• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1593 Cloud courses

MS Azure - Introduction

4.3(43)

By John Academy

Description Learn about different types of cloud service including Microsoft Azure with the MS Azure - Introduction service. Cloud service is the service made available to users on demand via the Internet from a cloud computing provider's servers. The types of cloud service can be divided based on the location and the service it provides. Based on the service, it can be divided into the following: IaaS (Infrastructure-as-a-Service) PaaS (Platform-as-a-Service) SaaS (Software-as-a-Service) or, Storage, Database, Information, Process, Application, Integration, Security, Management, Testing-as-a-service The course explains these cloud services with a special focus on the services provided by Microsoft Azure which is an open, flexible, enterprise-grade cloud computing platform developed by Microsoft for building, testing, deploying, and managing applications and services through a global network. You will learn the procedures of managing Azure from the Classic, New Portal and Azure PowerShell. You will know the steps of authenticating Azure PowerShell. To sum up, the course teaches you various types of cloud services along with the Microsoft Azure. Assessment and Certification: This course does not involve any assessment. Students can order their course completion Certificate at an additional cost of £39 for hard copy and in PDF format at £24. Who is this Course for? MS Azure - Introduction is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our MS Azure - Introduction is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Introduction Introduction FREE 00:03:00 Overview of Cloud Services What is the Cloud 00:03:00 Types of Cloud Services 00:04:00 Azure Data Centers 00:03:00 Setting up a Free Trial 00:04:00 Azure Service Overview Compute Services 00:02:00 Networking 00:02:00 Storage 00:02:00 Data and Analytics 00:02:00 Web and Mobile 00:03:00 Miscellaneous 00:02:00 Azure Deployment Models 00:06:00 Azure Management Interfaces 00:02:00 Azure Portal 00:06:00 Azure Powershell 00:07:00 Conclusion Course Recap 00:03:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

MS Azure - Introduction
Delivered Online On Demand54 minutes
£18

Palo Alto Networks: Prisma Access SASE Security: Design and Operation EDU-318 (3.2)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security Engineers Security Administrators Security Operations Specialists Security Analysts Network Engineers Overview Successful completion of this four-day, instructor-led course will help enhance your understanding of how to better protect your applications, remote networks, and mobile users using a SASE implementation. You will get hands-on experience configuring, managing, and troubleshooting Prisma Access in a lab environment. The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and network security services from the cloud. This course is intended for people in the fields of public cloud security and cybersecurity, or for anyone who wants to learn how to secure remote networks and mobile users. Course Outline 1 - Prisma Access Overview and Definitions 2 - Planning and Design Architecture 3 - Routing SD-WAN Design and CloudGenix 4 - Activate and Configure Service Connections 5 - Rule Enforcement in Prisma Access and SSL Decrypt 6 - Panorama Operations for Prisma Access and Fawkes Overview 7 - Remote Networks 8 - Mobile Users 9- Cloud Secure Web Gateway 10 - Tune, Optimize and Troubleshoot 11 - Manage Multiple Tenants 12 - What?s New in v2.1 13 - Next Steps Additional course details: Nexus Humans Palo Alto Networks: Prisma Access SASE Security: Design and Operation EDU-318 (3.2) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks: Prisma Access SASE Security: Design and Operation EDU-318 (3.2) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks: Prisma Access SASE Security: Design and Operation EDU-318 (3.2)
Delivered OnlineFlexible Dates
Price on Enquiry

Web Development Concepts for Everyone

By Packt

This is a comprehensive course designed to provide a solid foundation in web development principles and practices. This course is intentionally structured to provide a technical understanding of web development concepts without delving into intricate implementation details. Anyone looking to better understand how web applications are built can take this course.

Web Development Concepts for Everyone
Delivered Online On Demand5 hours
£82.99

AWS Certified Big Data - Specialty Certification

By Packt

This course covers all aspects of hosting big data on the Amazon Web Services (AWS) platform, and will prepare you to confidently perform distributed processing.

