Essential DHCP training course description Almost all businesses use DHCP. This course builds on delegates existing IP knowledge and focuses on IP Address management using DHCP. Also covered is the role of DHCP in plug and play environments. What will you learn Explain how DHCP works. Configure DHCP servers. Troubleshoot DHCP. Essential DHCP training course details Who will benefit: Anyone working with TCP/IP. Prerequisites: TCP/IP Foundation for engineers Duration 1 day Essential DHCP training course contents Introduction What is DHCP?, IP configuration: Address, mask, default gateway, DNS. History of DHCP: RARP, BOOTP. Hands on Client configuration, releasing and renewing. DHCP servers Installation. Base configuration: Scope. Lease period. DHCP options. Hands on Server setup, Impact of lease times. Server monitoring. How DHCP works Client states. Obtaining, renewing leases. DHCP messages: DISCOVER, OFFER, REQUEST, NAK, ACK, DECLINE, RELEASE, INFORM. Hands on Troubleshooting DHCP using Wireshark. DHCP architecture DHCP relay agents. Server platforms, resilience, DHCP fail over, split scopes. Dynamic DNS and DHCP. Hands on DDNS, routers, Troubleshooting.
This one-day course introduces the field of user experience and provides an excellent entry point to our other specialised training courses. UX processes and practices have become a central component of product design, service design and web design.
Delivered in either our Live Online format (4 days) or in our Classroom (5 days), the ISO 37001 Lead Auditor training course enables you to develop the necessary expertise to perform an Anti-bribery Management System (ABMS) audit by applying widely recognized audit principles, procedures and techniques. About This Course During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process. Based on practical exercises, you will be able to master the audit techniques and become competent to manage an audit program and audit team. After acquiring the necessary expertise to perform this audit, you can sit for the exam and gain the "Certified ISO 37001 Lead Auditor' credential. By holding this Certificate, you will demonstrate that you have the capabilities and competencies to audit organizations based on best practices. Learning objectives Understand the operation of an Anti-bribery Management System based on ISO 37001 and its principal processes Understand the correlation between ISO 37001 and other standards and regulatory frameworks Understand the auditor's role in planning, leading and following-up on a management system audit in accordance with ISO 19011 Interpret the requirements of ISO 37001 in the context of an ABMS audit Strengthen the personal skills necessary for an auditor to act with due professional care during an audit Educational approach Lecture sessions are illustrated with practical questions and examples Practical exercises include examples and discussions Practice tests are similar to the certification exam Prerequisites A foundational understanding of ISO 37001 and knowledge of audit principles. What's Included? Refreshments & Lunch (Classroom only) Course Slide Deck Official Study Guides CPD Certificate The Exam Who Should Attend? Auditors seeking to perform and lead Anti-bribery Management System (ABMS) certification audits Managers or consultants seeking to master an Anti-bribery Management System audit process Individuals responsible for maintaining conformance with ISO 37001 requirements Technical experts seeking to prepare for an Anti-bribery Management System audit Expert advisors in Anti-bribery Management Accreditation Assessment The exam is delivered in a 12 question essay format, to be completed within 150 minutes and gaining a 70% pass mark. Exam results are provided within 24 hours. Provided by This course is Accredited by NACS and Administered by the IECB.
After mastering all the necessary concepts of Disaster Recovery processes, you can sit for the exam and gain the "Certified Lead Disaster Recovery Manager' credential. By holding this Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead Disaster Recovery teams in implementing Disaster Recovery strategies based on best practices. About This Course Learning objectives Acknowledge the correlation between Disaster Recovery, Business Continuity Management, Information Security and other IT areas and frameworks Master the concepts, approaches, methods and techniques used for the implementation and effective management of a Disaster Recovery Plan Learn how to interpret the ICT Disaster Recovery strategies in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain DR services based on best practices Acquire the expertise to advise an organization in implementing an effective Disaster Recovery Plan based on best practices Educational approach This training is based on both theory and best practices used in the implementation and management of a DR plan Lecture sessions are illustrated with examples based on case studies Practical exercises are based on a case study which includes role playing and discussions Practice tests are similar to the Certification Exam Course Content Day 1: Introduction to Disaster Recovery and initiation of a DR plan Day 2: Risk Mitigation Strategies and Disaster Recovery Planning Day 3: Disaster Recovery facilities, services, recovery sites, response and activation Day 4: DRP testing, monitoring, measurement and continuous improvement; the examination Accreditation Prerequisites A foundational understanding of Disaster Recovery Services and knowledge of management principles, concepts and strategies. Assessment The exam for this course consists of 12 essay type questions, to be completed within the 150 minute timeframe and achieving the 70% pass mark. Exam results are provided within 24 hours. What's Included? Certification fees are included on the exam price Training material containing over 450 pages of information and practical examples will be distributed A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued In case of exam failure, you can retake the exam within 12 months for free Provided by This course is Accredited by NACS and Administered by the IECB. Who Should Attend? Information Security Managers Incident Managers Helpdesk Managers Executives with Governance concerns
