• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3380 Courses in Liverpool delivered Live Online

Commissioning of Electrical Equipment

By EnergyEdge - Training for a Sustainable Energy Future

About this training course This 5 full-day course provides a comprehensive understanding of all the commissioning and start-up activities of all electrical equipment including transformers, switchgear, induction and synchronous motors, generators and auxiliaries. All commissioning activities are covered in detail in this course. This includes all the commissioning procedures and documents, purpose of commissioning, responsibilities, system description, documentation, testing and commissioning schedules, test reports, safety, certification, and plant completion report. The course provides also a thorough understanding of all the commissioning requirements for transformers, switchgear, induction and synchronous motors and, generator and auxiliaries including its switchgear equipment, switchgear, and transformers. All the stages of the commissioning procedure are covered in-depth in this course. This includes preparation - planning various activities, pre-commissioning checks and tests, typical commissioning schedule, detailed tests and commissioning procedures for every type of transformers, switchgear, induction and synchronous motors, and generators and auxiliary systems, instrumentation, trial run of the equipment, safety and precautions, commissioning of electrical systems, Safety Rules Clearance Certificates, procedure for the control and handling of defects, Commissioning Reports. This course is a MUST for anyone who is involved in the pre-commissioning or commissioning of any electrical equipment because it provides detailed pre-commissioning checks and tests and detailed tests and commissioning procedures for every electrical equipment. In addition, the course provides in-depth coverage of all preparation, planning activities, commissioning schedules, trial run of each electrical equipment, safety and precautions, Safety Rules Clearance Certificates, Procedures for handling defects, and Commissioning Reports. Training Objectives Pre-Commissioning Checks and Tests, Detailed Tests and Commissioning Procedures and Instructions for all Electrical Equipment: Gain a thorough understanding of all pre-commissioning checks and tests, and all commissioning procedures and instructions for all electrical equipment Commissioning Procedures, Documents, and Certification of Electrical Equipment: Discover the benefits of the Commissioning Management System of electrical equipment including all commissioning procedures and documents, purpose of commissioning, responsibilities, system description, documentation, testing and commissioning schedules, test reports, safety, equipment certification, and commissioning completion report Commissioning Procedures for Transformers: Learn about the commissioning procedures for transformers including functional checks, pre-commissioning tests, commissioning tests, and records. Commissioning Procedures for Switchgear Assemblies: Gain a thorough understanding of all the commissioning procedures for switchgear assemblies including substation commissioning, electrical testing, code requirements, safety rules, grounding and shorting, high power testing, NETA acceptance testing procedures, test values analysis, and commissioning forms Commissioning Procedures for Generator and Auxiliaries: Discover all the commissioning procedures for generator and auxiliaries including generator, seal oil system, hydrogen gas system, stator water system, rolling and payment of generator Commissioning Procedures and Instructions for Generator Electrical Equipment: Learn about all the commissioning procedures and instructions for generator electrical equipment including switchyard equipment, switchgear, transformers, and motors Code Requirements for Commissioning Electrical Equipment and Systems: Learn about the code requirements for commissioning transformers, switchgear, inductions and synchronous motors, and generators and auxiliaries Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Course Level Basic or Foundation Training Methods Your specialist course leader relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Each delegate will receive a copy of the following materials written by the instructor: 'ELECTRICAL EQUIPMENT HANDBOOK' published by McGraw-Hill in 2003 (600 pages) ELECTRICAL EQUIPMENT COMMISSIONING MANUAL (includes practical information about all pre-commissioning checks and tests, typical commissioning schedule, detailed tests and commissioning procedures and instructions for all electrical equipment - 500 pages) Trainer Your specialist course leader has more than 32 years of practical engineering experience with Ontario Power Generation (OPG), one of the largest electric utility in North America. He was previously involved in research on power generation equipment with Atomic Energy of Canada Limited at their Chalk River and Whiteshell Nuclear Research Laboratories. While working at OPG, he acted as a Training Manager, Engineering Supervisor, System Responsible Engineer and Design Engineer. During the period of time, he worked as a Field Engineer and Design Engineer, he was responsible for the operation, maintenance, diagnostics, and testing of gas turbines, steam turbines, generators, motors, transformers, inverters, valves, pumps, compressors, instrumentation and control systems. Further, his responsibilities included designing, engineering, diagnosing equipment problems and recommending solutions to repair deficiencies and improve system performance, supervising engineers, setting up preventive maintenance programs, writing Operating and Design Manuals, and commissioning new equipment. Later, he worked as the manager of a section dedicated to providing training for the staff at the power stations. The training provided by him covered in detail the various equipment and systems used in power stations. In addition, he has taught courses and seminars to more than four thousand working engineers and professionals around the world, specifically Europe and North America. He has been consistently ranked as 'Excellent' or 'Very Good' by the delegates who attended his seminars and lectures. He written 5 books for working engineers from which 3 have been published by McGraw-Hill, New York. Below is a list of the books authored by him; Power Generation Handbook: Gas Turbines, Steam Power Plants, Co-generation, and Combined Cycles, second edition, (800 pages), McGraw-Hill, New York, October 2011. Electrical Equipment Handbook (600 pages), McGraw-Hill, New York, March 2003. Power Plant Equipment Operation and Maintenance Guide (800 pages), McGraw-Hill, New York, January 2012. Industrial Instrumentation and Modern Control Systems (400 pages), Custom Publishing, University of Toronto, University of Toronto Custom Publishing (1999). Industrial Equipment (600 pages), Custom Publishing, University of Toronto, University of Toronto, University of Toronto Custom Publishing (1999). Furthermore, he has received the following awards: The first 'Excellence in Teaching' award offered by PowerEdge, Singapore, in December 2016 The first 'Excellence in Teaching' award offered by the Professional Development Center at University of Toronto (May, 1996). The 'Excellence in Teaching Award' in April 2007 offered by TUV Akademie (TUV Akademie is one of the largest Professional Development centre in world, it is based in Germany and the United Arab Emirates, and provides engineering training to engineers and managers across Europe and the Middle East). Awarded graduation 'With Distinction' from Dalhousie University when completed Bachelor of Engineering degree (1983). Lastly, he was awarded his Bachelor of Engineering Degree 'with distinction' from Dalhousie University, Halifax, Nova Scotia, Canada. He also received a Master of Applied Science in Engineering (M.A.Sc.) from the University of Ottawa, Canada. He is also a member of the Association of Professional Engineers in the province of Ontario, Canada. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Commissioning of Electrical Equipment
Delivered in Internationally or OnlineFlexible Dates
£3,009 to £3,499

