• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4574 Courses in Cardiff delivered Online

VMware vRealize Automation SaltStack SecOps: Deploy and Manage [V8.6]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security administrators who are responsible for using SaltStack SecOps to manage the security operations in their enterprise Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of SaltStack Config and SaltStack SecOps Integrate SaltStack Config with directory services. Configure roles and permissions for users and groups to manage and use SaltStack SecOps Use targeting to ensure that the jobs run on the correct minion systems Use remote execution modules to install the packages, transfer files, manage services, and manage users on minion systems Manage configuration control on the minion systems with states, pillars, requisites, and declarations Use Jinja and YAML code to manage the minion systems with the state files Enforce the desired state across minion systems automatically Use SaltStack SecOps to update the compliance and vulnerability content libraries Use SaltStack SecOps to enforce compliance and remediation on the infrastructure with industry standards Use SaltStack SecOps to provide automated vulnerability scanning and remediation on your infrastructure This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in using VMware vRealize© Automation SaltStack© SecOps. SaltStack SecOps allows you to scan your system for compliance against security benchmarks, detect system vulnerabilities, and remediate your results. This course enables you to create the SaltStack SecOps custom compliance libraries and use SaltStack SecOps. In addition, this course provides you with the fundamentals of how to use VMware vRealize© Automation SaltStack© Config to install software and manage system configurations. Course Introduction Introductions and course logistics Course objectives SaltStack Config Architecture Identify the SaltStack Config deployment types Identify the components of SaltStack Config Describe the role of each SaltStack Config component SaltStack Config Security Describe local user authentication Describe LDAP and Active Directory authentication Describe the roles and permissions in vRealize Automation for SaltStack Config Describe the roles and permissions in SaltStack Config Describe the SecOps permissions in SaltStack Config Describe the advanced permissions available in SaltStack Config Targeting Minions Describe targeting and its importance Target minions by minion ID Target minions by glob Target minions by regular expressions Target minions by lists Target minions by compound matching Target minions by complex logical matching Remote Execution and Job Management Describe remote execution and its importance Describe functions and arguments Create and manage jobs Use the Activities dashboard Configuration Control Through States, Pillars, Requisites, and Declarations Define the SaltStack states Describe file management in SaltStack Config Create the SaltStack state files Identify the components of a SaltStack state Describe pillar data and the uses of pillar data Configure pillar data on the SaltStack Config master server Use pillar data in variables in the state files Describe the difference between IDs and names in the state files Use the correct execution order Use requisites in the state files Using Jinja and YAML Describe the SaltStack Config renderer system Use YAML in the state files Use Jinja in the state files Use Jinja conditionals, lists, and loops Using SaltStack SecOps Comply Describe the SaltStack SecOps Comply architecture Describe CIS and DISA STIG benchmarks Describe the SaltStack SecOps Comply security library Describe the remediation differences between SaltStack SecOps and VMware Carbon Black© Create and manage the policies Create and manage the custom checks Run assessments on the minion systems Use SaltStack SecOps to remediate the noncompliant systems Manage the SaltStack SecOps Comply configuration options Manage the benchmark content ingestion Using SaltStack SecOps Protect Describe Common Vulnerabilities and Exposures (CVEs) Use the Protect dashboard Create and manage the policies Update the vulnerability library Run the vulnerability scans Remediate the vulnerabilities Manage the vulnerability exemptions

VMware vRealize Automation SaltStack SecOps: Deploy and Manage [V8.6]
Delivered OnlineFlexible Dates
Price on Enquiry

CompTIA ITF+ (FCO-U61) Fundamentals

4.8(9)

By Skill Up

Start your tech journey with CompTIA ITF+ (FCO-U61) Fundamentals. Gain essential knowledge in IT basics. Enroll now for a strong foundation in technology!

