• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1701 Computing courses in Yeovil delivered Live Online

DevOps for engineers

5.0(3)

By Systems & Network Training

DevOps training course description This course is an introduction to DevOps. The course emphasizes communication, collaboration , integration, and automation to improve the workflow between developers and IT operations professionals. Improved workflows lead to more opportunities to design software and services in a more agile fashion. This course is a basis for discovering the most important DevOps concepts and to understand the principles and methods behind this. The course will leave you with the inspiration to be the advocate of change. What will you learn Explain DevOps principles. Describe the relationship between Agile , Lean and IT Service Management ( ITSM). Describe methods for automation and technology factors. Describe considerations when changing. Describe challenges, risks and critical success factors. DevOps training course details Who will benefit: IT development, IT operations and IT service management. Prerequisites: Introduction to data communications & networking. Duration 2 days DevOps training course contents Why DevOps? Introduction DevOps Goals DevOps Added value of DevOps Proven Results DevOps for businesses DevOps principles (The Three Ways) DevOps and other frameworks DevOps and Agile DevOps and Lean DevOps and IT Service Management DevOps culture Characteristics of a DevOps culture Organizational Considerations DevOps DevOps stakeholders DevOps roles DevOps teams DevOps organizational structures DevOps methods Continuous Integration Continuous delivery Continuous deployment Value stream mapping Kanban Theory of Constraints Improvement Kata Deming's quality circle ITSM processes DevOps and Automation Methods for DevOps automation Longevity and tools categories DevOps applications Transitioning to a DevOps culture. Implementation Challenges, risks and critical success factors Measuring DevOps successes

DevOps for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Microsoft SharePoint

5.0(3)

By Systems & Network Training

Supporting Microsoft SharePoint course description A concise hands on course enabling delegates to manage and administer a SharePoint site. What will you learn Perform initial farm configuration. Use stsadm commands. Manage content. Secure SharePoint. Customise SharePoint search. Monitor and performance tune SharePoint. Supporting Microsoft SharePoint server course details Who will benefit: Anyone working with Microsoft SQL server Prerequisites: SharePoint Administrators. Duration 2 days Supporting Microsoft SharePoint course contents SharePoint Introduction A SharePoint installation. Initial farm configuration. Creating a site collection. Administering SharePoint Stsadm commands, automation with PowerShell. Managing content Lists, libraries, items and documents Security SecureStore, Users and groups, roles and role assignments. Permission levels. SharePoint search Configure search, refine search. SharePoint performance Diagnostic logging, logging levels, Health anaylzer, performance bottlenecks.

Microsoft SharePoint
Delivered in Internationally or OnlineFlexible Dates
£1,727

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

Advanced UNIX shell programming

5.0(3)

By Systems & Network Training

Advanced UNIX shell scripting training course description A follow on hands on course from the Introduction to shell programming course covering the powerful sed and awk tools along with the extra Korn shell programming features. What will you learn Use regular expressions within grep, ed and many other utilities. Use awk and sed. Integrate sed and awk into shell scripts. Recognise the role of shell scripts within the UNIX system. Write shell scripts using new Korn shell features including: The select construct Arrays Arithmetic evaluation Advanced UNIX shell scripting training course details Who will benefit: Programmers developing applications under UNIX. Administrators who need time saving utilities. Technical personnel who wish to make the most out of the Korn Shell. Prerequisites: UNIX shell scripting Duration 3 days Advanced UNIX shell scripting training course contents Regular Expressions What are REs? How can they be used? How to write REs More REs e REs Tagging, matching words, repetitions. The sed editor Basic usage: Saving output, options. sed script files, sed commands, Specifying lines to edit, Hold space and pattern space, advanced commands Awk Basic usage, nawk script files, Patterns, Records and fields, Actions if, while, do, for... System variables NF, NR, RS... Arrays Functions length, printf, cos, user defined... Using nawk in shell scripts Korn shell scripts Review of Bourne shell scripts functions... Variables typeset, manipulating strings Arrays Arithmetic evaluation the let command, (( )), typeset -i The select construct Syntax, workings, REPLY, PS3 Miscellaneous Enhanced I/O, ${10}

Advanced UNIX shell programming
Delivered in Internationally or OnlineFlexible Dates
£1,697

