• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5602 Computing & IT courses delivered Online

CompTIA Network+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for entry-level computer support professionals with a basic knowledge of computer hardware, software, and operating systems who wish to increase their knowledge and understanding of networking concepts and acquire the required skills to prepare for a career in network support or administration, or who wish to prepare for the CompTIA Network+ certification. CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT professionals with job roles such as network administrator, network technician, network installer, help desk technician, and IT cable installer. This course is also designed for students who are seeking the CompTIA Network+ certification and who want to prepare for the CompTIA Network+ N10-008 Certification Exam. Overview In this course, you will describe the major networking technologies and systems of modern networks and configure, manage, and troubleshoot modern networks. Explain the OSI and TCP/IP Models. Explain properties of network traffic. Install and configure switched networks. Configure IP networks. Install and configure routed networks. Configure and monitor ports and protocols. Explain network application and storage issues. Monitor and troubleshoot networks. Explain network attacks and mitigations. Install and configure security devices. Explain authentication and access controls. Deploy and troubleshoot cabling solutions. Implement and troubleshoot wireless technologies. Compare and contrast WAN technologies. Use remote access methods. Identify site policies and best practices. CompTIA's Network+ certification is a foundation-level certification designed for IT professionals with around one year of experience, whose job role is focused on network administration. The CompTIA Network+ exam will certify the successful candidate has the knowledge and skills required to troubleshoot, configure, and manage common network devices; establish basic network connectivity; understand and maintain network documentation; identify network limitations and weaknesses; and implement network security, standards, and protocols. The candidate will have a basic understanding of enterprise technologies, including cloud and virtualization technologies. The Official CompTIA© Network+© (Exam N10-008): will teach you the fundamental principles of installing, configuring, and troubleshooting network technologies and help you to progress a career in network administration. In this course, you will build on your existing user-level knowledge and experience with personal computer operating systems and networks to master the fundamental skills and concepts that you will need to use on the job in any type of networking career. Prerequisites CompTIA A+ Certification (Exams 220-1001 and 220-1002) 1 - Explaining the OSI and TCP/IP Models Topic A: Explain OSI Model Layers Topic B: Explain the TCP/IP Suite 2 - Explaining Properties of Network Traffic Topic A: Explain Media Types and Access Methods Topic B: Deploy Ethernet Standards Topic C: Configure and Monitor Network Interfaces 3 - Installing and Configuring Switched Networks Topic A: Install and Configure Hubs and Bridges Topic B: Install and Configure Switches Topic C: Compare and Contrast Network Topologies Topic D: Compare and Contrast Network Types 4 - Configuring IP Networks Topic A: Configure IPv4 Addressing Components Topic B: Test IP Interfaces with Command Line Tools Topic C: Configure IPv4 Subnets Topic D: Configure Private and Public IPv4 Addressing Schemes Topic E: Configure IPv6 Addressing Components Topic F: Configure DHCP Services 5 - Installing and Configuring Routed Networks Topic A: Explain Characteristics of Routing Topic B: Install and Configure Routers 6 - Configuring and Monitoring Ports and Protocols Topic A: Explain the Uses of Ports and Protocols Topic B: Use Port Scanners and Protocol Analyzers Topic C: Explain the Use of Name Resolution Services Topic D: Configure DNS and IPAM Services 7 - Explaining Network Application and Storage Services Topic A: Explain the Uses of Network Applications Topic B: Explain the Uses of Voice Services and Advanced Networking Devices Topic C: Explain the Uses of Virtualization and Network Storage Services Topic D: Summarize the Concepts of Cloud Services 8 - Monitoring and Troubleshooting Networks Topic A: Monitor Network Interfaces and Logs Topic B: Explain Network Troubleshooting Methodology Topic C: Troubleshoot Common Network Services Issues 9 - Explaining Networking Attacks and Mitigations Topic A: Summarize Common Networking Attacks Topic B: Explain the Characteristics of VLANs Topic C: Explain the Characteristics of NAT and Port Forwarding 10 - Installing and Configuring Security Devices Topic A: Install and Configure Firewalls and Proxies Topic B: Explain the Uses of IDS/IPS and UTM 11 - Explaining Authentication and Access Controls Topic A: Explain Authentication Controls and Attacks Topic B: Explain the Uses of Authentication Protocols and Directory Services Topic C: Explain the Uses of Port Security and NAC Topic D: Implement Network Device Hardening Topic E: Explain Patch Management and Vulnerability Scanning Processes 12 - Deploying and Troubleshooting Cabling Solutions Topic A: Deploy Structured Cabling Systems Topic B: Deploy Twisted Pair Cabling Solutions Topic C: Test and Troubleshoot Twisted Pair Cabling Solutions Topic D: Deploy Fiber Optic Cabling Solutions 13 - Implementing and Troubleshooting Wireless Technologies Topic A: Install and Configure Wireless Technologies Topic B: Troubleshoot Wireless Performance Issues Topic C: Secure and Troubleshoot Wireless Connectivity 14 - Comparing and Contrasting WAN Technologies Topic A: Compare and Contrast WAN Core Service Types Topic B: Compare and Contrast WAN Subscriber Service Types Topic C: Compare and Contrast WAN Framing Service Types Topic D: Compae and Contrast Wireless and IoT WAN Technologies 15 - Using Remote Access Methods Topic A: Use Remote Access VPNs Topic B: Use Remote Access Management Methods 16 - Identifying Site Policies and Best Practices Topic A: Manage Networks with Documentation and Diagrams Topic B: Summarize the Purposes of Physical Security Devices Topic C: Compare and Contrast Business Continuity and Disaster Recovery Concepts Topic D: Identify Policies and Best Practices