AWS Certified Big Data - Specialty Certification
Delivered Online On Demand6 hours 11 minutes
£33.99

Palo Alto Networks: Prisma SD-WAN 5.6: Design and Operation (EDU-238)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Engineers, Network Administrators, Network Security Engineers, and NOC Administrators Overview Successful completion of this five-day, instructor-led course will help enhance your understanding of how to design, implement, and effectively operate a Prisma SDWAN solution. You will get hands-on experience configuring Prisma SD-WAN with a branch and datacenter, configure policies, and use Prisma SD-WAN services. The Prisma SD-WAN Design and Operation (EDU-238) course describes the next generation Prisma SD-WAN solution, the capability and value it provides over legacy WAN and SD-WAN implementations, and how to configure, operate, and troubleshoot the solution.This course is intended for people who must configure, maintain, and use wide area networks, from data centers, to branches, to the cloud. This class is powered by Cloud Harmonics. Course Outline Module 1 - Solution Overview Module 2 - Branch Design Module 3 - Routing Module 4 - Policy Module #1 - Application Path and QoS Policy Module 5 - Policy Module #2 - NAT, ZBFW and Security Module 6 - Event Policy Management Services Module 7 - DNS and DHCP Services Module 8 - Operations and Troubleshooting Module 9 - CloudBlades Module 10 - Integrating Prisma SD-WAN and Prisma Access for SASE Implementation Module 11 - DevOps Module 12 - Next Steps

Palo Alto Networks: Prisma SD-WAN 5.6: Design and Operation (EDU-238)
Delivered OnlineFlexible Dates
Price on Enquiry

IT: CompTIA with Cyber Security Career Oriented Job Focused Program - Money Back Guarantee

5.0(10)