Microsoft Access

5.0(3)

By Systems & Network Training

Microsoft Access training course description A hands on course providing a solid grounding in Microsoft Access. What will you learn Use and customise the Microsoft Access environment. Select, use and customise queries. Define tables. Design forms and reports. Recognise the use of macros. Microsoft Access training course details Who will benefit: Anyone wishing to work with Microsoft Access. Prerequisites: Database fundamentals Duration 3 days Microsoft Access training course contents Introducing databases Flat file databases, Relational databases, the objects defined in an Access database, planning a simple relational database. Open Access and create a database The database wizards, tables, creating and amending tables, using field properties to improve the quality of data entry and system performance, the primary key. Working in datasheet view View, add, modify and delete records, find records. Advantages and disadvantages of entering data directly into a table. Queries Sort and select records form a single table, advantages and disadvantages of entering data via a query, define simple calculated expressions, use 'Totals' queries. Forms Use the form wizards, basic editing of objects created using the form wizards, Data-entry in form view. Reports Use the report wizard, basic editing of objects created using the report wizard, print reports. The multi table environment Plan and create a related table, define a one-to-many relationship, write multi-table queries and use the 'AutoLookup' feature, use the form wizard to create a subform and carry out data-entry in a main/subform, print and amend reports, use the report wizard to create reports based on multi-table. Relationships Working with one-to-one and one-to-many relationships, recognising and handling many-to-many relationships, referential integrity. Select queries Select queries based on related tables, parameter queries, Crosstab, find unmatched queries and Find Duplicate, the implications of the Join properties in a relational query, conditional expressions, and working with the expression builder. Action queries Make table queries, append queries, update queries, delete queries. Customising forms. Using the Toolbox, calculated controls, Combo and List boxes, query by form, working with form and control properties, domain aggregate functions. Reports Report and control properties, customising sorting and grouping, calculated controls on reports, Sub-reports, editing and altering a report's source. Macros Introduction to macros.

Microsoft Access
Delivered in Internationally or OnlineFlexible Dates
£1,697

CND - EC Council Official Certified Network Defender

5.0(12)

By Nemstar Ltd

This is the perfect launch pad for a technical career in Cyber Security and fully prepares every delegate for the prestigious Certified Ethical Hacking (CEH) Course that comes next on the Cyber & Hacking Learning Pathways by Nemstar.

CND - EC Council Official Certified Network Defender
Delivered OnlineFlexible Dates
£3,294

Streaming telemetry for engineers

5.0(3)

By Systems & Network Training

Streaming telemetry training course description An introduction to streaming telemetry. The course progresses from a brief look at the weaknesses of SNMP onto what streaming telemetry is, how it differs from the xflow technologies, the data formats available and how to configure it. What will you learn Describe streaming telemetry. Explain how streaming telemetry works. Describe the data presentation formats available. Configure streaming telemetry. Streaming telemetry training course details Who will benefit: Network engineers. Prerequisites: TCP/IP foundation for engineers. Duration 1 day Streaming telemetry training course content What is streaming telemetry? SNMP weaknesses, Netflow, sflow, polling and the old models, push vs pull, What is streaming telemetry? Telemetry streaming architecture Model driven versus event driven telemetry, subscriptions, publications. Periodic versus on change, model selection and scalability. Telemetry streaming protocols TCP, UDP, SSH, HTTP, HTTP2, NETCONF, RESTCONF, gRPC, gNMI. Models and Encoding The role of YANG. YANG models and tools. XML/ NETCONF, JSON/RESTCONF, JSON over UDP. Protocol buffers/gRPC. Google Protocol Buffers Decoder ring, protocol definition file. GPB-KV, GPB-Compact. Keys. Streaming telemetry configuration Router: Destination, Sensor, subscription. Collector: YANG models, .proto file. Pipeline. ELK: Consume, store, visualise streaming data. Collection tools APIs, YANG development Kit, Downstream consumers, influxdata, Grafana, Kafka, Prometheus, others.