CompTIA Network+
Delivered Online + more
£2,475

CompTIA A+ Certification (Exams 220-1101 and 220-1102)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted to those seeking A+ Certification and anyone in these roles: IT Support Specialist Helpdesk Technician Field Technician Tier I Support Specialist Desktop Support Specialist Associate Network Engineer Systems Support Technician Junior Systems Administrator Overview At completion of this course, you will be able to: Install and configure end-user devices and software Address connectivity problems Perform basic cybersecurity mitigations Troubleshoot common problems to diagnose and resolve issues Demonstrate basic knowledge of scripting, the cloud, and virtualization CompTIA A+ certified professionals are proven problem solvers. They support today?s core technologies from security to networking to virtualization and more. CompTIA A+ is the industry standard for launching IT careers into today?s digital world. This course, prepares you for the CompTIA A+ Certification exams 220-1101 and 220-1102. Lesson 1: Installing Motherboards and Connectors Topic 1A: Explain Cable Types and Connectors Topic 1B: Install and Configure Motherboards Topic 1C: Explain Legacy Cable Types Lesson 2: Installing System Devices Topic 2A: Install and Configure Power Supplies and Cooling Topic 2B: Select and Install Storage Devices Topic 2C: Install and Configure System Memory Topic 2D: Install and Configure CPUs Lesson 3: Troubleshooting PC Hardware Topic 3A: Apply Troubleshooting Methodology Topic 3B: Configure BIOS/UEFI Topic 3C: Troubleshoot Power and Disk Issues Topic 3D: Troubleshoot System and Display Issues Lesson 4: Comparing Local Networking Hardware Topic 4A: Compare Network Types Topic 4B: Compare Networking Hardware Topic 4C: Explain Network Cable Types Topic 4D: Compare Wireless Networking Types Lesson 5: Configuring Network Addressing and Internet Connections Topic 5A: Compare Internet Connection Types Topic 5B: Use Basic TCP/IP Concepts Topic 5C: Compare Protocols and Ports Topic 5D: Compare Network Configuration Concepts Lesson 6: Supporting Network Services Topic 6A: Summarize Services Provided by Networked Hosts Topic 6B: Compare Internet and Embedded Appliances Topic 6C: Troubleshoot Networks Lesson 7: Summarizing Virtualization and Cloud Concepts Topic 7A: Summarize Client-Side Virtualization Topic 7B: Summarize Cloud Concepts Lesson 8: Supporting Mobile Devices Topic 8A: Set Up Mobile Devices and Peripherals Topic 8B: Configure Mobile Device Apps Topic 8C: Install and Configure Laptop Hardware Topic 8D: Troubleshoot Mobile Device Issues Lesson 9: Supporting Print Devices Topic 9A: Deploy Printer and Multifunction Devices Topic 9B: Replace Print Device Consumables Topic 9C: Troubleshoot Print Device Issues Lesson 10: Configuring Windows Topic 10A: Configure Windows User Settings Topic 10B: Configure Windows System Settings Lesson 11: Managing Windows Topic 11A: Use Management Consoles Topic 11B: Use Performance and Troubleshooting Tools Topic 11C: Use Command-line Tools Lesson 12: Identifying OS Types and Features Topic 12A: Explain OS Types Topic 12B: Compare Windows Editions Lesson 13: Supporting Windows Topic 13A: Perform OS Installations and Upgrades Topic 13B: Install and Configure Applications Topic 13C: Troubleshoot Windows OS Problems Lesson 14: Managing Windows Networking Topic 14A: Manage Windows Networking Topic 14B: Troubleshoot Windows Networking Topic 14C: Configure Windows Security Settings Topic 14D: Manage Windows Shares Lesson 15: Managing Linux and macOS Topic 15A: Identify Features of Linux Topic 15B: Identify Features of macOS Lesson 16: Configuring SOHO Network Security Topic 16A: Explain Attacks, Threats, and Vulnerabilities Topic 16B: Compare Wireless Security Protocols Topic 16C: Configure SOHO Router Security Topic 16D: Summarize Security Measures Lesson 17: Managing Security Settings Topic 17A: Configure Workstation Security Topic 17B: Configure Browser Security Topic 17C: Troubleshoot Workstation Security Issues Lesson 18: Supporting Mobile Software Topic 18A: Configure Mobile OS Security Topic 18B: Troubleshoot Mobile OS and App Software Topic 18C: Troubleshoot Mobile OS and App Security Lesson 19: Using Support and Scripting Tools Topic 19A: Use Remote Access Technologies Topic 19B: Implement Backup and Recovery Topic 19C: Explain Data Handling Best Practices Topic 19D: Identify Basics of Scripting Lesson 20: Implementing Operational Procedures Topic 20A: Implement Best Practice Documentation Topic 20B: Use Proper Communication Techniques Topic 20C: Use Common Safety and Environmental Procedures

