• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5601 Computing & IT courses delivered Online

C)DRE-Certified Disaster Recovery Engineer Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers DR and BCP Engineers Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Disaster Recovery Engineer students will be able to establish industry acceptable DR & BCP standards with current best practices and policies. Students will also be prepared to competently take the C)DRE exam. A Certified Disaster Recovery Engineer, C)DRE, is the superhero of an information System! When a business is hit by a natural disaster, cybercrime or any other disruptive tragedy, how should the organization react? What if the network infrastructure is taken down? Will the business be able to continue operations? How much will it cost if the business is down during repairs? The answer is found in theÿ Certified Disaster Recovery Engineer certification course. Disaster recovery and business continuity planning is the process of having a professional work with a business to prepare processes, policies, and procedures to follow in the event of a disruption. The C)DRE prepares students to plan and present the latest methodologies and best practices for real-world system recovery. Course Outline Welcome to Disaster Recovery Training Business Impact Analysis Risk Analysis Design & Development Phase (BCP Strategies) IT Recovery Strategies Implementation Phase Testing and Exercise Maintenance and Updating Pandemics Case Studies and Templates

C)DRE-Certified Disaster Recovery Engineer Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat Linux Diagnostics and Troubleshooting (RH342)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Senior system administrators who wish to learn more about troubleshooting. Have earned a Red Hat Certified System Administrator (RHCSA) or have similar experience. It is recommend that students have earned a Red Hat Certified Engineer (RHCE) or have similar experience. Overview As a result of attending this course, students should be able to leverage the software development life-cycle process to plan, create, test, and provision host systems within an organization. Students should be able to demonstrate the following skills: - Installation of Red Hat Satellite 6 - Software life-cycle management of software used to provision and maintain configured hosts within a controlled production environment This course enriches your skills by providing the tools and techniques that you need to successfully diagnose, and fix, a variety of potential issues. You will work through hands-on problems in various subsystems to diagnose and fix common issues. You will learn develop the skills to apply the scientific method to a structured form of troubleshooting. You will then apply this approach in troubleshooting various types of problems, including boot issues, hardware issues, storage issues, RPM issues, network issues, third-party application issues, security issues, and kernel issues. At the end of the course, you will be empowered to complete various comprehensive review labs to test your skills. 1 - INTRODUCTION TO TROUBLESHOOTING Describe a generalized strategy for troubleshooting. 2 - TAKE PROACTIVE STEPS TO PREVENT SMALL ISSUES Prevent small issues from becoming large problems by employing proactive system administration techniques. 3 - TROUBLESHOOT BOOT ISSUES Identify and resolve issues that can affect a system's ability to boot. 4 - IDENTIFY HARDWARE ISSUES Identify hardware problems that can affect a system?s ability to operate. 5 - TROUBLESHOOT STORAGE ISSUES Identify and fix issues related to storage. 6 - TROUBLESHOOT RPM ISSUES Identify and fix problems in, and using, the package management subsystem. 7 - TROUBLESHOOT NETWORK ISSUES Identify and resolve network connectivity issues. 8 - TROUBLESHOOT APPLICATION ISSUES Debug application issues. 9 - DEAL WITH SECURITY ISSUES Identify and fix issues related to security subsystems. 10 - TROUBLESHOOT KERNEL ISSUES Identify kernel issues and assist Red Hat Support in resolving kernel issues. 11 - RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING COMPREHENSIVE REVIEW Practice and demonstrate knowledge and skills learned in Red Hat Enterprise Linux Diagnostics and Troubleshooting.

