• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

449 Courses in Cardiff delivered Online

Master JavaScript with Data Visualization

4.5(3)

By Studyhub UK

Learn the power of coding with this Master JavaScript with Data Visualization course. With JavaScript being the focus, this program offers comprehensive insights into the heart of web development. The course begins with the basics, setting up your local development environment, and quickly moves on to exploring JavaScript fundamentals like strings, operators, and control flow statements, preparing you for a deep dive into the world of coding.   Unlock your potential as we guide you through JavaScript's crucial aspects, including functions, error handling, and client-side validations. Each module is designed by industry experts, ensuring your understanding aligns with real-world scenarios. The course offers practical examples, and quizzes, fostering a rich learning environment that stimulates engagement and helps to master the topics.   But what sets this course apart is its emphasis on Data Visualization using Google Chart. The integration of JavaScript with Data Visualization introduces you to new and innovative methods to present data in a more interactive and user-friendly format. By the end of the course, you should be proficient in JavaScript and able to design and implement complex data visualisations. Sign up today for a learning journey combining tech knowledge with creative visualisation skills! Learning Outcomes: After completing the JavaScript with Data Visualization course, you should be able to:   Develop a comprehensive understanding of JavaScript fundamentals. Acquire the ability to write and manipulate JavaScript strings and operators. Gain mastery over JavaScript control flow and conditional statements. Learn to implement robust JavaScript functions for diverse applications. Understand JavaScript error handling and client-side validations. Learn to visualise data using Google Chart tools effectively. Gain the ability to create interactive, data-driven web applications. Who is this course for: This JavaScript with Data Visualization course is ideal for:   Aspiring web developers seeking to learn JavaScript. Data analysts interested in expanding their skillset. Web designers aiming to enhance their interactivity skills. Software engineers looking to broaden their coding repertoire. Any tech enthusiast wanting to harness the power of Data Visualization. Certification After studying the course materials of the JavaScript with Data Visualization course, there will be a written assignment test which you can take either during or at the end of the course. After passing the test, you will have a range of certification options. A CPD Accredited PDF Certificate costs £4.99, while a CPD Accredited Hardcopy Certificate is £8.00. Also, a PDF Transcript costs £4.99, and a Hardcopy Transcript is £9.99. Select according to your needs, and we assure timely delivery of your chosen certificate. Requirements This professionally designed JavaScript with Data Visualization course does not require you to have any prior qualifications or experience. It is open to everyone, and you can access the course from anywhere at any time. Just enrol and start learning! Career Path: Upon completion of this JavaScript with Data Visualization course, you can gain the knowledge and skills required to pursue many career paths, such as:   JavaScript Developer: £35,000 - £55,000 Per year. Front-end Developer: £40,000 - £60,000 Per year. Full-Stack Developer: £45,000 - £70,000 Per year. Data Visualization Engineer: £45,000 - £65,000 Per year. Web Application Developer: £40,000 - £60,000 Per year. Software Engineer: £50,000 - £80,000 Per year. Course Curriculum Introduction Getting Started Introduction to Getting Started 00:02:00 Course Curriculum 00:05:00 How to Get Pre-Requisites 00:02:00 Getting Started on Windows, Linux or Mac 00:01:00 How to ask a Great Questions 00:02:00 FAQ's 00:01:00 Setting up Local Development Environment What is JavaScript 00:09:00 Choosing Code Editor 00:03:00 Installing Code Editor (Sublime Text) 00:04:00 Installing Code Editor(Visual Studio Code) 00:07:00 Hello World Program 00:14:00 Getting Output 00:11:00 Summary 00:02:00 JavaScript Fundamentals Introduction 00:02:00 Internal JavaScript 00:13:00 External JavaScript 00:09:00 Inline JavaScript 00:04:00 Async and defer 00:06:00 Variables 00:13:00 Data Types 00:10:00 Numbers 00:06:00 Boolean 00:04:00 Arrays() 00:12:00 Objects 00:06:00 Comments 00:05:00 Summary 00:01:00 JavaScript Strings Introduction 00:02:00 Strings 00:06:00 String Formatting 00:05:00 String Methods 00:12:00 Summary 00:02:00 JavaScript Operators Introduction 00:02:00 Arithmetic operators 00:07:00 Assignment operators 00:03:00 Comparison operators 00:06:00 Logical operators 00:08:00 Summary 00:02:00 JavaScript Conditional Statements Introduction 00:02:00 If-else-if statement 00:04:00 If-else statement 00:05:00 If-else-if statement 00:04:00 Switch-case statement 00:09:00 Summary 00:01:00 JavaScript Control Flow Statements Introduction 00:02:00 While loop 00:09:00 Do-while loop 00:03:00 For loop 00:08:00 Break 00:02:00 Continue 00:03:00 Coding Exercise 00:02:00 Solution for Coding Exercise 00:02:00 Summary 00:02:00 JavaScript Functions Introduction 00:02:00 Creating a Function 00:07:00 Function Call() 00:07:00 Function with parameters 00:05:00 Function Bind() 00:06:00 Summary 00:01:00 Data Visualization (Google Chart) Introduction 00:01:00 How to Use Google chart script 00:04:00 Line Graph chart 00:14:00 Scatter plots chart 00:02:00 Bar chart 00:04:00 3D Pie chart 00:02:00 3D Pie chart 00:02:00 Summary 00:01:00 JavaScript Error Handling Introduction 00:01:00 Try-catch 00:05:00 Try-catch-finally 00:17:00 Summary 00:01:00 JavaScript Client-side Validations Introduction 00:01:00 On Submit Validation 00:09:00 Input Numeric Validation 00:12:00 Login Form Validation 00:05:00 Password Strength Check Validation 00:04:00 Summary 00:01:00

