• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5811 Computing courses in Glenrothes delivered Online

Functional Skills Maths Training

By iStudy UK

Overview Boost your functional math skills to progress in work, education and life. This Functional Skills Maths Course will guide you in every possible way to gain confidence and fluency in maths.  The Functional Skills Maths Training includes various training modules to develop your math skills. Throughout this training, you'll learn about integers and the methods for adding, subtracting, multiplying and dividing integers. The course will also discuss factors and multiples, fractions, ratios and proportions, etc. By the end of the program, you'll have the expertise to get instant solutions to various math problems.  Learning Outcomes Know the various operations on integers Expand your knowledge of factors and multiples Understand how to solve various math equations using the BODMAS rule Become efficient in applying basic operations involving decimals Know about the unitary method and its application Why You Should Choose Functional Skills Maths Training Course Lifetime access to the course No hidden fees or exam charges CPD Qualification Standards certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment, and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential Who is this Course for? The Functional Skills Maths Training is for anyone interested in improving their functional maths skills to live independently. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Functional Skills Maths Course is fully compatible with any kind of device. Whether you are using a Windows computer, Mac, smartphone or tablet, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path This course will provide you with the necessary knowledge and skills required to succeed in this sector. You will be ready to enter the relevant job market after completing this course. On top of that, the course will enhance your ability to earn an average salary of £52,500 annually.  Functional Skills Maths Training Integers ( Directed Numbers) Lecture 1 Introduction FREE 00:00:00 Lecture 2 Quick glance at number system FREE 00:05:00 Lecture 3 Integers and ordering of integers 00:06:00 Lecture 4 Addition and Subtractions of Integers 00:07:00 Lecture 5 Operations on Integers 00:04:00 Lecture 6 Multiplication and Division of Integers 00:04:00 Lecture 7 Powers of Integers (Exponents) 00:04:00 Factors and Multiples Lecture 8 Complete knowledge about factors and multiples 00:06:00 Lecture 9 Divisibility tests for 2,3,4,5,6 00:07:00 Lecture 10 Divisibility rules 7,8,9,10,11 00:06:00 Lecture 11 Prime Factorization 00:06:00 Lecture 12 Highest Common Factor HCF 00:10:00 Lecture 13 Least Common Multiple LCM FREE 00:16:00 Lecture 14 Relation between LCM and HCF 00:04:00 Fractions Lecture 15 Classification of Fractions 00:04:00 Lecture 16 Convert mixed to improper and improper to mixed fractions 00:03:00 Lecture 17 Equivalent Fractions 