Duration 5 Days 30 CPD hours This course is intended for Senior system administrators who wish to learn more about troubleshooting. Have earned a Red Hat Certified System Administrator (RHCSA) or have similar experience. It is recommend that students have earned a Red Hat Certified Engineer (RHCE) or have similar experience. Overview As a result of attending this course, students should be able to leverage the software development life-cycle process to plan, create, test, and provision host systems within an organization. Students should be able to demonstrate the following skills: - Installation of Red Hat Satellite 6 - Software life-cycle management of software used to provision and maintain configured hosts within a controlled production environment This course enriches your skills by providing the tools and techniques that you need to successfully diagnose, and fix, a variety of potential issues. You will work through hands-on problems in various subsystems to diagnose and fix common issues. You will learn develop the skills to apply the scientific method to a structured form of troubleshooting. You will then apply this approach in troubleshooting various types of problems, including boot issues, hardware issues, storage issues, RPM issues, network issues, third-party application issues, security issues, and kernel issues. At the end of the course, you will be empowered to complete various comprehensive review labs to test your skills. 1 - INTRODUCTION TO TROUBLESHOOTING Describe a generalized strategy for troubleshooting. 2 - TAKE PROACTIVE STEPS TO PREVENT SMALL ISSUES Prevent small issues from becoming large problems by employing proactive system administration techniques. 3 - TROUBLESHOOT BOOT ISSUES Identify and resolve issues that can affect a system's ability to boot. 4 - IDENTIFY HARDWARE ISSUES Identify hardware problems that can affect a system?s ability to operate. 5 - TROUBLESHOOT STORAGE ISSUES Identify and fix issues related to storage. 6 - TROUBLESHOOT RPM ISSUES Identify and fix problems in, and using, the package management subsystem. 7 - TROUBLESHOOT NETWORK ISSUES Identify and resolve network connectivity issues. 8 - TROUBLESHOOT APPLICATION ISSUES Debug application issues. 9 - DEAL WITH SECURITY ISSUES Identify and fix issues related to security subsystems. 10 - TROUBLESHOOT KERNEL ISSUES Identify kernel issues and assist Red Hat Support in resolving kernel issues. 11 - RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING COMPREHENSIVE REVIEW Practice and demonstrate knowledge and skills learned in Red Hat Enterprise Linux Diagnostics and Troubleshooting.
Duration 5 Days 30 CPD hours This course is intended for If you are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, the CompTIA© A+© Certification course is the first step in your preparation. Overview In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. You will:Identify the hardware components of personal computers and mobile digital devices.Identify the basic components and functions of operating systems.Identify networking and security fundamentals.Identify the operational procedures that should be followed by professional PC technicians.Install, configure, and troubleshoot display devices.Install and configure peripheral components.Manage system components.Manage data storage.Install and configure Microsoft Windows.Optimize and maintain Microsoft Windows.Work with other operating systems.Identify the hardware and software requirements for client environment configurations.Identify network technologies.Install and configure networking capabilities.Support mobile digital devices.Support printers and multifunction devices.Identify security threats, vulnerabilities, and controls.Implement security controls.Troubleshoot system-wide issues. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. Hardware Fundamentals Topic A: Personal Computer Components Topic B: Storage Devices Topic C: Mobile Digital Devices Topic D: Connection Interfaces Operating System Fundamentals Topic A: PC and Mobile Operating Systems Topic B: PC Operating System Tools and Utilities Networking & Security Fundamentals Topic A: Network Types Topic B: Network Components Topic C: Common Network Services Topic D: Cloud Concepts Topic E: Security Fundamentals Safety & Operational Procedures Topic A: Basic Maintenance Tools and Techniques Topic B: Personal and Electrical Safety Topic C: Environmental Safety and Materials Handling Topic D: Professionalism and Communication Topic E: Organizational Policies and Procedures Topic F: Troubleshooting Theory Supporting Display Devices Topic A: Install Display Devices Topic B: Configure Display Devices Topic C: Troubleshoot Video and Display Devices Installing & Configuring Peripheral