Windows server 2019 administration course description This five-day instructor-led course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing identity, networking, storage and compute by using Windows Server 2019, and who need to understand the scenarios, requirements, and options that are available and applicable to Windows Server 2019. The course teaches IT professionals the fundamental administration skills required to deploy and support Windows Server 2019 in most organizations. What will you learn Administrate Windows Server 2019. Configure file servers and storage. Manage Hyper-V virtualization and containers. Implement HA and disaster recovery solutions. Implement service monitoring and performance monitoring, and apply troubleshooting. Perform upgrades and migration related to AD DS, and storage. Windows server 2019 administration course details Who will benefit: Technical staff working with Windows server 2019. Prerequisites: TCP/IP foundation for engineers. Some Windows experience. Duration 5 days Windows server 2019 administration course contents Windows server administration overview Windows server administration principles and tools, Introducing Windows Server 2019, Windows Server Core Overview. Lab: Deploying and configuring Server Core, Implementing and using remote server administration. Identity Services in Windows server AD DS, Windows Server domain controllers, Azure AD, Group Policy, Active Directory Certificate Services. Lab: Deploying a new domain controller on Server Core, Configuring Group Policy, Deploying and using certificate services. Network Infrastructure services in Windows server DHCP, DNS services, IPAM. Lab: Deploying and configuring DHCP, Deploying and configuring DNS. File Servers and Storage management Volumes and file systems, sharing in Windows Server, Storage Spaces in Windows Server, Data Deduplication, Iscsi, Distributed File System. Lab: Implementing Data Deduplication, Configuring iSCSI storage, Configuring redundant storage spaces, Implementing Storage Spaces Direct. Hyper-V virtualization and containers Hyper-V in Windows Server, Configuring VMs, Securing virtualization in Windows Server, Containers in Windows Server, Overview of Kubernetes. Lab: Creating and configuring VMs, Installing and configuring containers. High Availability in Windows Server Planning for failover clustering implementation, Creating and configuring failover cluster, stretch clusters, High availability and disaster recovery solutions with Hyper-V VMs. Lab: Configuring iSCSI storage, Configuring a failover cluster, Deploying and configuring a highly available file server, Validating the highly available file server deployment. Disaster recovery in Windows Server Hyper-V Replica, Backup and restore infrastructure in Windows Server. Lab: Implementing Hyper-V Replica, Implementing backup and restore with Windows Server Backup. Windows Server security Credentials and privileged access protection, Hardening Windows Server, Just Enough Administration in Windows Server, Securing and analyzing SMB traffic, Windows Server update management. Lab: Configuring Windows Defender Credential Guard, Locating problematic accounts, Implementing LAPS. Remote Desktop Services in Windows Server Remote Desktop Services, session-based desktop deployment, personal and pooled virtual desktops. Lab: Implementing RDS, Configuring RemoteApp collection settings, Configuring a virtual desktop template. Remote access and web services in Windows Server Overview of RAS in Windows Server, Implementing VPNs, Implementing NPS, Implementing Always On VPN, Implementing Web Server in Windows Server. Lab: Implementing Web Application Proxy, Implementing VPN in Windows Server, Deploying and Configuring Web Server. Monitoring, performance, and troubleshooting Windows Server monitoring tools, Performance Monitor, Monitoring event logs for troubleshooting. Lab: Establishing a performance baseline, Identifying the source of a performance problem, Viewing and configuring centralized event logs, Identifying the source of a performance problem, Describe monitoring tools and performance monitoring in Windows Server, Describe event logging and perform event logging monitoring for troubleshooting purposes. Upgrade and migration in Windows Server AD DS migration, Storage Migration Service, Windows Server migration tools. Lab: Selecting a process to migrate server workloads, Planning how to migrate files by using Storage Migration Service.
Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.
This course is perfect for L&D professionals keen to develop their skills and drive change within their organisation and those who want the chance to advance their profession and demonstrate their experience. Course Overview Ready to shape your organisation’s working environment? Discover how to measure your company’s performance and culture, boost people’s confidence and organise different forms of learning across your organisation. Learn how to organise different forms of learning across your organisation to boost people’s confidence and supercharge their development. This course is perfect for L&D professionals keen to develop their skills and drive change within their organisation and those who want the chance to advance their profession and demonstrate their experience. After completing this qualification, you will receive a CIPD Associate Membership. As a result, your professional credibility will be established, your profile will be raised, and new work chances will become available. Is this qualification right for me? This qualification is perfect for you if you enjoy helping employees become the best they can be. You’ll expand your knowledge of L&D with a combination of core units and specialist areas and get an individual plan for your self-development. What will I learn? You’ll study 3 core units + 3 specialist units + the choice of 1 optional unit: Core units: • Organisational performance and culture in practice • Evidence-based practice • Professional behaviours and valuing people Specialist units: • Supporting self-directed and social learning • Learning and development design to create value • Facilitate personalised and performance focused learning Optional units: • Specialist employment law • Advances in digital learning and development • People management in an international context • Diversity and inclusion • Leadership and management development • Well-being at work Typical job titles: • L&D Business Partner or Manager • L&D Consultant • Organisation Design Specialist • Organisational Development Business Partner • Employee Experience Manager • L&D Designer DURATION 12-16 Months WHATS INCLUDED Course Material Case Study Experienced Lecturer Refreshments Certificate
Start your career in Barbering with this Beginners Barbering Course. You will learn to cut and style using the 5 Alan d Foundation haircuts along with clipper work, beard and moustache trimming, scissor-over-comb techniques, client care, shampooing, styling and Barber-shop protocol.
