• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

35680 Courses in Bradford delivered Online

Excel (but not like you've seen it before)

By Alumno Consulting

Excel but different. Harness this most powerful tool but on a course tailored to your business and needs. Using case studies relevant to your business and often actual files your firm uses on a daily basis we embark on a voyage of discovery. This isn't a boring "watch what I do and copy" course. This is exciting, engaging, funny and enjoyable. Delegates will learn relevant skills but also, because of the delivery methods they will gain an increased enjoyment of using Excel and will retain and implement all of the material covered. They also have access to the trainer for an unlimited amount of time after the course to continue to grow their knowledge

Excel (but not like you've seen it before)
Delivered in Internationally or OnlineFlexible Dates
£1,500

Ultimate Microsoft Training: Excel, Word, PowerPoint, Access and more

4.9(27)

By Apex Learning

Let's give you three situations: Firstly, you need to write down a formal letter Then, your boss asks for annual employment records Finally, you have to make a presentation for the next conference How do you complete these tasks? Do you start making posters for your presentation or start calculating the records on hand? You can not imagine doing that this way. Right? Because it's time-consuming. You probably want to use software where you can complete your work efficiently. One of these software is Microsoft Office which most companies use. So, acquire your knowledge and expertise in Microsoft Office and flourish in your career. Apex Learning is offering you a comprehensive Microsoft Training course, where you can learn from the basics to advanced levels to learning about Microsoft Word, Microsoft PowerPoint, Microsoft Excel and many more. So, join this course for further learning! We included the latest knowledge about Microsoft to make you an exceptional candidate and well fit for the position. So, go through our learning material and acquire how to add, delete, and attach data, tables and pictures. Moreover, learn how to calculate data in Excel, how to create slides on PowerPoint and how to write documents in Word from this course. So, if you are keen to advance your skills in Microsoft Office, enrol in our Microsoft Training course now. Furthermore, to help you showcase your expertise in Microsoft, we have prepared a special gift of 1 hardcopy certificate and 1 PDF certificate for the title course completely free of cost. These certificates will enhance your credibility and encourage possible employers to pick you over the rest. This Microsoft Training Bundle Consists of the following Premium courses: Course 01: Microsoft SQL Server Development for Everyone Course 02: MS Word Diploma Course 03: Advanced Diploma in MS Excel Course 04: PowerPoint Diploma Course 05: The Complete Microsoft OneDrive Course Course 06: The Complete Microsoft Outlook Masterclass Course 07: Course 08: Complete Microsoft Power BI 2021 Course 09: Microsoft Teams Course 10: Course 11: Touch Typing Essentials Course 12: GDPR Data Protection Level 5 Course 13: Functional Skills IT Course 14: Time Management Learning outcomes: After completing this Microsoft Training course, learners will be able to: Learn about the fundamentals of Microsoft from this course Acquire how to work in Microsoft Word, Microsoft Excel and Microsoft PowerPoint Know more about attaching, adding, editing and deleting data in excel Deepen your understanding of managing various work in Microsoft Office Equip yourself with the knowledge of Microsoft office and advance your career in the future So, what are you waiting for? Enrol in the Microsoft Training course and start your learning journey now! The bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your Microsoft Trainingexpertise and essential knowledge, which will assist you in reaching your goal. Enrol now in Microsoft Training to advance your career, and use the premium study materials from Apex Learning. CPD 150 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Microsoft Training course is designed for everyone. More suitable for Students Recent Graduate A beginner who wants to learn about Microsoft Office An expert who wants to improve their skills in Microsoft Office Anyone with a knack for learning about Microsoft Office Requirements You don't need any specific skills or qualifications to enrol in this Microsoft Training course. Career path The expertise and knowledge you will gain after the completion of this Microsoft Training course will help you grab various opportunities, such as; Office Administrator Data Analyst Microsoft Security Specialist IT Support Analyst Software Tester The annual salary of these positions is between£25,000 - £50,000 per annum in the UK. Certificates Certificate of completion Digital certificate - Included

Ultimate Microsoft Training: Excel, Word, PowerPoint, Access and more
Delivered Online On Demand
£69