Master JavaScript with Data Visualization
Delivered Online On Demand6 hours 21 minutes
£10.99

Cisco CCNA Certification - Complete Video Training

4.3(43)

By John Academy

Description Nowadays, many companies' embrace the cloud system because of the better business outcomes as the system helps to meet the changing business demands from technology transitions. The career path of a Cisco CCNA certified is vast as it is one of the most popular certification programs in the IT industry. The Cisco CCNA Certification - Complete Video Training prepares you for Cisco CCNA exam. The course is sectioned into two parts Cisco Networking Devices Part 1 (ICND1) and Cisco Networking Devices Part 2 (ICND2). In the first part, you will be introduced to the networking fundamentals including connecting to a WAN, necessary security and wireless concepts, routing and switching fundamentals, configuring simple networks etc. Next, the second section teaches you the process of implementing scalable medium-sized networks. To summarise, the bundle video course will help you to successfully install, operate, and troubleshoot a small branch office network. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our Cisco CCNA Certification - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Building a Simple Network Networking Functions FREE 00:20:00 Understanding the Host-to-Host Communications Model 00:22:00 Introducing LANs 00:17:00 Introduction to the IOS 00:32:00 Starting a Switch 00:11:00 Understanding Ethernet and Switch Operation 00:27:00 Troubleshooting OSPF 00:17:00 Perform Switch Startup 00:29:00 Troubleshooting Switch Media Issues 00:09:00 Command Line Help 00:06:00 Establishing Internet Connectivity Understanding the TCPIP Internet Layer 00:31:00 Understanding IP Addressing and Subnets 00:41:00 Understanding the TCPIP Transport Layer 00:24:00 Exploring the Functions of Routing 00:22:00 Configuring a Cisco Router 00:19:00 Exploring the Packet Delivery Process 00:24:00 Enabling Static Routing 00:18:00 Managing Traffic Using ACLs 00:18:00 Enabling Internet Connectivity 00:50:00 Performing Initial Router Setup Media Issues 00:15:00 Connecting to the Internet 00:24:00 Life of a Packet 00:11:00 Managing Network Device Security Securing Administrative Access 00:33:00 Implementing Device Hardening 00:47:00 Implementing Traffic Filtering with ACLs 00:32:00 Ethernet the Security of the Intial Configuration Part 1 00:15:00 Ethernet the Security of the Intial Configuration Part 2 00:22:00 Device Hardening 00:31:00 Filtering Traffic with ACLs 00:12:00 Configuring SSH 00:10:00 Configuring NTP 00:06:00 AAA 00:14:00 DHCP Snooping 00:08:00 Building a Medium-Sized Network Implementing VLANs and Trunks 00:30:00 Routing Between VLANs 00:12:00 Using a Cisco Network Device as a DHCP Server 00:16:00 Introducing WAN Technologies 00:15:00 Introducing Dynamic Routing Protocols 00:32:00 Implementing OSPF 00:40:00 Configuring Expanded Switch Networks 00:24:00 Configuring DHCP Server 00:13:00 Implementing OSPF 00:40:00 Troubleshooting OSPF 00:04:00 Implementing RIPv2 00:12:00 Introducing IPv6 Introducing Basic IPv6 00:23:00 Understanding IPv6 00:11:00 Configuring IPv6 Routing 00:11:00 IPv6 Addresses 00:17:00 Configure and Verify IPv6 Routing 00:20:00 IPv6 ACL 00:11:00 IPv6 RIP 00:16:00 Implementing Scalable Medium-Sized Networks Troubleshooting VLAN Connectivity FREE 00:25:00 Building Redundant Switched Topologies 00:40:00 Improving Redundant Switched Topologies with EtherChan 00:17:00 Understanding Layer 3 Redundancy 00:50:00 Initial Lab Setup - Part 1 00:17:00 Initial Lab Setup - Part 2 00:14:00 Optimizing STP 00:15:00 PortFast and BPDU Guard 00:04:00 Configuring EtherChannel 00:11:00 VTP 00:13:00 HSRP 00:18:00 QoS 00:11:00 Troubleshooting Basic Connectivity Troubleshooting IPv4 Network Connectivity 00:41:00 Troubleshooting IPv6 Network Connectivity 00:20:00 Troubleshooting an ACL 00:15:00 Implementing an EIGRP-Based Solution Implementing EIGRP 00:34:00 Troubleshooting EIGRP 00:13:00 Implementing EIGRP for IPv6 00:09:00 EIGRP 00:12:00 Troubleshooting EIGRP 00:06:00 Routing Table Issues 00:04:00 EIGRP with IPv6 00:14:00 Implementing a Scalable, Multiarea Network, OSPF-Based Solution OSPF Overview 00:32:00 Multiarea OSPF Implementation 00:12:00 Troubleshooting Multiarea OSPF 00:20:00 Examining OSPFv3 00:09:00 Multiarea OSPF 00:28:00 Troubleshooting OSPF 00:17:00 Configuring OSPF for IPv6 00:23:00 Wide-Area Networks Understanding WAN Technologies 00:22:00 Configuring Serial Encapsulation 00:34:00 Establishing a WAN Connection Using Frame Relay 00:36:00 Introducing VPN Solutions 00:14:00 Configuring GRE Tunnels 00:09:00 Enabling HDLC 00:13:00 Troubleshooting 00:08:00 Frame Relay 00:28:00 External BGP 00:13:00 GRE Tunnel 00:18:00 Dialer Interface 00:12:00 Network Device Management Configuring Network Devices to Support Network 00:25:00 Managing Cisco Devices 00:41:00 ICND Part 2 Licensing 00:24:00 Managing Files 00:06:00 Logging 00:07:00 Syslog 00:09:00 Password Recovery 00:10:00 Superlab Initial Setup 00:04:00 Superlab - Part 1 00:18:00 Superlab - Part 2 00:15:00 Superlab - Part 3 00:19:00 Superlab - Part 4 00:08:00 Superlab - Part 5 00:17:00 Superlab - Part 6 00:17:00 Superlab - Part 7 00:16:00 Superlab - Part 8 00:13:00 Superlab - Part 9 00:03:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Cisco CCNA Certification - Complete Video Training
Delivered Online On Demand34 hours
£24

