• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1695 Computing courses in Hythe, Kent delivered Live Online

MS-700T00 Managing Microsoft Teams

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in Microsoft Teams or in passing the Microsoft Teams Administrator Associate certification exam. A Microsoft Teams administrator plans, deploys, configures, and manages Microsoft Teams to focus on efficient and effective collaboration and communication in a Microsoft 365 environment. A Microsoft Teams administrator must be able to plan, deploy, and manage teams, chat, apps, channels, meetings, audio/video conferencing, live events, calling, and Teams certified devices. A Microsoft Teams administrator has experience integrating Microsoft Teams with SharePoint, OneDrive, Exchange, Microsoft 365 Groups, and other Microsoft, third-party, and custom apps. A Microsoft Teams administrator understands and collaborates with other workloads and roles, such as Network, Voice, Identity, Access, Devices, Licensing, Security, Compliance, Information management, and User Adoption. Overview What is Microsoft Teams and how the components work together How to implement Governance, Security and Compliance for Microsoft Teams How to prepare an organizations environment for a Microsoft Teams deployment How to deploy and manage teams How to manage collaboration and communication experiences in Microsoft Teams Techniques to manage and troubleshoot communication in Microsoft Teams The Managing Microsoft Teams course is designed for persons who are aspiring to the Microsoft 365 Teams Admin role. A Microsoft Teams administrator plans, deploys, configures, and manages Microsoft Teams to focus on efficient and effective collaboration and communication in a Microsoft 365 environment. In this course, you will learn about various Teams management tools, security and compliance feature for Teams, network requirement for Teams deployment as well as different Teams settings and policies for managing collaboration and communication experience in Teams. Prerequisites A proficient understanding of basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices, including using PowerShell. 1 - Explore Microsoft Teams Explore capabilities in Microsoft Teams Explore Microsoft Teams integration with Microsoft 365 Explore Microsoft Teams integration with Microsoft Power Platform Illustrate Microsoft Teams architecture Describe Microsoft Teams with Microsoft 365 Groups Describe Microsoft Teams with SharePoint and OneDrive Describe Microsoft Teams with Exchange Understand Microsoft Teams certified solutions 2 - Plan and deploy Microsoft Teams Designate Teams admin roles Understand Teams management tools Plan for Teams rollout Plan for Teams adoption Plan for Teams licensing Deploy Microsoft Teams clients 3 - Implement lifecycle management and governance for Microsoft Teams Plan for lifecycle management Plan for Teams governance Manage Microsoft 365 Groups creation Configure Microsoft 365 Groups expiration policy Configure Microsoft 365 Groups naming policy Plan policy assignment for users and groups Create and manage policy packages Manage Teams preview features using Teams update policies Create and manage teams templates and template policies 4 - Monitor your Microsoft Teams environment Monitor Microsoft Teams usage reports Monitor Microsoft 365 usage reports Interpret Microsoft Adoption Score Manage user access with Azure Active Directory access reviews Monitor the Microsoft 365 network connectivity dashboard Manage Teams notifications and alerts Manage feedback policies 5 - Manage access for external users Understand features in Azure Active Directory Work with external users in Microsoft Teams Manage access for external users Manage external collaboration in Azure AD Manage external collaboration in Microsoft 365 Manage external access in Microsoft Teams Manage guest access in Microsoft Teams Manage file sharing in SharePoint and OneDrive 6 - Implement security for Microsoft Teams Configure conditional access and multifactor authentication for Microsoft Teams Configure Safe Attachments for Microsoft Teams Configure Safe Links for Microsoft Teams Examine the Defender for Cloud Apps Monitor security reports for Microsoft Teams Plan and configure enhanced encryption policies 7 - Implement compliance for Microsoft Teams Create and manage sensitivity labels Create and manage retention policies Create and manage Data Loss Prevention policies Deploy communication compliance Enable scoped directory search Create