Furniture design face to face training customised and bespoke.
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.
The CIPD Level 5 Diploma in People Management is an HR qualification that was created by the highly respected Chartered Institute of Personnel and Development (CIPD) Course Overview The CIPD Level 5 Diploma in People Management is an HR qualification that was created by the highly respected Chartered Institute of Personnel and Development (CIPD) Working in a people practice role and ready to grow? This qualification will help you gain a deeper understanding of the professional behaviours that lead to organisational success. Learn how to manage relationships, foster talent, guide strategic planning and reward performance. Benefits of a CIPD Level 5 HR qualification You will get a greater grasp of the external factors that can have an impact on HR operations and organisations as you investigate a wide range of HR models and practises in important areas like talent management, hiring, and employment legislation. Additionally, you will improve your own analytical and problem-solving abilities. You can advance to the Advanced Diploma, the highest level of CIPD study, after successfully completing the Associate Diploma, which results in CIPD Associate Membership. Is this qualification right for me? This qualification is perfect for you if you enjoy developing and managing people. You’ll expand your knowledge of HR with a combination of core units and specialist areas – helping you focus on what matters most to you. What will I learn? Core units: • Organisational performance and culture in practice • Evidence-based practice • Professional behaviours and valuing people Specialist units: • Employment relationship management • Talent management and workforce planning • Reward for performance and contribution Optional units: • Specialist employment law • Advances in digital learning and development • Learning and development essentials • People management in an international context • Diversity and inclusion • Leadership and management development • Well-being at work Perfect for: HR professionals keen to develop their skills and drive change within their organisation Typical job titles: • HR Business Partner or Manager • People Analyst • Employee Relations Manager • Diversity and Inclusion Specialist • Resourcing Business Partner • Reward and Benefits Manager • Talent Manager DURATION 12-14 Months WHATS INCLUDED Course Material Case Study Experienced Lecturer Refreshments Certificate
FOUR DAY ATTENDENCE AND TRAINING GUIDELINE: DAY ONE AND TWO - INTRODUCTION TO DERMAL FILLERS Day one Arrive and coffees (10.00) Registration, introduction and expectations (10.00-10.15) Structure of the training (10.15-10.30) Break (10.30-11.00) Lectures and interactive workshops / simulation (11.00 - 1230pm) Health and safety in the workplace Sharps injury and disposal The consultation process and prescriptions LUNCH (1300-1730) with a coffee break Basic life support Anaphylaxis - recognition and management Emergency kits - what it should contain and how to buy one Your doctors on call - how to contact our on call doctors for emergency advice How to use Hyalase safely - when to use it / recognise mechanism of action, how prescription in an emergency works and how to give the hyalase Practical and to include demonstration of Hyalase injection Our added benefits services for safety and convenience Day two Arrive and coffees (10.00) introduction and expectations (10.00-10.30) Structure of the training (10.30-11.00) Formal written examination covering key areas of THEORY for Dermal Filler injections: Anatomy, Physiology, Products and Complications. This will highlight early on if any important areas need to be covered in more detail for the students (11.00 - 1200) - Break for lunch - Practical session commences - (12.30 - 1800) - and in total on average we have scope for one model per 30 minutes on both of the Dermal filler days, so that’s a potential for 10 in total for a class size of maximum 4, which will give good hands on experience, as the way we train is to allow several people the opportunity to be involved with each patient - e.g. splitting into the phases of treatment, which allows the trainees to understand the concept of the treatment process. That would be - consultation, consent, marking up, readying equipment, performing the injection, providing advice and aftercare. DAY THREE AND FOUR BOTOX FOUNDATION COURSE Day three Arrive and coffees (10.00) introduction and expectations (10.00 – 10.30) Structure of the training (10.30 – 11.00) Formal written examination covering key areas of THEORY for Botox Application: Anatomy, Physiology, Products and Complications. This will highlight early on if any important areas need to be covered in more detail for the students (11.00 - 1200) - Break for lunch - Practical session commences - (12.30 - 1800) - and in total on average we have one model per 30 minutes on both the botox and days, so that’s a potential of 10 in total for a class size of 4, which will give good hands on experience, as the way we train is to allow several people the opportunity to be involved with each patient - e.g. splitting into the phases of treatment, which allows the trainees to understand the concept of the treatment process. That would be - consultation, consent, marking up, readying equipment, performing the injection, providing advice and aftercare. Day four Observed Treatment Process Examination The participants will be tested on the following key facets of safe practical care: Consultation process - rapport and understanding what the client wants Safe consent Marking and photographs Technical skill of injection Atercare provision and safety netting (eg if this happens do this / call me) 1 model will be provided for Botulinum (3 area) treatment and 1 - 2 clients for filler to ensure that each of the key anatomical areas covered are observed. Morning = Botulinum (0900 - 1230) Afternoon = Botulinum and Option Dermal fillers (1330 - 1630) Conclusion Candidates given session and refreshments and discussion regarding Case Studies and further support. (1700 - 1800)