CompTIA A+ Certification (Exams 220-1101 and 220-1102)
Delivered Online + more
£2,475

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered Online + more
£2,475

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online
£3,495

C++ Bootcamp Course, 2-Months

4.6(12)

By PCWorkshops

C++ Bootcamp is for coding beginners: You want all the basic stuff, all the advanced stuff and practical experience and get a fantastic job in C++

C++ Bootcamp Course, 2-Months
Delivered Online + more
£2,000

AZ-800T00 Administering Windows Server Hybrid Core Infrastructure

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. This course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. Prerequisites Experience with managing Windows Server operating system and Windows Server workloads in on-premises scenarios, including AD DS, DNS, DFS, Hyper-V, and File and Storage Services Experience with common Windows Server management tools (implied in the first prerequisite). Basic knowledge of core Microsoft compute, storage, networking, and virtualization technologies (implied in the first prerequisite). Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding of Microsoft Hyper-V and basic server virtualization concepts Basic experience with implementing and managing IaaS services in Microsoft Azure Basic knowledge of Azure Active Directory Experience working hands-on with Windows client operating systems such as Windows 10 or Windows 11 Basic experience with Windows PowerShell 1 - Introduction to AD DS Define AD DS Define users, groups, and computers Define AD DS forests and domains Define OUs Manage objects and their properties in AD DS 2 - Manage AD DS domain controllers and FSMO roles Deploy AD DS domain controllers Maintain AD DS domain controllers Manage the AD DS Global Catalog role Manage AD DS operations masters Manage AD DS schema 3 - Implement Group Policy Objects Define GPOs Implement GPO scope and inheritance Define domain-based GPOs Create and configure a domain-based GPO Define GPO storage Define administrative templates 4 - Manage advanced features of AD DS Create trust relationships Implement ESAE forests Monitor and troubleshoot AD DS Create custom AD DS partitions 5 - Implement hybrid identity with Windows Server Select a Microsoft Entra integration model Plan for Microsoft Entra integration Prepare on-premises Active Directory for directory synchronization Install and configure directory synchronization with Microsoft Entra Connect Implement Seamless Single Sign-On Enable Microsoft Entra login in for Windows VM in Azure Describe Microsoft Entra Domain Services Implement and configure Microsoft Entra Domain Services Manage Windows Server 2019 in a Microsoft Entra Domain Services environment Create and configure a Microsoft Entra Domain Services instance Join a Windows Server VM to a managed domain 6 - Deploy and manage Azure IaaS Active Directory domain controllers in Azure Select an option to implement directory and identity services using Active Directory Domain Services in Azure Deploy and configure Active Directory Domain Services domain controllers in Azure VMs Install a replica Active Directory domain controller in an Azure VM Install a new Active Directory forest on an Azure VNet 7 - Perform Windows Server secure administration Define least privilege administration Implement delegated privileges Use privileged access workstations Use jump servers 8 - Describe Windows Server administration tools Explore Windows Admin Center Use Server Manager List Remote Server Administration Tools Use Windows PowerShell Use Windows PowerShell to remotely administer a server 9 - Perform post-installation configuration of Windows Server List the available post-installation configuration tools Configure Server Core using Sconfig Use DSC to configure Windows Server Perform post-installation configuration with Windows Admin Center Configure a server with answer files 10 - Just Enough Administration in Windows Server Explain the concept of Just Enough Administration (JEA) Define role capabilities for a JEA endpoint Create a session configuration file to register a JEA endpoint Describe how JEA endpoints work to limit access to a PowerShell session Create and connect to a JEA endpoint Demonstration: Connect to a JEA endpoint 11 - Administer and manage Windows Server IaaS Virtual Machine remotely Select the appropriate remote administration tool Manage Windows Virtual Machines with Azure Bastion Create an Azure Bastion host Configure just-in-time administration 12 - Manage hybrid workloads with Azure Arc Describe Azure Arc Onboard Windows Server instances Connect hybrid machines to Azure from the Azure portal Use Azure Arc to manage Windows Server instances Restrict access with RBAC 13 - Configure and manage Hyper-V Define Hyper-V Define Hyper-V Manager Configure Hyper-V hosts using best practices Configure Hyper-V networking Assess advanced Hyper-V networking features Define nested virtualization 14 - Configure and manage Hyper-V virtual machines List the virtual machine configuration versions List the virtual machine generation versions List available VHD formats and types Create and configure VMs Determine storage options for VMs Define shared VHDs and VHD Sets Implement