Components Topic A: Install and Configure Input Devices Topic B: Install and Configure Output Devices Topic C: Install and Configure Input/Output Devices Topic D: Install and Configure Expansion Cards Managing System Components Topic A: Identify Motherboard Components and Features Topic B: Install and Configure CPUs and Cooling Systems Topic C: Install Power Supplies Topic D: Troubleshoot System Components Managing Data Storage Topic A: Identify RAM Types and Features Topic B: Troubleshoot RAM Issues Topic C: Install and Configure Storage Devices Topic D: Configure the System Firmware Topic E: Troubleshoot Hard Drives and RAID Arrays Installing & Configuring Microsoft Windows Topic A: Implement Client-Side Virtualization Topic B: Install Microsoft Windows Topic C: Use Microsoft Windows Topic D: Configure Microsoft Windows Topic E: Upgrade Microsoft Windows Optimizing & Maintaining Microsoft Windows Topic A: Optimize Microsoft Windows Topic B: Back Up and Restore System Data Topic C: Perform Disk Maintenance Topic D: Update Software Working with Other Operating Systems Topic A: The OS X Operating System Topic B: The Linux Operating System Customized Client Enviroments Topic A: Types of Common Business Clients Topic B: Custom Client Environments Networking Technologies Topic A: TCP/IP Properties and Characteristics Topic B: TCP/IP Topic C: Internet Connections Topic D: Ports and Protocols Topic E: Networking Tools Installing & Configuring Networking Capabilities Topic A: Configure Basic Windows Networking Topic B: Configure Network Perimeters Topic C: Using Windows Networking Features Topic D: Install and Configure SOHO Networks Supporting Mobile Digital Devices Topic A: Install and Configure Exterior Laptop Components Topic B: Install and Configure Interior Laptop Components Topic C: Other Mobile Devices Topic D: Mobile Device Accessories and Ports Topic E: Mobile Device Connectivity Topic F: Mobile Device Synchronization Topic G: Troubleshoot Mobile Device Hardware Supporting Printers & Multifunction Devices Topic A: Printer and Multifunction Technologies Topic B: Install and Configure Printers Topic C: Maintain Printers Topic D: Troubleshoot Printers Security Threats, Vulnerabilities, and Controls Topic A: Common Security Threats and Vulnerabilities Topic B: General Security Controls Topic C: Mobile Security Controls Topic D: Data Destruction and Disposal Methods Implementing Security Controls Topic A: Secure Operating Systems Topic B: Secure Workstations Topic C: Secure SOHO Networks Topic D: Secure Mobile Devices Troubleshooting System-Wide Issues Topic A: Troubleshoot PC Operating Systems Topic B: Troubleshoot Mobile Device Operating Systems and Applications Topic C: Troubleshoot Wired and Wireless Networks Topic D: Troubleshoot Common Security Issues Additional course details: Nexus Humans Managing and Troubleshooting PCs - Part 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing and Troubleshooting PCs - Part 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This intermediate course is for the Information Systems communications professional who is planning to install TCP/IP for z/OS and for TCP/IP users who are interested in installing and customizing IBM's TCP/IP product in interoperability environments and main applications. Overview Describe IBM's z/OS TCP/IP product offering Describe the installation requirements and system customization for the z/OS TCP/IP implementation Define network interface attachments that produce connectivity for z/OS TCP/IP communications Construct TCP/IP configuration statements for z/OS to allow operation and connectivity to an existing TCP/IP network Configure TCP/IP for z/OS for basic communications functions Construct TCP/IP configuration statements for z/OS for selected TCP/IP application protocols services This course is designed to provide the skills for basic implementation and customization of TCP/IP on z/OS. TCP/IP for z/OS introduction . z/OS system prerequisites for TCP/IP . Basic customization . Network interfaces . Name services . OMPRoute . Telnet . Enterprise Extender . SyslogD . FTP . SMTP . Additional course details: Nexus Humans CB69 IBM TCP/IP for z/OS Implementation Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CB69 IBM TCP/IP for z/OS Implementation Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for C - Level Managers IT Managers Cyber Security Personelle Engineers Information Systems Owners ISSO's CISSP Students ISO's Overview Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam. You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture. Certified Security Leadership Officerÿ course is designed for mid and upper-level managers.