00:04:00 Lecture 18 Comparing Fractions after converting to like fractions 00:09:00 Lecture 19 Reducing a fraction to lowest term 00:03:00 Lecture 20 Addition and subtraction OF fractions 00:08:00 Lecture 21 Multiplication and division of fractions 00:11:00 Lecture 22 Word problems on fractions 00:16:00 Simplification Rule : BODMAS Lecture 23 BODMAS and rules to remove brackets 00:03:00 Lecture 24 Simplify expressions using BODMAS rules 00:05:00 Lecture 25 Simplify expressions involving fractions using BODMAS 00:07:00 Decimal numbers Lecture 26 Decimal numbers in relation to fractions 00:08:00 Lecture 27 Like and unlike Decimals 00:05:00 Lecture 28 Ordering of Decimal numbers 00:10:00 Lecture 29 Addition and subtraction of Decimal 00:07:00 Lecture 30 Multiplication of Decimal 00:03:00 Lecture 31 Division of Decimal 00:00:00 Rational Numbers Lecture 32 Rational number 00:02:00 Lecture 33 Representation of Rational Numbers on Number line 00:04:00 Lecture 34 Determining which fraction is terminating or non terminating 00:05:00 Lecture 35 shortcut method of writing decimal expansion of fraction to decimal 00:08:00 Approximation Lecture 36 Rounding to whole number 00:06:00 Lecture 37 Rounding to required number of decimals (1 d.p. ) 00:05:00 Lecture 38 rounding to significant digits 00:07:00 Lecture 39 Practice question on three methods of approximation 00:05:00 Estimation and Scientific Notation or Standard form Lecture 40 Estimation 00:05:00 Lecture 41 Scientific Notation 00:07:00 Lecture 42 Operation on numbers when they are in scientific notation 00:06:00 Percentage Lecture 43 Percentage to fraction and fraction to percentage 00:06:00 Lecture 44 Percentage of a quantity and conversation to decimal 00:05:00 Lecture 45 Expressing one quantity as percentage of another quantity 00:06:00 Lecture 46 Finding increase decrease percent 00:05:00 Lecture 47 Uses of percentages-Word Problems 00:09:00 Ratio and Proportion Lecture 48 Ratio- How to express as simple ratio 00:09:00 Lecture 49 How to compare Ratios 00:04:00 Lecture 50 Word problems on finding ratios FREE 00:07:00 Lecture 51 To divide a given quantity into a given Ratio 00:11:00 Lecture 52 Proportion 00:04:00 Lecture 53 Practice problems on Proportion 00:00:00 Lecture 54 Continued proportion 00:06:00 Unitary Method and its Applications Lecture 55 Direct Variation ( or proportion) 00:04:00 Lecture 56 Problems based on Direct proportion 00:10:00 Lecture 57 Inverse Variation ( or proportion) 00:10:00 Lecture 58 Multiple Ratios 00:10:00 Profit , Loss, discount and Tax Lecture 59 Basics - Profit and Loss 00:04:00 Lecture 60 More practice problems on Profit & Loss 00:06:00 Lecture 61 Selling price formula and Problems 00:04:00 Lecture 62 Cost price formula and Problems 00:03:00 Lecture 63 Higher problems on Profit and Loss 00:08:00 Lecture 64 Basics - Discount 00:05:00 Lecture 65 Practice problems on Discount 00:04:00 Lecture 66 Tax 00:06:00 Resources Resources - Functional Skills Maths Training 00:00:00

