• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

113 Courses in Leicester delivered On Demand

Certified Kubernetes Security Specialist (CKS) Course

By Packt

Want to learn about Kubernetes security or need to pass the Certified Kubernetes Security Specialist (CKS) exam? You are at the right place. A hands-on course to help you develop your Kubernetes security skills. You need to have a basic understanding of Kubernetes Administrator to get the best out of this course.

Certified Kubernetes Security Specialist (CKS) Course
Delivered Online On Demand6 hours 5 minutes
£19.99

70-413 - Designing and Implementing a Server Infrastructure (MCSE)

4.3(43)

By John Academy

Description: The 70-413 - Designing and Implementing a Server Infrastructure (MCSE) course will prepare you for the Exam 70-414: Implementing an Advanced Server Infrastructure. The course covers the advanced topics that IT professionals encounter in the enterprise environment. For passing the exam, you should have a thorough understanding of a fundamental server infra¬structure including monitoring, virtualisation, and high availability. There are four main objective areas on the 70-414 Exam which are discussed in the course thoroughly: Manage and maintain a server infrastructure Plan and implement a highly available enterprise infrastructure Plan and implement a server virtualisation infrastructure Design and implement identity and access solutions In the course, you will learn how to create the virtual infrastructure, plan and deploy virtual machines and implement solutions for the virtual administration. You will also learn about monitoring, high availability, updates, PKI, BCP and IDA. In short, the course will prepare you for the exam. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? 70-413 - Designing and Implementing a Server Infrastructure (MCSE) course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our 70-413 - Designing and Implementing a Server Infrastructure (MCSE) training course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Server Infrastructure - Upgrade and Migration Upgrade and Migration FREE 00:34:00 Windows Assessment and Deployment Kit (ADK) 00:20:00 HyperV Virtual Licensing 00:12:00 Cloning Domain Controllers 00:24:00 Imaging Strategies 00:19:00 Choosing a Deployment Method 00:07:00 Installing Windows AIK 00:07:00 New Features in Windows DS 00:04:00 Storage and File Services Storage and File Services 00:09:00 iSCSIes 00:14:00 DFS 00:15:00 Deploying and Configrueing DFS 00:14:00 BranchCache 00:06:00 Implementing BrancheCache 00:05:00 Discretionary Access Control 00:19:00 Resource Properties 00:09:00 Network Infrastructure Services Network Infrastructure Services 00:25:00 DHCP Server Placement Infrastructure 00:25:00 IPAM Definition and Benefits 00:25:00 DNS Namespace Design 00:26:00 DNS Records Needed by AD 00:09:00 DNS Design Considerations 00:11:00 Performance Monitor and DNS 00:08:00 Zone Transfers and Replications 00:09:00 Configuring Zone Transfers 00:05:00 Creating DNS Zones 00:08:00 DNS and High-Availability 00:11:00 Planning for External User Access Planning for External User Access 00:18:00 Authentication Protocols and Methods 00:15:00 Network Access Policies 00:10:00 Creating a VPN 00:18:00 Perimeter Networks 00:07:00 DirectAccess 00:16:00 RADIUS Authentication and NPS 00:10:00 Network Security 00:26:00 Connection Security Rules 00:03:00 Design and Implement Logical AD Infrastructure Design and Implement Logical AD Infrastructure 00:18:00 Guidelines for Designing AD DS Forests 00:19:00 Creating a Forest Root 00:18:00 Viewing and Editing the Schema 00:10:00 Creating a Forest Trust Part 1 00:06:00 Creating a Forest Trust Part 2 00:06:00 AD DS Domains 00:18:00 Install Second Domain Controller to Domain 00:12:00 Trust Relationships 00:29:00 OU Strategies 00:21:00 Exploring AD Permissions within OU Structure 00:09:00 Protecting OUs using PowerShell 00:08:00 Active Directory Groups 00:24:00 Creating Groups with Active Directory Administration Center 00:11:00 Creating Groups with PowerShell 00:05:00 Special Identities 00:05:00 D GPO AD GPO 00:14:00 Group Policy Categories 00:18:00 Group Policy Preferences 00:11:00 PowerShell Cmdlets 00:06:00 Designing a Physical AD Infrastructure Designing a Physical AD Infrastructure 00:19:00 Replication Topologies Ring 00:09:00 Site Links 00:12:00 Domain Controllers Domain Controllers 00:12:00 Best Practices Analyzer 00:07:00 HighAvailability 00:15:00 Mock Exam Mock Exam- 70-413 - Designing and Implementing a Server Infrastructure (MCSE) 00:20:00 Final Exam Final Exam- 70-413 - Designing and Implementing a Server Infrastructure (MCSE) 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

