• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

707 Courses delivered Live Online

Health & Safety and Wellbeing in Care

By NextGen Learning

Health & Safety and Wellbeing in Care Course Overview This course provides an in-depth understanding of health, safety, and wellbeing within the care sector. It explores key legislation, risk management, and the essential protocols to ensure the safety of both care providers and recipients. By covering topics such as fire safety, stress management, and correct handling techniques, learners will be equipped to create safer care environments. The course delivers valuable knowledge for maintaining compliance with legal frameworks and improving overall wellbeing in care settings. Upon completion, learners will gain confidence in managing health and safety practices, enhancing both personal and organisational care standards. Course Description "Health & Safety and Wellbeing in Care" is designed to provide learners with a comprehensive understanding of the regulations, practices, and tools necessary for ensuring safety and wellbeing in care environments. The course covers essential topics such as health and safety legislation, security protocols, and stress management. Learners will explore fire safety and its related legislation, as well as proper handling and moving techniques. The course also delves into key regulations like LOLER (Lifting Operations and Lifting Equipment Regulations) and RIDDOR (Reporting of Injuries, Diseases, and Dangerous Occurrences Regulations). By the end, learners will have developed skills to assess and manage risks in various care settings, ensuring the safety of individuals and contributing to the improvement of overall care standards. Health & Safety and Wellbeing in Care Curriculum Module 01: Health & Safety Legislation & Policies Module 02: Safety, Security & Stress Management Module 03: Fire Safety Module 04: Fire Safety Legislation Module 05: Handling and Moving Module 06: LOLER & RIDDOR (See full curriculum) Who is this course for? Individuals seeking to enhance their understanding of health and safety in care environments. Professionals aiming to ensure compliance with health and safety regulations in care settings. Beginners with an interest in health and safety practices for the care industry. Care providers who wish to improve their workplace safety standards. Career Path Health and Safety Officer in care settings Risk Manager in healthcare environments Care Home Manager Support Worker Health and Safety Consultant for care organisations

Health & Safety and Wellbeing in Care
Delivered OnlineFlexible Dates
£7.99

Safety in Confined Spaces: Regulations and Risk Assessment

By NextGen Learning

Safety in Confined Spaces: Regulations and Risk Assessment Course Overview This course on Safety in Confined Spaces: Regulations and Risk Assessment provides an essential understanding of the safety standards and regulations governing confined space work environments. Focusing on the critical aspects of risk assessment, learners will gain insights into the identification, evaluation, and mitigation of hazards associated with confined spaces. The course covers a range of key safety protocols, regulations, and best practices that professionals need to adhere to in order to protect themselves and their colleagues. With a strong emphasis on UK-specific legal frameworks and safety guidelines, the course ensures that learners are well-equipped to make informed decisions in hazardous work settings. Learners will leave with the confidence to assess risks and implement appropriate safety measures, ensuring compliance with industry standards. Course Description This comprehensive course delves into the regulations and risk assessment processes crucial for ensuring safety in confined spaces. Key topics include relevant UK health and safety legislation, types of confined spaces, hazard identification, risk evaluation, emergency procedures, and the implementation of safety controls. Learners will explore risk management strategies, focusing on how to conduct thorough risk assessments and mitigate potential dangers in confined environments. The course also provides an overview of the roles and responsibilities of employees and employers in maintaining a safe work environment. Through a structured learning experience, participants will gain the skills necessary to evaluate confined spaces, understand their legal obligations, and implement effective risk control measures. On completion, learners will have a thorough understanding of safety in confined spaces, ensuring they are prepared to contribute effectively to workplace safety initiatives. Safety in Confined Spaces: Regulations and Risk Assessment Curriculum Module 01: Safety in Confined Spaces: Regulations and Risk Assessment (See full curriculum) Who is this course for? Individuals seeking to enhance their understanding of confined space safety. Professionals aiming to ensure compliance with safety regulations in high-risk environments. Beginners with an interest in occupational safety and health. Safety officers and managers working in sectors involving confined spaces. Career Path Health and Safety Officer Risk Assessment Specialist Confined Space Safety Coordinator Environmental Health and Safety Consultant Occupational Safety Manager

Safety in Confined Spaces: Regulations and Risk Assessment
Delivered OnlineFlexible Dates
£7.99

