legal letters Letter writing clinic Correcting common mistakes in letter writing TOLES Foundation Exam practice The Language of Company Law Who runs a company Areas of company law Directors Company meetings Company finance - a case study Closing a company Insolvent companies Vocabulary check TOLES Foundation Exam practice Understanding Contracts - Part 2 Some typical contract clauses Some important commercial vocabulary Termination clauses Intellectual property clauses Warranty, indemnity and force majeure clauses Vocabulary check TOLES Foundation Exam

TOLES Foundation Certificate in Legal English Skills
Delivered OnlineFlexible Dates
£4,212

Microsoft Dynamics 365 Associate Certification Bundle (with 4 Exams)

By Hudson

The Microsoft Certified Associate is a new breed of Microsoft certification. It is referred to as a ‘role-based certification’. According to Microsoft, role-based certifications show that individuals that possess them are keeping pace with today’s technical roles and requirements. They allow a learner to skill up and prove their expertise to employers and peers, plus get the recognition and opportunities they’ve earned

Microsoft Dynamics 365 Associate Certification Bundle (with 4 Exams)
Delivered Online On Demand
£1,295

Microsoft 365 Security and Messaging Administrator Associate Certification Bundle (with 3 Exams)

By Hudson

The Microsoft Certified Associate is a new breed of Microsoft certification. It is referred to as a ‘role-based certification’. According to Microsoft, role-based certifications show that individuals that possess them are keeping pace with today’s technical roles and requirements. They allow a learner to skill up and prove their expertise to employers and peers, plus get the recognition and opportunities they’ve earned.

Microsoft 365 Security and Messaging Administrator Associate Certification Bundle (with 3 Exams)
Delivered Online On Demand
£1,295

CertNexus Certified CyberSec First Responder (CFR-410)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) Lesson 1: Assessing Cybersecurity Risk Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management Lesson 2: Analyzing the Threat Landscape Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering Lesson 4: Analyzing Attacks on Computing and Network Environments Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques Lesson 6: Assessing the Organization's Security Posture Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing Lesson 7: Collecting Cybersecurity Intelligence Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources Lesson 8: Analyzing Log Data Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis Lesson 9: Performing Active Asset and Network Analysis Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise Lesson 10: Responding to Cybersecurity Incidents Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation Lesson 11: Investigating Cybersecurity Incidents Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation Additional course details: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified CyberSec First Responder (CFR-410)
Delivered OnlineFlexible Dates
£3,495