By Apex Learning

Defend, Excel, Succeed: Unleash Your Potential with IT: CompTIA with Cyber Security program. Dive into IT excellence and cyber resilience with our exclusive IT: CompTIA with Cyber Security program. Elevate your career prospects and knowledge with our comprehensive curriculum to pave the way for success. Our IT: CompTIA with Cyber Security program is a stepping stone, guiding you toward a fulfilling career. With technology shaping industries, the demand for skilled professionals is at an all-time high. This program, spanning multiple courses, is tailored to equip you with the expertise employers demand across diverse sectors. Delve into cutting-edge subjects such as CompTIA A+, Cloud Computing, Cybersecurity Analyst, PenTest+, and more. Moreover, we're your dedicated partners in this exciting IT: CompTIA with Cyber Security program. Our goal isn't just to teach you; it's to support you 24/7 so you can get closer to your dream job. We're so confident with our program that we offer a 100% money-back guarantee, ensuring your complete satisfaction. Learning Outcomes: By completing this IT: CompTIA with Cyber Security program, you will gain the following: Master CompTIA A+ essentials (220-1001 and 220-1002). Understand Cloud Computing principles (CompTIA Cloud+). Analyse and counteract cybersecurity threats (CompTIA CySA+). Conduct ethical hacking with CompTIA PenTest+. Attain a robust grasp of IT fundamentals and networking. Excel in Linux systems and Bash scripting. Develop skills in incident handling and response. Cultivate cyber awareness through online courses Explore Linux & ethical hacking using Kali Linux Master Bash scripting, Linux, and shell programming Become a skilled IT support technician Progress to network security level 2 & functional IT skills Craft a compelling CV and master job searching Ace interviews with expert guidance Navigate video job interviews effectively Create a standout LinkedIn profile Courses Included in the Program Enrol in our IT: CompTIA with Cyber Security program and gain access to a 25 comprehensive set of courses, including: => Course 01: CompTIA A+ (220-1001) => Course 02: CompTIA A+ (220-1002) => Course 03: Cloud Computing / CompTIA Cloud+ (CV0-002) => Course 04: CompTIA CySA+ Cybersecurity Analyst (CS0-002) => Course 05: CompTIA PenTest+ (Ethical Hacking) => Course 06: CompTIA Security+ (SY0-601) => Course 07: CompTIA IT Fundamentals ITF+ (FCO-U61) => Course 08: CompTIA Networking - Level 4 => Course 09: CompTIA Healthcare IT Technician => Course 10: Cyber Security Incident Handling and Incident Response => Course 11: Cyber Security Advanced Training => Course 12: Cyber Security Awareness Training | Online Course => Course 13: Learn Linux in 5 Days => Course 14: Ethical Hacking with Kali Linux => Course 15: Bash Scripting, Linux and Shell Programming => Course 16: IT Support Technician Training => Course 17: Network Security Level 2 => Course 18: Functional Skills IT => Course 19: Data Protection and Data Security Level 2 => Course 20: Learning Computers and Internet Level 2 => Course 21: Career Development Plan Fundamentals => Course 22: CV Writing and Job Searching => Course 23: Interview Skills: Ace the Interview => Course 24: Video Job Interview for Job Seekers => Course 25: How to Create a Professional LinkedIn Profile Enrol in our highly regarded IT: CompTIA with Cyber Security program, featuring a job-relevant curriculum that ensures your skills align with employer expectations across various sectors. Don't miss this opportunity - your success story starts now! For any query, please feel free to contact us, and we will be glad to assist you. Venture on a transformative journey through our IT: CompTIA with Cyber Security program, meticulously crafted to empower you with cutting-edge IT skills and cybersecurity expertise. Elevate your career prospects with a curriculum designed to meet industry demands, providing a comprehensive understanding of the IT landscape. Why Choose Us? What sets us apart is our unwavering commitment to your success. Here's what you gain by joining our IT: CompTIA with Cyber Security program: Updated Materials: Stay current with industry trends: Our IT: CompTIA with Cyber Security program ensures you have access to the most up-to-date materials, guaranteeing a curriculum that reflects the latest technological advancements. Dive into the cutting-edge knowledge that empowers you to navigate the dynamic IT terrain confidently, equipping you for success in the fast-paced world of information technology. Flexible Timing: Learn at your own pace:Life can be unpredictable, but your learning journey doesn't have to be. Flexibility is critical with our IT: CompTIA with Cyber Security program. Learn at your own pace, whether you're a full-time professional, a student, or someone managing various commitments. Our program adapts to your schedule, allowing you to delve into the intricacies of IT and cyber security without compromising your existing responsibilities. No Hidden Cost: Certification and course materials are inclusive. Transparency is the cornerstone of our IT: CompTIA with Cyber Security program. We believe in providing a seamless learning experience without any financial surprises. Your enrollment covers the comprehensive certification process and all necessary course materials. Say goodbye to hidden costs and embrace a straightforward, all-inclusive educational journey. Money-Back Guarantee: Enjoy peace of mind within 14 days: With our IT: CompTIA with Cyber Security program, your peace of mind is our priority. Take the first two weeks to explore the curriculum and experience the quality of our offerings. If, for any reason, you feel this program isn't the right fit for you, enjoy the reassurance of our 100% money-back guarantee within 14 days of enrollment. Lifetime Access: Continued learning at your fingertips:Our commitment to your growth extends beyond completing the program. Enrol in IT: CompTIA with Cyber Security and gain lifetime access to course materials and updates. Keep your knowledge current, revisit critical concepts, and stay connected to the ever-evolving world of IT. Your journey doesn't end; it evolves with you. 24/7 Support: Assistance whenever you need it:Our IT: CompTIA with Cyber Security program provides 24/7 support, ensuring that assistance is readily available whenever you need it. Whether you have questions about the curriculum, encounter technical issues, or seek guidance on your learning path, our dedicated support team is just a message away, ready to provide the help you need. CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This IT: CompTIA with Cyber Security program is for individuals who are: Aspiring IT professionals. Seeking to specialise in cybersecurity. Eager to enhance networking skills. Wishing to enter the healthcare IT sector. Interested in ethical hacking and penetration testing. Requirements No prior experience is required to enrol in IT: CompTIA with Cyber Security program. Career path Upon completion of IT: CompTIA with Cyber Security program, explore a multitude of career paths, including: Cybersecurity Analyst: £30,000 - £50,000 IT Support Technician: £25,000 - £40,000 Cloud Computing Specialist: £35,000 - £55,000 Network Security Specialist: £30,000 - £50,000 Healthcare IT Technician: £28,000 - £45,000 Linux Systems Administrator: £35,000 - £60,000 Certificates CPD Accredited (e-Certificate) Digital certificate - Included CPD Accredited (Hard Copy Certificate) Hard copy certificate - Included e-Transcript Digital certificate - Included Hard Copy Transcript Hard copy certificate - Included Student ID Card Digital certificate - Included

IT: CompTIA with Cyber Security Career Oriented Job Focused Program - Money Back Guarantee
Delivered Online On Demand
£209

Internet of Things (IoT)

5.0(10)