Red Hat Linux Diagnostics and Troubleshooting (RH342)
Delivered OnlineFlexible Dates
Price on Enquiry

CB69 IBM TCP/IP for z/OS Implementation Workshop

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This intermediate course is for the Information Systems communications professional who is planning to install TCP/IP for z/OS and for TCP/IP users who are interested in installing and customizing IBM's TCP/IP product in interoperability environments and main applications. Overview Describe IBM's z/OS TCP/IP product offering Describe the installation requirements and system customization for the z/OS TCP/IP implementation Define network interface attachments that produce connectivity for z/OS TCP/IP communications Construct TCP/IP configuration statements for z/OS to allow operation and connectivity to an existing TCP/IP network Configure TCP/IP for z/OS for basic communications functions Construct TCP/IP configuration statements for z/OS for selected TCP/IP application protocols services This course is designed to provide the skills for basic implementation and customization of TCP/IP on z/OS. TCP/IP for z/OS introduction . z/OS system prerequisites for TCP/IP . Basic customization . Network interfaces . Name services . OMPRoute . Telnet . Enterprise Extender . SyslogD . FTP . SMTP . Additional course details: Nexus Humans CB69 IBM TCP/IP for z/OS Implementation Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CB69 IBM TCP/IP for z/OS Implementation Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CB69 IBM TCP/IP for z/OS Implementation Workshop
Delivered OnlineFlexible Dates
Price on Enquiry

C)SLO-Certified Security Leadership Officer Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for C - Level Managers IT Managers Cyber Security Personelle Engineers Information Systems Owners ISSO's CISSP Students ISO's Overview Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam. You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture. Certified Security Leadership Officerÿ course is designed for mid and upper-level managers.ÿ If you are an engineer, this course will increase your knowledge in the leading information system security teams. Plus, the C)SLO will give you an essential understanding of current security issues, best practices, and technology. With this knowledge you will then be prepared to manage the security component of an information technology project. As a Security Leadership Officer, you will be the bridge between cybersecurity and business operations. Course Outline Security Management Risk Management Encryption Information Security Access Control Concepts Incident Handling and Evidence Operations Security Network Security Additional course details: Nexus Humans C)SLO-Certified Security Leadership Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)SLO-Certified Security Leadership Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)SLO-Certified Security Leadership Officer Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

OP05 IBM Introducing z/OS UNIX System Services

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This intermediate course is for all computer professionals who will use z/OS UNIX. Overview Discuss the role of z/OS in an open systems environmentIdentify the basic terms used in z/OS UNIXDefine the components of z/OS UNIXExplain major functions provided in z/OS UNIXDiscuss opportunities for applications in a z/OS UNIX environmentIdentify z/OS base elements and optional features that make up z/OS UNIXUse the two interactive interfaces available to access the services This course describes how open standards are implemented in a z/OS system by z/OS UNIX. UNIX System Services are introduced, and the role of z/OS as a server in the open systems environment is discussed. Day 1 Welcome and introduction Unit 1. z/OS UNIX overview Unit 2. Introduction to z/OS UNIX Unit 3. Hierarchical file system Exercises Day 2 Unit 4. z/OS UNIX shell and utilities Unit 5. z/OS UNIX shell commands Unit 6. Working with the shell Unit 7. Functions in z/OS UNIX Exercises Day 3 Unit 8. Working with the z/OS UNIX environment Exercises

OP05 IBM Introducing z/OS UNIX System Services
Delivered OnlineFlexible Dates
Price on Enquiry

C)DFE - Certified Digital Forensics Examiner Mile 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IS Security Officers IS Managers Virtualization Engineers and Managers Cloud Security Managers Overview Upon completion, the Certified Digital Forensics Examiner candidate will be able to competently take the CDFE exam. The Certified Digital Forensics Examiner, C)DFE certification is designed to train Cyber Crime and Fraud Investigators. Students are taught electronic discovery and advanced investigation techniques.ÿ This course is essential to anyone encountering digital evidence while conducting an investigation. Mile2?s Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-ðcustody, and write a findings report. Through the use of a risk-based approach, the C)DFE is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Course Outline Computer Forensic Incidents Investigative Theory Investigative Process Digital Acquisition and Analysis Disks and Storages Live Acquisitions Windows Forensics Linux Forensics Mac Forensics Examination Protocols Digital Evidence Protocols Digital Evidence Presentation Laboratory Protocols Specialized Artifact Recovery eDiscovery and ESI Mobile Forensics Incident Handling Reporting Additional course details: Nexus Humans C)DFE - Certified Digital Forensics Examiner Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)DFE - Certified Digital Forensics Examiner Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)DFE - Certified Digital Forensics Examiner Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Enterprise Linux System Admin 2 with Exam Prep