Functional Skills Maths Training
Delivered Online On Demand6 hours 37 minutes
£25

Build Your Algebra Fundamentals (New version)

By iStudy UK

Want to master basic algebra? Engineering, physics, pharmaceuticals and many other industries require excellent numerical skills, so it's important to know your algebra if you want to work in these fields. This Build Your Algebra Fundamentals (New version) Course will help you gain fundamental practical skills and help you reach a higher level of learning, whether you're a student or professional. This essential algebra course will train you to develop your critical thinking skills, so you can become a master at problem-solving and logical reasoning. Even if you have little or no knowledge of the subject, in just a few hours, you'll be able to tackle more advanced algebra equations and simplify equations with ease. You'll explore all levels of algebra, including common algebraic terminology, and will get the chance to tackle beginner and advanced problems. On course completion, you'll have the confidence to solve simple and more complex algebraic equations, with the ability to apply your newfound skills in the workplace. Highlights of this Build Your Algebra Fundamentals (New version) Course Familiarise with basic algebraic expressions and concepts Learn how to multiply and divide algebraic expressions Understand how to expand and simplify brackets Solve linear equations and inequalities with ease Expand your knowledge of algebraic identities Get an overview of polynomials in abstract algebra Familiarise with the coordinate plane and the axis of symmetry What you'll learn Higher Indices - Laws of Indices (Exponent) Formula - Change the subject of formula Rational Expressions - Simplification of Algebraic Fractions to its lowest form BODMAS - Adding and removing brackets in algebraic expressions Graphs - Coordinate Axis, Points and Line Graph Linear equations in one variable and word problems Linear Inequalities Simultaneous linear equations- Graphical method, Substitution method, Equating coefficient & cross multiplication method Graphical method of solving simultaneous linear equations Word problems with the help of simultaneous linear equations Quadratic equations using Factorization method and Quadratic Formula Quadratic equations using squaring complete method Equations reducible to quadratic equations Word problems of Quadratic equations Quadratic polynomials Knowledge of nature of roots of quadratic equations Zeros of polynomials α, β & γ Addition, Subtraction,Multiplication and Division of Algebraic Expressions Remainder Theorem & Factor Theorem Directed Numbers (Integers) Finding Numerical Value of Algebraic Expressions Factorization Techniques like common factors, regrouping , splitting the middle term and using identities Algebraic Identities like ( a - b ) ² , ( a + b ) ³ , a ³ - b ³ , ( a + b + c ) ² etc Requirements Knowledge of Mathematics till 5th grade Introduction Lecture 1 Introduction FREE 00:03:00 Fundamental concepts on Algebraic Expressions Lecture 2 What is Algebra FREE 00:02:00 Lecture 3 Simple Equations 00:05:00 Lecture 4 What are Polynomials 00:04:00 Lecture 5 Terms in Polynomials 00:03:00 Lecture 6 Degree of Polynomials 00:05:00 Lecture 7 Writing statements to algebraic form 00:04:00 Operations on Algebraic Expressions Lecture 8 Integers and common mistakes in solving integers 00:13:00 Lecture 9 Arrangement of Terms 00:07:00 Lecture 10 Powers on integers 00:04:00 Lecture11 Simplification using BODMAS 00:08:00 Lecture 12 Distributive Properties in Polynomials 00:04:00 Lecture 13 Simplify Polynomials 00:10:00 Lecture 14 Additions of Polynomials 00:06:00 Lecture 15 Subtractions of Polynomials 00:10:00 Indices ( Exponents) Lecture 16 The rules of Indices in algebra 00:11:00 Lecture 17 Fractional indices 00:10:00 Lecture 18 Understanding indices (practice questions) 00:07:00 Lecture 19 Problems from IGCSE Last year papers 00:09:00 Multiplication and Division of Algebraic expressions Lecture 20 Multiplication of monomial to Polynomial 00:09:00 Lecture 21 Multiplication of Polynomial by Polynomial 00:06:00 Lecture 22 Division