ÿ If you are an engineer, this course will increase your knowledge in the leading information system security teams. Plus, the C)SLO will give you an essential understanding of current security issues, best practices, and technology. With this knowledge you will then be prepared to manage the security component of an information technology project. As a Security Leadership Officer, you will be the bridge between cybersecurity and business operations. Course Outline Security Management Risk Management Encryption Information Security Access Control Concepts Incident Handling and Evidence Operations Security Network Security Additional course details: Nexus Humans C)SLO-Certified Security Leadership Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)SLO-Certified Security Leadership Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This intermediate course is for all computer professionals who will use z/OS UNIX. Overview Discuss the role of z/OS in an open systems environmentIdentify the basic terms used in z/OS UNIXDefine the components of z/OS UNIXExplain major functions provided in z/OS UNIXDiscuss opportunities for applications in a z/OS UNIX environmentIdentify z/OS base elements and optional features that make up z/OS UNIXUse the two interactive interfaces available to access the services This course describes how open standards are implemented in a z/OS system by z/OS UNIX. UNIX System Services are introduced, and the role of z/OS as a server in the open systems environment is discussed. Day 1 Welcome and introduction Unit 1. z/OS UNIX overview Unit 2. Introduction to z/OS UNIX Unit 3. Hierarchical file system Exercises Day 2 Unit 4. z/OS UNIX shell and utilities Unit 5. z/OS UNIX shell commands Unit 6. Working with the shell Unit 7. Functions in z/OS UNIX Exercises Day 3 Unit 8. Working with the z/OS UNIX environment Exercises
Duration 3 Days 18 CPD hours This course is intended for Information System Owners Analysts Ethical Hackers ISSOs Cyber Security Managers IT Engineers Overview Upon completion, the Certified Vulnerability Assessor candidate will be able to competently take the exam. This course provides a solid understanding of the tools an IT engineer needs to review an Information System. In this course, you will learn the importance of vulnerability assessments and how they are used to prevent serious cyber break-ins. Lessons include understanding malware and viruses and how they can infiltrate an organization?s network. After you take this course, you will be able to assess a company?s security posture and perform a basic vulnerability test.ÿPlus, you will be able to generate reports to guide new security implementation. Course Outline Why Vulnerability Assessment Vulnerability Types Assessing the Network Assessing Web Servers and Applications Assessing Remote and VPN Services Vulnerability Assessments & Tools of the Trade Output Analysis
Duration 5 Days 30 CPD hours This course is intended for This course is designed for technology leaders, solution developers, project managers, organizational decision makers, and other individuals seeking to demonstrate a vendor-neutral, cross-industry understanding of ethics in emerging data-driven technologies, such as AI, robotics, IoT, and data science. This course is also designed for professionals who want to pursue the CertNexus Certification Exam CET-110: Certified Ethical Emerging Technologies. Overview In this course, you will incorporate ethics into data-driven technologies such as AI, IoT, and data science. You will: Describe general concepts, theories, and challenges related to ethics and emerging technologies. Identify ethical risks. Practice ethical reasoning. Identify and mitigate safety and security risks. Identify and mitigate privacy risks. Identify and mitigate fairness and bias risks. Identify and mitigate transparency and explainability risks. Identify and mitigate accountability risks. Build an ethical organization. Develop ethical systems in technology-focused organizations. Mutually reinforcing innovations in computing and engineering are catapulting advances in technological production. From blockchain and artificial intelligence (AI) to gene editing and the Internet of Things (IoT), these advances come with tremendous opportunities for improvement in productivity, efficiency, and human well-being. But as scandals increasingly demonstrate, these advances also introduce new and serious risks of conflict and harm.Technology professionals now face growing demands to identify and mitigate ethical risks to human rights and the environment, as well as to navigate ethical tradeoffs between qualities such as privacy and accuracy, fairness and utility, and safety and accountability. This course provides the tools to identify and manage common ethical risks in the development of emerging data-driven