• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1593 Cloud courses

Certified Data Centre Migration Specialist (CDMS)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Participants who have actual experience in the data centre and/or IT infrastructures are best suited. Attendance of the CDCP© course is recommended but not a requirement. Overview After completion of the course the participant will be able to: 1. Develop and review their data centre strategy 2. Use different risk assessment methodologies together with practical tips specifically for data centre migrations to reduce the risk during a data centre migration 3. Understand different migration strategies 4. Understand the legal aspects when migrating a data centre 5. Understand the importance of Business Service Reviews and Service Level Objectives 6. Size and design the target data centre 7. Understand the importance of detailed discovery and how dependencies influence migration waves 8. Understand the safety requirements during migration 19. Get lots of practical tips when moving to another data centre This course is designed to expose participants to a step-by-step methodology which will enable them to reduce the risks involved when undertaking a data centre migration. It will also give participants a lot of valuable practical hints and tips by trainers having extensive experience in moving and consolidating mission critical data centre. Data Centre Strategy Data centre lifecycle Reasons to migrate a data centre Alternatives to data centre migration Consolidation Outsourcing Cloud computing Upgrade existing data centre or build new Project Management Project management and methods Scope statement Statement Of Work (SOW) Work Breakdown Structure (WBS) Allocate time to the project Cost and estimation methodology Project communication Risk Management Risk management and methods Risk identification Risk assessment methodologies Qualitative approach Semi-quantitative approach Quantitative approach Risk evaluation Risk treatment Risk in data centre migrations Migration Strategies Different data centre migration strategies Heterogeneous migration Homogeneous migration Physical migration Different IT transformations Pre-migration transformation Migration transformation Post-migration transformation Legal Aspects Regulatory requirements Contractual considerations Legal aspects when decommissioning High Level Discovery & Planning The importance of Business Service Reviews The concept of Availability The concept of Recoverability The importance of Service Level Objectives Requirements on designing the target IT architecture Information needed for high level planning Design Target Data Centre Requirements for the target data centre Sizing the data centre Architectural requirements Cooling requirements Power requirements Security Detailed Discovery and Planning The importance of discovery Automated discovery tools Asset management Network and system dependencies Detailed migration planning Migration waves Staffing Warranties and insurance Safety Safety precautions Technical safety review Electrical safety Lifting Personal safety during migration Fire safety during migration Security Controversy between access and security Access control Managing security during migration Security during migration Key management Practical hints and tips Continuous improvement Implementation Rehearsal Route investigation Resourcing Logistics team Packing Transport Installing the equipment Post migration support End of Project Why project closure Lessons learned Phased completion of project Criteria for project closure The outcome of the project End of project Exam: Certified Data Centre Migration Specialist Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Certified Data Centre Migration Specialist (CDMS)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Digital Learning Networking