of algebraic expression by a monomial 00:08:00 Lecture 23 Division of algebraic expression by another polynomial 00:09:00 Lecture 24 Division of a polynomial by another polynomial with remainder 00:11:00 Brackets in Algebra Lecture 25 Rules of brackets 00:04:00 Lecture 26 Simplification by removing brackets 00:11:00 Linear equations in one variable Lecture 27 Simplification of algebraic fractions 00:07:00 Lecture 28 Rules to solve linear equations in one variable 00:03:00 Lecture 29 Solving linear equations in one variable 00:07:00 Lecture 30 Solving complex linear equations in one variable 00:10:00 Lecture 31 Word problems on linear equations in one variable 00:13:00 Algebraic Identities Lecture 32 What are Identities? 00:05:00 Lecture 33 Identity ( a + b ) ² 00:13:00 Lecture 34 Identity ( a - b ) ² new 00:07:00 Lecture 35 Identity a² - b² = (a-b) (a +b ) new 00:07:00 Lecture 36 -- Standard Identities ( a + b + c ) ² = a ² + b ² + c ² + 2 a b + 2 a c +2 b c old 00:07:00 Lecture 37 Identity (x + a) (x + b) Identity Derivation & Application new 00:08:00 Lecture 38 Pascal's Triangle _ Identity ( a + b ) ³ new 00:07:00 Lecture 39 Identities( a - b ) ³, ( a ³ + b ³) and (a ³ - b ³) new 00:13:00 Lecture 40 - Standard Identities a ³ + b ³ + c ³ - 3 a b c 00:10:00 Formula : Change of subject of formula Lecture 41 -Changing the subject of formula 00:08:00 Linear Inequalities Lecture 42 - Linear Inequalities 00:12:00 Resolve into factors Lecture 43 - Factorization by taking out common factor 00:10:00 Lecture 44 - Factorization by grouping the terms 00:09:00 Lecture 45 - factorize using identity a ² - b ² 00:07:00 Lecture 46 - factorize using identity (a + b )² and (a - b )² (2) 00:08:00 Lecture 47 - factorize using identity ( a + b + c ) ² 00:05:00 Lecture 48 - factorization by middle term split 00:12:00 Algebraic Fractions Lecture 49 -Simplification of algebraic fractions 00:06:00 Coordinate axis - points and Line graph Lecture 50 All that you need to know about co ordinate axis 00:04:00 Lecture 51 Some important facts needed to draw line graph 00:03:00 Lecture 52 - How to draw a line graph on coordinate plane 00:03:00 Lecture 53 Drawing line graphs 00:06:00 System of simultaneous linear equations in two variables Lecture 54 Simultaneous Linear Equations in two variables- intro 00:03:00 Lecture 55 Graphical method of solving linear equations 00:06:00 Lecture 56 Graphical method - more problems 00:10:00 Lecture 57 Method of Elimination by substitution 00:09:00 Lecture 58 Method of Elimination by Equating coefficients 00:11:00 Lecture 59 Method of Elimination by cross multiplication 00:07:00 Lecture 60 Equations reducible to simultaneous linear equations 00:12:00 Lecture 61 Word Problems on Linear equations 00:18:00 Polynomials Lecture 62 Polynomials and Zeros of polynomials 00:10:00 Lecture 63 Remainder Theorem 00:04:00 Lecture 64 Factor Theorem 00:08:00 Lecture 65 Practice problems on Remainder and Factor Theorem 00:09:00 Lecture 66 Factorization using factor Theorem 00:10:00 Quadratic Polynomials Lecture 67 Zeros of polynomials α, β & γ 00:10:00 Lecture 68 Relation between zeros and coefficients of a polynomials 00:13:00 Lecture 69 Finding polynomials if zeros are known 00:06:00 Lecture 70 Practice problems on zeros of polynomials 00:10:00 Lecture 71Problems solving with α and β (part 1) 00:11:00 Lecture 72 Problems solving with α and β (part 2) 00:10:00 Quadratic Equations Lecture73 what are Quadratic equations 00:03:00 Lecture 74 Solutions by factorization method 00:12:00 Lecture 75 Solutions by completing square formula 00:06:00 Lecture 76 Deriving Quadratic formula 00:05:00 Lecture 77 Practice problems by Quadratic formula 00:07:00 Lecture 78 Solving complex quadratic equations by Quadratic Formula 00:11:00 Lecture 79 Solutions of reducible to Quadratic Formula 00:09:00 Lecture 80 Skilled problems on Quadratic Equations 00:07:00 Lecture 81 Exponential problems reducible to Quadratic Equations 00:06:00 Lecture 82 Nature of Roots of Quadratic Equations 00:09:00 Lecture 83 Word problems on quadratic Equations Part 1 00:13:00 Lecture 84 Word problems on quadratic Equations Part 2 00:11:00