Tax Accounting

By NextGen Learning

Course Overview The Tax Accounting course provides a comprehensive introduction to the UK tax system, covering key areas such as income tax, corporation tax, VAT, and inheritance tax. Designed to equip learners with up-to-date knowledge of tax regulations and processes, this course offers valuable insights into tax administration, individual and corporate responsibilities, and submission of tax returns. Learners will develop a solid understanding of fundamental and advanced tax principles, payroll, and financial analysis. By the end of the course, participants will be able to navigate the complexities of taxation confidently and apply their knowledge in professional contexts. Whether aiming to launch a career in tax accounting or broaden existing financial expertise, this course supports learners in achieving their professional development goals and gaining skills that are in high demand across multiple sectors in the UK. Course Description This Tax Accounting course delves into the structure and operation of the UK tax system, offering detailed modules on personal and corporate taxation, VAT, capital gains, and national insurance contributions. Learners will explore both basic and advanced income tax calculations, understand payroll systems, and gain familiarity with self-assessment and double-entry accounting methods. The curriculum is structured to promote a clear and methodical understanding of tax reporting, compliance obligations, and financial analysis. With a strong emphasis on technical knowledge and regulatory frameworks, this course supports learners in building the analytical and accounting skills essential for a successful career in finance and taxation. Throughout the course, learners will benefit from clear explanations, real-world examples, and guided study that align with industry standards. By completion, participants will be well-prepared to pursue opportunities in accounting firms, corporate finance departments, and tax advisory roles. Course Modules Module 01: Tax System and Administration in the UK Module 02: Tax on Individuals Module 03: National Insurance Module 04: How to Submit a Self-Assessment Tax Return Module 05: Fundamentals of Income Tax Module 06: Advanced Income Tax Module 07: Payee, Payroll and Wages Module 08: Capital Gain Tax Module 09: Value Added Tax Module 10: Import and Export Module 11: Corporation Tax Module 12: Inheritance Tax Module 13: Double Entry Accounting Module 14: Management Accounting and Financial Analysis Module 15: Career as a Tax Accountant in the UK (See full curriculum) Who is this course for? Individuals seeking to develop a strong foundation in tax accounting. Professionals aiming to enhance their accounting and financial expertise. Beginners with an interest in taxation, finance, or business management. Entrepreneurs wanting to understand tax obligations for businesses. Students planning a career in accounting, auditing, or tax consultancy. Career Path Tax Accountant Payroll Administrator VAT Specialist Income Tax Advisor Financial Analyst Management Accountant Corporate Tax Consultant Self-Assessment Practitioner Tax Compliance Officer Accounting Technician

Tax Accounting
Delivered OnlineFlexible Dates
£9.99

VMware Workspace ONE: UEM Troubleshooting [V22.x]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Workspace ONE administrators, account managers, solutions architects, solutions engineers, sales engineers, technical support engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Summarize the basic troubleshooting methodologies Outline common troubleshooting techniques in the Workspace ONE UEM console Outline common troubleshooting techniques when integrating enterprise solutions in the Workspace ONE UEM console Summarize common troubleshooting strategies for Workspace ONE UEM managed devices Outline common application management troubleshooting techniques in the Workspace ONE UEM console Summarize common troubleshooting techniques for email management in the Workspace ONE UEM console Explain common troubleshooting approaches for the VMware Unified Access Gateway™ platform and individual edge services Outline useful troubleshooting tools, such as the Self-Service Portal and VMware Workspace ONE Assist™ In this two-day course, you learn to investigate, analyze, and determine issues that might occur with all the different components of VMware Workspace ONE© UEM. Troubleshooting is the backbone of service maintenance and management. To effectively troubleshoot product issues, administrators must understand how product services communicate and function. This in turn helps optimize service and software health management. Course Introduction Introductions and course logistics Course objectives Fundamentals of Troubleshooting Workspace ONE UEM Outline software troubleshooting logic and support methods Summarize the main process flows for the Workspace ONE UEM components Explain the importance of Workspace ONE UEM process flows for troubleshooting Identify different Workspace ONE UEM log files Workspace ONE UEM Console Troubleshooting Outline the best practices for troubleshooting Workspace ONE UEM console issues Identify common group management and assignment-related issues Outline common issues for Workspace ONE UEM console roles and system settings Understand how analytic events can be used to identity platform errors Summarize the steps for collecting and analyzing Workspace ONE UEM console logs Integration Troubleshooting Outline the common enterprise integrations in Workspace ONE UEM Outline common troubleshooting techniques for the VMware AirWatch© Cloud Connector? Troubleshoot issues related to Directory Services integration Identify directory user and groups synchronization issues Troubleshoot issues related to certificate authority integration Explain VMware Workspace ONE© Access? integration and VMware Workspace ONE© Intelligent Hub troubleshooting techniques Endpoint Troubleshooting Compare the endpoint connection topologies in Workspace ONE UEM Outline useful tools and resources for endpoint troubleshooting Summarize the best practices for device enrollment troubleshooting Explain device connectivity troubleshooting techniques Understand how to identify and resolve profile-related issues Identify common compliance policy issues and potential root causes Applications Troubleshooting Explain the different scoping questions for troubleshooting applications Review application management configurations Summarize the general tools and resources for application troubleshooting Describe the general logic of troubleshooting public applications Understand internal application issues and potential causes Explain purchased application troubleshooting techniques Unified Access Gateway And Edge Services Troubleshooting Review Unified Access Gateway architecture and edge service workflows Understand Unified Access Gateway general configurations Explain how to utilize Unified Access Gateway related troubleshooting tools and resources Identify and resolve common issues for Content Gateway on Unified Access Gateway Summarize troubleshooting techniques for VMware Workspace ONE© Tunnel? on Unified Access Gateway Email Troubleshooting Review different email architecture and workflows Summarize common errors associated with email profiles Identify tools and resources for email troubleshooting Discuss troubleshooting techniques for VMware AirWatch© Secure Email Gateway? on Unified Access Gateway Outline PowerShell integration issues and techniques to address them Additional Troubleshooting Tools Describe how the Self-Service Portal helps administrators and empowers end-users to resolve issues Understand how Workspace ONE Assist can help endpoint troubleshooting