By Nexus Human

Duration 70 Days 420 CPD hours Cisco Learning Library: Networking offers a subscription to all Cisco core online networking training, including product training, technology training, and certifications such as Cisco Routing and Switching, Wireless, Design, and Network Programmability.This comprehensive technical training library includes full-length, interactive certification courses, additional product and technology training with labs, and thousands of reference materials. Networking Library Certification Courses CCNA Implementing and Administering Cisco Solutions (CCNA) v1.0 CCNP Enterprise Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 Implementing Cisco SD-WAN Solutions (SDWAN300) v1.0 Designing Cisco Enterprise Networks (ENSLD) v1.0 Designing Cisco Enterprise Wireless Networks (ENWLSD) v1.0 Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.1 Implementing Automation for Cisco Enterprise Solutions (ENAUI) v1.0 CCIE Enterprise Infrastructure Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 CCIE Enterprise Wireless Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 Product and Technology Training Implementing and Administering Cisco Solutions (CCNA) v1.0 Developing Applications and Automating Workflows Using Cisco Core Platforms (DEVASC) v1.0 Developing Applications Using Cisco Core Platforms and APIs (DEVCOR) v1.0 Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT) v1.0 Implementing DevOps Solutions and Practices Using Cisco Platforms (DEVOPS) v1.0 Developing Applications for Cisco Webex and Webex Devices (DEVWBX) v1.0 Implementing Automation for Cisco Enterprise Solutions (ENAUI) v1.0 Implementing Automation for Cisco Collaboration Solutions (CLAUI) v1.0 Implementing Automation for Cisco Data Center Solutions (DCAUI) v1.0 Implementing Automation for Cisco Security Solutions (SAUI) v1.0 Implementing Automation for Cisco Service Provider Solutions (SPAUI) v1.0 Introducing Automation for Cisco Solutions (CSAU) v1.0 Cisco Certified Technician Supporting Cisco Routing and Switching Network Devices (RSTECH) v3.0 Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 Implementing Cisco SD-WAN Solutions (SDWAN300) v1.0 Designing Cisco Enterprise Networks (ENSLD) v1.0 Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.1 Cisco NCS 2000 Deploying 96-Channel Flex Spectrum (OPT201) v3.0 Cisco Digital Network Architecture Implementation Essentials (DNAIE) v2.0 Understanding Cisco Industrial IoT Networking Foundation (INFND) v1.0 Programming Use Cases for Cisco Digital Network Architecture v1.0 (DNAPUC) v1.0 Engineering Cisco Meraki Solutions Part 1 (ECMS1) v1.0 Deploying Cisco SD-Access (ENSDA) v1.1 Cisco SD-WAN Operation and Deployment (ENSDW) v1.0 Introduction to Cisco IOS XR (IOSXR100) v2.0 Cisco IOS XR System Administration (IOSXR200) v1.1 Cisco IOS XR Basic Troubleshooting (IOSXR201) v1.1 Cisco ASR 9000 Series IOS XR 64-Bit Software Migration and Operational Enhancements (IOSXR211) v1.0 Cisco IOS XR Layer 3 VPN Implementation and Verification (IOSXR301) v1.1 Cisco IOS XRMulticast Routing Implementation and Verification (IOSXR302) v1.1 Cisco IOS XR Broadband Network Gateway Implementation and Verification (IOSXR304) v1.0 NSO Essentials for Programmers and Network Architects (NSO201) v3.0 Cisco NSO Administration and DevOps (NSO303) v3.0 Cisco Optical Technology Advanced (OPT300) v2.0 Implementing Segment Routing on Cisco IOS XR (SEGRTE201) v2.0 Operating and Implementing Cisco WAN Automation Engine (WAE200) v3.0 Implementing Cisco Virtual Wide Area Application Services (VWAAS) v1.0 Configuring and Operating Cisco EPN Manager (EPNM100) v3.0 Cisco Elastic Services Controller (ESC300) v2.0 Product and Technology Training Deploying Cloud Connect Solutions with Cisco Cloud Services Router 1000V (CLDCSR) v1.0 Implementing Cisco Multicast (MCAST) v2.0 Cisco Prime Central Intermediate ? Administration and Operations (CPCI-AO) v1.0 Cisco Prime Network Intermediate ? Administration and Operation (CPNI-AO) v1.1 Cisco Prime Provisioning (CPP) v6.5 Cisco Prime Performance Manager (CPPERF) v1.0 Implementing Cisco Catalyst 9000 Switches (ENC9K) v1.0 Cisco Aggregation Services Router 9000 Series Essentials (ASR9KE) v6.0 Network Convergence System 5500 Series Router (NCS5500HW) v1.0 Cisco DNA Center Fast-Start Use Cases (A-SDA-FASTSTART) Getting Started with DNA Center Assurance (A-DNAC-ASSUR) v1.0 Overview of Cisco DNA Center Fast Start Use Cases for System Engineers (P-SDA-SYSEF) Planning and Deploying SD-Access Fundamentals (For Customers) (CUST-SDA-FUND) v1.0 Preparing the Identity Services Engine (ISE) for SD-Access (For Customers) (CUST-SDA-ISE) v1.0 SD-Access 1.2 Update Supplement (A-SDA-12UPDT) The SD-WAN Mastery Collection - Getting Started (For Customers) v1.0 (A-SDW-START) The SD-WAN Mastery Collection - Deploying the Data Plane (For Customers) v1.0 (A-SDW-DATPLN) The SD-WAN Mastery Collection - Developing the Overlay Topology (For Customers) v1.0 (A-SDW-OVRLAY) The SD-WAN Mastery Collection - Managing the Application Experience (For Customers) v1.0 (A-SDW-APPEXP) The SD-WAN Mastery Collection - Bringing Up the Control Plane Devices (For Customers) v1.0 (A-SDW-CTRPLN) Securing Branch Internet and Cloud Access with Cisco SD-WAN (A-SDW-BRSEC) Programming for Network Engineers (PRNE) v1.0 Cisco Optical Technology Intermediate (OPT200) v2.0 Advanced Implementing and Troubleshooting MPLS VPN Networks (AMPLS) BGP Bootcamp (BGP) Building Core Networks with OSPF, IS-IS, BGP and MPLS Bootcamp (BCN) Configuring BGP on Cisco Routers (BGP) v4.0 Implementing Cisco MPLS v3.0 Internetworking Technology Overview (ITO) Introduction to IP Multicast Bootcamp Introduction to IPsec VPN Bootcamp (IPsec VPN) Introduction to IPv6 Bootcamp (IPv6) Introduction to MPLS-VPN Bootcamp (MPLS-VPN) LAN Switching Bootcamp (LAN-SW) RP Bootcamp Troubleshooting for Network Support Engineers

Cisco Digital Learning Networking
Delivered OnlineFlexible Dates
Price on Enquiry

CompTIA Network+ Certification (N10-007)

4.7(26)