By Apex Learning

**Don't Spend More; Spend Smarter** Boost Your Career with Apex Learning and Get Noticed By Recruiters in this Hiring Season! Get Hard Copy + PDF Certificates + Transcript + Student ID Card worth £160 as a Gift - Enrol Now Give a compliment to your career and take it to the next level. This Internet of Things (IoT) will provide you with the essential knowledge to shine in your professional career. Whether you want to develop skills for your next job or elevate skills for your next promotion, this Internet of Things (IoT) will help you keep ahead of the pack. The Internet of Things (IoT) incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your expertise and essential knowledge, which will assist you in reaching your goal. Further, this Internet of Things (IoT) will add extra value to your resume to stand out to potential employers. Throughout the programme, it stresses how to improve your competency as a person in your chosen field while also outlining essential career insights in this job sector. Consequently, you'll sharpen your knowledge and skills; on the other hand, see a clearer picture of your career growth in future. By the end of the Internet of Things (IoT), you can equip yourself with the essentials to keep you afloat in the competition. Along with this Internet of Things (IoT) course, you will get 10 premium courses, an original Hardcopy, 11 PDF Certificates (Main Course + Additional Courses) Student ID card as gifts. This Internet of Things (IoT) Bundle Consists of the following Premium courses: Course 01: Internet of Things Course 02: Internet of Things Hacking Course 03: Automation Course 04: Learning Computers and Internet Level 2 Course 05: AWS Essentials Course 06: Encryption Course 07: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 08: CompTIA Networking - Level 4 Course 09: Network Security Level 2 Course 10: Cyber Security Incident Handling and Incident Response Course 11: Data Center Training Essentials: General Introduction So, enrol now to advance your career! Benefits you'll get choosing Apex Learning for this Internet of Things (IoT): Pay once and get lifetime access to 11 CPD courses Free e-Learning App for engaging reading materials & helpful assistance Certificates, student ID for the title course included in a one-time fee Free up your time - don't waste time and money travelling for classes Accessible, informative modules designed by expert instructors Learn at your ease - anytime, from anywhere Study the course from your computer, tablet or mobile device CPD accredited course - improve the chance of gaining professional skills How will I get my Certificate? After successfully completing the course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) Curriculum of Internet of Things (IoT) Bundle Course 01: Internet of Things Course Agenda Unit 01: Introduction Unit 02: Raspberry Pi Installation Unit 03: Getting Around Raspberry Pi Unit 04: Raspberry Pi GPIO Output Unit 05: Output from Raspberry Pi Unit 06: Inputs to Raspberry Pi Unit 07: Sensor Interfacing Unit 08: Interfacing of I2C Based BMP180 Sensor with Raspberry Pi Unit 09: Internet of Things with Microsoft Azure Unit 10: IoT with Thingspeak Unit 11: Learn a new platform, Adafruit IO Unit 12: IOT Security Course 02: Internet of Things Hacking Module 01: IoT Part 1 Module 02: IoT Part 2 Module 03: IoT Hacking Tools and Technique Module 04: IoT Hacking Tools and Technique Part 2 Module 05: IoT Scenario Part 1 Module 06: IoT Scenario Part 2 Module 07: Smart Devices Module 08: AWS Basics Course 03: Automation Module 01: Introduction Module 02: Overview of Automation Concepts and Tools Module 03: Common Automation Workflows and Campaigns Module 04: Build Your First Workflow from Scratch Course 04: Cloud Computing / CompTIA Cloud+ (CV0-002) Section 01: What You Need to Know Section 02: Introducing the Cloud Section 03: System Requirements for Cloud Deployments Section 04: Cloud Storage Section 05: Cloud Compute Section 06: Cloud Networking Section 07: Cloud Security Section 08: Migrating to the Cloud Section 09: Maintaining Cloud Solutions Section 10: Troubleshooting Cloud Solutions Course 05: AWS Essentials Section 01: AWS Foundations and Services Section 02: AWS Security and Costs Course 06: Encryption Section 01: Introduction Section 02: Basics of Common Encryption Section 03: Technical Aspects of Encryption Section 04: AES Basic Tech Demo Section 05: File and System Encryption Section 06: Conclusion Course 07: Basics Blockchain Section 01: Introduction Section 02: Underlying technologies of Blockchain Section 03: Advantages of Blockchain Section 