Level 5 Award in Understanding Demand Management and Leakage Management in the Water Industry

By Learning & Development Associates Ltd

This qualification is designed for Water Network Field Managers, Operational Managers, Project Managers, Department Heads, and other practising Senior and Middle Managers. The qualification will develop your technical skills and understanding of the Management of demand Management & Leakage and improve your performance. It will encourage strategic thinking at this level of management to foster business improvement. Main themes Understand the role demand management plays in the water industry sustainability plan Understand the range of demand management tools available and their effectiveness Understand the application of leakage strategies, the economic value and the external influences Understand data handling, meaningful leakage calculations and the interpretation of leakage data Understand various leakage control methods used and their respective effectiveness and economic cost-benefit Understand network repair and maintenance methods and the provision of these services Instructions This online course will be delivered using CISCO Webex. You will need a suitable device with a camera and microphone like a laptop. If you have any questions about what is required, please contact us on enquiries@learninganddevelopment.associates. Qualification All learners taking the qualification will need to produce identification to enable ProQual registration. This can take the form of a: Passport Driving Licence Construction Skills Certification Scheme Card (CSCS Card) Construction Plant Competence Scheme Card (CPCS Card) If none of the above are available to the learner, a photograph with a statement confirming their identity, dated and signed, along with a utility bill, would be acceptable.

Level 5 Award in Understanding Demand Management and Leakage Management in the Water Industry
Delivered OnlineFlexible Dates
£250

OpenStack for NFV and SDN

5.0(3)