70-413 - Designing and Implementing a Server Infrastructure (MCSE)
Delivered Online On Demand14 hours 45 minutes
£23

AZ-900 | Microsoft Azure Fundamentals Full Course

4.3(43)

By John Academy

Course Overview Learn about the functions of Microsoft Azure from this AZ-900 | Microsoft Azure Fundamentals Full Course course. The course will give you a clear understanding of the basics of Microsoft Azure and how you can use this cloud platform to grow and strengthen your online existence. In this AZ-900 | Microsoft Azure Fundamentals Full Course course, you will learn about the tools and basic functions of Microsoft Azure. You will be familiarized with the core Azure services, security, privacy and compliance policies. This course will teach you how you can secure your website and account using multi-factor authentication and protect data from hackers. This course will also help you to understand the supports Azure can offer you and get the best suitable one for you. Microsoft Azure is one of the most popular and safe cloud platforms. This AZ-900 | Microsoft Azure Fundamentals Full Course course will teach you the functions of Microsoft Azure from scratch. You don't need any prior knowledge or technical background to understand the lessons of this course. Learning Outcomes familiarize with the fundamentals of cloud services Understand the benefits of using cloud services Learn about the differences between capital expenditure and operational expenditure Be able to compare and contrast the IAAS, PAAS and SAAS service Learn about different cloud models and how they work Understand the core Azure architectural components Learn about the solutions you will get from Azure Learn about the management tools of Azure Get to know about the security and private privacy protocols of Microsoft Azure Understand how Azure identity services work Familiarize with role-based access control system Understand the policies and compliance standards in Azure Who is this course for? This comprehensive AZ-900 | Microsoft Azure Fundamentals Full Course is ideal for those who want to learn more about the functions of Microsoft Azure. You will learn about the application of Microsoft Azure and the career prospect from this course. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path AZ-900 | Microsoft Azure Fundamentals Full Course is a useful qualification to possess and would be beneficial for any related profession or industry such as: Managers Managing Directors Management Executives Data Security Officers Programmers Microsoft Azure Developers Technicians Computer Operators Cloud Engineers Cloud Data Consultants Azure Consultants Data Scientists Course Introduction Introduction 00:04:00 Module 1 : Cloud Concepts What is Cloud Computing - I 00:05:00 What is Cloud Computing - II 00:06:00 Benefits of Cloud Computing 00:09:00 Key Concepts and Terminology 00:06:00 Economies of Scale 00:01:00 CapEx Vs OpEx 00:03:00 Cloud Models : What is Public Cloud 00:02:00 Cloud Models : Characteristics of Public Cloud 00:02:00 Cloud Models : What is Private Cloud 00:01:00 Cloud Models : Characteristics of Private Cloud 00:01:00 Cloud Models : Hybrid Cloud 00:01:00 Cloud Models : Characteristics of Hybrid Cloud 00:01:00 Review and What Next!! 00:01:00 What is IAAS 00:04:00 Use Cases of IAAS 00:02:00 What is PAAS ? 00:02:00 Use Cases of PAAS 00:04:00 What is SAAS ? 00:02:00 Cloud Models : Shared Responsibility Model 00:09:00 Module 2 : Core Azure Services Introduction 00:01:00 Azure Regions 00:01:00 Special Azure regions 00:01:00 Region pairs 00:01:00 Feature Availability Region Wise 00:01:00 Availability Zones 00:01:00 Availability Sets 00:02:00 What are Resource Groups? 00:02:00 Azure Resource Manager 00:01:00 What Next!! - Azure Core Services and Products 00:02:00 What is Azure Compute 00:01:00 Azure Virtual Machines - Audiocast Only 00:01:00 Azure Virtual Machines I - LAB 00:15:00 Azure Virtual Machines II - LAB 00:01:00 Azure Virtual Machines III - LAB 00:02:00 Azure Virtual Machines IV - LAB 00:04:00 Azure Virtual Machines V - LAB 00:03:00 Azure Virtual Machines VI - LAB 00:03:00 What are Containers? 