guest clusters using shared VHDX 15 - Secure Hyper-V workloads Define guarded fabric Define the Host Guardian Service Explore TPM-trusted attestation Define KPS Determine key features of shielded VMs Compare encryption-supported and shielded VMs in a guarded fabric Implement a shielded VM 16 - Run containers on Windows Server Define containers List the differences between containers and VMs Define Windows Server and Hyper-V containers and isolation modes Explore Docker Prepare a Windows Server 2019 host for container deployment Security, Storage, and Networking with Windows containers 17 - Orchestrate containers on Windows Server using Kubernetes Define orchestration Define Kubernetes Deploy Kubernetes resources Create a Kubernetes cluster on Windows Define Azure Arc Connect an Azure Arc-enabled Kubernetes cluster to Azure Arc 18 - Plan and deploy Windows Server IaaS Virtual Machines Describe Azure compute Describe Virtual Machine storage Deploy Azure Virtual Machines Create a windows Virtual Machine using the portal Create a windows Virtual Machine using Azure CLI Deploy Azure Virtual Machines using templates Describe additional management optimization options 19 - Customize Windows Server IaaS Virtual Machine images Create a generalized image Create a new Virtual Machine from a managed image Create a managed image of a generalized virtual machine in Azure Create a Virtual Machine from a managed image Implement Azure Image Builder Create a windows Virtual Machine using Azure Image Builder template Create a Windows Virtual Machine with Azure Image Builder using PowerShell 20 - Automate the configuration of Windows Server IaaS Virtual Machines Describe Azure Automation Implement Azure Automation with DSC Remediate noncompliant servers Describe Custom Script Extensions Configure a Virtual Machine by using DSC 21 - Deploy and manage DHCP Use DHCP to simplify IP configuration Install and configure the DHCP role Configure DHCP options Configure DHCP scopes Select DHCP high availability options Implement DHCP Failover 22 - Implement Windows Server DNS Explore the DNS architecture Work with DNS zones and records Install and configure the DNS role Implement DNS forwarding 23 - Implement IP Address Management Define IP Address Management Deploy IP Address Management Administer IP Address Management Configure IP Address Management options Manage DNS zones with IP Address Management Manage DHCP servers with IP Address Management Use IP Address Management to manage IP addressing 24 - Implement remote access Examine the remote access options in Windows Server Select and set up VPNs Use NPS to create and enforce network access policies Plan and implement NPS Deploy a PKI for remote access Use WAP as a reverse web proxy 25 - Implement hybrid network infrastructure Describe Azure network topologies Implement Azure VPN options Create a route-based VPN gateway using the Azure portal Implement Azure ExpressRoute Configure Azure Virtual WAN Implement DNS in hybrid environments 26 - Implement DNS for Windows Server IaaS VMs Understand Azure DNS Implement Azure DNS Create an Azure DNS zone and record using the Azure portal Implement DNS with Azure IaaS virtual machines Implement split-horizon DNS in Azure Troubleshoot DNS 27 - Implement Windows Server IaaS VM IP addressing and routing Implement a virtual network Implement IaaS VM IP addressing Assign and manage IP addresses Configure a private IP address for a virtual machine using the Azure portal Create a virtual machine with a static public IP address using the Azure portal Implement IaaS virtual machine IP routing Implement IPv6 for Windows Server IaaS virtual machines 28 - Manage Windows Server file servers Define the Windows Server file system List the benefits and uses of File Server Resource Manager Define SMB and its security considerations Configure SMB protocol Define Volume Shadow Copy Service 29 - Implement Storage Spaces and Storage Spaces Direct Define the Storage Spaces architecture and its components List the functionalities, benefits, and use cases of Storage Spaces Implement Storage Spaces List the functionalities, components, benefits, and use cases of Storage Spaces Direct Implement Storage Spaces Direct 30 - Implement Windows Server Data Deduplication Define the architecture, components, and functionality of Data Deduplication Define the use cases and interoperability of Data Deduplication Implement Data Deduplication Manage and maintain Data Deduplication 31 - Implement Windows Server iSCSI List the functionalities, components, and use cases of iSCSI List the considerations for implementing iSCSI Implement iSCSI Configure high availability for iSCSI 32 - Implement Windows Server Storage Replica List the functionalities and components of Storage Replica Examine the prerequisites for implementing Storage Replica Implement Storage Replica by using Windows Admin Center Implement Storage Replica by using Windows PowerShell 33 - Implement a hybrid file server infrastructure Describe Azure File services Configure Azure Files Configure connectivity to Azure Files Describe Azure File Sync Implement Azure File Sync Deploy Azure File Sync Deploy Azure File Sync 2 Manage cloud tiering Migrate from DFSR to Azure File Sync