information barrier policy Create security and compliance alerts for Microsoft Teams 8 - Plan and configure network settings for Microsoft Teams Examine network requirements for Microsoft Teams Plan for network deployment using Network Planner Configure network ports and protocols for Microsoft Teams Implement Quality of Service Configure reporting labels for location-enhanced Call Analytics reports Configure tenant data for Call Quality Dashboard reports Assess network readiness Manage network topology 9 - Create and manage teams Create teams Create a team from existing resources Plan and create org-wide teams Manage teams Manage users in a team Configure dynamic membership Archive restore and delete a team 10 - Manage collaboration experiences for chat and channels Create and manage channels in a team Create and manage Teams policies for channels Configure teams settings Create and manage messaging policies Manage channel moderation Manage access to channels 11 - Manage apps for Microsoft Teams Explore apps in Microsoft Teams Describe admin settings for Teams apps Manage access to Teams apps at the organization level Create and manage app permission policies Create and manage app setup policies Manage permissions and consent for Teams apps Plan and configure connectors Manage custom apps uploads Publish custom apps to Microsoft Teams Manage purchasing of apps in the Microsoft Teams app store Customize the organization's app store Customize the branded experience of an app 12 - Introduction to Teams meetings and calling Overview of Teams meetings and events Overview of Teams Phone Overview of auto attendants and call queues Overview of Teams devices 13 - Manage meetings and events experiences Explore meetings and events in Microsoft Teams Configure meeting settings Create and manage meeting policies Configure audio conferencing Create and manage meeting templates and template policies Create and manage meetings customization policies Configure live events settings Create and manage live events policies Examine live events across Microsoft 365 14 - Plan for Microsoft Teams Rooms and Surface Hub Determine license requirements for Microsoft Teams Rooms and shared devices Understand differences between Microsoft Teams Rooms on Android and Windows Understand Microsoft Teams Rooms on Surface Hub 2S Understand and plan Teams Room accessories, components, and peripherals Understand Teams Rooms management options 15 - Configure, deploy, and manage Teams devices Manage Microsoft Teams Phones Manage Microsoft Teams Room Systems Microsoft Teams Rooms management options Manage Surface Hub 2S devices Configure Microsoft Teams SIP gateway Manage Microsoft Teams displays Remote provisioning and sign in for Teams Phones Update Microsoft Teams devices remotely Manage Microsoft Teams device tags 16 - Plan for Teams Phone Plan to deploy Teams Phone Plan for Teams Phone PSTN connectivity Determine license requirements Plan for Teams Phone devices Plan and design Teams Phone features Plan for voicemail 17 - Configure and deploy Teams Phone Configure emergency calling for Teams Calling Plans Manage and configure Microsoft PSTN numbers Configure Operator Connect and Teams Phone Mobile Configure Teams Phone policies Create and manage Teams policies Configure Audio Conferencing 18 - Configure and manage voice users Enable users for Teams Phone Enable users for Direct Routing with Teams Phone Enable additional calling features for Teams Phone Enable users for Teams Phone Mobile 19 - Configure auto attendants and call queues Design call flows for auto attendants and call queues Configure auto attendants and call queues Deploy a channel-based call queue Configure resource accounts Configure Microsoft 365 groups for voicemail Interpret call queue conference modes Interpret call queue routing methods Configure holidays for auto attendants and call queues Configure custom music on hold 20 - Troubleshoot audio, video, and client issues Troubleshoot Teams Collect and identify logs Clear Microsoft Teams client cache Identify issues with call analytics Identify issues with Call Quality Dashboard Use Power BI to analyze Call Quality Dashboard data Identify issues with the Direct Routing Health Dashboard Additional course details: Nexus Humans MS-700T00 Managing Microsoft Teams training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-700T00 Managing Microsoft Teams course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-700T00 Managing Microsoft Teams
Delivered OnlineFlexible Dates
£2,380