By Academy for Health and Fitness

** Trust The 35000+ Students Who Are Learning with Us & Kick Starting Their Career! ** Deal Price is Active; Save Now- £405! Offer Ends Soon; Hurry Up!! Are you looking to improve your current abilities or make a career move? Our unique CompTIA Network+ Certification (N10-007) Course might help you get there! Expand your expertise with high-quality training - study and get an expertly designed, great-value training experience. Learn from industry professionals and quickly equip yourself with the specific knowledge and skills you need to excel in your chosen career through the online training course. This online training course is accredited by CPD with 20 CPD points for professional development. Students can expect to complete this training course in around 23 hours. You'll also get dedicated expert assistance from us to answer any queries you may have while studying our course. The course is broken down into several in-depth modules to provide you with the most convenient and rich learning experience possible. Upon successful completion of the course, you will receive an instant e-certificate as proof of comprehensive skill development and competency. Add these amazing new skills to your resume and boost your employability by simply enrolling on this course. With this comprehensive course, you can achieve your dreams and train for your ideal career. The course provides students with an in-depth learning experience that they can work through at their own pace to enhance their professional development. You'll get a Free Student ID card by enrolling in this course. This ID card entitles you to discounts on bus tickets, movie tickets, and library cards. Enrolling on the course will ensure that you land your dream career faster than you thought possible. Stand out from the crowd and train for the job you want with the program. Experts created the CompTIA Network+ Certification (N10-007) course to provide a rich and in-depth training experience for all students who enrol in it. Enrol in the course right now and you'll have immediate access to all of the course materials. Then, from any internet-enabled device, access the course materials and learn when it's convenient for you. Start your learning journey straight away with this course and take a step toward a brighter future! Why Prefer this CompTIA Network+ Certification (N10-007) Course? Opportunity to earn a certificate accredited by CPD after completing this course Student ID card with amazing discounts - completely for FREE! (£10 postal charges will be applicable for international delivery) Standards-aligned lesson planning Innovative and engaging content and activities Assessments that measure higher-level thinking and skills Complete the program in your own time, at your own pace Each of our students gets full 24/7 tutor support *** Course Curriculum *** Here is the curriculum breakdown of course: Section 01: Introduction Introduction Section 02: Network Models What is a Model? OSI vs. TCP/IP Model Walking Through OSI and TCP/IP Meet the Frame The MAC Address Broadcast vs. Unicast Introduction to IP Addressing Packets and Ports Section 03: Cabling and Topology Network Topologies Coaxial Cabling Twisted Pair Cabling Cat Ratings Fiber Optic Cabling Fire Ratings Legacy Network Connections Section 04: Ethernet Basics What is Ethernet? Ethernet Frames Early Ethernet The Daddy of Ethernet, 10BaseT Terminating Twisted Pair Hubs vs. Switches Section 05: Modern Ethernet 100BaseT Connecting Switches Gigabit Ethernet and 10-Gigabit Ethernet Transceivers Connecting Ethernet Scenarios Section 06: Installing a Physical Network Introduction to Structured Cabling Terminating Structured Cabling Equipment Room Alternative Distribution Panels Testing Cable Troubleshooting Structured Cabling, Part 1 Troubleshooting Structured Cabling, Part 2 Using a Toner and Probe Wired Connection Scenarios Section 07: TCP/IP Basics Introduction to IP Addressing and Binary Introduction to ARP Classful Addressing Subnet Masks Subnetting with CIDR More CIDR Subnetting Practice Dynamic and Static IP Addressing Rogue DHCP Servers Special IP Addresses IP Addressing Scenarios Section 08: Routing Introducing Routers Understanding Ports Network Address Translation Implementing NAT Forwarding Ports Tour of a SOHO Router SOHO vs. Enterprise Static Routes Dynamic Routing RIP OSPF BGP Section 09: TCP/IP Applications TCP and UDP ICMP and IGMP Handy Tools Introduction to Wireshark Introduction to netstat Web Servers FTP E-mail Servers