AZ-800T00 Administering Windows Server Hybrid Core Infrastructure
Delivered Online
£2,380

SQL Intermediate Course, 3 Days

4.6(12)

By PCWorkshops

This Practical SQL course, is designed make you fully conversant with queries, DML and DDL statements. Hands-on, Practical SQL course. You will get the PCWorkshops SQL Course Certificate. Max 4 people per course, to keep it personalised.

SQL Intermediate Course, 3 Days
Delivered Online + more
£600

Certified Data Centre Professional (CDCP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional who works in and around the data centre and who has the responsibility to achieve and improve the availability and manageability of the data centre. Overview After completion of the course the participant will be able to:? Choose an optimum site for mission-critical data centre based on current and future needs? Describe all components that are important for high availability in a data centre and how to effectively setup the data centre? Name and apply the various industry standards? Describe the various technologies for UPS, fire suppression, cooling, monitoring systems, cabling standards, etc, and to select and apply them effectively to cost-efficiently enhance the high-availability of the data centre.? Review the electrical distribution system to avoid costly downtime? Enhance cooling capabilities and efficiency in the data centre by using existing and new techniques and technologies for the increased cooling requirements of the future? Design a highly reliable and scalable network architecture and learn how to ensure installers apply proper testing techniques? Create effective maintenance contracts with equipment suppliers ensuring the best return on investment? Setup effective data centre monitoring ensuring the right people get the right message? Ensure proper security measures, both procedural and technical, are established to safeguard your company's valuable information in the data centre The course will address how to setup and improve key aspects such as power, cooling, security, cabling, safety, etc., to ensure a high available data centre. It will also address key operations and maintenance aspects. The Data Centre, it?s Importance and Causes for DowntimeData Centre Standards and Best PracticesData Centre Location, Building and Construction Selecting appropriate sites and buildings and how to avoid pitfalls Various components of an effective data centre and supporting facilities setup Raised Floor/Suspended Ceiling Uniform, concentrated and rolling load definitions Applicable standards Raised Floor guidelines Signal Reference Grid, grounding of racks Disability act and regulations Suspended ceiling usage and requirements Light Standards Light fixture types and placement Emergency lighting, Emergency Power Supply (EPS) Power Infrastructure Power infrastructure layout from generation to rack level ATS and STS systems Redundancy levels and techniques Three-phase and single-phase usage Power distribution options within the computer room Power cabling versus bus bar trunking Bonding versus grounding Common Mode Noise and isolation transformers Distribution boards, form factors and IP-protection grades Power quality guidelines Real power versus apparent power How to size and calculate load in the data centre Generators Static and dynamic UPS systems, selection criteria, how they operate and energy efficiency option Battery types, correct selection and testing Thermo-graphics Electro Magnetic Fields Electrical fields and magnetic fields definitions and units of measurements Sources of EMF Effects of EMF on human health and equipment (H)EMP Standards EMF shielding solutions Equipment Racks Rack standards, properties and selection criteria Security considerations Power rail/strip options Cooling Infrastructure Temperature and humidity recommendations Cooling measurement units and conversion rates Sensible and latent heat definitions Differences between comfort and precision cooling Overview of different air conditioner technologies Raised floor versus non-raised floor cooling Placement of air conditioner units and limitations to be observed Supplemental cooling options Cold aisle/hot aisle containment Water Supply Importance of water supply and application areas Backup water supply techniques Designing a Scalable Network Infrastructure The importance of a Structured Cabling System Planning considerations Copper and Fiber cable technology and standards ANSI/TIA-942 Cabling hierarchy and recommendations Testing and verification SAN storage cabling Network redundancy Building-to-building connectivity Network monitoring system requirements Fire Suppression Standards for fire suppression Detection systems Various total flooding fire suppression techniques and systems, their benefits and disadvantages Handheld extinguishers Signage and safety Regulatory requirements and best practices Data Centre Monitoring Data centre monitoring requirements EMS versus BMS Water leak detection systems Notification options and considerations Operational Security and Safety Practices Data centre security layers Physical, infrastructure and organisational security Safety measures and essential signage Labelling Choosing a labelling scheme Recommended labelling practices Network labelling Documentation How to setup proper documentation Document management policies and procedures Cleaning Cleaning practices for the data centre MTBF/MTTR Standards and definitions Calculation models The ?real? value Maintenance Contracts/SLA/OLAEXAM: Certified Data Centre Professional Additional course details: Nexus Humans Certified Data Centre Professional (CDCP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Centre Professional (CDCP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Data Centre Professional (CDCP)