04: How Blockchain works Section 05: Types of blockchain and bitcoin Section 06: Libra [Facebook's cryptocurrency] Section 07: Ethereum [The revolution in Blockchain technology] Section 08: Forming Blockchain Solutions Course 08: Cisco ASA Firewall Training Lecture 01: Common Network Security Terms Lecture 02: Confidentiality, Integrity, Availability. Lecture 03: Security Concepts & Terms Lecture 04: Intro to Firewall Technologies Lecture 05: About Cisco ASA Firewall Lecture 06: Install Cisco ASAv Firewall in GNS3 Lecture 07: Install ASA 9 Cluster, Security Context enable in GNS3. Lecture 08: Install Cisco ASAv Firewall on EVE-NG Lecture 09: Install Cisco ASAv Firewall on VMWare Workstation. Lecture 10: Cisco ASA Firewall Basic Configuration Commands. Lecture 11: Device Management Cisco ASA Console Lecture 12: Device Management Cisco ASA Telnet Lecture 13: Device Management Cisco ASA SSH Lecture 14: Device Management Cisco ASA ASDM Lecture 15: Device Management Cisco ASA TFTP Lecture 16: Device Management Cisco ASA FTP Lecture 17: Security Levels and Zoning in Cisco ASA Lecture 18: Introduction to Routing & Static Routing Lecture 19: Network Route Configuration in Cisco ASA Lecture 20: Host Route Configuration in Cisco ASA Lecture 21: Default Route Configuration in Cisco ASA Lecture 22: Floating Static Route Configuration in ASA Lecture 23: IP SLA (Service Level Agreement) in ASA Lecture 24: Dynamic Routing Protocol RIP version 2 Lecture 25: Dynamic Routing Protocol EIGRP Configuration Lecture 26: Dynamic Routing Protocol OSPF Configuration Lecture 27: Routing Protocols Redistribution Lecture 28: Implement Access Control Lists in ASA Lecture 29: Configure & Verify Extended ACLs in ASA Lecture 30: Configure & Verify Infrastructure ACLs Lecture 31: Configure & Verify Time-Based ACLs Lecture 32: Configure & Verify Standard ACLs Lecture 33: Configure & Verify Object Groups ACLs Lecture 34: Configure & Verify DHCP Server in ASA Lecture 35: Configure & Verify DHCP Relay in ASA Lecture 36: Introduction & Theory of NAT and PAT ASA Lecture 37: Creating Lab Topology for NAT & PAT Lecture 38: Static NAT in Cisco ASA Lecture 39: Static PAT in Cisco ASA Lecture 40: Dynamic NAT in Cisco ASA Lecture 41: Dynamic PAT in Cisco ASA Lecture 42: Identity NAT in Cisco ASA Lecture 43: Policy NAT in Cisco ASA Lecture 44: Modular Policy Framework (MPF) Lecture 45: Transparent Firewall Lecture 46: ASDM Walkthrough Lecture 47: Security Contexts (Multi-Contexts) Lecture 48: Redundancy, HA, Active/Standby Failover Lecture 49: Packet Capture in Cisco ASA Firewall Lecture 50: Packet Tracer in Cisco ASA Firewall Lecture 51: Syslog Logging in Cisco ASA Firewall Lecture 52: Introduction and Concept of Cryptography & Terminologies Lecture 53: Introduction & Concept of Symmetric & Asymmetric Encryption Lecture 54: Introduction and Concept of Cryptography Hash (SHA, MD5) Lecture 55: Introduction and Concept of Virtual Private Network VPN Lecture 56: Introduction and Concept of IPSec Protocols Features Lecture 57: Introduction and Concept of Diffie-Hellman (DH) And Much More... Course 09: Network Security Level 2 Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security Course 10: Cyber Security Level 3 Module 01: Getting Started Module 02: Cyber security Fundamentals Module 03:Types of Malware Module 04: Cyber Security Breaches Module 05: Types of Cyber Attacks Module 06: Prevention Tips Module 07: Mobile Protection Module 08: Social Network Security Module 09: Prevention Software Module 10: Critical Cyber Threats Module 11: Defense Against Hackers Module 12: Closing Course 11: Data Center Training Essentials: General Introduction Module 01: Data Center Introduction Module 02: Data Center Reliability Module 03: Data Center Equipment Module 04: Data Center White Space Module 05: Data Center Support Spaces Module 06: Data Center Security, Safety, Networks and IT CPD 120 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Internet of Things (IoT) bundle. Persons with similar professions can also refresh or strengthen their skills by enrolling in this course. Students can take this course to gather professional knowledge besides their study or for the future. Requirements Our Internet of Things (IoT) is fully compatible with PC's, Mac's, laptops, tablets and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones, so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course; it can be studied in your own time at your own pace. Career path Having this various expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (Internet of Things) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