Functional Skills IT/ ICT Level 2

4.5(3)

By Studyhub UK

Starting the journey on the 'Functional Skills IT/ICT Level 2' course unlocks a world of digital prowess, essential in today's tech-driven era. Learners will explore the essentials of system hardware, understand the nuances of operating systems, and gain crucial insights into data storage and sharing. Moreover, the curriculum extends to practical skills in setting up and configuring both PCs and mobile devices, ensuring a well-rounded understanding of modern technology. As the course progresses, students will delve into the complexities of network and internet connectivity, IT security, and efficient computer maintenance. The final stages of the course focus on specialised areas like troubleshooting, database understanding, and software development, equipping learners with the knowledge to excel in the evolving tech landscape. Learning Outcomes: Acquire comprehensive knowledge of computer usage, system hardware, and peripherals. Master skills in configuring and managing PCs and mobile devices. Develop proficiency in data storage, file management, and application software usage. Gain expertise in network connectivity, IT security, and computer maintenance. Understand database systems and acquire skills in software development and implementation. Why buy this Functional Skills IT course? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Functional Skills IT/ ICT Level 2 there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this Functional Skills IT course for? Individuals seeking foundational and advanced Functional IT skills. Aspiring IT professionals aiming to broaden their technical knowledge. Students pursuing a career in the information technology sector. Employees looking to enhance their IT competencies in the workplace. Entrepreneurs need technical skills for business management. Prerequisites This Functional Skills IT/ ICT Level 2 does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Functional Skills IT/ ICT Level 2 was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path IT Support Specialist: £20,000 - £30,000 per annum Network Administrator: £25,000 - £35,000 per annum Database Manager: £30,000 - £45,000 per annum Software Developer: £25,000 - £50,000 per annum Systems Analyst: £35,000 - £55,000 per annum Cybersecurity Analyst: £30,000 - £60,000 per annum Course Curriculum Section 01: How People Use Computers The Case for Computer Literacy 00:03:00 Features Common to Every Computing Device 00:02:00 Common General-Purpose Computing Devices 00:02:00 Networks of Computing Devices 00:04:00 Remotely-Accessed Computer Systems 00:04:00 Specialized Computer Systems 00:02:00 Specialty I/O Devices 00:01:00 Section 02: System Hardware CPUs 00:03:00 Passive and Active Cooling 00:03:00 RAM and Active Memory 00:05:00 Motherboards 00:03:00 Power Supplies 00:03:00 AMA - Ask Me Anything about System Hardware 00:07:00 Section 03: Device Ports and Peripherals Ports and Connectors 00:03:00 General Use I/O Devices 00:03:00 AMA - Ask Me Anything about I/O, Ports and Peripherals 00:07:00 Section 04: Data Storage and Sharing Basics of Binary 00:04:00 Storage Technologies 00:04:00 Mass Storage Variation 00:03:00 AMA - Ask Me Anything about Data Storage and Sharing 00:07:00 