DP-300T00 Administering Microsoft Azure SQL Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The audience for this course is data professionals managing data and databases who want to learn about administering the data platform technologies that are available on Microsoft Azure. This course is also valuable for data architects and application developers who need to understand what technologies are available for the data platform with Azure and how to work with those technologies through applications. This course provides students with the knowledge and skills to administer a SQL Server database infrastructure for cloud, on-premises and hybrid relational databases and who work with the Microsoft PaaS relational database offerings. Additionally, it will be of use to individuals who develop applications that deliver content from SQL-based relational databases. Prerequisites In addition to their professional experience, students who take this training should have technical knowledge equivalent to the following courses: AZ-900T00 Microsoft Azure Fundamentals DP-900T00 Microsoft Azure Data Fundamentals 1 - Prepare to maintain SQL databases on Azure Describe Microsoft Intelligent Data Platform roles Understand SQL Server in an Azure virtual machine Design Azure SQL Database for cloud-native applications Explore Azure SQL Database Managed Instance 2 - Deploy IaaS solutions with Azure SQL Explain IaaS options to deploy SQL Server in Azure Understand hybrid scenarios Explore performance and security Explain high availability and disaster recovery options 3 - Deploy PaaS solutions with Azure SQL Explain PaaS options for deploying SQL Server in Azure Explore single SQL database Deploy SQL database elastic pool Understand SQL database hyperscale Examine SQL managed instance Describe SQL Edge 4 - Evaluate strategies for migrating to Azure SQL Understand compatibility level Understand Azure preview features Describe Azure database migration options 5 - Migrate SQL workloads to Azure SQL databases Choose the right SQL Server Instance option in Azure Migrate SQL Server to Azure SQL Database offline Migrate SQL Server to Azure SQL Database online Load and move data to Azure SQL Database 6 - Migrate SQL workloads to Azure Managed Instances Evaluate migration scenarios to SQL Database Managed Instance Migrate to SQL Database Managed Instance Load and Move data to SQL Database Managed Instance 7 - Configure database authentication and authorization Describe Active Directory and Azure Active Directory Describe authentication and identities Describe Security Principals Describe database and object permissions Identify authentication and authorization failures 8 - Protect data in-transit and at rest Explore Transparent Data Encryption Configure server and database firewall rules Explain object encryption and secure enclaves Enable encrypted connections Describe SQL injection Understand Azure Key Vault 9 - Implement compliance controls for sensitive data Explore data classification Explore server and database audit Implement Dynamic Data Masking Implement Row Level security Understand Microsoft Defender for SQL Explore Azure SQL Database Ledger Implement Azure Purview 10 - Describe performance monitoring Describe performance monitoring tools Describe critical performance metrics Establish baseline metrics Explore extended events Describe Azure SQL Insights Explore Query Performance Insight 11 - Configure SQL Server resources for optimal performance Explain how to optimize Azure storage for SQL Server virtual machines Describe virtual machine resizing Optimize database storage Control SQL Server resources 12 - Configure databases for optimal performance Explore database maintenance checks Describe database scoped configuration options Describe automatic tuning Describe intelligent query processing 13 - Explore query performance optimization Understand query plans Explain estimated and actual query plans Describe dynamic management views and functions Explore Query Store Identify problematic query plans Describe blocking and locking 14 - Evaluate performance improvements Describe wait statistics Tune and maintain indexes Understand query hints 15 - Explore performance-based design Describe normalization Choose appropriate data types Design indexes 16 - Automate deployment of database resources Describe deployment models in Azure Automate deployment by using Azure Resource Manager templates and Bicep Automate deployment by using PowerShell Automate deployment by using Azure CLI 17 - Create and manage SQL Agent jobs Create a SQL Server maintenance plan Describe task status notifications 18 - Manage Azure PaaS tasks using automation Explore Elastic jobs Understand Azure Automation Build an automation runbook Automate database workflows by using Logic Apps Monitor automated tasks 19 - Describe high availability and disaster recovery strategies Describe recovery time objective and recovery point objective Explore high availability and disaster recovery options Describe Azure high availability and disaster recovery features for Azure Virtual Machines Describe high availability and disaster recovery options for PaaS deployments Explore an IaaS high availability and disaster recovery solution Describe hybrid solutions 20 - Explore IaaS and PaaS solutions for high availability and disaster recovery Describe failover clusters in Windows Server Configure Always-on availability groups Describe temporal tables in Azure SQL Database Describe active geo-replication for Azure SQL Database Explore auto-failover groups for Azure SQL Database and Azure SQL Managed Instance 21 - Back up and restore databases Back up and restore SQL Server running on Azure virtual machines Back up a SQL Server virtual machine Back up and restore a database using Azure SQL Database Additional course details: Nexus Humans DP-300T00: Administering Microsoft Azure SQL Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-300T00: Administering Microsoft Azure SQL Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DP-300T00 Administering Microsoft Azure SQL Solutions
Delivered OnlineFlexible Dates
£2,380