VMware Workspace ONE: UEM Troubleshooting [V22.x]
Delivered OnlineFlexible Dates
Price on Enquiry

First Aid at Work

By NextGen Learning

Course Overview This comprehensive First Aid at Work course is designed to equip learners with the knowledge needed to effectively manage health-related emergencies in professional settings. Covering a wide range of workplace incidents, it explores the role of appointed persons, emergency protocols, and how to respond to common injuries and illnesses. Learners will develop confidence in managing both physical and mental health-related situations at work, including remote support and procedures adapted for the COVID-19 era. Whether you are an employee, manager, or business owner, this course provides essential guidance that aligns with UK regulations and first aid expectations in modern work environments. By the end of the course, learners will be familiar with key emergency response procedures and legal requirements, contributing to a safer and more responsible workplace culture. Course Description The First Aid at Work course offers in-depth learning across a structured series of modules that cover everything from primary and secondary assessments to CPR, AED usage, and mental health support. It examines various types of injuries and illnesses such as fractures, dislocations, breathing problems, and minor workplace injuries. The course also discusses the legal framework for first aid at work, risk assessments, and the importance of mental health awareness. Additionally, it addresses recent considerations such as pandemic-specific protocols and remote psychological support. Learners will gain theoretical insight into emergency handling, including when and how to contact emergency services. With up-to-date content aligned with UK standards, this course is ideal for those looking to support a health-conscious and safety-oriented work environment. Course Modules: Module 01: Introduction to Workplace First Aid Module 02: Appointed Persons in the Workplace First Aid Module 03: Incident Management at Work Module 04: Classifications and Abbreviations Module 05: Emergency Management Module 06: Primary Survey Module 07: Secondary Survey Module 08: Basic First-Aid Techniques Module 09: AED Module 10: Minor Injuries at Workplace Module 11: Loss of Responsiveness and CPR Module 12: Breathing Problems Module 13: Secondary Illnesses and Injuries Module 14: Fractures and Dislocations Module 15: Call for an Emergency Module 16: Things to Keep in Mind for A First Aider Module 17: Legal Framework for Workplace First Aid Module 18: Mental Health First Aid in the Workplace Module 19: First Aid during Coronavirus Pandemic Module 20: First Aid Qualifications During the Pandemic, Risk at Work and PPE Regulations Module 21: Remote Psychological First Aid (See full curriculum) Who is this course for? Individuals seeking to understand workplace first aid responsibilities. Professionals aiming to support health and safety compliance in the workplace. Beginners with an interest in health and safety protocols. Managers, HR personnel, or safety officers seeking foundational knowledge in first aid. Career Path Workplace Health & Safety Officer HR and Compliance Manager Office Administrator with Safety Responsibilities Site or Facility Supervisor Community Support Worker Mental Health Support Facilitator Risk Management and Corporate Safety Advisor