technologies. It distills ethical theory, public regulations, and industry best practices into concrete skills and guidelines needed for the responsible development of digital products and services. By following the course's practical, problems-based approach, learners will become adept at applying theories, principles, frameworks, and techniques in their own roles and organizations. Introduction to Ethics of Emerging Technologies Topic A: What?s at Stake Topic B: Ethics and Why It Matters Topic C: Ethical Decision-Making in Practice Topic D: Causes of Ethical Failures Identifying Ethical Risks Topic A: Ethical Reasons Topic B: Stumbling Blocks for Ethical Reasoning Topic C: Identify Ethical Risks in Product Development Topic D: Tools for Identifying Ethical Risks Topic E: Use Regulations, Standards, and Human Rights to Identify Ethical Risks Ethical Reasoning in Practice Topic A: Ethical Theories Topic B: Use Ethical Decision-Making Frameworks Topic C: Select Options for Action Topic D: Avoid Problems in Ethical Decision-Making Identifying and Mitigating Security Risks Topic A: What Is Security? Topic B: Identify Security Risks Topic C: Security Tradeoffs Topic D: Mitigate Security Risks Identifying and Mitigating Privacy Risks Topic A: What Is Privacy? Topic B: Identify Privacy Risks Topic C: Privacy Tradeoffs Topic D: Mitigate Privacy Risks Identifying and Mitigating Fairness and Bias Risks Topic A: What Are Fairness and Bias? Topic B: Identify Bias Risks Topic C: Fairness Tradeoffs Topic D: Mitigate Bias Risks Identifying and Mitigating Transparency and Explainability Risks Topic A: What Are Transparency and Explainability? Topic B: Identify Transparency and Explainability Risks Topic C: Transparency and Explainability Tradeoffs Topic D: Mitigate Transparency and Explainability Risks Identifying and Mitigating Accountability Risks Topic A: What Is Accountability? Topic B: Identify Accountability Risks Topic C: Accountability Tradeoffs Topic D: Mitigate Accountability Risks Building an Ethical Organization Topic A: What Are Ethical Organizations? Topic B: Organizational Purpose Topic C: Ethics Awareness Topic D: Develop Professional Ethics within Organizations Developing Ethical Systems in Technology-Focused Organizations Topic A: Policy and Compliance Topic B: Metrics and Monitoring Topic C: Communication and Stakeholder Engagement Topic D: Ethical Leadership
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals, Cybersecurity Forensic Analyst, Cyberthreat Analyst, Cloud Security, Analyst Information Security Consultant, Application Security Analyst, Cybersecurity Assurance Engineer, Security Operations Center (SOC) Analyst, Technical Operations Network Engineer, Information Security Engineer, Network Security Penetration Tester, Network Security Engineer, Information Security Architect. Overview Upon successful completion of this course, students will master their Penetration Testing skills, perform the repeatable methodology, become committed to the code of ethics, and present analyzed results through structured reports. The main course outcomes include: 100% mapped with the NICE framework. Maps to the job role of a Penetration Tester and security analyst, based on major job portals. 100% methodology-based Penetration Testing program. Provides strong reporting writing guidance. Blended with both manual and automated Penetration Testing approaches. Gives a real-world experience through an Advanced Penetration Testing Range. Designed based on the most common Penetration Testing services offered by the best service providers in the market. Offers standard templates that can help during a Penetration test. This is a multidisciplinary course with extensive hands-on training in a wide range of crucial skills, including advanced Windows attacks, Internet of Things (IoT) and Operational Technology (OT) systems, filtered network bypass techniques, exploit writing, single and double pivoting, advanced privilege escalation, and binary exploitation. Course Outline Introduction to Penetration Testing Penetration Testing Scoping and Engagement Open Source Intelligence (OSINT) Social Engineering Penetration Testing Network Penetration Testing ? External Network Penetration Testing ? Internal Network Penetration Testing - Perimeter Devices Web Application Penetration Testing Wireless Penetration Testing IoT Penetration Testing OT/SCADA Penetration Testing Cloud Penetration Testing Binary Analysis and Exploitation Report Writing and Post-Testing Actions Additional course details: Nexus Humans Certified Penetration Testing Professional (CPENT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Penetration Testing Professional (CPENT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