CompTIA ITF+ (FCO-U61) Fundamentals
Delivered Online On Demand5 hours 6 minutes
£25

Intelligence Analyst Certification Course

5.0(2)

By Institute of Beauty & Makeup

CPD Accredited | Career Oriented Learning Modules | 24x7 Tutor Support | Lifetime Access

Intelligence Analyst Certification Course
Delivered Online On Demand1 hour
£12

Level 5 Diploma in Event Planner

By Compliance Central

Unveil the artistry behind seamless events with our Level 5 Diploma in Event Planning. Dive into the intricacies of crafting unforgettable experiences as you navigate through modules like "Event Classification" and "Catering at Events." Immerse yourself in the world of strategic event marketing and master the nuances of event security. From the foundations of event management to developing your own event planning business, this event planning course is your passport to unlocking the secrets of the industry. Elevate your expertise in planning and executing events that leave a lasting impression. Set out on an adventure that goes beyond traditional event planning, exploring the core of each module and assisting you in developing the range of abilities needed to become a skilled event planner. Learn about the shifting roles, responsibilities, and difficulties faced by event planners and gain a thorough understanding of event cleaning, waste management, and decoration. Develop your abilities to plan flawless events that enthral spectators and create enduring memories. Level 5 Diploma in Event Planner Course Learning Outcomes: Master the art of event classification, understanding diverse event types. Develop strategic event marketing techniques to enhance event visibility. Hone skills in catering at events, ensuring culinary excellence aligns with the event theme. Acquire proficiency in event security measures to guarantee a safe and enjoyable experience. Explore the intricacies of developing an event planning business, from conceptualization to execution. Gain comprehensive knowledge in the role of an event planner, navigating challenges with finesse. Level 5 Diploma in Event Planner Module 01: Introduction to Event Management Module 02: Role of an Event Planner Module 03: Event Classification Module 04: Events and Clients Module 05: Steps to Plan an Event Module 06: Invitation to the Event Module 07: Event Marketing Module 08: Catering at Events Module 09: Event Decorations Module 10: Cleaning and Waste Disposal Module 11: Event Security Module 12: Developing an Event Planning Business Certificate of Achievement Endorsed Certificate of Achievement from the Quality Licence Scheme Learners will be able to achieve an endorsed certificate after completing the course as proof of their achievement. You can order the endorsed certificate for Free to be delivered to your home by post. For international students, there is an additional postage charge of £10. Endorsement The Quality Licence Scheme (QLS) has endorsed this course for its high-quality, non-regulated provision and training programmes. The QLS is a UK-based organisation that sets standards for non-regulated training and learning. This endorsement means that the course has been reviewed and approved by the QLS and meets the highest quality standards. Who is this course for? Level 5 Diploma in Event Planner Event Coordinator Wedding Planner Corporate Event Manager Exhibition Organizer Conference Planner Fundraising Event Specialist Requirements Level 5 Diploma in Event Planner To enrol in this Level 5 Diploma in Event Planner, Purchasing & Procurement course, all you need is a basic understanding of the English Language and an internet connection. Career path Level 5 Diploma in Event Planner Event Coordinator: £22,000 to £30,000 per year Wedding Planner:£25,000 to £35,000 per year Conference and Exhibition Organizer: £24,000 to £32,000 per year Corporate Event Planner: £26,000 to £35,000 per year Event Marketing Specialist: £28,000 to £40,000 per year Certificates CPD Accredited PDF Certificate Digital certificate - Included QLS Endorsed Hard Copy Certificate Hard copy certificate - Included CPD Accredited Hard Copy Certificate Hard copy certificate - £9.99 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each

Level 5 Diploma in Event Planner
Delivered Online On Demand5 hours
£109

Becoming a Cloud Expert - Microsoft Azure IaaS - Level 1

By Packt

Plan, deploy and monitor cloud solutions in Microsoft Azure's Infrastructure as a Service

Becoming a Cloud Expert - Microsoft Azure IaaS - Level 1
Delivered Online On Demand5 hours 13 minutes
£135.99