55238 SharePoint Online for Administrators

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for Administrators who need to setup, configure and manage SharePoint Online as part of their Office 365 Administration. Overview After completing this course, students will gain the skills to: - Understand the architecture of SharePoint Online - Have knowledge of all the components in SharePoint Online - Have on hands on experience configuring the components of SharePoint Online - Have hands on experience configuring the options - Work with Site Collections and storage options - Manage user profiles and social profiling - Understand and configure data connectivity in SharePoint Online - Build a taxonomy structure - Understand and configure Search in SharePoint Online - Configure and deploy apps - Understand and define Enterprise content management and data loss prevention. - Configure additional options and features in SharePoint Online such as Information Rights Management This course will introduce the audience to SharePoint Online Administration in Office 365 and explain and demonstrate the configuration options for SharePoint Online. The course is appropriate for existing SharePoint on-premises administrators and new administrators to Office 365 who need to understand how to correctly setup SharePoint Online for their company. The course will also help SharePoint on-premise administrators understand the differences between SharePoint on-premises and SharePoint Online. 1 - INTRODUCTION TO OFFICE 365 AND SHAREPOINT ONLINE Introduction to the Office 365 Administration Center Configure Reporting Accessing SharePoint management tools Accessing security and compliancy Managing Office 365 and SharePoint Online with PowerShell Comparing On Premises SharePoint with SharePoint Online User identity in Office 365 and SharePoint Online Manging user domains Building Hybrid scenarios OneDrive and Sites redirection Yammer redirection Understand hybrid search Hybrid business data connectivity Hybrid taxonomy 2 - WORKING WITH SITE COLLECTIONS Introduction to classic and modern admin centers Creating Site Collections Defining ownership and security for site collections Configuring Storage Configure External Access to site collections Recovering site collections Configure external sharing Managing site collections with PowerShell 3 - MANAGING USER PROFILES Overview of the profile service Defining profile properties Map profile properties to a term store Creating custom profile properties Managing audiences Creating audiences Managing user profile policies Configure trusted my site host locations Configure preferred search center locations Defining read access permission levels Configuring newsfeed options Setup email notifications Configure my site cleanup 4 - WORKING WITH DATA CONNECTIONS Introduction to Data Connections Overview of PowerApps, Flow and PowerBi Overview of the business connectivity service Introduction to BDC definition files Creating BDC definition files Introduction to the secure store service Configuring the secure store service Creating secure store target application settings Configure connections to cloud services Configure connections to on-premises services Tools to build data connections Creating external content types Building external lists using external data 5 - MANAGING THE TERM STORE Overview of the term store Understanding terms and life cycle management Creating term groups Creating the term store Creating Term Sets in the UI Creating Term Sets via importing via a CSV Creating terms in the UI Creating terms via PowerShell and CSOM Manage terms with synonyms and pinning Configure delegated administration 6 - CONFIGURING SEARCH An Introduction to the search service Classic versus Modern search experience Understanding Managed Properties Create Managed Properties Manage Authoritative pages Understand Result sources Create and configure result sources Understand Query rules Promoting results through query rules Remove search results from the index Exporting search configurations Importing search configurations 7 - CONFIGURING APPS An Introduction to Apps Understanding the App Catalog Building the App catalog Adding Apps to the catalog Add Apps to your SharePoint sites Adding Apps via the marketplace store Manage App licensing Configure store access settings Monitoring app usage 8 - ENTERPRISE CONTENT MANAGEMENT IN SHAREPOINT ONLINE An Introduction to ECM in SharePoint Online Components of ECM Office 365 versus classic compliancy Understanding In-Place records management Configure In-Place records management Understanding the records center Build and configure a records center Understanding the compliancy policy center Build a compliancy policy center and configure policies Discover the security and compliancy center Configure an eDiscovery center Build an eDiscovery case Understand data loss prevention Build a data loss prevention policy and query Working with classification and data governance 9 - MANAGE OPTIONS FOR SHAREPOINT ONLINE Configure OneDrive features Configure use of Yammer or Newsfeeds Understand Information Rights Management Configure Information Rights Management Define site classification options Understand early release options for Office 365 Configure Early release options for your Office 365 tenant Manage Access Control Additional course details: Nexus Humans 55238 SharePoint Online for Administrators training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55238 SharePoint Online for Administrators course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55238 SharePoint Online for Administrators
Delivered OnlineFlexible Dates
£1,785

Certified Wireless Network Administrator

5.0(3)