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IT professionals who have attended Red Hat System Administration I and want the skills to be full-time enterprise Linux administrators and/or earn RHCSA certifications This course focuses on the key tasks needed to become a full time Linux administrator and goes deeper into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting. Automate installation with Kickstart Automate the installation of Red Hat Enterprise Linux systems with Kickstart Use regular expressions with grep Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files. Create and Edit text files with vim Introduce the vim text editor, with which you can open, edit, and save text files. Schedule future Linux tasks Schedule tasks to automatically execute in the future. Manage priority of Linux processes Influence the relative priorities at which Linux processes run. Control access to files with access control lists (ACL) Manage file security using POSIX access control lists. Manage SELinux security Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise. Connect to network-defined users and groups Configure systems to use central identity management services. Add disks, partitions, and file systems to a Linux system Manage simple partitions and file systems. Manage logical volume management (LVM) storage Manage logical volumes from the command line. Access networked attached storage with network file system (NFS) Access (secure) NFS shares. Access networked storage with SMB Use autofs and the command line to mount and unmount SMB file systems. Control and troubleshoot the Red Hat Enterprise Linux boot process Limit network communication with firewall, Configure a basic firewall. Comprehensive review Practice and demonstrate knowledge and skills learned in this course.

Enterprise Linux System Admin 2 with Exam Prep
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus Data Ethics for Business Professionals (DEBIZ)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for business leaders and decision makers, including C-level executives, project and product managers, HR leaders, Marketing and Sales leaders, and technical sales consultants, who have a vested interest in the representation of ethical values in technology solutions. Other individuals who want to know more about data ethics are also candidates for this course. This course is also designed to assist learners in preparing for the CertNexus DEBIZ™ (Exam DEB-110) credential. The power of extracting value from data utilizing Artificial Intelligence, Data Science and Machine Learning exposes the learning differences between humans and machines. Humans can apply ethical principles throughout the decision-making process to avoid discrimination, societal harm, and marginalization to maintain and even enhance acceptable norms. Machines make decisions autonomously. So how do we train them to apply ethical principles as they learn from decisions they make? This course provides business professionals and consumers of technology core concepts of ethical principles, how they can be applied to emerging data driven technologies and the impact to an organization which ignores ethical use of technology. Introduction to Data Ethics Defining Data Ethics The Case for Data Ethics Identifying Ethical Issues Improving Ethical Data Practices Ethical Principles Ethical Frameworks Data Privacy Accountability Transparency and Explainability Human-Centered Values and Fairness Inclusive Growth, Sustainable Development, and Well-Being Applying Ethical Principles to Emerging Technology Improving Ethical Data Practices Sources of Ethical Risk Mitigating Bias Mitigating Discrimination Safety and Security Mitigating Negative Outputs Data Surveillance Assessing Risk Ethical Risks in sharing data Applying professional critical judgement Business Considerations Data Legislation Impact of Social and Behavioral Effects Trustworthiness Impact on Business Reputation Organizational Values and the Data Value Chain Building a Data Ethics Culture/Code of Ethics Balancing organizational goals with Ethical Practice Additional course details: Nexus Humans CertNexus Data Ethics for Business Professionals (DEBIZ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Data Ethics for Business Professionals (DEBIZ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Data Ethics for Business Professionals (DEBIZ)
Delivered OnlineFlexible Dates
Price on Enquiry

