Overview With the ever-increasing demand for Functional Skills in personal & professional settings, this online training aims at educating, nurturing, and upskilling individuals to stay ahead of the curve - whatever their level of expertise in Functional Skills may be. Learning about Functional Skills or keeping up to date on it can be confusing at times, and maybe even daunting! But that's not the case with this course from Compete High. We understand the different requirements coming with a wide variety of demographics looking to get skilled in Functional Skills . That's why we've developed this online training in a way that caters to learners with different goals in mind. The course materials are prepared with consultation from the experts of this field and all the information on Functional Skills is kept up to date on a regular basis so that learners don't get left behind on the current trends/updates. The self-paced online learning methodology by compete high in this Functional Skills course helps you learn whenever or however you wish, keeping in mind the busy schedule or possible inconveniences that come with physical classes. The easy-to-grasp, bite-sized lessons are proven to be most effective in memorising and learning the lessons by heart. On top of that, you have the opportunity to receive a certificate after successfully completing the course! Instead of searching for hours, enrol right away on this Functional Skills course from Compete High and accelerate your career in the right path with expert-outlined lessons and a guarantee of success in the long run. Who is this course for? While we refrain from discouraging anyone wanting to do this Functional Skills course or impose any sort of restrictions on doing this online training, people meeting any of the following criteria will benefit the most from it: Anyone looking for the basics of Functional Skills , Jobseekers in the relevant domains, Anyone with a ground knowledge/intermediate expertise in Functional Skills , Anyone looking for a certificate of completion on doing an online training on this topic, Students of Functional Skills , or anyone with an academic knowledge gap to bridge, Anyone with a general interest/curiosity Career Path This Functional Skills course smoothens the way up your career ladder with all the relevant information, skills, and online certificate of achievements. After successfully completing the course, you can expect to move one significant step closer to achieving your professional goals - whether it's securing that job you desire, getting the promotion you deserve, or setting up that business of your dreams. Course Curriculum Functional Skills Maths Level 2 Module 01 Introduction Introduction 00:00 Functional Skills Maths Level 2 Module 2 Basic arithmetic Basic arithmetic 00:00 Functional Skills Maths Level 2 Module 3 Fractions Fractions 00:00 Functional Skills Maths Level 2 Module 4 Decimals Decimals 00:00 Functional Skills Maths Level 2 Module 5 Using a calculator Using a calculator 00:00 Functional Skills Maths Level 2 Module 6 Percentages Percentages 00:00 Functional Skills Maths Level 2 Module 7 Ratio and proportion Ratio and proportion 00:00 Functional Skills Maths Level 2 Module 8 Powers, roots and laws of indices Powers, roots and laws of indices 00:00 Functional Skills Maths Level 2 Module 9 Units, prefixes and engineering notation Units, prefixes and engineering notation 00:00
ð Unlock the Full Power of Microsoft Excel 2019! ð Ready to take your Excel skills to the next level? Dive into our comprehensive online course - 'Microsoft Excel 2019 - Advanced Level Training' - designed to transform you into an Excel maestro! ð Here's What You'll Master: ð Section 1: Excel - Advanced - Get hands-on with advanced techniques and shortcuts to streamline your workflow. ð Section 2: Working with Multiple Workbooks - Seamlessly manage multiple workbooks and boost your productivity effortlessly. ð Section 3: Protecting Worksheets and Workbooks - Learn how to safeguard your data with robust protection strategies. ð Section 4: Conditional Formulas - Unravel the power of conditional logic and unleash the true potential of formulas. ð§® Section 5: Advanced Functions - Elevate your Excel expertise by mastering complex functions for data analysis. ð Section 6: Text Based Functions - Manipulate text effortlessly and efficiently with advanced text-based functions. ð Section 7: What IF Tools - Explore the 'What If' analysis tools to make informed decisions and predictions. ð Section 8: Excel Advanced - Conclusion - Wrap up with a comprehensive understanding and practical application of advanced Excel features. ð Section 9: Bonus #1 - Advanced Pivot Tables - Delve into bonus content covering advanced techniques for Pivot Tables, a must-have skill for data analysis pros. ð Why Choose Our Course? ð Expert Guidance: Led by seasoned Excel professionals, ensuring clarity and depth in learning. ð Practical Assignments: Apply your newfound skills through real-world exercises. ð Career Growth: Elevate your career prospects by mastering sought-after Excel abilities. ð Accessible Learning: Study at your own pace from anywhere, anytime with our user-friendly online platform. ð¤ Join our vibrant community of learners dedicated to mastering Excel's advanced functionalities. ð¡ Enroll now and revolutionize your Excel prowess with 'Microsoft Excel 2019 - Advanced Level Training'! Don't miss this chance to become an Excel wizard! ð¡ Course Curriculum Section 1 - Excel - Advanced Excel Advanced Introduction 01:39 Advanced Shortcut Keys 02:58 Section 2 - Working with Multiple Workbooks Tracing Precedents 