00:04:00 Containers ( LAB Activity ) 00:07:00 Containers VS Virtual Machines 00:04:00 What Are Virtual Networks 00:01:00 Virtual Networks - LAB 00:15:00 Azure Load Balancer 00:01:00 VPN Gateway 00:01:00 Azure Application Gateway - I 00:02:00 Azure Application Gateway - II 00:01:00 Azure Content Delivery Networks (CDN's) 00:02:00 How CDN works ? 00:03:00 Azure CDN - Lab Activity 00:07:00 Azure Storage Services 00:01:00 Structured Data 00:01:00 Semi Structured Data 00:01:00 Unstructured Data 00:01:00 Azure Storage Account - Types 00:03:00 Azure Storage Account - Blob - Lab Activity - I 00:07:00 Azure Storage Account - Blog - Lab Activity - II 00:07:00 Azure Storage Account - Blob - Lab Activity - III 00:16:00 Azure Storage Account - Blog - Lab Activity - IV 00:09:00 Azure Storage Account - Blob - Lab Activity - V 00:04:00 Azure Storage Account - Blob - Lab Activity - VI 00:07:00 Azure Database Services 00:02:00 Azure SQL - Lab Demo 00:09:00 Azure MarketPlace 00:02:00 What is Internet of Things ( IOT ) - Intro 00:01:00 IOT Hub 00:01:00 IOT Hub Demo 00:09:00 Azure Big Data and Analytics 00:01:00 Azure SQL Data Warehouse 00:01:00 Azure HDInsights 00:01:00 Azure Data Lake Analytics 00:01:00 Machine Learning 00:02:00 Azure Machine Learning Services and Studio 00:02:00 What is Server less Computing ? 00:02:00 The concept of DevOps 00:03:00 Azure Management Tools 00:01:00 Creating Resources with Powershell - Lab Activity 00:05:00 Creating Resources with Azure CLI - Lab Activity 00:07:00 Provision Resources using Cloud Shell - Lab Activity 00:05:00 Deployment with JSON - Lab Activity 00:08:00 Azure Advisor 00:01:00 Module 2 : What did we learn 00:01:00 Module 3 Security, Privacy, Compliance and Trust What to expect in Module 3 00:01:00 Azure Firewalls 00:02:00 Azure Firewall - Lab Activity - notes 00:02:00 Azure Firewall - Lab Activity 00:19:00 Azure DDOS 00:02:00 Network Security Groups 00:03:00 Application Security Groups 00:02:00 Which Network Security Solution to choose from ? 00:04:00 AuthZ and AuthN 00:01:00 Azure Active Directory 00:02:00 Multi Factor Authentication 00:03:00 Azure Security Center 00:02:00 Azure Security center - LAB activity 00:08:00 Azure Key Vault 00:02:00 Azure Information Protection 00:02:00 Azure Advanced Threat Protection 00:04:00 What is Azure Policy 00:03:00 Azure Policy - Lab Activity 00:06:00 Azure Role Based Access Control ( RBAC ) 00:02:00 Azure Role Based Access Control ( RBAC ) - Lab Activity 00:07:00 Azure Locks 00:01:00 Azure Locks - Lab Activity 00:02:00 Azure Blueprints 00:01:00 Subscription Governance 00:02:00 Azure Tags 00:03:00 Azure Monitoring 00:02:00 Azure Monitor- Lab Activity 00:03:00 Azure Service Health 00:01:00 Monitoring Applications and Services 00:04:00 Compliance Terms and Requirements 00:02:00 Microsoft Privacy Statement 00:01:00 Microsoft Trust Center 00:01:00 Service Trust Portal 00:01:00 Azure Government Services 00:02:00 Azure Germany Services 00:01:00 Azure China 21Vianet 00:02:00 Module 4 : Azure Pricing and Support Module 4 Introduction : What tÌ¥o expect in this module 00:02:00 Azure Subscriptions 00:06:00 What are Management Groups 00:01:00 Purchase Azure Product & Services : Available Options 00:01:00 Usage Metrics 00:01:00 Factors Affecting Costs 00:02:00 The concept of Zones for Billing 00:02:00 Azure Pricing Calculator 00:04:00 Azure Total Cost of Ownership ( TCO ) 00:02:00 Ways to Minimize Costs in Azure 00:04:00 Azure Cost Management 00:02:00 Azure Support Plans 00:03:00 Alternative Support Options 00:02:00 Service Level Agreements ( SLA's ) 00:03:00 Composite SLA's 00:03:00 Improving Application SLA's 00:04:00 Public and Preview Features 00:01:00 Providing Feedback 00:01:00 General Availability 00:01:00 Azure Updates , Announcements and Roadmaps 00:01:00 Course Conclusion Course Conclusion 00:01:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

AZ-900 | Microsoft Azure Fundamentals Full Course
Delivered Online On Demand7 hours 12 minutes
£18

