• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

740 Courses delivered Live Online

FortiGate Security

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks. Overview Deploy the appropriate operation mode for your network. Use the GUI and CLI for administration. Identify the characteristics of the Fortinet security fabric. Control network access to configured networks using firewall policies. Apply port forwarding, source NAT, and destination NAT. Authenticate users using firewall policies. Understand encryption functions and certificates. Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies. Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites. Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports. Fight hacking and denial of service (DoS). Defend against data leaks by identifying files with sensitive data, and block them from leaving your private network. Offer an SSL VPN for secure access to your private network. Implement a dial-up IPsec VPN tunnel between FortiGate and FortiClient. Collect and interpret log entries. In this three-day course, you will learn how to use basic FortiGate features, including security profiles. Course Outline Module 1. Introduction to FortiGate and the Security Fabric Module 2. Firewall Policies Module 3. Network Address Translation (NAT) Module 4. Firewall Authentication Module 5. Logging and Monitoring Module 6. Certificate Operations Module 7. Web Filtering Module 8. Application Control Module 9. Antivirus Module 10. Intrusion Prevention and Denial of Service Module 11. SSL VPN Module 12. Dial-Up IPsec VPN Module 13. Data Leak Prevention (DLP)

FortiGate Security
Delivered OnlineFlexible Dates
Price on Enquiry

OL19 IBM i System Administration

By Nexus Human

Duration 4.5 Days 27 CPD hours This course is intended for This is an intermediate course intended for IBM i system administrators, data processing managers and other individuals who implement and manage security, backup and recovery, system software and problem determination. This course is not recommended for s Overview Describe and implement the components of IBM i security, such as user profile, group profile, authorization list, adopted authority and object / resource security Develop a security plan for your Power Systems with IBM i Describe the options to implement security auditing Develop a plan to audit security on your Power Systems with IBM i Describe the IBM i availability products and features and choose the option(s) that best fit your company requirements Describe how to backup and recover user, IBM and full system data on your Power Systems with IBM i Develop a backup and recovery plan for your Power Systems with IBM i Describe the system diagnostics and problem determination procedures available on your Power Systems with IBM i Learn how to plan for, implement, and manage the ongoing operations of an IBM i. Class administration and introductions . IBM i overview and concepts . Management central overview . Security concepts and overview . System values . User security . Resource security . Security auditing . Designing security . IBM i availability overview . Disk management . Backup and recovery strategy using Save/Restore . Journal management . Commitment control overview . Backup and recovery planning . Problem determination . Overview of Systems Director Navigator for i . Introduction to BRMS .

OL19 IBM i System Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Airport Ground Handling Management

By NextGen Learning

Airport Ground Handling Management Course Overview: This comprehensive course on Airport Ground Handling Management equips learners with essential knowledge about the operational aspects of airport management. Covering a wide range of topics, from passenger terminal management to cargo handling and security protocols, the course provides a solid foundation for managing various airport functions effectively. Learners will gain valuable insights into the complex dynamics of airport operations, which are critical for maintaining seamless air travel. By completing this course, participants will develop the skills necessary to oversee ground handling activities, enhance customer service, and contribute to operational efficiency in the aviation industry. Course Description: The Airport Ground Handling Management course delves deep into essential areas of airport operations. Topics include passenger terminal management, airport components, cargo handling, and security measures, offering learners a comprehensive understanding of how each function contributes to overall airport efficiency. Learners will explore complex issues such as peak periods, airline scheduling, aviation noise control, and weather management, all within the context of sustainable airport practices. The course also addresses modern innovations in the aviation industry, equipping learners with up-to-date knowledge to meet the evolving demands of airport management. Upon completion, participants will gain the expertise required to manage and optimise airport ground operations, ensuring smooth, safe, and efficient passenger and cargo handling. Airport Ground Handling Management Curriculum: Module 01: Introduction to Airport Management Module 02: Airport Customer Service Module 03: Passenger Terminal Management Module 04: Airport Components Module 05: Airport Peaks and Airline Scheduling Module 06: Cargo Management Module 07: Aviation Noise Control Module 08: Weather Control Module 09: Sustainable Airport Management Module 10: Security Management Module 11: Innovation and Growth (See full curriculum) Who is this course for? Individuals seeking to build a career in airport management. Professionals aiming to advance their expertise in ground handling operations. Beginners with an interest in the aviation industry. Those looking to contribute to the efficient functioning of airports. Career Path Airport Ground Handling Supervisor Airport Operations Manager Airline Ground Operations Coordinator Cargo Operations Manager Airport Customer Service Manager Aviation Safety and Security Officer