Build Your Algebra Fundamentals (New version)
Delivered Online On Demand11 hours 9 minutes
£25

HA200 SAP HANA 2.0 SPS04 - Installation and Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Database Administrator Help Desk/CoE Support System Administrator Technology Consultant Overview This course will prepare you to: Install and update an SAP HANA 2.0 SPS04 database Installation and configuration of SAP HANA cockpit 2.0 SP10 Perform the SAP HANA system administration tasks using SAP HANA cockpit 2.0 SP10 in a multitenant database environment Start and stop, change the configuration, backup and troubleshoot an SAP HANA 2.0 SPS04 database Backup and recover a multitenant SAP HANA 2.0 SPS04 database This course covers in detail all key capabilities of SAP HANA database system administration. Through the lectures and exercises you will learn how to install, update and operate an SAP HANA 2.0 SPS04 database using SAP HANA Cockpit 2.0 SP10. The course covers the most important database administration tasks of an SAP HANA system administrator. During the course, you will learn details about starting and stopping, changing the configuration parameters, monitoring the database, backup and recovery and troubleshoot of a multitenant SAP HANA 2.0 SPS04 database system. Course Outline This course is the best starting point to learn about SAP HANA installation, update, configuration and system administration The course is independent from the SAP NetWeaver administration world, as it teaches how to perform system administration on the SAP HANA platform. The system administration tools used are native to the SAP HANA platform At the end, you will be able to perform all the required daily system administration tasks on the SAP HANA database platform Throughout the course, you will learn about the following SAP HANA tools for installation, update, configuration and system administration SAP HANA database lifecycle manager (HDBLCM) SAP HANA cockpit 2.0 SP10 SAP HANA HDBSQL command line Contents SAP HANA introduction Installation sizing and OS preparations SAP HANA installation and upgrade of a multitenant database SAP HANA architecture and deployment options SAP HANA cockpit 2.0 installation and configuration SAP HANA Administration tools Post installation steps Database administration tasks using SAP HANA cockpit 2.0 Backup and recovery using SAP HANA cockpit 2.0 SAP HANA Security User and authorizations

HA200 SAP HANA 2.0 SPS04 - Installation and Administration
Delivered OnlineFlexible Dates
Price on Enquiry

CCTE Check Point Troubleshooting Expert

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for security experts and Check Point resellers who desire to obtain the necessary knowledge required to perform more advanced troubleshooting skills while managing their security environments. Overview Understand how to use Check Point diagnostic tools to determine the status of a network. Understand how to use network packet analyzers and packet capturing tools to evaluate network traffic.Become familiar with more advanced Linux system commands. Obtain a deeper knowledge of the Security Management architecture. Understand how the Management database is structured and how objects are represented in the database. Understand key Security Management Server processes and their debugs. Understand how GuiDBedit operates. Understand how the kernel handles traffic and how to troubleshoot issues with chain modules. Understand how to use the two main procedures for debugging the Firewall kernel and how they differ. Recognize User mode processes and how to interpret their debugs. Discuss how to enable and use core dumps. Understand the processes and components used for policy installs and processing packets in Access Control policies. Understand how to troubleshoot and debug issues that may occur with App Control and URLF. Understand how to debug HTTPS Inspection-related issues. Understand how to troubleshoot and debug Content Awareness issues. Understand how IPS works and how to manage performance issues. Understand how to troubleshoot Anti-Bot and Antivirus. Recognize how to troubleshoot and debug Site-to-Site VPN related issues. Understand how to troubleshoot and debug Remote Access VPNs. Understand how troubleshoot Mobile Access VPN issues. Recognize how to use SecureXL features and commands to enable and disable accelerated traffic. Understand how the server hardware and operating system affects the performance of Security Gateways. Understand how to evaluate hardware configurations for optimal performance. Provide advanced troubleshooting skills to investigate and resolve more complex issues that may occur while managing your Check Point Security environment. Course Outline Advanced Troubleshooting Management Database and Processes Advanced Kernel Debugging User Mode Troubleshooting Advanced Access Control Understanding Threat Prevention Advanced VPN Troubleshooting Acceleration and Performance Tuning Additional course details: Nexus Humans CCTE Check Point Troubleshooting Expert training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCTE Check Point Troubleshooting Expert course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCTE Check Point Troubleshooting Expert
Delivered OnlineFlexible Dates
Price on Enquiry

C)PEH/C)PTE Ultimate Boot Camp Mile 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Pen Testers Ethical Hackers Network Auditors Cybersecurity Professionals Vulnerability Assessors Cybersecurity Managers IS Managers Overview A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system. You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system. Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants. In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system.ÿ You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system.ÿ ÿ Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants.ÿ In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. Course Outline Business & Technical Logistics of Pen Testing Information Gathering Reconnaissance ? Passive (External Only) Detecting Live Systems ? Reconnaissance (Active) Banner Grabbing and Enumeration Automated Vulnerability Assessment Hacking Operating Systems Advanced Assessment and Exploitation Techniques Evasion Techniques Hacking with PowerShell Networks and Sniffing Accessing and Hacking Web Techniques Mobile and IoT Hacking Report Writing Basics