Complete Door Supervisor Training - CPD Certified

By Wise Campus

Door Supervising: Door Supervising Training Would you want to take advantage of our door supervising course, which may help you advance your expertise and teach you from the ground up? Hurry up! Join our door supervising course quickly. The door supervising course equips individuals with the necessary skills and knowledge to work effectively as door supervisors in the security industry. This door supervising course covers legal regulations, conflict resolution techniques, and physical intervention methods. Through this door supervising course, you can learn customer service strategies. Moreover, the door supervising course teaches how to manage security risks, handle challenging situations, and ensure the safety of patrons on licenced premises. The door supervising course emphasises professionalism, communication skills, and adherence to industry standards and best practices. If you want to learn different door supervisory and organisational abilities, enrol in our door supervising course right now! Door Supervising: Door Supervising Training Course This Complete Door Supervising: Door Supervising Training Training includes a FREE PDF Certificate. Lifetime access to this Door Supervising: Door Supervising Training Course Instant access to this Door Supervising: Door Supervising Training Course Get FREE Tutor Support to this Door Supervising: Door Supervising Training Course Door Supervising: Door Supervising Training Unlock your potential with our comprehensive Door Supervisor course. Gain essential skills to excel in door supervising roles. Learn key techniques for handling challenging situations confidently. Open doors to exciting career opportunities. Enroll now and become a certified Door Supervisor, ensuring safety and security in diverse environments. Who is this course for? Door Supervising: Door Supervising Training The door supervising course is open to anybody with a strong desire to learn door supervisory skills. Requirements Door Supervising: Door Supervising Training To enrol in this Door Supervising: Door Supervising Training Course, students must fulfil the following requirements. To join in our Door Supervising: Door Supervising Training Course, you must have a strong command of the English language. To successfully complete our Door Supervising: Door Supervising Training Course, you must be vivacious and self driven. To complete our Door Supervising: Door Supervising Training Course, you must have a basic understanding of computers. A minimum age limit of 15 is required to enrol in this Door Supervising: Door Supervising Training Course. Career path Door Supervising: Door Supervising Training Once you've finished the door supervising course, you'll be able to confidently apply the information and abilities you've learned to better yourself.

Complete Door Supervisor Training - CPD Certified
Delivered Online On Demand1 hour
£12

Data Protection (GDPR) Practitioner Certificate

By Computer Law Training

5-day intensive data protection course, delivered by a specialist.

Data Protection (GDPR) Practitioner Certificate
Delivered OnlineFlexible Dates
£1,200

Network Engineer Training

By Compete High

🚀 Take your IT career to the next level with our Network Engineer Training Course! Learn essential networking concepts, security protocols, and industry best practices at your own pace. Enrol now and start building your future in Network Engineering! 🔗💻

Network Engineer Training
Delivered Online On Demand7 hours
£4.99

IT Support Technician

4.5(3)