Internet of Things (IoT)
Delivered Online On Demand
£53

IT (Information Technology) Support with Cyber Security & Data Protection Training

5.0(10)

By Apex Learning

"The future belongs to those who prepare for it today." - Malcolm X. Embrace the evolving digital landscape with our comprehensive IT (Information Technology) Support with Cyber Security & Data Protection Training bundle course. Delve into various topics, from IT (Information Technology) Support Technician Training to GDPR Data Protection Level 5, to fortify your knowledge and understanding of the technological world. Equip yourself with the essential tools to excel in IT (Information Technology) Support, asset management, and computer building. Our curriculum covers crucial subjects such as Electronic & Electrical Devices Maintenance, Cyber Security Incident Handling and Response, and Data Center Training Essentials to ensure your readiness for a rewarding IT and cyber security career. Stay ahead of the curve by mastering essential software and platforms through our Level 2 Microsoft Office Essentials and Complete Windows 10 Troubleshooting for IT Help Desk courses. Additionally, our Cloud Computing / CompTIA Cloud+ (CV0-002) module will provide insights into the ever-expanding world of cloud technology. Finally, Enrol in our IT (Information Technology) Support with Cyber Security & Data Protection Training bundle course today and secure your future in the rapidly growing tech industry. This IT (Information Technology) Support with Cyber Security & Data Protection Training Bundle Consists of the following Premium courses: Course 01: IT (Information Technology) Support Technician Training Course 02: IT Asset Department Course 03: Learning Computers and Internet Level 2 Course 04: Building Your Own Computer Course 05: Electronic & Electrical Devices Maintenance Course 06: Cyber Security Incident Handling and Incident Response Course 07: GDPR Data Protection Level 5 Course 08: Data Center Training Essentials: General Introduction Course 09: Complete Windows 10 Troubleshooting for IT HelpDesk Course 10: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 11: Level 2 Microsoft Office Essentials Learning outcomes: Gain proficiency in IT (Information Technology) Support and troubleshooting techniques. Understand the workings of an IT asset department. Enhance your knowledge of computers and the Internet. Learn how to build and maintain your computer. Develop aptitudes in electronic and electrical device maintenance. Tackle cyber security incidents with effective handling and response strategies. Comprehend the nuances of GDPR data protection. Familiarise yourself with data centre essentials and cloud computing. Our IT (Information Technology) Support with Cyber Security & Data Protection Training bundle course offers a diverse and in-depth exploration of the many facets of the IT and cyber security fields. From IT (Information Technology) Support technician training to mastering the intricacies of data protection, this comprehensive course bundle encompasses a wide range of essential topics to prepare you for success in the ever-changing tech landscape. Whether you're looking to advance your career in IT (Information Technology) Support, enhance your knowledge of data protection, or dive into the world of cloud computing, this multifaceted course has you covered. Equip yourself with the tools and knowledge necessary to excel in the digital domain and stay ahead of the curve in this fast-paced industry. Course Curriculum: IT (Information Technology) Support Technician Training Section 01: How People Use Computers Section 02: System Hardware Section 03: Device Ports and Peripherals Section 04: Data Storage and Sharing Section 05: Understanding Operating Systems Section 06: Setting Up and Configuring a PC Section 07: Setting Up and Configuring a Mobile Device Section 08: Managing Files Section 09: Using and Managing Application Software Section 10: Configuring Network and Internet Connectivity Section 11: IT Security Threat Mitigation Section 12: Computer Maintenance and Management Section 13: IT Troubleshooting Section 14: Understanding Databases Section 15: Developing and Implementing Software CPD 110 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Aspiring IT (Information Technology) Support technicians. Individuals interested in cyber security and data protection. Those seeking to build and maintain their computers. Professionals aiming to work in IT asset management. Individuals looking to expand their Microsoft Office and Windows 10 expertise. Anyone pursuing a career in cloud computing. Requirements This IT (Information Technology) Support with Cyber Security & Data Protection Training course has been designed to be fully compatible with tablets and smartphones. Career path IT (Information Technology) Support Technician (Salary range: £18,000 - £35,000) IT Asset Manager (Salary range: £25,000 - £45,000) Computer Repair Specialist (Salary range: £18,000 - £30,000) Cyber Security Analyst (Salary range: £25,000 - £60,000) Data Protection Officer (Salary range: £30,000 - £60,000) Data Center Technician (Salary range: £20,000 - £40,000) Cloud Computing Specialist (Salary range: £30,000 - £70,000) Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - £10 You will get the Hard Copy certificate for the IT (Information Technology) Support Technician Training course absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

