• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5595 Computing & IT courses in Sandown delivered Online

Mastering Microsoft Office: Word, Excel, PowerPoint, and 365

4.9(27)

By Apex Learning

Overview This comprehensive course on Mastering Microsoft Office: Word, Excel, PowerPoint, and 365 will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Mastering Microsoft Office: Word, Excel, PowerPoint, and 365 comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast-track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Mastering Microsoft Office: Word, Excel, PowerPoint, and 365. It is available to all students, of all academic backgrounds. Requirements Our Mastering Microsoft Office: Word, Excel, PowerPoint, and 365 is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 34 sections • 135 lectures • 08:20:00 total length •Introduction: 00:03:00 •Getting started on Windows, macOS, and Linux: 00:01:00 •How to ask great questions: 00:01:00 •FAQ's: 00:01:00 •Excel Overview: 00:05:00 •Start Excel Spreadsheet: 00:04:00 •Enter Text and Numbers: 00:07:00 •Relative References: 00:04:00 •Working with ranges: 00:07:00 •Save and Save as Actions: 00:08:00 •File Extensions, Share, Export, and Publish files: 00:06:00 •Adding Rows and Columns: 00:03:00 •Modifying Rows and Column lengths: 00:05:00 •Copy, Cut, and Paste: 00:07:00 •Copying Formulas: 00:03:00 •Page setup options: 00:06:00 •Fit to print on One Page: 00:03:00 •Print Workbooks: 00:03:00 •Sorting Data Ascending Order: 00:04:00 •Sorting Data Descending Order: 00:02:00 •Filter Data: 00:04:00 •Creating Basic Formulas: 00:06:00 •Datetime Formulas: 00:06:00 •Mathematical formulas phase1: 00:20:00 •Mathematical formulas phase2: 00:12:00 •VLOOKUP formula: 00:12:00 •HLOOKUP formula: 00:04:00 •XLOOKUP: 00:08:00 •Handling #NA and Approximates match in XLOOKUP: 00:11:00 •Split Text into columns: 00:07:00 •Flash Fill: 00:07:00 •Data Validation: 00:07:00 •Remove Duplicates: 00:08:00 •Import Data from Text files: 00:06:00 •Import Data from .CSV files: 00:03:00 •Formatting Font: 00:04:00 •Formatting Alignment: 00:06:00 •Formatting Numbers: 00:05:00 •Formatting Date: 00:03:00 •Formatting Tables: 00:05:00 •Pivot Tables: 00:07:00 •Pivot Charts: 00:02:00 •Excel Charts - Categories: 00:03:00 •Elements of a chart: 00:04:00 •Creating Charts: 00:02:00 •Column or Bar charts: 00:04:00 •Formatting charts: 00:04:00 •Line Charts: 00:02:00 •Pie and Doughnut charts: 00:04:00 •Overview: 00:04:00 •Start PowerPoint Presentation: 00:05:00 •Screen setting and Views: 00:05:00 •Presentation Tips and Guidelines: 00:06:00 •Creating a New Presentation: 00:04:00 •Working with Slides: 00:04:00 •Save a Presentation: 00:04:00 •Print Slides: 00:03:00 •Formatting Text: 00:05:00 •Slide Text Alignments: 00:03:00 •Multi-Column Text Alignments: 00:02:00 •Adding Bullets and Numbered List Items: 00:03:00 •Insert Shapes: 00:03:00 •Insert Icons: 00:03:00 •Insert Graphics: 00:04:00 •Add 3D Models: 00:03:00 •Insert Pictures: 00:03:00 •Picture Options: 00:04:00 •Picture Cropping: 00:03:00 •Applying Built-in Picture Styles: 00:04:00 •Add SmartArt Graphic: 00:03:00 •Modifying SmartArt: 00:03:00 •Creating a Target Chart using SmartArt: 00:03:00 •Create a Table on Slide: 00:04:00 •Formatting Tables: 00:02:00 •Inserting Tables: 00:02:00 •Table Layouts: 00:01:00 •Add a Chart: 00:02:00 •Formatting Charts: 00:02:00 •Insert Chart from Microsoft Excel: 00:03:00 •Adding Video to a Presentation: 00:03:00 •Adding Audio to a Presentation: 00:02:00 •Screen Recording and Adding: 00:02:00 •Applying Transitions to Presentation: 00:04:00 •Object Animation: 00:03:00 •Effect Options: 00:02:00 •Advanced Animation: 00:02:00 •Triggers to control animation: 00:02:00 •Onscreen Presentation: 00:02:00 •Hiding Slides: 00:02:00 •Changing Order of Slides: 00:02:00 •Copying Slides: 00:02:00 •Overview of MS Word: 00:04:00 •Start MS Word 2021: 00:05:00 •Create a new blank document: 00:04:00 •Creating a paragraph text: 00:05:00 •Non-printing characters: 00:03:00 •Save a document: 00:03:00 •Open a document: 00:01:00 •Find and replace: 00:04:00 •AutoCorrect options: 00:03:00 •Formatting text: 00:04:00 •Copy cut and paste: 00:04:00 •Character formatting: 00:02:00 •Format painter: 00:04:00 •Work with numbers: 00:02:00 •Add bullets: 00:03:00 •Outline creation: 00:04:00 •Creating a table: 00:03:00 •Adding rows and columns to a table: 00:02:00 •Formatting table data: 00:02:00 •Borders and shading: 00:02:00 •Sorting in a table: 00:04:00 •Draw a table: 00:04:00 •Convert text to table: 00:03:00 •Convert table to text: 00:02:00 •Insert a spreadsheet: 00:02:00 •Quick tables - readily available formats: 00:02:00 •Working with styles: 00:02:00 •Creating styles: 00:02:00 •Clear formatting: 00:01:00 •Margins: 00:02:00 •Orientation: 00:01:00 •Page size setting: 00:01:00 •Adding columns: 00:03:00 •Page break - section break: 00:02:00 •Adding watermark: 00:03:00 •Headers and footers: 00:03:00 •Create envelops: 00:02:00 •Creating labels: 00:02:00 •Creating a mail merge document: 00:03:00 •Thesaurus and spell check: 00:01:00 •Word count: 00:01:00 •Speech - read aloud: 00:01:00 •Language - translate: 00:01:00 •Tracking: 00:01:00