Delivered Online
£1,500

55341 Installation, Storage, and Compute with Windows Server

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT professionals who have some experience working with Windows Server, and who are looking for a single five-day course that covers storage and compute technologies in Windows Server. This course will help them update their knowledge and skills related to storage and compute for Windows Server. Overview Prepare and install Windows Server and plan a server upgrade and migration strategy. Describe the various storage options, including partition table formats, basic and dynamic disks, file systems, virtual hard disks, and drive hardware, and explain how to manage disks and volumes. Describe enterprise storage solutions, and select the appropriate solution for a given situation. Implement and manage Storage Spaces and Data Deduplication. Install and configure Microsoft Hyper-V, and configure virtual machines. Deploy, configure, and manage Windows and Hyper-V containers. Describe the high availability and disaster recovery technologies in Windows Server. Plan, create, and manage a failover cluster. Implement failover clustering for Hyper-V virtual machines. Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation. Create and manage deployment images. Manage, monitor, and maintain virtual machine installations. This five-day course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing storage and compute by using Windows Server, and who need to understand the scenarios, requirements, and storage and compute options that are available and applicable to Windows Server. Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and Server 2019. The course and labs also focus on how to administer Windows Server using not only the traditional tools such as PowerShell and Server manager, but also Windows Admin Center. Prerequisites A basic understanding of networking fundamentals. An awareness and understanding of security best practices. An understanding of basic Active Directory concepts. Basic knowledge of server hardware. Experience supporting and configuring Windows client operating systems such as Windows 10 or Windows 11. 1 - Installing, upgrading, and migrating servers and workloads Introducing Windows Server Preparing and installing Server Core Preparing for upgrades and migrations Migrating server roles and workloads Windows Server activation models 2 - Configuring local storage Managing disks in Windows Server Managing volumes in Windows Server 3 - Implementing enterprise storage solutions Overview of DAS, NAS, and SANs Comparing Fibre Channel, iSCSI, and Fibre Channel over Ethernet Understanding iSNS, DCB, and MPIO Configuring sharing in Windows Server 4 - Implementing Storage Spaces and Data Deduplication Implementing Storage Spaces Managing Storage Spaces Implementing Data Deduplication 5 - Installing and configuring Hyper-V and virtual machines Overview of Hyper-V Installing Hyper-V Configuring storage on Hyper-V host servers Configuring networking on Hyper-V host servers Configuring Hyper-V virtual machines Managing virtual machines 6 - Deploying and managing containers Overview of containers in Windows Server Deploying Windows Server and Hyper-V containers Installing, configuring, and managing containers by using Docker 7 - High availability and disaster recovery Defining levels of availability Planning high availability and disaster recovery solutions with Hyper-V virtual machines Backing up and restoring by using Windows Server Backup High availability with failover clustering in Windows Server 8 - Implementing failover clustering Planning a failover cluster Creating and configuring a new failover cluster Maintaining a failover cluster Troubleshooting a failover cluster Implementing site high availability with stretch clustering 9 - Implementing failover clustering with Windows Server Hyper-V Overview of the integration of Hyper-V with failover clustering Implementing Hyper-V VMs on failover clusters Key features for VMs in a clustered environment 10 - Implementing Network Load Balancing Overview of NLB Configuring an NLB cluster Planning an NLB implementation 11 - Creating and managing deployment images Introduction to deployment images Creating and managing deployment images by using MDT Virtual machine environments for different workloads 12 - Managing, monitoring, and maintaining virtual machine installations WSUS overview and deployment options Update management process with WSUS Overview of Windows PowerShell DSC Overview of Windows Server monitoring tools Using Performance Monitor Monitoring event logs