Cyber Security Awareness - Video Training Course

4.3(43)

By John Academy

Description: This Cyber Security Awareness - Video Training Course has been designed to allow the learner garner knowledge about security issues and the importance of safeguarding data. Here, you will learn all the techniques to prevent security attacks and protect valuable data. Any computer connected to the internet is vulnerable to a cyber-attack. In this course, you will learn about the basic terms like social engineering, identity theft, data classification, malware, piracy, etc. These terms are associated with the security of any business and/or home users. You will also learn about access control, network security, government litigation, and risk management, security software development, security architecture and design, disaster recovery planning, legal regulations, physical security, etc. These concepts and techniques will help you train yourself in this professional field and prevent any loss of information by making your security system formidable. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Cyber Security Awareness - Video Training Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Cyber Security Awareness - Video Training Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Course Overview Course Overview FREE 00:14:00 Types of Security Threats Types of Security Threats 00:29:00 Social Engineering Social Engineering 00:30:00 Identity Theft Identity Theft 00:29:00 Data Classification Data Classification 00:28:00 Types of Classifications 00:18:00 Protecting Your Digital Information Protecting Your Digital Information 00:45:00 Password Management 00:13:00 Malware Malware 00:17:00 Software Detection 00:28:00 Security from End-to-End Security from End-to-End 00:27:00 Secure E-mail Use 00:21:00 Secure Web Browsing 00:29:00 Piracy Piracy 00:16:00 Security Policies Security Policies 00:17:00 Moving Forward Moving Forward 00:12:00 Mock Exam Mock Exam- Cyber Security Awareness - Video Training Course 00:20:00 Final Exam Final Exam- Cyber Security Awareness - Video Training Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Cyber Security Awareness - Video Training Course
Delivered Online On Demand6 hours 53 minutes
£22

Azure - Networking

By iStudy UK

Azure Virtual Network gives you an isolated and highly-secure environment to run your virtual machines and applications. Use your private IP addresses and define subnets, access control policies, and more. Use Virtual Network to treat Azure the same as you would your own datacenter. The Azure - Networking is designed to introduce to virtual network configuration through the Microsoft Azure Portal and network configuration files. You'll also see how to use network services to configure and load balance network traffic using tools such as Azure DNS. Load Balancer, Azure Traffic Manager, and Application Gateway. And because this is about the cloud, you'll see how to connect your on-premises computers to Azure virtual networks as well as establishing connectivity between sites. The course guides you to configure a Point to Site VPN and a Site to Site VPN. On completion this course, you will look at Azure Vnet peering, and how peering between Vnets can reduce the need to build Vnet-to-Vnet VPN gateways. What Will I Learn? Create a Vnet Configure a Point to Site VPN Understand Vnet Peering Understand DNS in Azure Vnets Who is the target audience? People interested in learning Networking Basics in Azure Requirements Some prior knowledge in Azure is required, or the completion of Introduction to Azure course Introduction Introduction FREE 00:02:00 Virtual Networks Virtual Network Overview 00:02:00 IP Address Space 00:03:00 DNS in Azure Vnets 00:03:00 Creating a VNet 00:03:00 VPNs with VNets 00:04:00 Configuring a Point to Site VPN 00:12:00 Configure Site to Site VPN 00:05:00 Azure Vnet Peering 00:02:00 Conclusion Course Recap 00:04:00 Course Certification

Azure - Networking
Delivered Online On Demand40 minutes
£25

Cyber Security Officer Training - Complete Video Course

4.3(43)