Streaming telemetry for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,397

Jenkins for network engineers

5.0(3)

By Systems & Network Training

Jenkins training course description An introduction to Continuous Integration and development (CI/CD) in network automation using Jenkins. The course focusses specifically on the network Devops case of using Jenkins. What will you learn Explain how Jenkins can help with network automation. Configure Jenkins for network Devops. Use Jenkins for network automation. Jenkins training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 1 day Jenkins training course contents What is Jenkins? DevOps, CI/CD, version control systems, git, automating execution of tasks, Jenkins job, Jenkins pipeline, Jenkins plugins, CI server. Hands on Installing Jenkins. Example pipeline for network automation YAML, GitHub, Jenkins, ansible, network devices. Hands on Investigating a workflow: Auto deploying network configurations. Configuring Jenkins Code repository, build triggers, gerrit and reviews, build environment. A Jenkins job, build step, post build actions, running a Jenkins job, build log, home directory. Hands on Configuring Jenkins. CI using Jenkins Branches, pipeline, git, the git plugin. Hands on A Jenkins job to poll, build and unit test network configurations.

Jenkins for network engineers
Delivered in Internationally or OnlineFlexible Dates
£1,397

Total SPB (802.1)for engineers

5.0(3)

By Systems & Network Training

Total SPB training course description A comprehensive look at Service Provider Bridging (SPB) as standardised in 802.1aq. This SPB course starts with the problems in traditional switched networks then moves onto to how SPB solves these problems. As IS-IS is key to loop free topologies in SPB networks, this protocols is also studied. What will you learn Explain the benefits of SPB. Explain how SPB works. Explain the role of IS-IS in SPB. Integrate SPB into existing networks. Total SPB training course details Who will benefit: Technical staff working with Ethernet. Prerequisites: Definitive Ethernet switching for engineers Duration 1 day Total SPB training course contents What is SPB? Layer 2 versus Layer 3, STP problems: One path, convergence, MAC explosion. Virtualisation issues: VRF. Service Provider Bridging (SPB), 802.1aq. Virtual Services Network. SPB variants 802.1Q, 802.1ad, Q-in-Q, VLAN IDs, 802.1ah, M-in-M, I-SID. SPBV, SPBM. SPBM frame format. How SPB works Node ID, Backbone Edge Bridges, Backbone MAC address, Customer MACs, I-SID. IS-IS. Forwarding database. VSN. IS-IS Link layer IS-IS, SPF trees, traffic management. IS-IS extensions for SPB. ISIS TLV. SPB services Data centre bridging, server virtualisation, multitenant applications. Integration of SPB into existing networks. VLAN to ISID mappings. Inter ISID routing, IP/SPB Layer 3 VRF extensions. Miscellaneous Multicast in SPB environments. Source specific multicast trees. SPB configuration. SPB deployment considerations.

Total SPB (802.1)for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,397

DDOS demystified

5.0(3)

By Systems & Network Training

DDOS demystified training course description This course covers DDOS attacks and how to defend against them. The course starts by studying DOS attacks and then DDOS attack. Reflectors, booters and stressers are followed by reflection and amplification. Once the various DDOS attacks have been covered we then study the ways to defend against DDOS attacks. What will you learn Describe DDOS. Explain how DDOS attacks work. Recognise DDOS attack types. Describe how to defend DDOS attacks. DDOS demystified training course details Who will benefit: Anyone involved in network security. Prerequisites: Network fundamentals Duration 1 day DDOS demystified training course contents What is DOS? Denial Of Service, outages, Attackers, Command and control, Bots. Why DOS? What is DDOS? Distributed, reflectors, botnets, botnet topologies, amplification, attack bandwidth, attack vectors, booters, stressers, backscatter, DirtJumper, XOR. RUDY. High and Low orbit Ion Cannon. Attack types Application layer attacks, HTTP flood, protocol attacks, SYN floods, teardrop, volumetric attacks, slowloris, DNS cachebusting, fraggle, smurf. IP address spoofing. Reflectors Reflector attacks, amplification attacks, quotients, embedded devices, DNS, NTP, SSDP. DDOS defence Protecting devices from becoming bots. Onsite, outsourced scrubbing, Defending self, defending the Internet, Black hole routing, rate limiting, intelligent application firewalls, anycast, IPS, upstream filtering, BCP38, BCP 140. uRPF.

DDOS demystified
Delivered in Internationally or OnlineFlexible Dates
£1,397