Mastering Microsoft Office: Word, Excel, PowerPoint, and 365
Delivered Online On Demand8 hours 20 minutes
£12

Lab Technician

5.0(1)

By LearnDrive UK

Throughout this course, you will learn how to operate and maintain laboratory equipment and perform laboratory technician tasks.

Lab Technician
Delivered Online On Demand1 hour
£5

Microsoft SQL Server Bootcamp 2024

5.0(1)

By LearnDrive UK

Elevate your SQL skills with our Microsoft SQL Server Bootcamp 2024. Master SQL Server administration and development for data-driven decision-making and analysis.

Microsoft SQL Server Bootcamp 2024
Delivered Online On Demand1 hour
£5

NLP Practitioner Certification - Internationally Accredited

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 1 to 2 hours Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about NLP Understand the core competencies and principles of NLP Explore the various areas of NLP Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert NLP practitioner NLP Practitioner Certification - Internationally Accredited Master the skills you need to propel your career forward in NLP. This course will equip you with the essential knowledge and skillset that will make you a confident NLP practitioner and take your career to the next level. This comprehensive NLP practitioner certification course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this NLP practitioner certification course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective NLP practice and equip you with the essential skills, confidence and competence to assist you in the NLP industry. You'll gain a solid understanding of the core competencies required to drive a successful career in NLP. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for NLP practitioner or for people who are aspiring to specialise in NLP. Enrol in this NLP practitioner certification course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive NLP practitioner certification course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this NLP can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This NLP practitioner certification course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This NLP practitioner certification course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This NLP practitioner certification course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. Course Curriculum Supplementary Resources Supplementary Resources - NLP Practitioner Certification - Internationally Accredited 00:00:00 Basics of Neuro-Linguistic Programming (NLP) Programme Overview 00:02:00 Introduction to NLP 00:03:00 How Does NLP Work 00:03:00 Key Concepts in NLP Logical Levels of Change 00:08:00 Core Concepts of Neuro-Linguistic Programming 00:03:00 Understanding Mental Maps, Confirmation Bias, and Cognitive Dissonance 00:05:00 Mock Assessment Mock Assessment 00:10:00 Application of NLP Techniques Neuro-Linguistic Programming Planning 00:03:00 Techniques of Neuro-Linguistic Programming 00:02:00 Taking Charge of Your Life 00:02:00 Communication 00:02:00 Building Rapport 00:03:00 States and Anchors 00:03:00 Influence and Persuasion 00:02:00 Hypnotizing the Audience 00:03:00 Stories and Metaphors 00:03:00 Affirmations 00:02:00 Reframing 00:02:00 Meta Programs 00:03:00 Time and Timeline Therapy 00:02:00 Fast Phobia Cure 00:03:00 GROW Model 00:03:00 FUEL Model 00:03:00 CLEAR Model 00:04:00 OSCAR Model 00:03:00 Final Assessment Final Assessment 00:10:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

NLP Practitioner Certification - Internationally Accredited
Delivered Online On Demand
£19

Red Hat High Availability Clustering (RH436)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Senior Linux system administrators who use high-availability clustering and fault-tolerant shared storage technologies to maximize resiliency of production services. Overview Install and configure a Pacemaker-based high availability cluster. Create and manage highly available services. Troubleshoot common cluster issues. Work with shared storage (iSCSI) and configure multipathing. Implement Logical Volume Manager (LVM) in cluster-aware configurations. Configure GFS2 file systems on storage shared by multiple nodes. Deploy reliable, available critical production services in a high availability cluster In the Red Hat High Availability Clustering (RH436) course, you will learn how to provide highly available network services to a mission-critical enterprise environment through the deployment and management of shared storage and server clusters. Created for senior Linux system administrators, this 4-day course strongly emphasizes lab-based activities. You will set up a cluster of systems running the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, and deploy Linux-based services such as web servers and databases on that cluster. Cluster storage components from the Resilient Storage Add-On are also covered; installations and applications that require multiple cluster nodes can access the same storage simultaneously. This includes Logical Volume Manager (LVM) Shared Volume Groups, Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath. This course is based on Red Hat Enterprise Linux 8.3. Prerequisites Red Hat Certified System Administrator (RHCSA) exam (EX200) and associated courses. Red Hat Cerfitied Engineer (RHCE) exam (EX294) and associated courses. 1 - Creating high availability clusters Create a basic high availability cluster. 2 - Managing cluster nodes and quorum Manage node membership in the cluster and describe how it impacts cluster operation. 3 - Isolating malfunctioning cluster nodes Isolate unresponsive cluster nodes to protect data and recover services and resources after a failure. 4 - Creating and configuring resources Create basic resources and resource groups to provide highly available services. 5 - Troubleshooting high availability clusters Identify, diagnose, and fix cluster issues. 6 - Automating cluster and resource deployment Deploy a new high availability cluster and cluster resources using Ansible automation. 7 - Managing two-node clusters Operate two-node clusters while identifying and avoiding issues specific to a two-node cluster configuration. 8 - Accessing iSCSI storage Configure iSCSI initiators on your servers to access block-based storage devices provided by network storage arrays or Ceph storage clusters. 9 - Accessing storage devices resiliently Configure resilient access to storage devices that have multiple access paths. 10 - Configuring LVM in clusters Select, configure, and manage the correct LVM configuration for use in your cluster. 11 - Providing storage with the GFS2 cluster file system Use the GFS2 cluster file system to simultaneously pProvide tightly coupled shared storage that can be accessed by multiple nodes. 12 - Eliminating single points of failure Identify and eliminate single points of failure in your cluster to decrease risk and increase average service availability. Note: Course outline is subject to change with technology advances and as the nature of the underlying job evolves. For questions or confirmation on a specific objective or topic, please contact a training specialist. Additional course details: Nexus Humans Red Hat High Availability Clustering (RH436) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat High Availability Clustering (RH436) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat High Availability Clustering (RH436)
Delivered OnlineFlexible Dates
Price on Enquiry