By John Academy

Description: The Cyber Security Officer Training - Complete Video Course course is designed for the people who want to work as a cybersecurity professional and want to increase their knowledge regarding the cybersecurity. The course is sectioned into several part or chapters. Each focuses on a particular topic that will help you to be an excellent cyber security officer. At first, the course shows you the basics of ethical hacking including protocols, Windows hacking, attacking web technologies, etc. in the Ethical Hacking section. Then you will know the advanced techniques of becoming an ethical hacker and know the procedures of getting certification for ethical hacking. Then in part named Penetration Testing Consultant (CPTC), you will be introduced to the concept of packet capturing, Layer 2 attacks, Layer 3 attacks on Cisco-based infrastructures, VPN attacks, etc. In the next course, you will learn the advanced features of penetration testing. After that, the course, you will know about the web application security, Security Leadership Process, how to be a security Sentinel, etc. Finally, you will know the techniques of vulnerability assessments so that you can prevent severe break-ins to your company. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Cyber Security Officer Training - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Cyber Security Officer Training - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Ethical Hacking Overview FREE 00:35:00 Reconnaissance 00:25:00 Protocols 01:25:00 Windows Hacking 01:19:00 Attacking Web Technologies 00:56:00 Pen Testing Wireless Networks 01:34:00 Professional Hacking Security Fundamentals FREE 00:51:00 Access Controls 00:33:00 Protocols 00:36:00 Cryptography 00:52:00 Why Vulnerability Assessments? 00:36:00 Vulnerability Tools of the Trade 00:10:00 Output Analysis and Reports 00:13:00 Reconnaisance, Enumeration and Scanning 00:51:00 Gaining Access 00:31:00 Maintaining Access 00:17:00 Covering Tracks 00:18:00 Malware 00:09:00 Buffer Overflows 00:22:00 Password Cracking 00:33:00 Penetration Testing I Packet Capturing 00:38:00 Layer 2 Attacks 00:59:00 Layer 3 Attacks on Cisco Based Infrastructures 01:09:00 Pivoting and Relays 00:20:00 IPv6 Attacks 00:49:00 VPN Attacks 00:38:00 Defeating SSL 00:48:00 IDS/IPS Evasion 01:11:00 Penetration Testing II Logistics of Pen Testing FREE 00:25:00 Linux Fundamentals 00:22:00 Information Gathering 00:38:00 Detecting Live Systems 00:34:00 Enumeration 00:25:00 Vulnerability Assessments 00:20:00 Malware Goes Undercover 00:28:00 Windows Hacking 00:39:00 Hacking UNIX/Linux 00:36:00 Advanced Exploitation Techniques 00:28:00 Pen Testing Wireless Networks 00:34:00 Networks, Sniffing and IDS 00:42:00 Injecting the Database 00:26:00 Attacking Web Technologies 00:30:00 Project Documentation 00:17:00 Web Application Security Web Application Security FREE 01:20:00 Secure SDLC 00:26:00 OWASP TOP 10 00:28:00 Risk Management 00:35:00 Threat Modeling 00:18:00 Authentication and Authorization Attacks 00:24:00 Session Management 00:35:00 Security Architecture 00:29:00 Input Validation and Data Sanitization 00:24:00 AJAX Security 00:05:00 Insecurity Code Discovery and Mitigation 00:39:00 Application Mapping 00:07:00 Cryptography 00:28:00 Testing Methodologies 00:31:00 Security Leadership Security Management FREE 00:58:00 Risk Management 00:35:00 Encryption 00:31:00 Information Security - Access Control Concepts 00:31:00 Incident Handling and Evidence 01:01:00 Operations Security 00:48:00 Knowing Network Security 01:12:00 Security Sentinel Basic Security FREE 00:17:00 User Awareness 00:27:00 Implementing Countermeasures 00:09:00 Certified Security Sentinel 00:16:00 Using the Internet at Work 00:23:00 Accessing the Company's Network Through Your Assigned Computer 00:19:00 Accessing the Corporate Network Remotely 00:09:00 Social Engineering 00:13:00 Understanding and Manipulating our Target 00:16:00 Researching Our Target 00:11:00 Vulnerability Assessment Why Vulnerability Assessment FREE 00:46:00 Vulnerability Types 00:23:00 Assessing the Network 00:40:00 Assessing Web Servers & Applications 00:27:00 Assessing Remote & VPN Services 00:17:00 Vulnerability Assessment Tools of the Trade 00:15:00 Output Analysis 00:12:00 Mock Exam Mock Exam- Cyber Security Officer Training - Complete Video Course 00:30:00 Final Exam Final Exam- Cyber Security Officer Training - Complete Video Course 00:30:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Cyber Security Officer Training - Complete Video Course
Delivered Online On Demand46 hours
£22