Airport Ground Handling Management
Delivered OnlineFlexible Dates
£7.99

Business Management

By NextGen Learning

Business Management Course Overview This Business Management course provides learners with a comprehensive understanding of key management concepts and practices. Covering essential topics such as operations, business analysis, strategic planning, and risk management, the course equips learners with the necessary tools to handle various aspects of business management effectively. Through a blend of theoretical insights and applied learning, learners will develop the confidence to manage business operations, drive strategic growth, and navigate organisational challenges. The course is designed to provide value to individuals seeking to advance their management skills and progress in their careers. Course Description This course delves deeply into the core aspects of business management, providing a structured approach to understanding business operations, leadership, and decision-making. Learners will explore modules on business analysis, strategic management, and project development, as well as gain valuable skills in managing risk, performance, and human resources. The course covers critical areas including planning, forecasting, communication, and conflict management. By the end of the course, learners will have a broad understanding of how businesses operate and will be able to apply their learning to various management scenarios. Designed for those looking to enhance their management skills, the course ensures that learners gain a solid foundation in business management principles. Business Management Curriculum Module 01: Introduction to Business Management Module 02: Operations Management Module 03: Introduction to Business Analysis Module 04: Strategic Analysis and Product Scope Module 05: Project Management Module 06: Business Development and Succession Planning Module 07: Business Process Management Module 08: Planning & Forecasting Operations Module 09: Performance Management Module 10: Management of Cash and Credit Module 11: Managing Risk and Recovery Module 12: Quality Management Module 13: Communication Skills Module 14: Business Environment Module 15: Organisational Skills Module 16: Negotiation Techniques Module 17: Human Resource Management Module 18: Motivation and Counselling Module 19: Customer Service Module 20: Time Management Module 21: Conflict Management (See full curriculum) Who is this course for? Individuals seeking to build a career in business management. Professionals aiming to enhance their management and leadership skills. Beginners with an interest in business operations and management. Those looking to progress in roles related to business analysis, human resources, or strategic planning. Career Path Business Manager Operations Manager Project Manager HR Manager Strategic Planner Financial Analyst Customer Service Manager Risk Manager Organisational Development Specialist Performance Manager

Business Management
Delivered OnlineFlexible Dates
£7.99

Cisco Implementing Cisco Multicast v2.0 (MCAST)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network professionals, including systems engineers Channel Partners Customers Overview After taking this course, you should be able to: Describe IP multicast services Identify IP multicast issues on a data link layer Explain why Protocol Independent Multicast Sparse Mode (PIM-SM) is the most current scalable IP multicast routing protocol Describe Rendezvous Point (RP) distribution solutions Recognize the drawbacks of the PIM-SM and describe two extensions to provide possible solutions Explain basic concepts of Multiprotocol BGP (MP-BGP) and its use in the IP multicast environment Configure and deploy Multicast Source Discovery Protocol (MSDP) in the interdomain environment Describe solutions to mitigate security issues in the IP multicast network Describe the process of monitoring and maintaining multicast high-availability operations Design multicast-related application and network solutions in customer and service provider networks The Implementing Cisco Multicast (MCAST) v2.0 course teaches you the fundamentals of IP multicasting, including multicast applications, sources, receivers, group management, and IP multicast routing protocols such as Protocol Independent Multicast (PIM) used within a single administrative domain. You will learn about issues in switched LAN environments and reliable IP multicasting, and technical solutions for simple deployments of IP multicast within a provider or customer network. The course reviews the configuration and troubleshooting guidelines for implementation of IP multicast on Cisco© routers. Labs offer hands-on experience to help you prepare to deploy IP multicast successfully. Course Outline Module 1: IP Multicast Concepts and Technologies Module 2: Multicast on the LAN Module 3: PIM Sparse Mode Module 4: Rendezvous Point Engineering Module 5: PIM Sparse Mode Protocol Extensions Module 6: Multiprotocol Extensions for BGP Module 7: Interdomain IP Multicast Module 8: IP Multicast Security Module 9: Multicast Optimization and High-Availability Features Module 10: Applications of Multicast