and Clients Securing E-mail Telnet and SSH Network Time Protocol Network Service Scenarios Section 10: Network Naming Understanding DNS Applying DNS The Hosts File Net Command Windows Name Resolution Dynamic DNS DNS Troubleshooting Section 11: Securing TCP/IP Making TCP/IP Secure Symmetric Encryption Asymmetric Encryption Cryptographic Hashes Identification Access Control AAA Kerberos/EAP Single Sign-On Certificates and Trust Certificate Error Scenarios Section 12: Advanced Networking Devices Understanding IP Tunneling Virtual Private Networks Introduction to VLANs InterVLAN Routing Interfacing with Managed Switches Switch Port Protection Port Bonding Port Mirroring Quality of Service IDS vs. IPS Proxy Servers Load Balancing Device Placement Scenarios Section 13: IPv6 Introduction to IPv6 IPv6 Addressing IPv6 in Action IPv4 and IPv6 Tunneling Section 14: Remote Connectivity Telephony Technologies Optical Carriers Packet Switching Connecting with Dial-up Digital Subscriber Line (DSL) Connecting with Cable Modems Connecting with Satellites ISDN and BPL Remote Desktop Connectivity Advanced Remote Control Systems Section 15: Wireless Networking Introduction to 802.11 802.11 Standards Power over Ethernet (PoE) Antennas Wireless Security Standards Implementing Wireless Security Threats to Your Wireless Network Retro Threats Wi-Fi Protected Setup (WPS) Enterprise Wireless Installing a Wireless Network Wireless Scenarios More Wireless Scenarios Section 16: Virtualization and Cloud Computing Virtualization Basics Cloud Ownership Cloud Implementation Your First Virtual Machine NAS and SAN Platform as a Service (PaaS) Software as a Service (SaaS) Infrastructure as a Service (IaaS) Section 17: Mobile Networking Cellular Technologies Mobile Connectivity Deploying Mobile Devices Mobile Access Control Section 18: Building a Real-World Network Network Types Network Design Power Management Unified Communications Network Documentation Contingency Planning Predicting Hardware Failure Backups Section 19: Managing Risk What is Risk Management? Security Policies Change Management1 User Training Standard Business Documentation Mitigating Network Threats High Availability Section 20: Protecting Your Network Denial of Service Malware Social Engineering Access Control Man-in-the-Middle Introduction to Firewalls Firewalls DMZ Hardening Devices Physical Security Controls Testing Network Security Network Protection Scenarios Section 21: Network Monitoring SNMP Documenting Logs System Monitoring SIEM (Security Information and Event Management) Section 22: Network Troubleshooting Network Troubleshooting Theory Assessment Process Once you have completed all the modules in the CompTIA Network+ Certification (N10-007) course, you can assess your skills and knowledge with an optional assignment. Our expert trainers will assess your assignment and give you feedback afterwards. Show off Your New Skills with a Certificate of Completion The learners have to complete the assessment of this course to achieve the CPD accredited certificate. Digital certificates can be ordered for only £10. The learner can purchase printed hard copies inside the UK for £29, and international students can purchase printed hard copies for £39. CPD 20 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Is This CompTIA Network+ Certification (N10-007) Course Right for You? Anyone interested in learning more about this subject should take this course. This course will help you grasp the basic concepts as well as develop a thorough understanding of the subject. All are welcome to take this course. There are no prerequisites for enrolment, and you can access the course materials from any location in the world. Requirements The CompTIA Network+ Certification (N10-007) program does not require any prior knowledge; everyone may participate! This course is open to anyone interested in learning from anywhere in the world. Every student must be over the age of 16 and have a passion for learning and literacy. This 100% online course can be accessed from any internet-connected device, such as a computer, tablet, or smartphone. This course allows you to study at your speed and grow a quality skillset. Career path After completing this CompTIA Network+ Certification (N10-007) Course, you are to start your career or begin the next phase of your career in this field. Our entire course will help you to gain a position of respect and dignity over your competitors. The certificate enhances your CV and helps you find work in the field concerned.