Advanced SQL Training Online

By Study Plex

Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction Course Overview! 00:04:00 Installation And Getting Started The Final Milestone! 00:01:00 Installing and setting up PostgreSQL 00:09:00 Case Study : Demo Case Study Part 1 00:04:00 Case Study Part 2 00:06:00 Fundamental SQL statements CREATE 00:11:00 Exercise 1: Create DB and Table 00:01:00 INSERT 00:09:00 Import data from File 00:05:00 Exercise 2: Inserting and Importing 00:01:00 SELECT statement 00:03:00 SELECT DISTINCT 00:06:00 WHERE 00:04:00 Logical Operators 00:06:00 Exercise 3: SELECT & WHERE 00:01:00 UPDATE 00:05:00 DELETE 00:04:00 ALTER 00:17:00 Exercise 4: Updating Table 00:01:00 Restore And Back-Up Restore and Back-up 00:07:00 Exercise 5: Restore and Back-up 00:01:00 Selection Commands: Filtering IN 00:04:00 BETWEEN 00:05:00 LIKE 00:08:00 Exercise 6: In, Like & Between 00:01:00 Selection Commands: Ordering Side Lecture: Commenting in SQL 00:01:00 ORDER BY 00:07:00 LIMIT 00:03:00 Exercise 7: Sorting 00:01:00 Alias AS 00:03:00 Aggregate Commands COUNT 00:05:00 SUM 00:03:00 AVERAGE 00:03:00 MIN & MAX 00:04:00 Exercise 8: Aggregate functions 00:01:00 Group By Commands GROUP BY 00:12:00 HAVING 00:05:00 Exercise 9: Group By 00:01:00 Conditional Statement CASE WHEN 00:05:00 Joins Introduction to Joins 00:02:00 Inner Join 00:08:00 Left Join 00:07:00 Right Join 00:06:00 Full Outer Join 00:05:00 Cross Join 00:04:00 Except 00:03:00 Union 00:03:00 Exercise 10: Joins 00:01:00 Subqueries Subqueries 00:14:00 Exercise 11: Subqueries 00:01:00 Views And Indexes VIEWS 00:07:00 INDEX 00:06:00 Exercise 12: Views 00:01:00 String Functions LENGTH 00:03:00 Upper Lower 00:02:00 REPLACE 00:04:00 TRIM, LTRIM, RTRIM 00:07:00 CONCATENATION 00:03:00 SUBSTRING 00:06:00 LIST AGGREGATION 00:05:00 Exercise 13: String Functions 00:02:00 Mathematical Functions CEIL & FLOOR 00:03:00 RANDOM 00:05:00 SETSEED 00:04:00 ROUND 00:02:00 POWER 00:02:00 Exercise 14: Mathematical Functions 00:01:00 Date-Time Functions CURRENT DATE & TIME 00:04:00 AGE 00:03:00 EXTRACT 00:08:00 Exercise 15: Date-time functions 00:01:00 Pattern (String) Matching PATTERN MATCHING BASICS 00:07:00 ADVANCE PATTERN MATCHING (REGULAR EXPRESSIONS) 00:15:00 Exercise 16: Pattern Matching 00:01:00 Data Type Conversion Functions Converting Numbers/ Date to String 00:11:00 Converting String to Numbers/ Date 00:06:00 User Access Control Functions User Access Control 00:13:00 Bonus Section: Nail That Interview! Tablespace 00:05:00 PRIMARY KEY & FOREIGN KEY 00:05:00 ACID compliance 00:06:00 Truncate 00:04:00 Performance Tuning Tips TIP 1 (EXPLAIN) 00:04:00 TIP 2 00:01:00 TIP 3 00:02:00 TIP 4 (VACCUM) 00:01:00 TIP 5 00:02:00 TIP 6 (STRING FUNCTIONS) 00:02:00 TIP 7 (JOINS) 00:02:00 TIP 8 (SCHEMAS) 00:04:00 Bonus Section : Database Basics What is SQL 00:02:00 Tables and DBMS 00:03:00 Types of SQL commands 00:04:00 PostgreSQL 00:02:00 The Final Milestone! 00:01:00 Supplementary Resources Supplementary Resources - SQL Masterclass 00:00:00 Assessment Assessment - SQL Masterclass 00:10:00 Certificate of Achievement Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Advanced SQL Training Online
Delivered Online On Demand
£19