Cisco Implementing Cisco Multicast v2.0 (MCAST)
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks : Cortex XDR 3.2: Investigation and Response (EDU-262)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Cybersecurity analysts and engineers and security operations specialists, as well as administrators and product deployers. Overview Successful completion of this instructor-led course with hands-on lab activities should enable you to: Describe the architecture and components of the Cortex XDR family Use the Cortex XDR management console Create Cortex XDR agent installation packages, endpoint groups, and policies Deploy Cortex XDR agents on endpoints Create and manage exploit and malware prevention profiles Investigate alerts and prioritize them using starring and exclusion policies Tune Security profiles using Cortex XDR exceptions Perform and track response actions in the Action Center Perform basic troubleshooting related to Cortex XDR agents Deploy a Broker VM and activate the Local Agents Settings applet Understand Cortex XDR deployment concepts and activation requirements Work with the Customer Support Portal and Cortex XDR Gateway for authentication and authorization This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create Security profiles and policies. The training enables you to perform and track response actions, tune profiles, and work with Cortex XDR alerts. The training concludes with discussions about basic troubleshooting of the agent, the on-premises Broker VM component, and Cortex XDR deployment. Course Outline This class is comprised of the following modules: Module 1 - Cortex XDR Family Overview Module 2 - Cortex XDR Main Components Module 3 - Cortex XDR Mangement Components Module 4 - Profiles and Policy Rules Module 5 - Malware Protection Module 6 - Exploit Protection Module 7 - Cortex XDR Alerts Module 8 - Tuning Policies using Exceptions Module 9 - - Response Actions Module 10 - Basic Agent Troubleshooting Module 11 - Broker VM Overview Module 12 - Deployment Consideration

Palo Alto Networks : Cortex XDR 3.2: Investigation and Response (EDU-262)
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Network Defender (C|ND) v.2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Administrators Network security Administrators Network Security Engineer Network Defense Technicians CND Analyst Security Analyst Security Operator Anyone who involves in network operations Overview A dedicated focus on IoT security Network virtualization practices for the remote workforce Enhanced Cloud Security & IoT and Operational Technology (OT) Modules Introduction to threat intelligence In-depth Attack Surface Analysis Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF) as well as a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators. The program prepares network administrators how to identify what parts of an organization need to be reviewed and tested for security vulnerabilities and how to reduce, prevent, and mitigate risks in the network. CND covers the protect, detect, respond and predict approach to network security. Course Outline Network Attacks and Defense Strategies Administrative Network Security Technical Network Security Network Perimeter Security Endpoint Security-Windows Systems Endpoint Security-Linux Systems Endpoint Security- Mobile Devices Endpoint Security-IoT Devices Administrative Application Security Data Security Enterprise Virtual Network Security Enterprise Cloud Network Security Enterprise Wireless Network Security Network Traffic Monitoring and Analysis Network Logs Monitoring and Analysis Incident Response and Forensic Investigation Business Continuity and Disaster Recovery Risk Anticipation with Risk Management Threat Assessment with Attack Surface Analysis Threat Prediction with Cyber Threat Intelligence

EC-Council Certified Network Defender (C|ND) v.2
Delivered OnlineFlexible Dates
Price on Enquiry