C)PEH/C)PTE Ultimate Boot Camp Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

C)PEH - Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IS Security Owners Security Officers Ethical Hackers Information Owners Penetration Testers System Owners and Managers Cyber Security Engineers Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam. To protect an information system you need to be able to see that system through the eyes of the attacker.ÿThe Certified Professional Ethical Hackerÿcertification course is the foundational training to Mile2?s line of penetration testing courses because it teaches you to think like a hacker.ÿ Therefore, you can set up dynamic defenses to prevent intrusion. First, you will learn the value of vulnerability assessments.ÿ Then, you will discover how to use those assessments to make powerful changes in an information system?s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack. Course Introduction Introduction to Ethical Hacking Linux Fundamentals Protocols Cryptography Password Cracking Malware Security Devices Information Gathering ? Passive Reconnaissance Social Engineering Active Reconnaissance Vulnerability Assessment Network Attacks Hacking Servers Hacking Web Technologies Hacking Wireless Technologies Maintaining Access and Covering Tracks

C)PEH - Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

9000 System Manager 2.8 (5-day)

By Nexus Human

Duration 1 Days 6 CPD hours

9000 System Manager 2.8 (5-day)
Delivered OnlineFlexible Dates
Price on Enquiry

40550 Microsoft Cloud Workshop - Windows Server and SQL Server 2008 EOS planning

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services Overview At the end of this whiteboard design session, you will leave with the information needed to develop a solid migration plan to keep mission-critical apps and data protected as they are transitioned and modernized. Topics covered will include how to get an inventory of a 2008 server environment, how to categorize 2008 workloads and evaluate the best option for each category, migration and upgrade tools available, TCO analysis tools, offers available from Microsoft to leverage existing licenses and innovations of recent product updates, licensing and technologies. This course will look at the process of migrating workloads to Azure. You will leave with the information needed to develop a solid migration plan to keep mission-critical apps and data protected as your customers transition and modernize their application, data, and infrastructure environment. Whiteboard Design Session - Windows Server 2008 and SQL Server 2008 end of support planning Review the customer case study Design a proof of concept solution Present the solution

40550 Microsoft Cloud Workshop - Windows Server and SQL Server 2008 EOS planning
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Tanzu Mission Control: Management and Operations 2022

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Operators and application owners who are responsible for deploying and managing policies for multiple Kubernetes clusters across on-premises and public cloud environments. Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Tanzu Mission Control architecture Configure user and group access Create access, image registry, network, security, quota, and custom policies Connect your on-premises vSphere with Tanzu Supervisor cluster to VMware Tanzu Mission Control Create, manage, and backup Tanzu Kubernetes clusters Perform cluster inspections Monitor and secure Kubernetes environments During this two-day course, you focus on using VMware Tanzu© Mission Control? to provision and manage Kubernetes clusters. The course covers how to apply access, image registry, network, security, quota, and custom policies to Kubernetes environments. For cluster provisioning and management, the course focuses on deploying, upgrading, backing up and monitoring Kubernetes clusters on VMware vSphere© with Tanzu. Given the abstractions of VMware Tanzu Mission Control, the learnings should be transferrable to public cloud. Introducing VMware Tanzu Mission Control VMware Tanzu Mission Control Accessing VMware Tanzu Mission Control VMware Cloud? services access control VMware Tanzu Mission Control architecture Cluster Management Attached clusters Management clusters Provisioned clusters Cluster inspections Data protection VMware Tanzu© Observability? by Wavefront VMware Tanzu© Service Mesh? Policy Management Policy management Access policies Image registry policies Network policies Security policies Quota policies Custom policies Policy insights

VMware Tanzu Mission Control: Management and Operations 2022
Delivered OnlineFlexible Dates
Price on Enquiry