By Systems & Network Training

OpenStack for NFV and SDN course description OpenStack is predominately a cloud management technology. This course looks at how OpenStack can be used in a NFV and SDN environment. What will you learn Describe the architecture of NFV. Explain the relationship between NFV and SDN. Implement NFV VIM using OpenStack. Explain how OpenStack as VNFM and orchestrator works. OpenStack for NFV and SDN course details Who will benefit: Anyone wishing to implement NFV using OpenStack. Prerequisites: Introduction to Virtualization Duration 3 day OpenStack for NFV and SDN course content What is NFV? What is NFV? What are network Functions? NFV benefits, NFV market drivers. ETSI NFV framework. ETSI documents, Architecture overview, compute domain, hypervisor domain, infrastructure network domain. What is OpenStack? Virtual machines, clouds, management. OpenStack architecture, OpenStack modules. Why OpenStack for NFV? Hands on OpenStack installation. OpenStack Virtualization and NFV Server, storage and network virtualization and NFV. Where OpenStack fits in the ETSI framework. Virtual machines, containers and docker. Data centres, clouds, SaaS, IaaS, PaaS. Hands on OpenStack Iaas, OpenStack Nova. The virtualization layer VM centric model, containers versus hypervisors, FD.io. Hands on OpenStack as the VIM. OpenStack Neutron VXLAN, Networks, subnets, ports. Security groups. Routers. Service and component hierarchy. Hands on Implementing a virtual network with OpenStack Neutron. Virtualization of Network Functions Network virtualization versus Network Function virtualization. NFV MANO Management and Orchestration. Where OpenStack fits. MANO descriptors, Open orchestration. OpenStack Tacker, Open MANO, OpenBaton, other orchestrators. OpenStack Tacker Installation, getting started, configuration. SFC and OpenStack. Hands on Deploying a VNF. OPNFV What is OPNFV, Where OpenStack fits into OPNFV. SDN What is SDN? Control and data planes. SDN controllers. Classic SDN versus real SDN. Hybrid SDN, network automation, SDN with overlays. Northbound, southbound, SDN protocols, OpenFlow, OpenDaylight, ONOS, SDN with NFV. SDN and OpenStack. Summary Deploying NFV, performance, testing. Futures

OpenStack for NFV and SDN
Delivered in Internationally or OnlineFlexible Dates
£3,497

BOHS P405 - Management of Asbestos in Buildings (including Asbestos Removal)

By Airborne Environmental Consultants Ltd

The main subject areas of the course are: Legislation and guidance for asbestos practitioners. The properties of asbestos and health effects of exposure to asbestos fibres. The types of asbestos and its uses in buildings. The types of asbestos surveys. The asbestos register, risk assessment and management plan. Asbestos remediation. The role of asbestos analysts and laboratory procedures.

BOHS P405 - Management of Asbestos in Buildings (including Asbestos Removal)
Delivered in Manchester + 1 more or OnlineFlexible Dates
£775

Leadership Development 1:1 Executive Coaching

5.0(4)

By Puritas

Executive Coaching provides a safe space for leaders to explore new ideas and techniques without judgement, fostering personal growth and benefiting the wider business. Sessions are confidential, 90 minutes long, and tailored to individual developmental needs, with a bi-weekly schedule of six sessions suggested. These sessions are conducted via Zoom, with face-to-face options available in East Anglia and London; email engage@puritas.org.uk for details.

Leadership Development 1:1 Executive Coaching
Delivered OnlineFlexible Dates
FREE to £1,200

Python for network engineers

5.0(3)

By Systems & Network Training

Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.

Python for network engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in Internationally or OnlineFlexible Dates
£3,697

Facilitation Skills for Business Analysts: Virtual In-House Training

By IIL Europe Ltd

Facilitation Skills for Business Analysts: Virtual In-House Training This course is part of IIL's Business Analysis Certificate Program (BACP), a program designed to help prepare individuals pass the IIBA® Certification exam to become a Certified Business Analysis Professional (CBAP™). Business analysts are communicators who bridge the gap between people with business needs and knowledge and the people who will provide solutions. Business analysts are continuously involved in communications with stakeholders and developers as they create the solution to business problems. They participate in information-gathering sessions including interviewing, joint requirements definition, and Joint Application Design (JAD) workshops which are used to streamline information gathering and get immediate validation from user representatives. The business analyst is also involved with negotiating the solution with the stakeholders, upper-level management, and the developers, mediating among the groups when disagreements take place, and influencing the results of decisions during the solution cycle. This course teaches the methods needed to organize and run information-gathering events. It combines the basics of graphic decision making and modeling with facilitation, communication, and meeting management skills. What you will Learn At the end of this program, you will be able to: Identify the major touch points between key BABOK® Guide knowledge areas and business analysis communication Describe the facilitation skills that are most supportive of those intersections Improve your ability to apply these skills in the context of your business analyst functions Foundation Concepts The role of the Business analyst (BA) An Introduction to the BABOK® Guide Business analyst roles and the product / project life cycle (PLC) Facilitation skills for the business analyst The BABOK® Guide and Communication An introduction to the communication process Addressing basic communications challenges Planning business analysis communication Communication and BABOK® Guide tasks Targeted Elicitation Techniques Synergy between communication and targeted elicitation techniques Preparing for elicitation Cornerstone targeted technique: interviews Other targeted elicitation techniques Related general communication skills Group Elicitation Techniques Synergy between requirements communication and group elicitation techniques Cornerstone group elicitation technique - requirements workshops Other group elicitation techniques Related general communication skills - meeting management best practices Related general communication skills - facilitating best practices Process / Model-Based Elicitation Techniques Synergy between requirements communication and process / model-based elicitation techniques Process / model-based elicitation techniques Related interpersonal skills - problem solving and decision making Investigative Elicitation Techniques Synergy between requirements communication and investigative elicitation techniques Cornerstone investigative elicitation technique - document analysis Other investigative elicitation techniques Summary of elicitation techniques by usage in the requirements process Using Presentations, Structured Walkthroughs, and Influencing Structured walkthroughs, presentations, and influencing within BABOK® Guide tasks Cornerstone technique - structured walkthroughs General communication skill - presenting Related interpersonal skill - influencing Special Facilitation Skills - Negotiating and Mediating Negotiating Mediating