First Aid at Work
Delivered OnlineFlexible Dates
£9.99

The vital role of CFOs in business exit preparation

By FD Capital

he role of a CFO extends beyond day-to-day financial management and plays a pivotal role in preparing a business for an exit. The role of a CFO extends beyond day-to-day financial management and plays a pivotal role in preparing a business for an exit, whether it be through a merger, acquisition, or other strategic transaction. Here are some key points to consider: Financial Due Diligence: CFOs play a crucial role in conducting financial due diligence to assess the company’s financial health and identify any potential risks or issues. This involves reviewing financial statements, accounting practices, contracts, and other financial data to ensure accuracy and transparency. Valuation and Financial Modeling: CFOs work closely with the executive team, external advisors, and investment bankers to determine the company’s valuation. They develop financial models, assess growth projections, and analyze market comparables to arrive at a fair and realistic valuation range. Financial Documentation and Reporting: CFOs ensure that financial documentation and reporting are in order, accurate, and compliant with regulatory requirements. This includes preparing financial statements, management reports, and other financial disclosures necessary for the exit process. Negotiation and Deal Structuring: CFOs collaborate with legal and executive teams to negotiate the terms of the exit transaction. They provide financial insights and expertise to structure the deal in a way that maximizes value for the company and its stakeholders. Tax Planning and Optimisation: CFOs work closely with tax advisors to develop tax-efficient strategies for the exit transaction. They assess potential tax implications, explore tax-saving opportunities, and ensure compliance with applicable tax laws and regulations. Financial Communication and Investor Relations: CFOs play a critical role in communicating the financial aspects of the exit to internal and external stakeholders. They work with investor relations teams to ensure that key messages are effectively conveyed, providing transparency and clarity throughout the exit process. https://www.fdcapital.co.uk/podcast/the-vital-role-of-cfos-in-business-exit-preparation/ Tags Online Events Things To Do Online Online Seminars Online Business Seminars #business #cfo #preparation #exit #vital

The vital role of CFOs in business exit preparation
Delivered OnlineFlexible Dates
FREE

Cloud Fundamentals

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Sr. Systems Administrator Cloud Engineer Systems Engineer Sr. Network Administrator Sr. Network Engineer Cloud Specialist Cloud Project Manager Overview After completion of this course you will be able to describe: Cloud architecture and design Security within the cloud Automation and virtualization Troubleshooting and Disaster recovery High availability  This course covers in depth the skills and abilities needed to operate in the cloud, validating that candidates have the technical experience needed to deploy, secure, and automate environments regardless of the vendor solution. Understanding Cloud Concepts Topic 1A: Recognize Cloud Concepts Topic 1B: Recognize Cloud Terms Topic 1C: Understand the Troubleshooting Methodology Planning and Designing a Cloud Environment Topic 2A: Meet Cloud Business Requirements Topic 2B: Design Capacity Planning and Requirements Administering Cloud Resources Topic 3A: Manage Cloud Administration Topic 3B: Manage Compute Resources in the Cloud Topic 3C: Manage Memory Resources Managing Cloud Storage Topic 4A: Understand Cloud Storage Types Topic 4B: Configure Cloud Storage Solutions Topic 4C: Configure Cloud Storage Protocols and RAID Managing Networks in the Cloud Topic 5A: Deploying Cloud Network Services Topic 5B: Identify Cloud Network Infrastructure Components Securing and Troubleshooting Networks in the Cloud Topic 6A: Secure a Network in a Cloud Environment Topic 6B: Troubleshooting Cloud Connectivity Managing Cloud Migrations and Troubleshooting Cloud Deployments Topic 7A: Manage Cloud Migrations Topic 7B: Troubleshoot Cloud Deployment and Migration Issues Managing Cloud Automation and Orchestration Topic 8A: Understand Cloud Automation and Orchestration Techniques Topic 8B: Troubleshoot Automation and Orchestration in the Cloud Understanding Cloud Security Concepts Topic 9A: Administer Identity and Access Management in the Cloud Topic 9B: Manage Cloud Operating System and Application Security Topic 9C: Manage Data Security and Compliance in the Cloud Managing Cloud Security Topic 10A: Implement Security Measures in the Cloud Domain Topic 10B: Troubleshoot Cloud Security Managing Cloud Performance Topic 11A: Operate Efficiently in the Cloud Topic 11B: Accomplish Cloud Operations Tasks Topic 11C: Optimize Cloud Resources Topic 11D: Troubleshoot Common Cloud Performance Problems Managing Maintenance in the Cloud Topic 12A: Configure Logs, Monitoring, and Alerting for Cloud Services Topic 12B: Manage Backup and Restore in the Cloud Implementing High Availability and Disaster Recovery in the Cloud Topic 13A: Understand High Availability and Scaling in the Cloud Topic 13B: Manage Disaster Recovery in the Cloud Topic 13C: Incident Response Additional course details: Nexus Humans Cloud Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloud Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cloud Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Cloud on Dell: Deploy and Manage 2022