CompTIA Security+ (SY0-401) Complete Training

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 10 Hours Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about CompTIA Security networking Understand the core competencies and principles of CompTIA Security networking Explore the various areas of CompTIA Security networking Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert networking engineer CompTIA Security+ (SY0-401) Complete Training Course Master the skills you need to propel your career forward in CompTIA Security networking . This course will equip you with the essential knowledge and skillset that will make you a confident networking engineer and take your career to the next level. This comprehensive compTIA security course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this compTIA security course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective CompTIA Security networking practice and equip you with the essential skills, confidence and competence to assist you in the CompTIA Security networking industry. You'll gain a solid understanding of the core competencies required to drive a successful career in CompTIA Security networking . This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for networking engineer or for people who are aspiring to specialise in CompTIA Security networking . Enrol in this compTIA security course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive compTIA security course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this CompTIA Security networking can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This compTIA security course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This compTIA security course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This compTIA security course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction to the Security+ course Introduction To The Section 00:01:00 Risk Assessment Learning Risk Assessment For Security 00:23:00 Computing Risk Assessment 00:18:00 Additional Risk Terminology 00:12:00 Acting On Your Risk Assessment 00:11:00 Risk Associated with Cloud Computing 00:08:00 Risk Associated With Virtualization 00:05:00 Summary Of Section 00:03:00 Understanding the Guidelines and Standards of Networking Developing Policies, Standards, And Guidelines 00:06:00 Implementing Policies 00:12:00 Understanding Control Types And False Positives/Negatives 00:08:00 Undertaking Business Impact Analysis 00:13:00 Disaster Recovery 00:10:00 Summary Of Section 00:04:00 Actively monitoring and servicing your network Network Monitors 00:05:00 Monitoring system logs 00:05:00 Understanding Hardening 00:06:00 Working With Services 00:12:00 Summary Of Section 00:03:00 Tools and Services to secure your network Securing The Network 00:06:00 Security Posture 00:13:00 Reporting Security Issues 00:08:00 Detection Controls vs. Prevention Controls 00:06:00 Summary Of Section 00:04:00 The TCP/IP Suite and It's Protocols Mastering TCP/IP 00:26:00 Protocols And Services 00:08:00 Summary Of Section 00:05:00 Networks Designing A Secure Network 00:39:00 Understanding The Various Network Infrastructure Devices 00:24:00 Intrusion Detection Systems 00:24:00 Network Based IDS 00:09:00 Working With NIPS 00:13:00 Summary Of Section 00:10:00 Access Control, Authentication and Authorization Understanding Access Control Basics 00:21:00 Working With Radius 00:14:00 Protecting Wireless Networks Working With Wireless Systems 00:17:00 Wireless Vulnerabilities To Know 00:21:00 Working with Virtualization and Cloud Computing Working With Cloud Computing 00:16:00 Working With Virtualization 00:16:00 Security Application Security 00:22:00 Best Practices For Security 00:09:00 Malware Vulnerabilities and Threats Malware Vulnerabilities And Threats 00:29:00 Summary of Course Summary Of Course 00:21:00 Assessment Assessment - CompTIA Security+ (SY0-401) Complete Training 00:10:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

CompTIA Security+ (SY0-401) Complete Training
Delivered Online On Demand
£19

Learn Python and Ethical Hacking from Scratch

By Packt

This course is designed to help you understand the basic and advanced concepts of ethical hacking with ease. The course features interesting examples and coding activities in each video to keep you engaged and guides you effectively through writing programs to hack a system.

Learn Python and Ethical Hacking from Scratch
Delivered Online On Demand24 hours 35 minutes
£13.99

Certified Information Systems Professional - Complete Video Training

4.3(43)