By Systems & Network Training

CWNA training course description A hands-on course focusing on the technical support of WiFi. Wireless LANs are often seen as simple communications that are simply installed and then left alone to work. This course ensures that delegates will be able to install WiFi networks which work but also enable the delegates to troubleshoot WiFi when it does go wrong. What will you learn Compare 802.11 standards. Configure WiFi networks. Troubleshoot WiFi networks using spectrum analysers, Wireshark and other tools. Implement 802.11 security. Perform RF surveys. CWNA training course details Who will benefit: Technical staff working with WiFi networks. Anyone wishing to pass the CWNA exam. Prerequisites: Intro to data communications & networking Duration 5 days CWNA training course contents Introduction History, standards. RF fundamentals What is RF? Wavelength, Frequency, Amplitude, Phase. Wave behaviour. RF components. Watts, mW, dB, SNR, Link budgets. Hands on Spectrum analysis. Listing WiFi networks. WiFi connection. inSSIDer. Antennas Radiation envelopes, polar charts, gain, Antenna types. Line of Sight, MIMO. Hands on Connecting, installing, changing antennae. RSSI values. 802.11 802.11-2007, 802.11 post 2007, 802.11 drafts. 802.11 b/g/n. Hands on WiFi performance measurement. Spread Spectrum RF frequency bands, FHSS, DSSS, OFDM. Channels. Hands on Configuring channels. Topologies Mesh, Access points, distribution systems, SSID. Hands on AP configuration. Client connection profiles. 802.11 MAC CSMA/CA, Management frames, control frames, data frames. Passive scanning, active scanning. Open system authentication. Shared Key authentication. Association. RTS/CTS. Power management. Hands on Capturing frames, analysing frames. WiFi architecture WiFi client, WLAN architecture: Autonomous, Centralised, distributed. WiFi bridges. WiFi routers. PoE. Hands on WLAN controllers. Troubleshooting RF interference, multipath, adjacent channels, low SNR, mismatched power. Coverage, capacity. 802.11 Security Basics, Legacy security: WEP, MAC filters, SSID cloaking. PSK, 8021.X/EAP, WPA/WPA2. TKIP/ CCMP encryption. Guest WLANs. Wireless attacks, intrusion monitoring. Hands on WEP cracking, WPA2 configuration. RADIUS. RF Site surveys Protocol and spectrum analysis, coverage analysis. Site survey tools. Hands on Performing a site survey.

Certified Wireless Network Administrator
Delivered in Internationally or OnlineFlexible Dates
£2,797

55348 Administering Microsoft Endpoint Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment. Analyze data by using queries and reports. Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Intune. Deploy and manage the Configuration Manager client. Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. Identify and configure the most appropriate method to distribute and manage content used for deployments. Distribute, deploy, and monitor applications for managed users and systems. Maintain software updates for PCs that Configuration Manager manages. Implement Endpoint Protection for managed PCs. Configure an operating-system deployment strategy by using Configuration Manager. Manage and maintain a Configuration Manager site. This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports. Although this course and the associated labs are written for Microsoft Endpoint Configuration Manager and Windows 11, the skills taught will also be backwards compatible with previous editions of System Center Configuration Manager and Windows 10. Prerequisites Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing. Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management. Installation, configuration, and troubleshooting for Windows-based personal computers. Basic concepts of public key infrastructure (PKI) security. Basic understanding of scripting and Windows PowerShell syntax. Basic understanding of Windows Server roles and services. Basic understanding of the configuration options for iOS and Android Mobile device platforms. 1 - Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site 2 - Analyzing data using queries, reports, and CMPivot Introduction to queries Configuring SQL Server Reporting Services Analyzing the real-time state of a device by using CMPivot 3 - Preparing the Configuration Manager management infrastructure Configuring site boundaries and boundary groups Configuring resource discovery Organizing resources using device and user collections 4 - Deploying and managing the Configuration Manager client Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings and performing management operations 5 - Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence 6 - Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points 7 - Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying and managing Windows apps 8 - Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Enabling third-party updates 9 - Implementing Defender Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Configuring and deploying advanced threat policies 10 - Managing compliance and secure data access Overview of Compliance Settings Configuring compliance settings Viewing compliance results Managing resource and data access 11 - Managing operating system deployment An overview of operating system deployment Preparing a site for operating system deployment Deploying an operating system Managing Windows as a service 12 - Managing and maintaining a Configuration Manager site Configuring role-based administration Configuring Remote Tools Overview of Configuration Manager site maintenance and Management Insights Backing up and recovering a Configuration Manager site Updating the Configuration Manager infrastructure 13 - What?s new in Microsoft Endpoint Configuration Manager Whats new in Microsoft Endpoint Manager covering each semi annual release Additional course details: Nexus Humans 55348: Administering Microsoft Endpoint Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55348: Administering Microsoft Endpoint Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55348 Administering Microsoft Endpoint Configuration Manager
Delivered OnlineFlexible Dates
£2,975

The Online NLP Practitioner Training

By Ely Wellbeing

•The Online NLP Practitioner Training is a comprehensive program that will provide you with the tools and techniques you need to overcome your chronic pain and mental health conditions. • The program includes a printable digital copy of the NLP Practitioner Manual, access to the video recording of the training, ‘live’ online demonstrations of the techniques in action on yourself, online support for one year by way of group calls, and assistance set up your business website. • This program is perfect for anyone who wants to achieve positive change in their lives! Whether you’re a self-starter who is interested in self-development or a professional who is seeking career development and job fulfilment.