Facilitation Skills for Business Analysts: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,250

ITIL 4 Specialist: Drive Stakeholder Value: In-House Training

By IIL Europe Ltd

ITIL® 4 Specialist: Drive Stakeholder Value: In-House Training The ITIL® 4 Specialist: Drive Stakeholder Value module is part of the Managing Professional stream for ITIL 4. Candidates need to pass the related certification exam for working towards the Managing Professional (MP) designation. This course is based on the ITIL® 4 Specialist: Drive Stakeholder Value exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. What You Will Learn The learning objectives of the course are based on the following learning outcomes of the ITIL® 4 Specialist: Drive Stakeholder Value exam specification: Understand how customer journeys are designed Know how to target markets and stakeholders Know how to foster stakeholder relationships Know how to shape demand and define service offerings Know how to align expectations and agree on details of services Know how to onboard and offboard customers and users Know how to act together to ensure continual value co-creation (service consumption / provisioning) Know how to realize and validate service value Customer Journey Purpose of the Module Purpose of Mastering the Customer Journey Touchpoints and Service Interactions Module Topics Mapping the Customer Journey Designing the Customer Journey Measuring and Improving the Customer Journey Customer Journey Step 1: Explore Purpose of the Module Purpose of the Explore Step Module Topics Understanding Service Consumers Understanding Service Providers Understanding and Targeting Markets Customer Journey Step 2: Engage Purpose of the Module Purpose of the Engage Step Aspects of Service Value Module Topics Service Relationship Types Building Service Relationships Building and Sustaining Trust and Relationships Analyzing Customer Needs Managing Suppliers and Partners Customer Journey Step 3: Offer Purpose of the Module Purpose of Shaping Demand and Service Offerings Module Topics Managing Demand and Opportunities Specifying and Managing Customer Requirements Designing Service Offerings and User Experience Selling and Obtaining Service Offerings Customer Journey Step 4: Agree Purpose of the Module Purpose of Aligning Expectations and Agreeing on Services Module Topics Agreeing on and Planning Value Co-Creation Negotiating and Agreeing on a Service Customer Journey Step 5: Onboard Purpose of the Module Purpose of Onboarding and Offboarding ITIL® Management Practices Module Topics Planning Onboarding Fostering Relationships with Users Providing User Engagement and Delivery Channels Enabling Users for Service Elevating Mutual Capabilities Offboarding Customer Journey Step 6: Co-create Purpose of the Module Purpose of Service Provision and Consumption Module Topics Service Mindset Ongoing Service Interactions Nurturing User Communities Customer Journey Step 7: Realize Purpose of the Module Measuring Service Value Purpose of Value Capturing and Customer Journey Improvement Realizing Service Value in Different Settings Module Topics Tracking Value Realization Assessing and Reporting Value Realization Evaluating Value Realization and Improving Customer Journeys Realizing Value for the Service Provider

ITIL 4 Specialist: Drive Stakeholder Value: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£2,295

EC-Council Certified Cybersecurity Technician (C|CT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. Course Outline Information Security Threats and Vulnerabilities Information Security Attacks Network Security Fundamentals Identification, Authentication, and Authorization Network Security Controls: Administrative Controls Network Security Controls: Physical Controls Network Security Controls: Technical Controls Network Security Assessment Techniques and Tools Application Security Virtualization and Cloud Computing Wireless Network Security Mobile Device Security Internet of Things (IoT) and Operational Technology (OT) Security Cryptography Data Security Network Troubleshooting Network Traffic Monitoring Network Log Monitoring and Analysis Incident Response Computer Forensics Business Continuity and Disaster Recovery Risk Management

EC-Council Certified Cybersecurity Technician (C|CT)
Delivered OnlineFlexible Dates
£3,495