AJSEC - Advanced Junos Security

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course benefits individuals responsible for implementing, monitoring, and troubleshooting Juniper security components. Overview After successfully completing this course, you should be able to: Demonstrate understanding of concepts covered in the prerequisite Juniper Security courses. Describe the various forms of security supported by the Junos OS. Describe the Juniper Connected Security model. Describe Junos security handling at Layer 2 versus Layer 3. Implement next generation Layer 2 security features. Demonstrate understanding of Logical Systems (LSYS). Demonstrate understanding of Tenant Systems (TSYS). Implement virtual routing instances in a security setting. Describe and configure route sharing between routing instances using logical tunnel interfaces. Describe and discuss Juniper ATP and its function in the network. Describe and implement Juniper Connected Security with Policy Enforcer in a network. Describe firewall filters use on a security device. Implement firewall filters to route traffic. Explain how to troubleshoot zone problems. Describe the tools available to troubleshoot SRX Series devices. Describe and implement IPsec VPN in a hub-and-spoke model. Describe the PKI infrastructure. Implement certificates to build an ADVPN network. Describe using NAT, CoS and routing protocols over IPsec VPNs. Implement NAT and routing protocols over an IPsec VPN. Describe the logs and troubleshooting methodologies to fix IPsec VPNs. Implement working IPsec VPNs when given configuration that are broken. Describe Incident Reporting with Juniper ATP On-Prem device. Configure mitigation response to prevent spread of malware. Explain SecIntel uses and when to use them. Describe the systems that work with SecIntel. Describe and implement advanced NAT options on the SRX Series devices. Explain DNS doctoring and when to use it. Describe NAT troubleshooting logs and techniques. This four-day course, designed to build off the current Juniper Security (JSEC) offering, delves deeper into Junos security, next-generation security features, and ATP supporting software. Chapter 1: Course Introduction Course Introduction Chapter 2: Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 1: Implementing Layer 2 Security Chapter 3: Firewall Filters Using Firewall Filters to Troubleshoot Routing Instances Filter-Based Forwarding Lab 2: Implementing Firewall Filters Chapter 4: Troubleshooting Zones and Policies General Troubleshooting for Junos Devices Troubleshooting Tools Troubleshooting Zones and Policies Zone and Policy Case Studies Lab 3: Troubleshooting Zones and Policies Chapter 5: Hub-and-Spoke VPN Overview Configuration and Monitoring Lab 4: Implementing Hub-and-Spoke VPNs Chapter 6: Advanced NAT Configuring Persistent NAT Demonstrate DNS doctoring Configure IPv6 NAT operations Troubleshooting NAT Lab 5: Implementing Advanced NAT Features Chapter 7: Logical and Tenant Systems Overview Administrative Roles Differences Between LSYS and TSYS Configuring LSYS Configuring TSYS Lab 6: Implementing TSYS Chapter 8: PKI and ADVPNs PKI Overview PKI Configuration ADVPN Overview ADVPN Configuration and Monitoring Lab 7: Implementing ADVPNs Chapter 9: Advanced IPsec NAT with IPsec Class of Service with IPsec Best Practices Routing OSPF over VPNs Lab 8: Implementing Advanced IPsec Solutions Chapter 10: Troubleshooting IPsec IPsec Troubleshooting Overview Troubleshooting IKE Phase 1 and 2 IPsec Logging IPsec Case Studies Lab 9: Troubleshooting IPsec Chapter 11: Juniper Connected Security Security Models Enforcement on Every Network Device Chapter 12: SecIntel Security Feed Encrypted Traffic Analysis Use Cases for SecIntel Lab 10: Implementing SecIntel Chapter 13:Advanced Juniper ATP On-Prem Collectors Private Mode Incident Response Deployment Models Lab 11: Implementing Advanced ATP On-Prem Chapter 14: Automated Threat Mitigation Identify and Mitigate Malware Threats Automate Security Mitigation Lab 12: Identifying and Mitigation of Threats Additional course details: Nexus Humans AJSEC - Advanced Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AJSEC - Advanced Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AJSEC - Advanced Junos Security
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to HTML5. CSS3 and JavaScript (TT4003)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This is an introductory level course, designed for web developers that need to upgrade core skills leveraging modern scripting and web development languages and standards. This course provides an excellent foundation for continued learning to gain in-demand skills in in-demand skills and technologies such as Angular, React, NodeJS, JQuery and more. This course can also be tuned for non-developers. Please inquire for details. Overview This 'skills-focused' course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our instructors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working within in a hands-on learning environment guided by our expert team, attendees will explore: HTML5: How to effectively meet requirements using the full range of HTML5 semantic and structural elements To work with technologies such as web storage, application caching, and cross-domain messaging to improve performance and the user experience CSS: What features CSS3 supports and how they can be effectively used with HTML5 and other technologies To adapt to varying degrees of browser support for HTML5 and CSS3 JavaScript: What JavaScript is, how it relates to other programming languages, and how to script your web pages with it To traverse and manipulate the DOM and handle events in ways that work in all browsers To work with closures and prototypes and other exotic features of JavaScript Debugging What is needed to effectively debug these web technologies How to use both browser-based and proxy-based debuggers and tools Introduction to HTML5, CSS3 & JavaScript is geared for developers who need to understand the latest web technologies and responsive design practices central to targeting the entire spectrum of user platforms and browsers. This jumpstart style course provides a balanced mixture of theory and practical labs designed to take students through HTML5, CSS3 and JavaScript. Students who attend this course will leave this course armed with the new skills to begin to design, implement, and deploy robust, flexible, and safe web applications HTML Refresher HTML Review Introduction to HTML5 Introduction to CSS CSS Basics CSS3 Overview CSS3 Advanced Selectors CSS3 Visual Effects Introduction to JavaScript JavaScript Basics Debugging Tools JavaScript Functions JavaScript Arrays, Math and Date JavaScript Event Handling and the DOM Object-Oriented JavaScript