The Online NLP Practitioner Training
Delivered OnlineJoin Waitlist
£2,000

CIPD Level 5 Associate Diploma in People Management

5.0(5)

By Hrc Online

At HRC, our overarching mission revolves around ensuring accessibility to CIPD qualifications for everyone, irrespective of their time constraints or availability. We firmly believe that the vision of a world with better-supported employees hinges upon the leadership of qualified HR professionals who spearhead this transformation. Our values are rooted in simplicity: we direct our energy towards your achievement, relentlessly strive to aid others in reaching their objectives, and actively dismantle barriers to education. These principles are exemplified by our pioneering initiative, the First Module Free offer, granting everyone the opportunity to engage with the introductory segment of our CIPD course at no cost. Our team of seasoned tutors understands the rigorous demands of succeeding in CIPD courses – a journey that necessitates diligence, dedication, and the right guidance. In this pursuit, we equip you with The HRC Online Environment, an all-encompassing resource hub designed to furnish you with the tools and knowledge essential for success. Throughout your journey, our tutors stand by you, providing unwavering support at every step. The collective experience of the HR Courses Online team spans decades, bridging the realms of online education and the HR/L&D sector. When you choose to study with us, your attainment of a CIPD qualification holds the same weight and prestige as if you were studying within the confines of a traditional college or physical location. Certification CIPD Level 5 Associate Diploma in People Management Description The Chartered Institute of Personnel and Development (CIPD) stands as a leading force in shaping the landscape of HR and People Development. With a legacy spanning over a century, CIPD remains dedicated to driving excellence, fostering enhanced work environments, and establishing benchmarks that define optimal practices. As a respected Approved Centre of CIPD, we take immense pride in providing unparalleled HR training experiences. Our commitment is unwavering – we are devoted to equipping aspiring professionals with the skills, knowledge, and expertise requisite for attaining CIPD qualification. Within the Middle East, our distinctiveness lies in offering on-demand learning coupled with unprecedented face-to-face tutor support and a seamless Virtual Learning Environment, all contributing to paving the way for your HR journey. Our comprehensive course encompasses all the essentials you need to launch your career: Bite-Size Learning: Easily digestible educational materials crafted to facilitate a streamlined learning journey. Personalized Tutor Support: Enjoy the privilege of a dedicated tutor, with unlimited 1-to-1 support that adapts to your needs. Seamless Virtual Learning: Access our dedicated student portal housing learning materials, study guides, and a user-friendly interface. Versatile Learning: Our platform is accessible on a multitude of devices, ensuring learning fits seamlessly into your life. Engaging Web Series: "Let's Talk HR" – a series featuring over 40 specialists sharing insights, ideas, and solutions, offered entirely free. Learners' Community: An exclusive invitation to our private LinkedIn-based learners' community, fostering positive professional development. Transparent Pricing: All-inclusive access with no hidden fees, providing you with a holistic learning experience. Why opt for our program? Unlimited Tutor Support: Access tailored support at your discretion, putting you in control of when you need assistance. Seasoned Trainers: Benefit from trainers enriched with industry experience and comprehensive training backgrounds. Flexibility Redefined: Embrace a learning journey free from study deadlines or rigid requirements, allowing you to tailor study hours to your life. Continuous Assessment: Bid farewell to conventional exams as your progress is continually assessed, nurturing a dynamic learning experience. Who is this course for? If you are an HR & L&D professional aiming for career advancement or endeavoring to enter the field, CIPD qualifications are meticulously designed for you. Our CIPD Level 5 qualification caters to current or aspiring HR managers and individuals seeking to elevate their careers in human resources, learning, and development. At our institution, we don't just provide education – we facilitate transformation, enabling you to navigate the intricate realms of HR and People Development with confidence and expertise.

CIPD Level 5 Associate Diploma in People Management
Delivered Online On Demand
£2,750

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Python for network engineers

5.0(3)

By Systems & Network Training

Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.

Python for network engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697