CompTIA Network+ Certification (N10-007)
Delivered Online On Demand23 hours
£12

Advanced ESP32

By Packt

Implement OTA programming, FreeRTOS and deep sleep in the ESP32

Advanced ESP32
Delivered Online On Demand3 hours 33 minutes
£29.99

Office 365 Getting the Most out of OneDrive

By iStudy UK

This course would be perfect for individuals who prefer to learn more about Microsoft OneDrive, part of the Office 365 environment. You can store all sort of file on OneDrive, including photos, video, documents, and share files with others within the organisation and outside users. You can access the data from both Windows PCs and mobile devices. In this Office 365 Getting the Most out of OneDrive course, you'll learn about Microsoft OneDrive and get the most out of using OneDrive. Learn to access data, modify the view and sorting options, open and save files, organise folders and share files, view file details and many more. Besides, you'll also learn how to work with Version History, delete files, and sync files. What Will I Learn? Access OneDrive files Modify views and sorting Open and save files Create and rearrange folders Share files Work with version history Delete and sync files Requirements Familiarity with cloud-based storage concepts and using the Internet Familiarity with Microsoft Office applications Who is the target audience? Students who want to learn more about Microsoft OneDrive, part of the Office 365 environment. Introduction Introduction FREE 00:02:00 Getting Started with OneDrive Overview 00:02:00 Accessing Files 00:06:00 Changing the View and Sorting 00:06:00 Opening a File 00:05:00 Saving Files to OneDrive 00:06:00 Creating and Rearranging Folders 00:05:00 Sharing Files 00:07:00 Viewing File Details 00:05:00 Working with Version History 00:06:00 DeletingFiles 00:04:00 Restoring Your OneDrive 00:02:00 SyncingFiles 00:06:00 Copying Files to SharePoint 00:03:00 Conclusion Course Recap 00:03:00 Course Certification

Office 365 Getting the Most out of OneDrive
Delivered Online On Demand1 hour 8 minutes
£25

Palo Alto Networks : Strata Foundations

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Security Engineers Network Engineers Support staff Overview This course is intended to provide an understanding of Palo Alto Networks Next-Generation firewall technologies enable the student to perform a basic installation of Palo Alto Networks Next-Generation firewalls. Upon completion of this course, students will be able to: Explain the features and advantages of the Palo Alto Networks next-generation firewall architecture Understand the capabilities of App-ID, Content-ID, and User-ID Perform the basic configuration of the firewall including: Interfaces and virtual routers NAT Policies Security zones Objects Security policies Content security profiles View logs and basic reports This course was formerly named Palo Alto Networks Foundations of Next Generation Firewalls (EDU-150). ** Our foundation classes are just introductory trainings, NOT a full technical training. Your network has expanded beyond your organization\'s boundaries. Cloud locations and remote users (often using personal devices) have \'distributed\' the surface you need to both enable and protect.At the same time, the motivations of attackers and their sophistication have continued to evolve.Palo Alto Networks' next-generation firewalls are all based on a consistent Single-Pass Architecture, enabling security capability that is unique in the industry. This architecture is implemented in a portfolio of both physical and virtual appliances, designed to cover a range of performance and use case requirements.Features and management are consistent across the portfolio. Integration with GlobalProtect? mobile security service extends policy-based security to mobile devices (whether on-premises or remote). Integration with our threat intelligence services keeps information up to date for the firewall (e.g., URL categories, threat signatures). WildFire? cloud-based malware analysis environment integration supports a rapid \'feedback loop\' that enables the firewall to stop advanced threats throughout the attack lifecycle. Course Outline Module 0: Introduction Module 1: Platforms & Architecture Module 2: Getting Started Module 3: Basic Administration Module 4: Connectivity Module 5: Security Module 6: Logging & Reporting Additional course details: Nexus Humans Palo Alto Networks : Strata Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Strata Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks : Strata Foundations
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus CyberSAFE Extended Edition 2019 (CBS-310)

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for This course is designed for the non-technical end user of computers, mobile devices, networks, and the Internet, to enable you to use technology more securely to minimize digital risks. This course is also designed for you to prepare for the Certified CyberSAFE credential. You can obtain your Certified CyberSAFE certificate by completing the Certified CyberSAFE credential process on the CHOICE platform following the course presentation. Overview In this course, you will identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect yourself from those risks. You will: Identify the need for security Secure devices like desktops, laptops, smartphones, and more Use the Internet securely Regardless of your computer experience, this class will help you become more aware of technology ðrelated risks and what you can do to protect yourself and your organization from them. This course will help you to: ? Understand security compliance needs and requirements ? Recognize and avoid phishing and other social engineering ? Recognize and avoid viruses, ransomware, and other malware ? Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud. In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely. Course includes access to the CyberSAFE assessment. Upon successful completion of the assessment, learners will receive the CyberSAFE credential and digital badge. Identifying the Need for Security Identify Security Compliance Requirements Recognize Social Engineering and Avoid Phishing and other Attacks Securing Devices Maintain Physical Security of Devices Use Passwords for Security Protect Your Data Identify and Mitigate Viruses, Ransomware, and other Malware Use Wireless Devices Securely Using the Internet Securely Browse the Web Safely Use Email Securely Use Social Networking Securely Use Cloud Services Securely Additional course details: Nexus Humans CertNexus CyberSAFE Extended Edition 2019 (CBS-310) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus CyberSAFE Extended Edition 2019 (CBS-310) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus CyberSAFE Extended Edition 2019 (CBS-310)
Delivered OnlineFlexible Dates
Price on Enquiry