By Studyhub UK

Navigate the multifaceted domain of IT support with our 'IT Support Technician' course, a pathway to mastering the essentials of technology support in diverse environments. This curriculum embarks on a comprehensive journey, beginning with the foundational aspects of software, including operating systems and application management. As you move through the modules, you'll encounter a blend of technical knowledge and practical application, from understanding the intricacies of software licensing to mastering hardware devices and peripherals. This course is meticulously structured to equip you with not just the theoretical aspects of IT support, but also the hands-on skills required for effective troubleshooting and problem-solving in real-world scenarios. Progressing further, the course delves into the critical areas of security, including risk management, cybersecurity, and data protection. You'll gain insights into managing various threats and vulnerabilities, alongside learning the importance of robust security protocols. The course also encompasses essential knowledge in networking, covering topics from OSI layers to wireless security, preparing you for the complex nature of modern networks. Concluding with modules on basic IT literacy, the program ensures you are well-versed in healthcare IT, server management, and effective communication within IT roles. By the end of this course, you'll have a thorough understanding of the diverse components that make up IT support, ready to tackle challenges and advance your career in this dynamic field. Learning Outcomes Develop a comprehensive understanding of software systems and operating system configurations. Master the skills in hardware setup, peripheral management, and troubleshooting. Acquire in-depth knowledge of network infrastructure and wireless security. Learn to manage IT risks and implement robust cybersecurity measures. Gain expertise in healthcare IT and the implementation of EMR/EHR systems. Why choose this IT Support Technician course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this IT Support Technician course for? Aspiring IT support technicians and helpdesk professionals. Individuals seeking to transition into IT roles or enhance their tech skills. Professionals in healthcare IT looking to deepen their understanding of EMR systems. Small business owners or managers responsible for their IT infrastructure. Students pursuing a career in network or systems administration. Career path IT Support Technician: £20,000 - £35,000 Network Administrator: £25,000 - £40,000 Systems Administrator: £27,000 - £45,000 Cybersecurity Analyst: £30,000 - £55,000 Healthcare IT Specialist: £26,000 - £42,000 Helpdesk Manager: £28,000 - £48,000 Prerequisites This IT Support Technician does not require you to have any prior qualifications or experience. You can just enrol and start learning.This IT Support Technician was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Software: What is an Operating System 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:11:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:05:00 Hardware: Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:24:00 Integrate Documentation into Risk Management 00:15:00 Classify Threats and Threat Profiles 00:08:00 Perform Ongoing Threat Research 00:13:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:10:00 Assess the Impact of Reconnaissance Incidents 00:11:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:11:00 Assessing the impact of Social Engineering 00:08:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:21:00 Rogue Devices 00:04:00 Public Hotspots 00:07:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:18:00 WLAN Security Infrastructure 00:38:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:16:00 Security: Recover from a Security Incident 00:10:00 Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Common Scams 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle 00:37:00 Information Security Controls 00:36:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:32:00 Malware 00:25:00 Software-Based Threats 00:22:00 Based Threats 00:39:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:55:00 Manage Device and Host Security 01:08:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:05:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Hardware and Peripherals 00:07:00 Networking: OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:17:00 Converters and Connectors 00:27:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:07:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 01:00:00 Common Problems 00:32:00 Troubleshooting 00:28:00 Network Technician Tools 00:50:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT 00:06:00 EMR EHR Issues 00:05:00 Regulations, Standards, and Stakeholders 00:14:00 HIPAA Controls and Compliance 00:08:00 Roles and Responsibilities 00:10:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:02:00 Computing Essentials 00:05:00 Networking 00:33:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:20:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:08:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:15:00 Perform Backups and Disaster Recovery 00:16:00

IT Support Technician
Delivered Online On Demand3 days
£10.99

Linux Security and Hardening

By NextGen Learning

Linux Security and Hardening Course Overview: This "Linux Security and Hardening" course provides a comprehensive introduction to the essential practices required to secure Linux systems. It covers fundamental aspects of security, including general, physical, account, and network security, as well as file system security measures. With a focus on Linux-specific tools and techniques, the course is designed to equip learners with the knowledge to protect their systems from common vulnerabilities. By completing this course, learners will understand the key concepts and be able to implement security measures effectively, ensuring the integrity and confidentiality of their Linux-based systems. Course Description: In this course, learners will explore various layers of Linux security and hardening techniques to protect against threats. Topics covered include general system security, physical security, account management, network protection, and securing file systems. The course also provides additional resources to enhance your understanding of Linux security. By engaging with these modules, learners will acquire the skills necessary to safeguard systems, mitigate risks, and create a secure environment. This course is suitable for those wishing to bolster their technical expertise and for professionals eager to advance their career in Linux system administration and security. Linux Security and Hardening Curriculum: Module 01: Course Overview and Downloads Module 02: General Security Module 03: Physical Security Module 04: Account Security Module 05: Network Security Module 06: File System Security Module 07: Additional Resources (See full curriculum) Who is this course for? Individuals seeking to enhance their knowledge of Linux security. Professionals aiming to advance their career in Linux system administration. Beginners with an interest in system security and IT infrastructure. Those looking to specialise in security and hardening for Linux-based environments. Career Path: Linux System Administrator IT Security Analyst Network Security Specialist System Security Engineer Cybersecurity Consultant

Linux Security and Hardening
Delivered OnlineFlexible Dates
£7.99