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

Definitive OpenSSL for engineers

5.0(3)

By Systems & Network Training

OpenSSL for engineers training course description A hands on course covering OpenSSL. The course focusses on the use of OpenSSL from the command line as opposed to using its extensive libraries. Certificate authorities are configured along with key generation, HTTPS and a SSL VPN. What will you learn Describe OpenSSL. Use OpenSSL. Describe and implement: Explain how the various technologies involved in an OpenSSL work. OpenSSL for engineers training course details Who will benefit: Network personnel. Prerequisites: IP security foundation for engineers Duration 2 days OpenSSL for engineers training course contents What is OpenSSL? What is SSL? SSL versions, TLS, TLS negotiation, TLS authentication, What is OpenSSL, Command line tool, SSL library. OpenSSH, OpenVPN. Hands on TLS packet analysis. Getting started with OpenSSL Downloading, source code, packages, installing, versions, configuration, openssl command. Cipher suite selection. Hands on Encrypting a file with openssl. Public and private keys Algorithms, creating keys, public keys, private keys, encrypting the private key. Hands on Encrypting a file with keys. Digital signatures Creating signatures, checking validity of signatures, Self signing SSL certificates. Viewing certificates. Certificate files. Converting between formats. Hands on Securing a web server with HTTPS. Simple PKI with OpenSSL Root CA, signing CA, configuration files, Certificate signing requests. Email certificates, TLS server certificates. Hands on Implementing a simple PKI with OpenSSL.

Definitive OpenSSL for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Definitive Kerberos for engineers

5.0(3)

By Systems & Network Training

Kerberos for engineers training course description This hands on course covers the details of Kerberos, from installation and administration through to how it all works including the protocols. What will you learn Describe what Kerberos is. Explain how Kerberos works. Install Kerberos. Configure Kerberos. Troubleshoot Kerberos. Kerberos for engineers training course details Who will benefit: Engineers interested in security. Prerequisites: TCP/IP foundation for engineers Duration 2 days Kerberos for engineers training course contents What is Kerberos? Single Sign On, The protocol, the standard, history, v4, v5, RFCs, Linux, Windows. Kerberos concepts and technology AAA, Authentication, Authorization, Accounting. Kerberos vs LDAP and directories. Privacy, integrity. Kerberos realms, principles, instances. Keys, salts, passwords. Key Distribution Centre, Authentication server, ticket granting server. Tickets. Installation and administration of Kerberos Installing Kerberos, creating realms, testing. DNS and Kerberos, Kerberos clients. Hands on Windows and Linux Kerberos. Kerberos protocols The Needham-Schroeder protocol, Kerberos v4. Authentication server, ticket granting server, Kerberos v5, encryption options, ticket options, other protocol features and extensions. Related protocols: GSSAPI, SPNEGO. Hands on Using Wireshark to 'see' Kerberos. Troubleshooting Kerberos Approach, debugging tools, errors and solutions. Hands on Kerberos troubleshooting. Kerberos security concerns Kerberos attacks, protocol security issues. Dictionary attacks, brute force attacks, replay attacks, MITM attacks, security solutions, protecting the KDC, firewalls, NAT and Kerberos. Hands on Kerberos logging. Software which uses Kerberos Kerberos logins, Kerberos and web based applications, Directory services. Advanced Kerberos issues Cross realm authentication, Windows issues, Windows and UNIX interoperability, Hands on Using a Windows DC for UNIX clients.

Definitive Kerberos for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Linux shell scripting

5.0(3)

By Systems & Network Training

Linux shell scripting training course description A practical introduction to writing scripts using the Bourne shell under any Linux operating system. Applicable for those using the Korn shell as well. What will you learn Read shell scripts. Write shell scripts. Use different types of quotes. Recognise the role of shell scripts within the Linux system. Linux shell scripting training course details Who will benefit: Programmers developing programs under UNIX. Administrators / support personnel who wish to find out more about the workings of Linux or write simple utility programs. Prerequisites: Linux Fundamentals Duration 2 days Linux shell scripting training course contents Review of Linux fundamentals Basic shell scripts What does the shell do? How are commands executed? Different shells. what is a shell script? Comments, creating shell scripts. Variables Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. Positional parameters $0 to $9, $#, $* and others. shift parameter substitution. Control statements The test command The if statement while loops for loops The case statement. Special characters Redirection of errors, here documents, quoting. Arithmetic in shell scripts The expr command. System shell scripts Screen handling The terminfo database, The tput command. Advanced issues (optional session) Shell functions, getopts, xargs, debugging shell scripts, portability issues. Extras in the Korn shell. Optimising shell scripts The time command, performance tips.