ChatGPT, along with other AI tools, aims not to replace the human touch in management, but to enhance it. By addressing repetitive, daily tasks, these tools free up managers to concentrate on core responsibilities like strategic decision-making, team development, and innovation. As we move further into the digital age, integrating tools such as ChatGPT isn't a luxury; it's the future of proactive leadership. In this guide, we'll delve into 10 practical ways through which AI can elevate your efficiency and refine the quality of your work. Gain familiarity with prominent AI tools in the market Efficiently compose and respond to emails Generate concise summaries of complex reports and data. Obtain quick insights, data, and research across varied topics Streamline the writing of articles, training notes, and posts Craft interview tests, form relevant questions, and design checklists for the hiring process 1 Streamlining emails An inbox can be a goldmine of information but also a significant time drain for managers. Here's how to optimise it: Drafting responses: Give the AI a brief, and watch it craft a well-structured response. Sorting and prioritising: By employing user-defined rules and keywords, ChatGPT can flag important emails, ensuring no vital communication slips through the cracks. 2 Efficient report writing Reports, especially routine ones, can be time-intensive. Here's a smarter approach: Automate content: Supply key data points to the AI, and let it weave them into an insightful report. Proofreading: Lean on ChatGPT for grammar checks and consistency, ensuring each report remains crisp and error-free. 3 Rapid research From competitor insights to market trends, research is a pivotal part of management. Data synthesis: Feed raw data to the AI and receive succinct summaries in return. Question-answering: Pose specific questions about a dataset to ChatGPT and extract swift insights without diving deep into the entire content. 4 Reinventing recruitment Hiring can be a lengthy process. Here's how to make it more efficient: Resume screening: Equip the AI to spot keywords and qualifications, ensuring that only the most fitting candidates are shortlisted. Preliminary interviews: Leverage ChatGPT for the initial rounds of interviews by framing critical questions and evaluating the responses. 5 Enhancing training Especially for extensive teams, training can be a monumental task. Here's how ChatGPT can assist: Customised content: Inform the AI of your training goals, and it will draft tailored content suitable for various roles. PowerPoint design: Create visually appealing slide presentations on any topic in minimal time.
Artificial Intelligence (AI) is the most disruptive technology since the internet came onto the scene. AI is transforming every aspect of how we manage projects from developing a business case, to planning the work, managing risk, and tracking performance. Because the technology and market are moving so fast, it can be difficult to know how to start using AI on projects. Generative AI for Project Management will engage you with diverse Generative AI tools to start, plan, and manage either your own project or a generic case study. We will embrace a tool agnostic approach to adopting, integrating, and scaling Generative AI without compromising data or trust. You will have hands-on practice utilizing AI tools to optimize your time and your outcomes. You will be accessing a variety of AI tools requiring you to register for a free account. A computer is required for all traditional classroom deliveries. None At the end of this program, you will be able to: Define essential terms and concepts related to artificial intelligence (AI) Illustrate how prompts facilitate interaction with Generative AI Recognize the capabilities of Large Language Models Craft prompts to develop project origination documents Create prompts to assist in planning a project Develop user stories with Generative AI Analyze project performance using Generative AI Identify the limitations of Generative AI Identify the risks associated with using Generative AI Articulate the need for governance and ethics when establishing an AI program in an organization Course Overview Getting Started Foundation Concepts Understanding essential terms and concepts related to AI Exploring various Generative AI Models Understanding Prompts Creating Prompts for Project Startup Prompts for starting a project Prompts for planning a project Best Practices for prompt engineering Creating Prompts for Managing Projects Creating agile user stories Measuring project performance Analyzing a schedule Using Generative AI Responsibly Limitations of AI Models Establishing an AI governance framework Future trends and next steps Summary and Next Steps