Introduction to HTML5. CSS3 and JavaScript (TT4003)
Delivered OnlineFlexible Dates
Price on Enquiry

SonicWall Network Security Professional Course - SNSP - NA

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security professionals, System engineers, channel partners, service partners, and end users with 1+ years of experience in implementing IT security technologies (Network, Applications, and Systems) and are also SNSAcertified. Overview The students will learn how to monitor, investigate, analyze, and configure SonicWall Next-Gen firewalls running SonicOS to enable advanced functionality related to Secure and Remote Connectivity, Network Optimization, and Threat Prevention. Upon successful completion of the SNSP program, the students will be able to demonstrate SonicWall product expertise and the application skill sets required to mount a proactive, effective defense against current and evolving network and cyber security threats. A key issue affecting an organization?s business productivity and employee efficiency today is its ability to respond to dynamic changes in the cyber threat landscape. Coming up on the heels of the highly successful SNSA program launched earlier this year, SonicWall now presents the SonicWall Network Security Professional (SNSP) course, an expert-level training and certification program that builds on the enterprise security skills learned in the SNSA course. Previously known as the Network Security Advance Administration (NSAA) course, the revamped SNSP curriculum expands on the topics covered in SNSA and features advanced SonicWall firewall configuration and administration tasks aimed at helping enterprises adapt to dynamic security environments. Relevant changes to the curriculum include an enhanced and deeper scope of SonicOS 6.5.x features and functionality, as well as changes in the learning and delivery methodologies to better balance the professional needs of the students and the business requirements for network and cyber security. Course Outline Course Introduction and Overview Configuring VPN Auto Provisioning Configuring Advanced Routing Configuring Advanced Interface Settings Using SonicOS CLI Configuring Capture Client Capturing and Replaying Packets Configuring DPI-SSL/TLS Server Configuring DPI-SSH Configuring App Rules Configuring App Control Configuring Advanced High Availability Excluding Trusted Content Resolving and Reporting False Positives Configuring Content Filtering Implementing Best Practices