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Describe the business challenges that VMware Cloud on Dell EMC addresses Configure access to the vCenter Server instance Recognize the network configurations necessary to set up the VMware Cloud on Dell EMC Describe the NSX-T Data Center architecture in VMware Cloud on Dell EMC Recognize the storage options for VMware Cloud on Dell EMC Link a VMware Cloud on Dell EMC vCenter Server instance with an on-premises vCenter Single Sign-On domain Migrate workloads between your on-premises data center and VMware Cloud on Dell EMC Differentiate who is responsible for which maintenance tasks that correspond either to administrators or to VMware Recognize how VMware add-on solutions support VMware Cloud on Dell SDDC This course, equivalent to 4 days of training, provides you with the knowledge, skills, and tools for deploying and managing a VMware Cloud? on Dell EMC infrastructure. You explore the common use cases of the VMware Cloud on Dell EMC infrastructure that allows you to modernize, protect, and scale applications based on VMware vSphere© as well as workloads with compliance and residency requirements. In this course, you are introduced to various rapid and easy migration options for workloads based on vSphere to VMware Cloud on Dell EMC. In addition, you are presented with an overview of VMware HCX an application mobility platform that allows you to migrate your workloads between on-premises VMware vSphere and VMware Cloud on Dell EMC SDDC. Course Introduction Course Introduction Introduction to VMware Cloud on Dell EMC Choosing VMware Cloud on Dell EMC Management and operational structure Ordering and Site preparation Getting started with VMware Cloud on Dell EMC Ordering VMware Cloud on Dell EMC SDDC vSphere permissions on VMware Cloud on Dell EMC Billing and pricing on VMware Cloud services SDDC management Accessing vCenter Server SDDC Host management SDDC cluster management Creating Virtual Machines in SDDC Networking and Security SDDC Networks Networking and Security Options Storage Storage in VMware Cloud on Dell EMC Working with On-Premises vSphere Hybrid linked mode Migration Solutions for VMware Cloud on Dell EMC VM Migration with VMware HCX Maintaining and Troubleshooting Maintenance, Support, and Common Troubleshooting Steps Working with other VMware Products VMware vRealize Log Insight Cloud VMware Horizon with VMware Cloud on Dell EMC VMware vRealize Automation Using VMware vRealize Operations with VMware Cloud on Dell EMC Using VMware vRealize Network Insight? with VMware Cloud on Dell EMC Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Cloud on Dell: Deploy and Manage 2022 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Cloud on Dell: Deploy and Manage 2022 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Cloud on Dell: Deploy and Manage 2022
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Endpoint Protection 14.X - Configure And Protect

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions

Symantec Endpoint Protection 14.X - Configure And Protect
Delivered OnlineFlexible Dates
Price on Enquiry

CCSA PlusCCSE Check Point Certified Security Administrator and Expert Bundle

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for technical professionals who support, install, deploy or administer Check Point products. This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview CCSA Know how to perform periodic administrator tasks. Describe the basic functions of the Gaia operating system. Recognize SmartConsole features, functions, and tools. Understand how SmartConsole is used by administrators to give user access. Learn how Check Point security solutions and products work and how they protect networks. Understand licensing and contract requirements for Check Point security products. Describe the essential elements of a Security Policy. Understand the Check Point policy layer concept. Understand how to enable the Application Control and URL Filtering software. Blades to block access to various applications. Describe how to configure manual and automatic NAT. Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements. Describe different Check Point Threat Prevention solutions for network attacks. Articulate how the Intrusion Prevention System is configured, maintained and tuned. Understand the Infinity Threat Prevention system. Knowledge about Check Point's IoT Protect. CCSE Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. CCSA Outline Configure the Security Management Server. Use the WebUI to run the First Time Wizard. Install the Smart Console. Install the Alpha Gateway using the network detailed in the course topology. Demonstrate how the Security Management Server and Gateway communicate. Test SIC Status. Create multiple administrators and apply different roles and permissions for simultaneous administration. Validate existing licenses for products installed on the network. Create and configure host, network and group objects. Create a simplified Security Policy. Demonstrate how to use Security Zones in policy. Demonstrate how to share a layer between Security Polices. Configure Network Address Translation for server and network objects. Enable Identity Awareness. Deploy user access roles for more granular control of the security Policy. Generate network Traffic and use traffic visibility tools to monitor the data. Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic. CCSE Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent

CCSA PlusCCSE Check Point Certified Security Administrator and Expert Bundle
Delivered OnlineFlexible Dates
Price on Enquiry