• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

360 Computing courses in Coalville

Business Writing 1 Day Workshop in Leicester

5.0(1)

By Mangates

Business Writing 1 Day Workshop in Leicester

Business Writing 1 Day Workshop in Leicester
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Leicester

By Mangates

Cyber Security Overview 1 Day Training in Leicester

Cyber Security Overview 1 Day Training in Leicester
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Hinckley

By Mangates

Cyber Security Overview 1 Day Training in Hinckley

Cyber Security Overview 1 Day Training in Hinckley
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Burton Upon Trent

By Mangates

Cyber Security Overview 1 Day Training in Burton Upon Trent

Cyber Security Overview 1 Day Training in Burton Upon Trent
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Derby

By Mangates

Cyber Security Overview 1 Day Training in Derby

Cyber Security Overview 1 Day Training in Derby
Delivered In-Person + more
£595 to £795

Business Writing 1 Day Workshop in Burton Upon Trent

By Mangates

Business Writing 1 Day Workshop in Burton Upon Trent

Business Writing 1 Day Workshop in Burton Upon Trent
Delivered In-Person + more
£595 to £795

Business Writing 1 Day Workshop in Derby

By Mangates

Business Writing 1 Day Workshop in Derby

Business Writing 1 Day Workshop in Derby
Delivered In-Person + more
£595 to £795

Essential Cloud Technologies

5.0(3)

By Systems & Network Training

Cloud technologies training course description This course provides an introduction to cloud technologies, including, configuration and deployment, security, maintenance, and management. It covers all aspects of cloud computing infrastructure. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. . What will you learn Contrast and compare AWS, GCP and Azure. Explain the different cloud services, models and characteristics. Explain cloud virtualization components and options. Explain cloud security options. Describe cloud automation, orchestration, monitoring and performance options. Cloud technologies training course details Who will benefit: Anyone working with or looking to work with cloud technologies. Prerequisites: None. Duration 2 days Cloud technologies training course contents What is the cloud? The Internet Cloud computing Benefits Disadvantages Cloud services IaaS, PaaS, SaaS, others. Cloud service providers AWS, GCP Microsoft Azure, others Cloud architectures Private, public, hybrid others Cloud based delivery The cloud and virtualization Virtual Machines, networks, storage, deployment. Accessing the Virtual Machine Secure cloud environments Security considerations. Data privacy considerations Automation and orchestration Monitoring and performance Performance Cost issues Cost containment

Essential Cloud Technologies
Delivered in Internationally or OnlineFlexible Dates
£1,497

Cloud deployment

5.0(3)

By Systems & Network Training

Cloud deployment training course description This course covers the important topics every cloud professional needs, including, configuration and deployment, security, maintenance, management, and troubleshooting. It covers all aspects of cloud computing infrastructure and administration, with a practical focus on real-world skills. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. Deploy and implement cloud solutions, manage the infrastructure, and monitor performance. You will also be able to install, configure, and manage virtual machines. What will you learn Cloud services, models, and characteristics. Virtualization components, installation, and configuration. Infrastructure configurations and optimization. Resource management and specific allocations. IT security concepts, tools, and best practices. Recovery, availability and continuity in the cloud. Cloud deployment training course details Who will benefit: IT professionals looking to deploy and implement cloud solutions, manage the infrastructure, and monitor performance, Install, configure, and manage virtual machines. Prerequisites: Introduction to virtualization. Duration 5 days Cloud deployment training course contents Preparing to Deploy Cloud Solutions Deploying a Pilot Project Testing Pilot Project Deployments Designing a Secure and Compliant Cloud Infrastructure Designing and Implementing a Secure Cloud Environment Planning Identity and Access Management for Cloud Deployments Determining CPU and Memory Sizing for Cloud Deployments Determining Storage Requirements for Cloud Deployments Analysing Workload Characteristics to Ensure Successful Migration Maintaining Cloud Systems Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures Analysing Cloud Systems for Performance Analysing Cloud Systems for Anomalies and Growth Forecasting Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues Troubleshooting Connectivity Issues Troubleshooting Security Issues

Cloud deployment
Delivered in Internationally or OnlineFlexible Dates
£2,797

Definitive network forensics for engineers

5.0(3)

By Systems & Network Training

Network forensics training course description This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. What will you learn Recognise network forensic data sources. Perform network forensics using: Wireshark NetFlow Log analysis Describe issues such as encryption. Network forensics training course details Who will benefit: Technical network and/or security staff. Prerequisites: TCP/IP foundation for engineers. Duration 3 days Network forensics training course contents What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.

Definitive network forensics for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,497

Educators matching "Computing"

Show all 128
M-prez Enterprise Ltd

m-prez enterprise ltd

0.0(3)

Derby

It all started in Berlin, Germany and was inspired by a group of young women who read the book “The way of the Empress” by Christine Li. This made them realise that ordinary girls can achieve great things. This book has been an inspiration and a live partner and tells the story of a poor girl, who made it all the way up to be the most powerful woman in an Empire. M∙prez Enterprise is an organization formed on behalf of women, children and young people in the fields of arts, culture, education, technology, communication, science and health. It supports them in their creative endeavors in those fields and other areas that affect them. The company is limited by guarantee since 2009, but has ran projects and activities in partnership and in a freelance capacity. We began a journey where M-prez Enterprise started organising events, produced music, created a radio show called Gheto Yuth Vibez and a TV show called Triple T. M-prez Enterprise’s original founders were: Tortie, Chaos and Drama, and Eve 1. Over the past years, M-prez Enterprise has formed international networks to be a resource that strives collectively to provide opportunities for various participants especially for women and young people. We engage participants through these disciplines and all the other areas that are for the benefit of women, children, and young people across the globe to transform their lives. The organization embraces an individual and interdisciplinary approach to arts, culture, education, technology, communication, science and health and will encourage closing the gap between those disciplines and supporting them in their participation, through a variety of innovative approaches, programs, products, and services. M∙prez Enterprise aspires to uplift and aid in the self-development of women and girls from ethnic minorities, a historically