SonicWall Network Security Professional Course - SNSP - NA
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat Performance Tuning: Linux in Physical, Virtual, and Cloud (RH442)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Senior Linux system administrators responsible for maximizing resource utilization through performance tuning. Overview Analyze and tune for resource-specific scenarios Applying tuning profiles with the tuned tool Tune in virtual environments (hosts and guests) Trace and profile system events and activities Tune resource limits and utilization using systemd-integrated cgroups Gather performance metrics and benchmarking data Red Hat© Enterprise Performance Tuning is designed to teach senior Linux© system administrators the methodology of performance tuning for Red Hat Enterprise Linux. This course discusses system architecture with an emphasis on understanding the implications of system architecture on system performance, methods for testing the effects of performance adjustments, open source benchmarking utilities, methods for analyzing system and networking performance, and tuning configurations for specific application loads. Prerequisites Become a Red Hat Certified Engineer (RHCE©), or demonstrate equivalent experience 1 - Introduction to performance tuning Understand the basic principles of performance tuning and analysis. 2 - Collecting, graphing, and interpreting data Gain proficiency in using basic analysis tools and in evaluating data. 3 - General tuning Learn basic tuning theory and mechanisms used to tune the system. 4 - Hardware profiling Understand and analyze hardware. 5 - Software profiling Analyze CPU and memory performance of applications. 6 - Mail server tuning Learn about basic storage tuning using an email server as an example. 7 - Large memory workload tuning Understand memory management and tuning. 8 - HPC workload tuning HPC workload tuning 9 - File server tuning Understand storage and network tuning in the context of a file server application. 10 - Database server tuning Tune memory and network performance using a database application as an example. 11 - Power usage tuning Tune systems with power consumption in mind. 12 - Virtualization tuning Tune ?host? and ?guest? for efficient virtualization.