IT (Information Technology) Support with Cyber Security & Data Protection Training
Delivered Online On Demand3 days
£49 to £59

Red Hat Security - Linux in Physical, Virtual, and Cloud (RH415)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators, IT security administrators, IT security engineers, and other professionals responsible for designing, implementing, maintaining, and managing the security of Red Hat Enterprise Linux systems and ensuring their compliance with the organization's security policies. Be a Red Hat Certified Engineer (RHCE©), or demonstrate equivalent Red Hat Enterprise Linux knowledge and experience. Overview Students that complete this course should be able to demonstrate these skills: - Analyze and remediate system compliance using OpenSCAP and SCAP Workbench, employing and customizing baseline policy content provided with Red Hat Enterprise Linux. - Monitor security-relevant activity on your systems with the kernel's audit infrastructure. - Explain and implement advanced SELinux techniques to restrict access by users, processes, and virtual machines. - Confirm the integrity of files and their permissions with AIDE. - Prevent unauthorized USB devices from being used with USBGuard. - Protect data at rest but provide secure automatic decryption at boot using NBDE. - Proactively identify risks and misconfigurations of systems and remediate them with Red Hat Insights. - Analyze and remediate compliance at scale with OpenSCAP, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Tower. This course is ideal for security administrators and system administrators who need to manage the secure operation of servers running Red Hat© Enterprise Linux©, whether deployed on physical hardware, as virtual machines, or as cloud instances. Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will discover and understand the resources that can be used to help you implement and comply with your security requirements. This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible© Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights. 1 - MANAGE SECURITY AND RISK Define strategies to manage security on Red Hat Enterprise Linux servers. 2 - AUTOMATE CONFIGURATION AND REMEDIATION WITH ANSIBLE Remediate configuration and security issues with Ansible Playbooks. 3 - PROTECT DATA WITH LUKS AND NBDE Encrypt data on storage devices with LUKS and use NBDE to manage automatic decryption when servers are booted. 4 - RESTRICT USB DEVICE ACCESS Protect system from rogue USB device access with USBGuard. 5 - CONTROL AUTHENTICATION WITH PAM Manage authentication, authorization, session settings, and password controls by configuring pluggable authentication modules (PAMs). 6 - RECORD SYSTEM EVENTS WITH AUDIT Record and inspect system events relevant to security, using the Linux kernel's audit subsystem and supporting tools. 7 - MONITOR FILE SYSTEM CHANGES Detect and analyze changes to a server's file systems and their contents using AIDE. 8 - MITIGATE RISK WITH SELINUX Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analyses. 9 - MANAGE COMPLIANCE WITH OPENSCAP Evaluate and remediate a server's compliance with security policies by using OpenSCAP. 10 - AUTOMATE COMPLIANCE WITH RED HAT SATELLITE Automate and scale your ability to perform OpenSCAP checks and remediate compliance issues using Red Hat Satellite. 11 - ANALYZE AND REMEDIATE ISSUES WITH RED HAT INSIGHTS Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Insights. 12 - PERFORM A COMPREHENSIVE REVIEW Review the content covered in this course by completing hands-on review exercises. Additional course details: Nexus Humans Red Hat Security - Linux in Physical, Virtual, and Cloud (RH415) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Security - Linux in Physical, Virtual, and Cloud (RH415) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat Security - Linux in Physical, Virtual, and Cloud (RH415)
Delivered OnlineFlexible Dates
Price on Enquiry

Build a Super Advanced Trading Bot on DYDX Hosted on AWS with Python

By Packt

Discover the fascinating world of decentralized trading with Python and DYDX. Build a sophisticated trading bot, harness statistical arbitrage techniques, and automate your trading strategies on the AWS cloud. Gain the skills to navigate the cryptocurrency market and achieve consistent profitability in this comprehensive and hands-on course.

Build a Super Advanced Trading Bot on DYDX Hosted on AWS with Python
Delivered Online On Demand7 hours 49 minutes
£82.99