Data Visualization and Reporting with Power BI

5.0(10)

By Apex Learning

Overview This comprehensive course on Data Visualization and Reporting with Power BI will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Data Visualization and Reporting with Power BI comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Data Visualization and Reporting with Power BI. It is available to all students, of all academic backgrounds. Requirements Our Data Visualization and Reporting with Power BI is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 15 sections • 140 lectures • 14:25:00 total length •Welcome!: 00:01:00 •What is Power BI?: 00:03:00 •Download & Installing Power BI Desktop: 00:04:00 •Getting to know the interface: 00:03:00 •Mini Project: Transform Data: 00:07:00 •Mini Project: Visualize Data: 00:05:00 •Mini Project: Creating a Data Model: 00:07:00 •Course Outline: What will you learn in this course?: 00:05:00 •How to learn best with this course?: 00:03:00 •Creating our initial project file: 00:04:00 •Working with the attached project files: 00:04:00 •Exploring the Query Editor: 00:06:00 •Connecting to our data source: 00:07:00 •Editing rows: 00:08:00 •Changing data types: 00:08:00 •Replacing values: 00:03:00 •Close & Apply: 00:03:00 •Connecting to a csv file: 00:03:00 •Connecting to a web page: 00:05:00 •Extracting characters: 00:06:00 •Splitting & merging columns: 00:09:00 •Creating conditional columns: 00:06:00 •Creating columns from examples: 00:09:00 •Merging Queries: 00:17:00 •Pivoting & Unpivoting: 00:06:00 •Appending Queries: 00:08:00 •Practice & Solution: Population table: 00:15:00 •The Fact-Dimension-Model: 00:09:00 •Practice: Load the dimension table: 00:04:00 •Organizing our queries in groups: 00:03:00 •Entering data manually: 00:05:00 •Creating an index column: 00:03:00 •Workflow & more transformations: 00:05:00 •Module summary: 00:05:00 •Exercise 1 - Instruction: 00:02:00 •Exercise 1 - Exercise Solution: 00:11:00 •Advanced Editor - Best practices: 00:09:00 •Performance: References vs. Duplicating: 00:10:00 •Performance: Enable / Disable Load & Report Refresh: 00:05:00 •Group by: 00:05:00 •Mathematical Operations: 00:05:00 •Run R Script: 00:15:00 •Using Parameters to dynamically transform data: 00:06:00 •M formula language: Basics: 00:07:00 •M formula language: Values, Lists & Tables: 00:14:00 •M formula language: Functions: 00:13:00 •M formula language: More functions & steps: 00:05:00 •Exercise 2 - Instructions: 00:01:00 •Exercise 2 - solution: 00:05:00 •Understanding the relationship: 00:05:00 •Create & edit relationships: 00:06:00 •One-to-many & one-to-one relationship: 00:06:00 •Many-to-many (m:n) relationship: 00:08:00 •Cross filter direction: 00:06:00 •Activate & deactivate relationships: 00:06:00 •Model summary: 00:03:00 •Exercise 3 Create Model: 00:02:00 •Exercise 3 Solution: 00:02:00 •Our first visual: 00:08:00 •The format tab: 00:12:00 •Understanding tables: 00:10:00 •Conditional formatting: 00:09:00 •The Pie Chart: 00:06:00 •All about the filter visual: 00:13:00 •The filter pane for developers: 00:09:00 •Cross filtering & edit interactions: 00:04:00 •Syncing slicers across pages: 00:07:00 •Creating drill downs: 00:08:00 •Creating drill throughs: 00:07:00 •The tree map visual: 00:07:00 •The decomposition tree: 00:05:00 •Understanding the matrix visual: 00:05:00 •Editing pages: 00:07:00 •Buttons & Actions: 00:09:00 •Bookmarks to customize your report: 00:10:00 •Analytics and Forecasts with line charts: 00:10:00 •Working with custom visuals: 00:07:00 •Get data using R Script & R Script visual: 00:08:00 •Asking questions - Q&A visual: 00:04:00 •Wrap up - data visualization: 00:08:00 •Python in Power BI - Plan of attack: 00:03:00 •Setting up Python for Power BI: 00:03:00 •Transforming data using Python: 00:11:00 •Creating visualizations using Python: 00:08:00 •Violin plots, pair plots & ridge plots using Python: 00:15:00 •Machine learning (BayesTextAnalyzer) using Python: 00:00:00 •Performance & Troubleshooting: 00:03:00 •Introduction: 00:01:00 •Show Empathy & Identify the Requirement: 00:03:00 •Finding the Most Suitable KPI's: 00:02:00 •Choose an Effective Visualization: 00:04:00 •Make Use of Natural Reading Pattern: 00:03:00 •Tell a Story Using Visual Cues: 00:05:00 •Avoid Chaos & Group Information: 00:02:00 •Warp Up - Storytelling with Data: 00:02:00 •Introduction: 00:03:00 •The project data: 00:04:00 •Measures vs. Calculated Columns: 00:15:00 •Automatically creating a date table in DAX: 00:08:00 •CALENDAR: 00:05:00 •Creating a complete date table with features: 00:04:00 •Creating key measure table: 00:03:00 •Aggregation functions: 00:06:00 •The different versions of COUNT: 00:14:00 •SUMX - Row based calculations: 00:09:00 •CALCULATE - The basics: 00:11:00 •Changing the context with FILTER: 00:07:00 •ALL: 00:08:00 •ALL SELECTED: 00:03:00 •ALL EXCEPT: 00:07:00 •How to go on now?: 00:03:00 •Power BI Pro vs Premium & Signing up: 00:04:00 •Exploring the interface: 00:04:00 •Discovering your workspace: 00:03:00 •Connecting Power BI Desktop & Cloud: 00:04:00 •Understanding datasets & reports: 00:03:00 •Working on reports: 00:04:00 •Updating reports from Power BI Desktop: 00:04:00 •Creating and working with workspaces: 00:07:00 •Installing & using a data gateway: 00:13:00 •Get Quick Insights: 00:03:00 •Creating dashboards: 00:04:00 •Sharing our results through Apps: 00:10:00 •Power BI Mobile App: 00:05:00 •Creating the layout for the Mobile App: 00:04:00 •Wrap up - Power BI Cloud: 00:07:00 •Introduction: 00:03:00 •Creating a Row-Level Security: 00:05:00 •Row-Level Security in the Cloud: 00:04:00 •Row-Level Security & Data Model: 00:05:00 •Dynamic Row-Level Security: 00:07:00 •Dynamic Many-to-Many RLS: 00:04:00 •Hierarchical Row-Level Security: 00:13:00 •JSON & REST API: 00:10:00 •Setting up a local MySQL database: 00:14:00 •Connecting to a MySQL database in Power BI: 00:05:00 •Connecting to a SQL database (PostgreSQL): 00:05:00 •Congratulations & next steps: 00:06:00 •The End: 00:01:00 •Resources - Data Visualization and Reporting with Power BI: 00:00:00