Red Hat Performance Tuning: Linux in Physical, Virtual, and Cloud (RH442)
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Linux Systems Administration (TTLX2220)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This is an introductory-level systems administration course geared for Systems Administrators and users who wish to learn how to how to install, configure and maintain an Enterprise Linux system in a networked environment. Overview This course is about 50% lab to lecture ratio, combining expert instructor-led discussions with practical hands-on skills that emphasize current techniques, best practices and standards. Working in this hands-on lab environment, guided by our expert practitioner, attendees will explore Installing the Linux operating system and configuring peripherals Performing and modifying startup and shutdown processes Configuring and maintaining basic networking services Creating and maintaining system users and groups Understanding and administering file permissions on directories and regular files Planning and creating disk partitions and file systems Performing maintenance on file systems Identifying and managing Linux processes Automating tasks with cron Performing backups and restoration of files Working with system log files Troubleshooting system problems Analyzing and taking measures to increase system performance Configuring file sharing with NFS Configuring Samba for file sharing with the Windows clients Setting up a basic Web server Understanding the components for setting up a LAMP server Implementing basic security measures Linux System Administration is a comprehensive hands-on course that teaches students how to install, configure and maintain an Enterprise Linux system in a networked environment. This lab-intensive class explores core administrative tasks such as: creating and managing users, creating and maintaining file systems, determining and implementing security measures and performing software installation and package management. Linux networking topics include installing and supporting SSH, NFS, Samba and the Apache Web server. Students will explore common security issues, as well as several tools, such as the PAM modules that help secure the operating system and network environment. Upon successful completion of this course, students will be prepared to maintain Linux systems in a networked business environment. Although the course includes installing and configuring a CentOS 7 / RHEL 7 Linux system, much of the course content also applies to Oracle, Ubuntu, Scientific and other current versions of mainstream Linux distributions. Labs include user and group maintenance, system backups and restoration, software management, administration tasks automation, file system creation and maintenance, managing remote access, working with cron, and configuring basic file sharing and Web services, as well as working with system logging utilities such as rsyslog and much more. System Administration Overview UNIX, Linux and Open Source Duties of the System Administrator Superusers and the Root Login Sharing Superuser Privileges with Others (su and sudo Commands) TCP/IP Networking Fundamentals Online Help Installation and Configuration Planning: Hardware and Software Considerations Site Planning Installation Methods and Types Installation Classes Partitions Logical Volume Manager - LVM File System Overview Swap Partition Considerations Other Partition Considerations The Linux Boot Loader: grub Software Package Selection Adding and Configuring Peripherals Printers Graphics Controllers Basic Networking Configuration Booting to Recovery Mode Booting and Shutting Down Linux Boot Sequence The systemd Daemon The systemctl Command Targets vs. Run Levels Modifying a Target Service Unit Scripts Changing System States Booting into Rescue Mode Shutdown Commands Managing Software and Devices Identifying Software Packages Using rpm to Manage Software Using yum to Manage Software Installing and Removing Software Identifying Devices Displaying Device and System Information (PCI, USB) Plug and Play Devices Device Configuration Tools Managing Users and Groups Setting Policies User File Management The /etc/passwd file The /etc/shadow file The /etc/group file The /etc/gshadow file Adding Users Modifying User Accounts Deleting User Accounts Working with Groups Setting User Environments Login Configuration Files The Linux File System Filesystem Types Conventional Directory Structure Mounting a File System The /etc/fstab File Special Files (Device Files) Inodes Hard File Links Soft File Links Creating New File Systems with mkfs The lost+found Directory Repairing File Systems with fsck The Journaling Attribute File and Disk Management Tools Linux File Security File Permissions Directory Permissions Octal Representation Changing Permissions Setting Default Permissions Access Control Lists (ACLs) The getfacl and setfacl commands SUID Bit SGID Bit The Sticky Bit Controlling Processes Characteristics of Processes Parent-Child Relationship Examining Running Processes Background Processes Controlling Processes Signaling Processes Killing Processes Automating Processes cron and crontab at and batch System Processes (Daemons) Working with the Linux Kernel Linux Kernel Components Types of Kernels Kernel Configuration Options Recompiling the Kernel Shell Scripting Overview Shell Script Fundamentals Bash Shell Syntax Overview Shell Script Examples System Backups Backup Concepts and Strategies User Backups with the tar Command System Backup Options The xfsdump and xfsrestore Commands Troubleshooting the System Common Problems and Symptoms Troubleshooting Steps Repairing General Boot Problems Repairing the GRUB 2 Boot Loader Hard Drive Problems Restoring Shared Libraries System Logs and rsyslogd Basic Networking Networking Services Overview NetworkManager Introduction Network Configuration Files Locations and Formats Enabling and Restarting Network Services with systemtcl Configuring Basic Networking Manually Configuring Basic Networking with NetworkManager LAMP Server Basics LAMP Overview Configuring the Apache Web Server Common Directives Apache Virtual Hosting Configuring an Open Source Database MySQL MariaDB PHP Basics Perl CGI Scripting Introduction to System Security Security Overview Maintaining System Security Server Access Physical Security Network Security Security Tools Port Probing with nmap Intrusion Detection and Prevention PAM Security Modules Scanning the System Maintaining File Integrity Using Firewalls Introduction to firewalld The Samba File Sharing Facility Configure Samba for Linux to Linux/UNIX File Sharing Configure Samba for Linux to Windows File Sharing Use the smbclient Utility to Transfer Files Mount/Connect Samba Shares to Linux and Windows Clients Networked File Systems (NFS) Using NFS to Access Remote File Systems Configuring the NFS Server Configuring the NFS Client Exporting File Systems from the NFS Server to the NFS Client

Introduction to Linux Systems Administration (TTLX2220)
Delivered OnlineFlexible Dates
Price on Enquiry