Linux shell scripting
Delivered in Internationally or OnlineFlexible Dates
£1,497

UNIX shell programming

5.0(3)

By Systems & Network Training

UNIX shell programming training course description This course has been designed as a follow on course for the XML primer course. The course looks at the use of XSLT in the transforming and styling XML documents. What will you learn Read shell scripts. Write shell scripts. Use different types of quotes. Recognise the role of shell scripts within the UNIX system. UNIX shell programming training course details Who will benefit: Programmers developing programs under UNIX. Anyone working with XML. Administrators Support personnel who wish to find out more about the workings of UNIX or write simple utility programs. Prerequisites: UNIX fundamentals Some programming experience would be useful although not essential. Duration 2 days UNIX shell programming training course contents Review of UNIX fundamentals Basic shell scripts What does the shell do? How are commands executed? Different shells. What is a shell script? Comments, creating shell scripts. Variables Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. Positional parameters 0 to $9, $#, $* and others. shift parameter substitution. Control statements The test command, The if statement, while loops, for loops, The case statement, Special characters, Redirection of errors, here documents, quoting. Arithmetic in shell scripts The expr command. System shell scripts Screen handling The terminfo database The tput comand Avanced issues (optional session) Shell functions, getopts, xargs, debugging shell scripts, portability issues. Extras in the Korn shell. Optimising shell scripts The time command, performance tips.

UNIX shell programming
Delivered in Internationally or OnlineFlexible Dates
£1,497

Digital Electronics Course Online

By Hi-Tech Training

This Digital Electronics Course is designed to give practical knowledge of the type of electronic circuitry used in a modern Computer System or in any type of Computer Controlled equipment such as Photocopiers, Cash Registers, Tablets, mobile phones and many other types of IT equipment. Digital Electronics involves the use of Silicon chips (Integrated Circuits). The internal structure of a computer is to a large extent comprised of Digital Electronic Circuits.

Digital Electronics Course Online
Delivered Online
£85 to £685

Definitive Salt for engineers

5.0(3)

By Systems & Network Training

Definitive Salt training course description Salt is a remote execution framework and configuration management system. This course covers Salt from the basics. After a quick first taste the course moves onto execution modules, salt states, minion and master data, jinja, Salt extensions and then topology and configuration options. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Install and use Salt. Describe the architecture of Salt. Manage configurations with Salt. Extend Salt. Definitive Salt training course details Who will benefit: Anyone working with Salt. Prerequisites: Linux fundamentals. Duration 2 days Definitive Salt training course contents Introduction What is Salt? High- level architecture, Some quick examples, system management, configuration management, A brief history, Topology options, Extending Salt. Quick start: First taste of Salt Single-master setup, from packages, bootstrap scripts, Starting up, Basic commands, salt: the main workhorse, salt-key: key management, salt-call: execution on the minion, salt-run: co-ordination of jobs on the master, summary of commands, Key management, viewing keys, accepting keys, rejecting keys, key files, Minion targeting, minion ID, list (-L), glob, regular expressions (-E), grains (-G), compound (-C), targeting summary, Additional remote execution details, Conclusion. Execution modules: The functional foundation sys: information and documentation about modules, sys.doc basic documentation, sys.list_modules, sys.list_functions: simple listings, cmd: execute via shell, cmd.run: run any command, pkg: manage packages, virtual modules, pkg.lists_pkgs: list all installed packages, pkg.available version: see what version will be installed, pkg.install: install packages, user: manage users, user.add: add users, user.list_users, user info: get user info, saltutil: access various Salt utilities, Summary. Configuration management: Salt states Salt files overview, SLS example: adding a user, working with the multi-layered state system, Highstate and the top file, the top file, State ordering, require: depend on another state, watch: run based on other changes, odds and ends, Summary. Minion data / master data Grains are minion data, performing basic grain operations, setting grains, targeting with grains in the top file, Pillars are data from the master, querying pillar data, querying other sources with external pillars, Renderers give data options. Extending Salt: part I Introduction to Jinja, Jinja basics, Templating with Jinja, filtering by grains, Custom execution module, Custom state modules, Custom grains, External pillars, Summary. More on the matter Runners, manage minions, manage jobs, The orchestrate runner, The event system, The reactor system, Summary. Extending Salt: part II Python client API, reading configuration data on a master and minion, using the master client (localclient) API, Using the caller client API, Custom runners, writing a custom runner, using the runnerclient API, Summary. Topology and configuration options Master configuration, directories and files, logging, access control, files server options, Topology variations, masterless minions, peer systems, syndication masters, multiple masters. Brief introduction to salt-cloud Overview, Setup AWS and salt-cloud, installing salt-cloud, cloud providers, cloud profiles, cloud maps, Introspection via salt cloud, Creating infrastructure, More information. Using vagrant to run Salt examples YAML.

Definitive Salt for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered OnlineFlexible Dates
£3,395