Certificate in Compliance and Risk Management

By Online Training Academy

Just as a detective meticulously investigates a case, equips you with the skills to manage Compliance Systems. You become the Sherlock Holmes of corporate structure, ensuring every element aligns seamlessly with our Certificate in Compliance and Risk Management. Step into the shoes of an auditor, peeling back layers to unveil any lurking irregularities. The narrative takes an ethical turn, where you grapple with the moral compass guiding compliance. Uncover the many faces of risk management, and later modules act as your guide through the intricate process of risk management, transforming you into a vigilant guardian of corporate stability. Join us on this riveting adventure, where knowledge becomes your compass and resilience your armour. Key Features This Certificate in Compliance and Risk Management Course Includes: This Certificate in Compliance and Risk Management Course is CPD Certified Free Certificate from Reed CIQ Approved Compliance and Risk Management Course Developed by Specialist Lifetime Access Course Curriculum Module 01 Overview of Compliance Module 02 The 5 Core Components of Compliance Module 03 Managing Compliance Systems (CMS) Module 04 Conducting Compliance Audits Module 05 Ethics in Compliance Module 06 Understanding Risk and Its Types Module 07 Basics of Risk Management Module 08 The Process of Risk Management Learning Outcomes After completing this Compliance and Risk Management Course, you will be able to: Demonstrate understanding of compliance principles through practical application in scenarios. Identify core components of compliance and integrate them into organisational processes. Implement and manage Compliance Management Systems (CMS) for effective regulatory adherence. Conduct thorough compliance audits using established methodologies and reporting techniques for risk management. Evaluate ethical considerations within compliance frameworks and make informed ethical decisions. Apply risk management principles to identify, assess, and mitigate potential risks. Certification After completing this Compliance and Risk Management Course, you will get a free Certificate. Please note: The CPD approved course is owned by E-Learning Solutions Ltd and is distributed under license. CPD 10 CPD hours / points Accredited by The CPD Certification Service Certificate in Compliance and Risk Management 1:44:33 1: Module 01: Overview of Compliance 07:51 2: Module 02: The 5 Core Components of Compliance 13:20 3: Module 03: Managing Compliance Systems (CMS) 12:04 4: Module 04: Conducting Compliance Audits 17:42 5: Module 05: Ethics in Compliance 16:32 6: Module 06: Understanding Risk and Its Types 12:01 7: Module 07: Basics of Risk Management 13:47 8: Module 08: The Process of Risk Management 09:16 9: CPD Certificate - Free 01:00 10: Leave A Review 01:00 Who is this course for? This Certificate in Compliance and Risk Management course is accessible to anyone eager to learn more about this topic. Through this course, you'll gain a solid understanding of Compliance and Risk Management. Moreover, this course is ideal for: Professionals seeking comprehensive knowledge in compliance and risk management. Individuals aiming to enhance their skills for regulatory compliance roles. Managers responsible for implementing compliance systems within their organisations. Auditors looking to specialise in compliance audit procedures and methodologies. Ethical decision-makers committed to incorporating ethical practices into compliance frameworks. Requirements There are no requirements needed to enrol into this Certificate in Compliance and Risk Managementcourse. We welcome individuals from all backgrounds and levels of experience to enrol into this Certificate in Compliance and Risk Management course. Career path After finishing this Certificate in Compliance and Risk Management course you will have multiple job opportunities waiting for you. Some of the following Job sectors of Compliance and Risk Management are: Compliance Officer Risk Analyst Regulatory Affairs Specialist Audit Manager Ethics and Compliance Manager Risk Management Consultant Certificates Reed Courses Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.

Certificate in Compliance and Risk Management
Delivered Online On Demand1 hour 42 minutes
£12

Hybrid Team Management Level 1

5.0(1)

By Empower UK Employment Training

Master the art of hybrid team management with our comprehensive course. Learn effective techniques for transitioning, team building, and driving high performance in a hybrid work environment. Elevate your leadership skills and optimize your team’s effectiveness in today’s dynamic work landscape.

Hybrid Team Management Level 1
Delivered Online On Demand1 hour 12 minutes
£5