Data Visualization and Reporting with Power BI
Delivered Online On Demand14 hours 25 minutes
£12

Complete Microsoft Power BI 2021

5.0(10)

By Apex Learning

Overview This comprehensive course on Complete Microsoft Power BI 2021 will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Complete Microsoft Power BI 2021 comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Complete Microsoft Power BI 2021. It is available to all students, of all academic backgrounds. Requirements Our Complete Microsoft Power BI 2021 is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 15 sections • 140 lectures • 14:25:00 total length •Welcome!: 00:01:00 •What is Power BI?: 00:03:00 •Download & Installing Power BI Desktop: 00:04:00 •Getting to know the interface: 00:03:00 •Mini Project: Transform Data: 00:07:00 •Mini Project: Visualize Data: 00:05:00 •Mini Project: Creating a Data Model: 00:07:00 •Course Outline: What will you learn in this course?: 00:05:00 •How to learn best with this course?: 00:03:00 •Creating our initial project file: 00:04:00 •Working with the attached project files: 00:04:00 •Exploring the Query Editor: 00:06:00 •Connecting to our data source: 00:07:00 •Editing rows: 00:08:00 •Changing data types: 00:08:00 •Replacing values: 00:03:00 •Close & Apply: 00:03:00 •Connecting to a csv file: 00:03:00 •Connecting to a web page: 00:05:00 •Extracting characters: 00:06:00 •Splitting & merging columns: 00:09:00 •Creating conditional columns: 00:06:00 •Creating columns from examples: 00:09:00 •Merging Queries: 00:17:00 •Pivoting & Unpivoting: 00:06:00 •Appending Queries: 00:08:00 •Practice & Solution: Population table: 00:15:00 •The Fact-Dimension-Model: 00:09:00 •Practice: Load the dimension table: 00:04:00 •Organizing our queries in groups: 00:03:00 •Entering data manually: 00:05:00 •Creating an index column: 00:03:00 •Workflow & more transformations: 00:05:00 •Module summary: 00:05:00 •Exercise 1 - Instruction: 00:02:00 •Exercise 1 - Exercise Solution: 00:11:00 •Advanced Editor - Best practices: 00:09:00 •Performance: References vs. Duplicating: 00:10:00 •Performance: Enable / Disable Load & Report Refresh: 00:05:00 •Group by: 00:05:00 •Mathematical Operations: 00:05:00 •Run R Script: 00:15:00 •Using Parameters to dynamically transform data: 00:06:00 •M formula language: Basics: 00:07:00 •M formula language: Values, Lists & Tables: 00:14:00 •M formula language: Functions: 00:13:00 •M formula language: More functions & steps: 00:05:00 •Exercise 2 - Instructions: 00:01:00 •Exercise 2 - solution: 00:05:00 •Understanding the relationship: 00:05:00 •Create & edit relationships: 00:06:00 •One-to-many & one-to-one relationship: 00:06:00 •Many-to-many (m:n) relationship: 00:08:00 •Cross filter direction: 00:06:00 •Activate & deactivate relationships: 00:06:00 •Model summary: 00:03:00 •Exercise 3 Create Model: 00:02:00 •Exercise 3 Solution: 00:02:00 •Our first visual: 00:08:00 •The format tab: 00:12:00 •Understanding tables: 00:10:00 •Conditional formatting: 00:09:00 •The Pie Chart: 00:06:00 •All about the filter visual: 00:13:00 •The filter pane for developers: 00:09:00 •Cross filtering & edit interactions: 00:04:00 •Syncing slicers across pages: 00:07:00 •Creating drill downs: 00:08:00 •Creating drill throughs: 00:07:00 •The tree map visual: 00:07:00 •The decomposition tree: 00:05:00 •Understanding the matrix visual: 00:05:00 •Editing pages: 00:07:00 •Buttons & Actions: 00:09:00 •Bookmarks to customize your report: 00:10:00 •Analytics and Forecasts with line charts: 00:10:00 •Working with custom visuals: 00:07:00 •Get data using R Script & R Script visual: 00:08:00 •Asking questions - Q&A visual: 00:04:00 •Wrap up - data visualization: 00:08:00 •Python in Power BI - Plan of attack: 00:03:00 •Setting up Python for Power BI: 00:03:00 •Transforming data using Python: 00:11:00 •Creating visualizations using Python: 00:08:00 •Violin plots, pair plots & ridge plots using Python: 00:15:00 •Machine learning (BayesTextAnalyzer) using Python: 00:00:00 •Performance & Troubleshooting: 00:03:00 •Introduction: 00:01:00 •Show Empathy & Identify the Requirement: 00:03:00 •Finding the Most Suitable KPI's: 00:02:00 •Choose an Effective Visualization: 00:04:00 •Make Use of Natural Reading Pattern: 00:03:00 •Tell a Story Using Visual Cues: 00:05:00 •Avoid Chaos & Group Information: 00:02:00 •Warp Up - Storytelling with Data: 00:02:00 •Introduction: 00:03:00 •The project data: 00:04:00 •Measures vs. Calculated Columns: 00:15:00 •Automatically creating a date table in DAX: 00:08:00 •CALENDAR: 00:05:00 •Creating a complete date table with features: 00:04:00 •Creating key measure table: 00:03:00 •Aggregation functions: 00:06:00 •The different versions of COUNT: 00:14:00 •SUMX - Row based calculations: 00:09:00 •CALCULATE - The basics: 00:11:00 •Changing the context with FILTER: 00:07:00 •ALL: 00:08:00 •ALL SELECTED: 00:03:00 •ALL EXCEPT: 00:07:00 •How to go on now?: 00:03:00 •Power BI Pro vs Premium & Signing up: 00:04:00 •Exploring the interface: 00:04:00 •Discovering your workspace: 00:03:00 •Connecting Power BI Desktop & Cloud: 00:04:00 •Understanding datasets & reports: 00:03:00 •Working on reports: 00:04:00 •Updating reports from Power BI Desktop: 00:04:00 •Creating and working with workspaces: 00:07:00 •Installing & using a data gateway: 00:13:00 •Get Quick Insights: 00:03:00 •Creating dashboards: 00:04:00 •Sharing our results through Apps: 00:10:00 •Power BI Mobile App: 00:05:00 •Creating the layout for the Mobile App: 00:04:00 •Wrap up - Power BI Cloud: 00:07:00 •Introduction: 00:03:00 •Creating a Row-Level Security: 00:05:00 •Row-Level Security in the Cloud: 00:04:00 •Row-Level Security & Data Model: 00:05:00 •Dynamic Row-Level Security: 00:07:00 •Dynamic Many-to-Many RLS: 00:04:00 •Hierarchical Row-Level Security: 00:13:00 •JSON & REST API: 00:10:00 •Setting up a local MySQL database: 00:14:00 •Connecting to a MySQL database in Power BI: 00:05:00 •Connecting to a SQL database (PostgreSQL): 00:05:00 •Congratulations & next steps: 00:06:00 •The End: 00:01:00 •Resources - Complete Microsoft Power BI 2021: 00:00:00

Complete Microsoft Power BI 2021
Delivered Online On Demand14 hours 25 minutes
£12

CompTIA Security+ (SY0-601)

5.0(10)