WE761 IBM Administration of IBM DataPower Gateway V7.6

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for administrators who install, manage, and monitor IBM© DataPower Gateway Appliances. The course is also relevant for developers who administer appliances. Overview Configure an appliance for its initial deployment Download and upgrade the firmware on the DataPower appliances Create and manage user accounts, groups, and domains Configure Secure Sockets Layer (SSL) to and from DataPower Appliances Troubleshoot and debug services by using the problem determination tools, logs, and probes that are provided with the DataPower appliance Configure logging of messages to external locations IBM© DataPower Gateway Appliances are network devices that help secure, integrate, and optimize access to web, web services, mobile, and API workloads. Through instructor-led lectures and hands-on lab exercises, you learn how to run various administrative procedures, from initial installation and setup through ongoing maintenance of the appliances in production. You learn about the available management interfaces, such as the command-line interface (CLI), Web Management graphical interface, and XML Management Interface. You also learn how to use these interfaces to run various administrative tasks, such as upgrading firmware, running backup and restore operations, and configuring user accounts and domains. The course includes some information on upgrading firmware and working with DataPower hardware appliances. Course introductionDataPower deployment environmentsInitial setupManaging firmwareExercise: Upgrading image firmwareDataPower administration overviewUsing CLI and the XML Management Interface to configure appliance accessExercise: Using the CLI and the XML Management Interface to manage DataPower appliancesDataPower services overviewUsing the Web Management Blueprint Console to configure appliance accessTroubleshootingExercise: Using the troubleshooting tools to debug errorsDataPower cryptographic tools and SSL setupExercise: Securing connections with SSLLogging and log targetsExercise: Logging to an external systemCourse summary

WE761 IBM Administration of IBM DataPower Gateway V7.6
Delivered OnlineFlexible Dates
Price on Enquiry

FortiGate Security 7.2

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks should attend this course. You should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course. Overview After completing this course, the successful student should be able to: Deploy the appropriate operation mode for your network Use the GUI and CLI for administration Control network access to configured networks using firewall policies Apply port forwarding, source NAT, and destination NAT Authenticate users using firewall policies Understand encryption functions and certificates Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports Fight hacking and denial of service (DoS) Collect and interpret log entries Identify the characteristics of the Fortinet Security Fabric In this three-day course, you will learn how to use the most common FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, the Fortinet Security Fabric, user authentication, and how to protect your network using security profiles, such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security. Product Version FortiOS 7.2 Course Outline 1. Introduction and Initial Configuration 2. Firewall Policies 3. Network Address Translation 4. Firewall Authentication 5. Logging and Monitoring 6. Certificate Operations 7. Web Filtering 8. Application Control 9. Antivirus 10. Intrusion Prevention and Denial of Service 11. Security Fabric

FortiGate Security 7.2
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black EDR Administrator

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of the Carbon Black EDR server Identify the architecture and data flows for Carbon Black EDR communication Describe the Carbon Black EDR server installation process Manage and configure the Carbon Black EDR sever based on organizational requirements Perform searches across process and binary information Implement threat intelligence feeds and create watchlists for automated notifications Describe the different response capabilities available from the Carbon Black EDR server Use investigations to correlate data between multiple processes This course teaches you how to use the VMware Carbon Black© EDR? product and leverage the capabilities to configure and maintain the system according to your organization?s security posture and policies. This course provides an in-depth, technical understanding of the Carbon Black EDR product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Planning and Installation Hardware and software requirements Architecture Data flows Server installation review Installing sensors Server Administration Configuration and settings Carbon Black EDR users and groups Process Search and Analysis Filtering options Creating searches Process analysis and events Binary Search and Banning Binaries Filtering options Creating searches Hash banning Search best practices Search operators Advanced queries Threat Intelligence Enabling alliance feeds Threat reports details Use and functionality Watchlists Creating watchlists Use and functionality Alerts / Investigations / Response Using the HUD Alerts workflow Using network isolation Using live response

VMware Carbon Black EDR Administrator
Delivered OnlineFlexible Dates
Price on Enquiry