The Alternative Energy Technology Course is a practically based alternative energy course designed to give participants an understanding of alternative energy options and provide them with that practical knowledge and skills to build solar to electric and wind to electric systems at a foundation level. The course is designed to be of benefit to people either working or intending to work as:- Alternative Energy Installers or anyone just wishing to gain practical knowledge of Practical Alternative Energy Systems
Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician. This course is also designed for students who are seeking the CompTIA A+ certification. Overview Install and configure mobile devices Compare and contrast networking hardware Configure internet connections and wireless networking Troubleshoot hardware and networks Install motherboards, RAM, storage devices, CPUs and add-on cards Deploy and configure connected devices Summarize cloud-computing concepts and virtualization CompTIA A+ certified professionals are proven problem solvers. They support today's core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today's digital world. It is the only industry-recognized credential with performance-based items to prove pros can think on their feet to perform critical IT support tasks in the moment. It is trusted by employers around the world to identify the go-to person in end-point management and technical support roles. CompTIA A+ is regularly re-invented by IT experts to ensure that it validates core skills and abilities demanded in the workplace. Prerequisites While there are no prerequisites for this course, please ensure you have the right level of experience to be successful in this training. Lesson 1: Installing Motherboards and Connectors Topic 1A: Explain Cable Types and Connectors Topic 1B: Install and Configure Motherboards Topic 1C: Explain Legacy Cable Types Lesson 2: Installing System Devices Topic 2A: Install and Configure Power Supplies and Cooling Topic 2B: Select and Install Storage Devices Topic 2C: Install and Configure System Memory Topic 2D: Install and Configure CPUs Lesson 3: Troubleshooting PC Hardware Topic 3A: Apply Troubleshooting Methodology Topic 3B: Configure BIOS/UEFI Topic 3C: Troubleshoot Power and Disk Issues Topic 3D: Troubleshoot System and Display Issues Lesson 4: Comparing Local Networking Hardware Topic 4A: Compare Network Types Topic 4B: Compare Networking Hardware Topic 4C: Explain Network Cable Types Topic 4D: Compare Wireless Networking Types Lesson 5: Configuring Network Addressing and Internet Connections Topic 5A: Compare Internet Connection Types Topic 5B: Use Basic TCP/IP Concepts Topic 5C: Compare Protocols and Ports Topic 5D: Compare Network Configuration Concepts Lesson 6: Supporting Network Services Topic 6A: Summarize Services Provided by Networked Hosts Topic 6B: Compare Internet and Embedded Appliances Topic 6C: Troubleshoot Networks Lesson 7: Summarizing Virtualization and Cloud Concepts Topic 7A: Summarize Client-Side Virtualization Topic 7B: Summarize Cloud Concepts Lesson 8: Supporting Mobile Devices Topic 8A: Set Up Mobile Devices and Peripherals Topic 8B: Configure Mobile Device Apps Topic 8C: Install and Configure Laptop Hardware Topic 8D: Troubleshoot Mobile Device Issues Lesson 9: Supporting Print Devices Topic 9A: Deploy Printer and Multifunction Devices Topic 9B: Replace Print Device Consumables Topic 9C: Troubleshoot Print Device Issues
Autocad face to face training customised and bespoke.
Cyber Security training course description The reliance of the world on the Internet and computer systems means the protection of information systems is vitally important. This is even more important smart devices and the Internet of Things increase the number of devices. This Cyber Security provides a concise overview on the threats and attacks that can happen along with the counter measures that can be taken. What will you learn Recognise the different types of attack. Describe the attacks that can be made against information systems. Describe the counter measures available. Cyber Security training course details Who will benefit: Non-technical staff working with computers. Prerequisites: None. Duration 1 day Cyber Security training course contents What is Cyber Security? Computer security, Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Attacks Physical access, Social engineering, Privilege escalation, Malware, Trojans, worms, viruses, rootkits, Backdoors, Denial of Service (DOS), Distributed DOS, Eavesdropping, Spoofing, Man the middle tampering. Countermeasures Prevention, detection, response. Physical, user accounts, Firewalls, IDS, AAA, authentication, cryptography, encryption, data integrity. Cyber security standards ETSI, ISO 27001, 27002, NIST, ISA/IEC 62443.