55341 Installation, Storage, and Compute with Windows Server
Delivered Online
£2,975

Advanced Architecting on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for Solution Architects Overview At the end of this course, you will be able to: Apply the AWS Well-Architected Framework Manage multiple AWS accounts for your organization Connect an on-premises datacenter to AWS cloud Move large data from an on-premises datacenter to AWS Design large datastores for AWS cloud Understand different architectural designs for scalability Protect your infrastructure from DDoS attack Secure your data on AWS with encryption Enhance the performance of your solutions Select the most appropriate AWS deployment mechanism Building on concepts introduced in Architecting on AWS, Advanced Architecting on AWS is intended for individuals who are experienced with designing scalable and elastic applications on the AWS platform. Building on concepts introduced in Architecting on AWS, this course covers how to build complex solutions which incorporate data services, governance, and security on AWS. This course introduces specialized AWS services, including AWS Direct Connect and AWS Storage Gateway to support Hybrid architecture. It also covers designing best practices for building scalable, elastic, secure, and highly available applications on AWS. Module 1: AWS Account Management Multiple accounts Multi-account patterns License management Manage security and costs with multiple accounts AWS Organizations AWS Directory Service Hands-on lab: Multi-VPC connectivity using a VPN Module 2: Advanced Network Architectures Improve VPC network connections Enhance performance for HPC workloads VPN connections over AWS AWS Direct Connect AWS Transit Gateway Amazon Route 53 Exercise: Design a hybrid architecture Module 3: Deployment Management on AWS Application lifecycle management Application deployment using containers AWS Elastic Beanstalk AWS OpsWorks AWS CloudFormation Module 4: Data Optimize Amazon S3 storage Amazon ElastiCache AWS Snowball AWS Storage Gateway AWS DataSync Backup and archival considerations Database migration Designing for big data with Amazon DynamoDB Hands-on lab: Build a failover solution with Amazon Route 53 and Amazon RDS Module 5: Designing for large scale applications AWS Auto Scaling Migrating over-provisioned resources Blue-green deployments on AWS Hands-on lab: Blue-green deployment with AWS Module 6: Building resilient architectures DDoS attack overview AWS Shield AWS WAF Amazon GuardDuty High availability using Microsoft SQL Server and Microsoft SharePoint on AWS High availability using MongoDB on Amazon EC2 AWS Global Accelerator Hands-on lab: CloudFront content delivery and automating AWS WAF rules Module 7: Encryption and data security Encryption primer DIY key management in AWS AWS Marketplace for encryption products AWS Key Management Service (AWS KMS) Cloud Hardware Security Module (HSM) Comparison of key management options Hands-on lab: AWS KMS with envelope encryption

Advanced Architecting on AWS
Delivered Online
£1,717