By Apex Learning

Overview This comprehensive course on CompTIA Security+ (SY0-601) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Security+ (SY0-601) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA Security+ (SY0-601). It is available to all students, of all academic backgrounds. Requirements Our CompTIA Security+ (SY0-601) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 14 sections • 164 lectures • 20:35:00 total length •Introduction to CompTIA Security+ SY0-601: 00:03:00 •About the CompTIA Security+ SY0-601 Exam: 00:03:00 •Defining Risk: 00:08:00 •Threats and Vulnerabilities: 00:07:00 •Threat Intelligence: 00:11:00 •Risk Management Concepts: 00:07:00 •Security Controls: 00:09:00 •Risk Assessments and Treatments: 00:06:00 •Quantitative Risk Assessments: 00:07:00 •Qualitative Risk Assessments: 00:04:00 •Business Impact Analysis: 00:09:00 •Data Types and Roles: 00:11:00 •Security and the Information Life Cycle: 00:09:00 •Data Destruction: 00:06:00 •Personnel Risk and Policies: 00:10:00 •Third-Party Risk Management: 00:09:00 •Agreement Types: 00:07:00 •Exam Question Review: 00:02:00 •Wiping Disks with the dd Command Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Cryptography Basics: 00:16:00 •Data Protection: 00:09:00 •Cryptographic Methods: 00:07:00 •Symmetric Cryptosystems: 00:13:00 •Symmetric Block Modes: 00:08:00 •Asymmetric Cryptosystems: 00:13:00 •Diffie-Hellman: 00:07:00 •Hashing: 00:09:00 •Understanding Digital Certificates: 00:08:00 •Trust Models: 00:05:00 •Public Key Infrastructure: 00:04:00 •Certificate Types: 00:14:00 •Touring Certificates: 00:09:00 •Cryptographic Attacks: 00:05:00 •Password Cracking: 00:10:00 •Password Cracking Demo: 00:06:00 •Exam Question Review: 00:02:00 •SSH Public Key Authentication Lab: 00:09:00 •Ask Me Anything (AMA): 00:02:00 •Identification, Authentication, and Authorization: 00:08:00 •Enabling Multifactor Authentication: 00:05:00 •Authorization: 00:05:00 •Accounting: 00:05:00 •Authentication Methods: 00:14:00 •Access Control Schemes: 00:07:00 •Account Management: 00:13:00 •Network Authentication: 00:09:00 •Identity Management Systems: 00:06:00 •Exam Question Review: 00:02:00 •Creating LInux Users and Groups Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Touring the CLI: 00:16:00 •Shells: 00:06:00 •The Windows Command Line: 00:05:00 •Microsoft PowerShell: 00:13:00 •Linux Shells: 00:12:00 •Python Scripts: 00:07:00 •Windows Command-Line Tools: 00:16:00 •Linux Command-Line Tools: 00:10:00 •Network Scanners: 00:05:00 •Network Scanning with Nmap: 00:09:00 •Network Protocol Analyzers: 00:08:00 •Using Wireshark to Analyze Network Traffic: 00:09:00 •Using tcpdump to Analyze Network Traffic: 00:08:00 •Log Files: 00:09:00 •Centralized Logging: 00:09:00 •Configuring Linux Log Forwarding: 00:08:00 •Exam Question Review: 00:03:00 •Lunux Shell Script Lab: 00:07:00 •Nmap Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00 •Malware: 00:14:00 •Weak Configurations: 00:12:00 •Common Attacks: 00:09:00 •Driver and Overflow Attacks: 00:08:00 •Password Attacks: 00:08:00 •Bots and Botnets: 00:06:00 •Disk RAID Levels: 00:10:00 •Securing Hardware: 00:11:00 •Securing Endpoints: 00:09:00 •Exam Question Review: 00:02:00 •Linux Software RAID Lab: 00:08:00 •Ask Me Anything (AMA): 00:02:00 •The OSI Model: 00:13:00 •ARP Cache Poisoning: 00:09:00 •Other Layer 2 Attacks: 00:05:00 •Network Planning: 00:07:00 •Load Balancing: 00:06:00 •Securing Network Access: 00:06:00 •Honeypots: 00:06:00 •Firewalls: 00:11:00 •Proxy Servers: 00:06:00 •Network and Port Address Translation: 00:07:00 •IP Security (IPsec): 00:09:00 •Virtual Private Networks (VPNs): 00:10:00 •Intrusion Detection and Prevention Systems (IDS/IPS): 00:13:00 •Exam Question Review: 00:03:00 •Linux Snort IDS Lab: 00:07:00 •Ask Me Anything (AMA): 00:01:00 •Wi-Fi Encryption Standards: 00:10:00 •RFID, NFC, and Bluetooth: 00:07:00 •Wi-Fi Coverage and Performance: 00:08:00 •Wi-Fi Discovery and Attacks: 00:12:00 •Cracking WPA2: 00:10:00 •Wi-Fi Hardening: 00:11:00 •Exam Question Review: 00:02:00 •WPA2 Cracking Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Defining a Public Server: 00:01:00 •Common Attacks and Mitigations: 00:10:00 •Containers and Software-Defined Networking: 00:11:00 •Hypervisors and Virtual Machines: 00:08:00 •Cloud Deployment Models: 00:09:00 •Cloud Service Models: 00:08:00 •Securing the Cloud: 00:10:00 •Exam Question Review: 00:02:00 •Docker Container Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Embedded Systems: 00:13:00 •Industrial Control System (ICS): 00:07:00 •Internet of Things (IoT) Devices: 00:10:00 •Connecting to Dedicated and Mobile Systems: 00:11:00 •Security Constraints for Dedicated Systems: 00:05:00 •Mobile Device Deployment and Hardening: 00:11:00 •Exam Question Review: 00:03:00 •Smartphone Hardening Lab: 00:03:00 •Ask Me Anything (AMA): 00:02:00 •Physical Security Overview: 00:01:00 •Physical Security: 00:10:00 •Keylogger Demo: 00:05:00 •Environmental Controls: 00:05:00 •Exam Question Review: 00:02:00 •Physical Security Lab: 00:03:00 •Ask Me Anything (AMA): 00:03:00 •DNS Security: 00:05:00 •FTP Packet Capture: 00:03:00 •Secure Web and E-mail: 00:02:00 •Request Forgery Attacks: 00:05:00 •Cross-Site Scripting Attacks: 00:07:00 •Web Application Security: 01:20:00 •Web App Vulnerability Scanning: 00:06:00 •Exam Question Review: 00:03:00 •OWASP ZAP Web App Scan Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Testing Infrastructure Overview: 00:05:00 •Social Engineering: 00:06:00 •Social Engineering Attacks: 00:11:00 •Vulnerability Assessments: 00:09:00 •Penetration Testing: 00:10:00 •Security Assessment Tools: 00:12:00 •The Metasploit Framework: 00:08:00 •Exam Question Review: 00:02:00 •Hping3 Forged Packet Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Incident Response Overview: 00:03:00 •Incident Response Plans (IRPs): 00:06:00 •Threat Analysis and Mitigating Actions: 00:08:00 •Digital Forensics: 00:12:00 •Gathering Digital Evidence: 00:10:00 •Business Continuity and Alternate Sites: 00:06:00 •Data Backup: 00:10:00 •Exam Question Review: 00:01:00 •Autopsy Forensic Browser Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00

CompTIA Security+ (SY0-601)
Delivered Online On Demand20 hours 35 minutes
£12