00:00 Tracing Dependants 00:00 Watch Window 00:00 Show Formulas 00:00 Section 3 - Protecting Worksheets and Workbooks Protecting Cells in a Worksheet 00:00 Protecting the Workbook Structure 00:00 Encryption with Passwords 00:00 Section 4 - Conditional Formulas Name Ranges 00:00 Simple IF Function 00:00 IF, AND 00:00 IF, OR 00:00 Nested Formulas 00:00 CountIF and CountIFs 00:00 SumIF and SumIFs 00:00 Section 5 - Advanced Functions Advanced VLookUp 00:00 IF and IS Error - Part 1 00:00 IF and IS Error - Part 2 00:00 Advanced Index Match 00:00 Dates - Part 1 00:00 Dates - Part 2 00:00 Replace and Substitute - Part 1 00:00 Replace and Substitute - Part 2 00:00 Section 6 - Text Based Functions Left, Right and Mid Function 00:00 Search Function 00:00 Concatenate and Search 00:00 Indirect - Static 00:00 Indirect - Dynamic 00:00 Section 7 - What IF Tools Goal Seek 00:00 Data Tables 00:00 Scenarios 00:00 Solver 00:00 Section 8 - Excel Advanced - Conclusion Excel Advanced - Conclusion 00:00 Section 9 - Bonus # 1 - Advanced Pivot Tables Building a Mini Dashboard 00:00
Duration 5 Days 30 CPD hours This course is intended for Database Administrator Help Desk/CoE Support System Administrator Technology Consultant Overview This course will prepare you to: Install and update an SAP HANA 2.0 SPS04 database Installation and configuration of SAP HANA cockpit 2.0 SP10 Perform the SAP HANA system administration tasks using SAP HANA cockpit 2.0 SP10 in a multitenant database environment Start and stop, change the configuration, backup and troubleshoot an SAP HANA 2.0 SPS04 database Backup and recover a multitenant SAP HANA 2.0 SPS04 database This course covers in detail all key capabilities of SAP HANA database system administration. Through the lectures and exercises you will learn how to install, update and operate an SAP HANA 2.0 SPS04 database using SAP HANA Cockpit 2.0 SP10. The course covers the most important database administration tasks of an SAP HANA system administrator. During the course, you will learn details about starting and stopping, changing the configuration parameters, monitoring the database, backup and recovery and troubleshoot of a multitenant SAP HANA 2.0 SPS04 database system. Course Outline This course is the best starting point to learn about SAP HANA installation, update, configuration and system administration The course is independent from the SAP NetWeaver administration world, as it teaches how to perform system administration on the SAP HANA platform. The system administration tools used are native to the SAP HANA platform At the end, you will be able to perform all the required daily system administration tasks on the SAP HANA database platform Throughout the course, you will learn about the following SAP HANA tools for installation, update, configuration and system administration SAP HANA database lifecycle manager (HDBLCM) SAP HANA cockpit 2.0 SP10 SAP HANA HDBSQL command line Contents SAP HANA introduction Installation sizing and OS preparations SAP HANA installation and upgrade of a multitenant database SAP HANA architecture and deployment options SAP HANA cockpit 2.0 installation and configuration SAP HANA Administration tools Post installation steps Database administration tasks using SAP HANA cockpit 2.0 Backup and recovery using SAP HANA cockpit 2.0 SAP HANA Security User and authorizations
Duration 2 Days 12 CPD hours This course is intended for This course is designed for security experts and Check Point resellers who desire to obtain the necessary knowledge required to perform more advanced troubleshooting skills while managing their security environments. Overview Understand how to use Check Point diagnostic tools to determine the status of a network. Understand how to use network packet analyzers and packet capturing tools to evaluate network traffic.Become familiar with more advanced Linux system commands. Obtain a deeper knowledge of the Security Management architecture. Understand how the Management database is structured and how objects are represented in the database. Understand key Security Management Server processes and their debugs. Understand how GuiDBedit operates. Understand how the kernel handles traffic and how to troubleshoot issues with chain modules. Understand how to use the two main procedures for debugging the Firewall kernel and how they differ. Recognize User mode processes and how to interpret their debugs. Discuss how to enable and use core dumps. Understand the processes and components used for policy installs and processing packets in Access Control policies. Understand how to troubleshoot and debug issues that may occur with App Control and URLF. Understand how to debug HTTPS Inspection-related issues. Understand how to troubleshoot and debug Content Awareness issues. Understand how IPS works and how to manage performance issues. Understand how to troubleshoot Anti-Bot and Antivirus. Recognize how to troubleshoot and debug Site-to-Site VPN related issues. Understand how to troubleshoot and debug Remote Access VPNs. Understand how troubleshoot Mobile Access VPN issues. Recognize how to use SecureXL features and commands to enable and disable accelerated traffic. Understand how the server hardware and operating system affects the performance of Security Gateways. Understand how to evaluate hardware configurations for optimal performance. Provide advanced troubleshooting skills to investigate and resolve more complex issues that may occur while managing your Check Point Security environment. Course Outline Advanced Troubleshooting Management Database and Processes Advanced Kernel Debugging User Mode Troubleshooting Advanced Access Control Understanding Threat Prevention Advanced VPN Troubleshooting Acceleration and Performance Tuning Additional course details: Nexus Humans CCTE Check Point Troubleshooting Expert training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCTE Check Point Troubleshooting Expert course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Pen Testers Ethical Hackers Network Auditors Cybersecurity Professionals Vulnerability Assessors Cybersecurity Managers IS Managers Overview A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system. You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system. Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants. In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system.ÿ You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system.ÿ ÿ Our C)PTE course is built on proven hands-on methods utilized by our international group of vulnerability consultants.ÿ In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward with a career in penetration testing. Course Outline Business & Technical Logistics of Pen Testing Information Gathering Reconnaissance ? Passive (External Only) Detecting Live Systems ? Reconnaissance (Active) Banner Grabbing and Enumeration Automated Vulnerability Assessment Hacking Operating Systems Advanced Assessment and Exploitation Techniques Evasion Techniques Hacking with PowerShell Networks and Sniffing Accessing and Hacking Web Techniques Mobile and IoT Hacking Report Writing Basics
Duration 5 Days 30 CPD hours This course is intended for IS Security Owners Security Officers Ethical Hackers Information Owners Penetration Testers System Owners and Managers Cyber Security Engineers Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam. To protect an information system you need to be able to see that system through the eyes of the attacker.ÿThe Certified Professional Ethical Hackerÿcertification course is the foundational training to Mile2?s line of penetration testing courses because it teaches you to think like a hacker.ÿ Therefore, you can set up dynamic defenses to prevent intrusion. First, you will learn the value of vulnerability assessments.ÿ Then, you will discover how to use those assessments to make powerful changes in an information system?s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack. Course Introduction Introduction to Ethical Hacking Linux Fundamentals Protocols Cryptography Password Cracking Malware Security Devices Information Gathering ? Passive Reconnaissance Social Engineering Active Reconnaissance Vulnerability Assessment Network Attacks Hacking Servers Hacking Web Technologies Hacking Wireless Technologies Maintaining Access and Covering Tracks
Duration 1 Days 6 CPD hours
Duration 1 Days 6 CPD hours This course is intended for This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services Overview At the end of this whiteboard design session, you will leave with the information needed to develop a solid migration plan to keep mission-critical apps and data protected as they are transitioned and modernized. Topics covered will include how to get an inventory of a 2008 server environment, how to categorize 2008 workloads and evaluate the best option for each category, migration and upgrade tools available, TCO analysis tools, offers available from Microsoft to leverage existing licenses and innovations of recent product updates, licensing and technologies. This course will look at the process of migrating workloads to Azure. You will leave with the information needed to develop a solid migration plan to keep mission-critical apps and data protected as your customers transition and modernize their application, data, and infrastructure environment. Whiteboard Design Session - Windows Server 2008 and SQL Server 2008 end of support planning Review the customer case study Design a proof of concept solution Present the solution
Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances
Duration 2 Days 12 CPD hours This course is intended for Operators and application owners who are responsible for deploying and managing policies for multiple Kubernetes clusters across on-premises and public cloud environments. Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Tanzu Mission Control architecture Configure user and group access Create access, image registry, network, security, quota, and custom policies Connect your on-premises vSphere with Tanzu Supervisor cluster to VMware Tanzu Mission Control Create, manage, and backup Tanzu Kubernetes clusters Perform cluster inspections Monitor and secure Kubernetes environments During this two-day course, you focus on using VMware Tanzu© Mission Control? to provision and manage Kubernetes clusters. The course covers how to apply access, image registry, network, security, quota, and custom policies to Kubernetes environments. For cluster provisioning and management, the course focuses on deploying, upgrading, backing up and monitoring Kubernetes clusters on VMware vSphere© with Tanzu. Given the abstractions of VMware Tanzu Mission Control, the learnings should be transferrable to public cloud. Introducing VMware Tanzu Mission Control VMware Tanzu Mission Control Accessing VMware Tanzu Mission Control VMware Cloud? services access control VMware Tanzu Mission Control architecture Cluster Management Attached clusters Management clusters Provisioned clusters Cluster inspections Data protection VMware Tanzu© Observability? by Wavefront VMware Tanzu© Service Mesh? Policy Management Policy management Access policies Image registry policies Network policies Security policies Quota policies Custom policies Policy insights