By John Academy

Description: A certificate in Information technology from an internationally recognized institution will increase your career opportunity very much. The Certified Information Systems Professional - Complete Video Training course provides you extensive lessons about the Information System field. Divided into four parts, the course teaches you how to be a certified auditor, security manager, security officer and security professional. Certified Information Systems Auditor (CISA) section illustrates you the process of auditing information systems while the Certified Information Security Manager (CISM) part deals with the information security issues. Here, you will learn the system of information security program development, incident management, and risk management. Next, Certified Information Systems Security Officer (CISSO) course teaches how to be an excellent information system security officer by utilising the information system in the security field. Finally, the Certified Information Systems Security Professional (CISSP) section shows you the path for becoming a security professional by focusing the security issues such as asset security, communication and network security, security operations, etc. In short, the bundle video course will help you to achieve certification in above four fields and helps you to know the practical knowledge about Information System. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Information Systems Professional - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Information Systems Professional - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. The Process of Auditing Information Systems Management of the Audit Function FREE 00:20:00 ISACA IT Audit and Assurance Standards and Guidelines 01:16:00 Risk Analysis 00:21:00 Internal Controls 00:17:00 Performing An IS Audit 01:07:00 Control Self-Assessment 00:09:00 The Evolving IS Audit Process 00:12:00 Governance and Management of IT Corporate Governance 00:06:00 IT Governance 00:02:00 IT Monitoring and Assurance Practices for Board and Senior Management 00:40:00 Information Systems Strategy 00:05:00 Maturity and Process Improvement Models 00:01:00 IT Investment and Allocation Practices 00:05:00 Policies and Procedures 00:17:00 Risk Management 00:31:00 IS Management Practices 00:50:00 IS Organizational Structure and Responsibilities 00:17:00 Auditing IT Governance Structure and Implementation 00:06:00 Business Continuity Planning 00:37:00 Information Systems Acquisition, Development and Implementation Business Realization 01:21:00 Project Management Structure 00:08:00 Project Management Practices 00:18:00 Business Application Development 00:42:00 Business Application Systems 00:38:00 Alternative Forms of Software Project Organization 00:03:00 Alternative Development Methods 00:10:00 Infrastructure Development/Acquisition Practices 00:09:00 Information Systems Maintenance Practices 00:09:00 System Development Tools And Productivity Aids 00:05:00 Business Process Reengineering And Process Change Projects 00:08:00 Application Controls 00:07:00 Auditing Application Controls 00:14:00 Auditing Systems Development, Acquisition And Maintenance 00:08:00 Information Systems Operations, Maintenance and Support Information Systems Operations 00:19:00 Information Systems Hardware 00:13:00 IS Architecture and Software 00:39:00 Network Infrastructure 01:16:00 Disaster Recovery Planning 00:19:00 Protection of Information Assets Importance Of Information Security 00:43:00 Logical Access 00:37:00 Network Infrastructure Security 00:39:00 Auditing Information Security Management Framework 00:03:00 Auditing Network Infrastructure Security 00:13:00 Environmental Exposures and Controls 00:02:00 Physical Access Exposures and Controls 00:05:00 Mobile Computing 00:05:00 Information Security Governance Information Security Governance Overview FREE 00:25:00 Effective Information Security Governance 00:24:00 Information Security Concepts and Technologies 00:20:00 Information Security Manager 00:09:00 Scope and Charter of Information Security Governance 00:10:00 Information Security Governance Metrics 00:23:00 Information Security Strategy Overview 00:02:00 Creating Information Security Strategy 00:36:00 Determining Current State Of Security 00:06:00 Information Security Strategy Development 00:10:00 Strategy Resources 00:40:00 Strategy Constraints 00:07:00 Action Plan to Implement Strategy 00:20:00 Information Risk Management Risk Management Overview 00:16:00 Good Information Security Risk Management 00:15:00 Information Security Risk Management Concepts 00:13:00 Implementing Risk Management 00:17:00 Risk Assessment 00:39:00 Controls Countermeasures 00:23:00 Recovery Time Objectives 00:18:00 Risk Monitoring and Communication 00:04:00 Information Security Program Development Development of Information Security Program 00:11:00 Information Security Program Objectives 00:09:00 Information Security Program Development Concepts 00:14:00 Scope and Charter of Information Security Program Development 00:22:00 Information Security Management Framework 00:16:00 Information Security Framework Components 00:12:00 Information Security Program Resources 01:04:00 Implementing an Information Security Program 00:27:00 Information Infrastructure and Architecture 00:14:00 Information Security Program 00:14:00 Security Program Services and Operational Activities 00:45:00 Information Security Incident Management Incident Management Overview 00:28:00 Incident Response Procedures 00:29:00 Incident Management Organization 00:19:00 Incident Management Resources 00:36:00 Incident Management Objectives 00:14:00 Incident Management Metrics and Indicators 00:17:00 Current State of Incident Response Capability 00:11:00 Developing an Incident Response Plan 00:32:00 BCP DRP 00:36:00 Testing Response and Recovery Plans 00:10:00 Executing the Plan 00:27:00 Information Systems Security Officer Risk Management FREE 00:58:00 Security Management 00:58:00 Authentication 01:01:00 Access Control 01:20:00 Security Models 01:01:00 Operations Security 01:10:00 Symmetric Cryptography and Hashing 01:19:00 Asymmetric Cryptography and PKI 01:31:00 Network Connections 01:28:00 Network Protocols and Devices 01:31:00 Telephony, VPNs and Wireless 01:13:00 Security Architecture 01:02:00 Software Development Security 01:05:00 Database Security and System Development 01:00:00 Malware and Software Attacks 00:17:00 Business Continuity 00:44:00 Disaster Recovery 00:53:00 Incident Management, Law, and Ethics 01:06:00 Physical 00:38:00 Information Systems Security Professional Security and Risk Management FREE 00:24:00 Asset Security 00:12:00 Security Engineering 00:15:00 Communication and Network Security 00:10:00 Identity and Access Management 00:10:00 Security Assessment and Testing 00:12:00 Security Operations 00:36:00 Software Development Security 00:13:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Information Systems Professional - Complete Video Training
Delivered Online On Demand48 hours
£22