Section 05: Understanding Operating Systems Operating System Functions 00:04:00 Operating System Interfaces 00:05:00 AMA - Ask Me Anything about Understanding OS's 00:05:00 Section 06: Setting Up and Configuring a PC Preparing the Work Area 00:02:00 Setting up a Desktop PC 00:01:00 Completing PC Setup 00:04:00 AMA - Ask Me Anything about Setting up and Configuring a PC 00:09:00 Section 07: Setting Up and Configuring a Mobile Device Personalizing a Tablet 00:08:00 AMA - Ask Me Anything about Mobile Devices Part 1 00:07:00 AMA - Ask Me Anything about Mobile Devices Part 2 00:07:00 Section 08: Managing Files File Management Tools 00:02:00 File Manipulation 00:06:00 Backups 00:03:00 AMA - Ask Me Anything about Managing Files 00:08:00 Section 09: Using and Managing Application Software Walking Survey of Applications 00:03:00 Managing Applications 00:03:00 Applications and Extensions 00:04:00 AMA - Ask Me Anything about Working with Applications 00:07:00 Section 10: Configuring Network and Internet Connectivity Wi-Fi Setup 00:06:00 Going High Speed 00:03:00 Setting Up and Sharing Printers 00:05:00 AMA - Ask Me Anything about Networks and Internet Connectivity Part 1 00:07:00 AMA - Ask Me Anything about Networks and Internet Connectivity Part 2 00:05:00 Section 11: IT Security Threat Mitigation Physical Security 00:05:00 Password Management 00:03:00 Clickworthy 00:03:00 Perils of Public Internet 00:02:00 AMA - Ask Me Anything about IT Threat Mitigation Part 1 00:07:00 AMA - Ask Me Anything about IT Threat Mitigation Part 2 00:08:00 Section 12: Computer Maintenance and Management Power Management 00:02:00 Cleaning and Maintaining Computers 00:02:00 Trash it or Stash it? 00:02:00 AMA - Ask Me Anything about Computer Maintenance and Management 00:11:00 Section 13: IT Troubleshooting Troubleshooting 101 00:03:00 AMA - Ask Me Anything about Troubleshooting Computers Part 1 00:10:00 AMA - Ask Me Anything about Troubleshooting Computers Part 2 00:11:00 Section 14: Understanding Databases Introduction to Databases 00:06:00 Database Details 00:06:00 AMA - Ask Me Anything about Databases 00:06:00 Section 15: Developing and Implementing Software Introduction to Programming 00:04:00 Programming with a PBJ Sandwich 00:08:00 AMA - Ask Me Anything about Databases 00:06:00

Functional Skills IT/ ICT Level 2
Delivered Online On Demand4 hours 52 minutes
£10.99

Ethical Hacking and Pentesting Ultimate Hands-on Online Training

By Lead Academy

Ethical Hacking and Pentesting Ultimate Hands-on Online Training Course Overview Are you looking to begin your ethical hacker career or want to develop more advanced skills in ethical hacker? Then this ethical hacker course will set you up with a solid foundation to become a confident ethical hacker and help you to develop your expertise in ethical hacker. This ethical hacking and pentesting ultimate hands-on online training course is accredited by the CPD UK & IPHM. CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Whether you are self-taught and you want to fill in the gaps for better efficiency and productivity, this ethical hacking and pentesting ultimate hands-on online training course will set you up with a solid foundation to become a confident ethical hacker and develop more advanced skills. Gain the essential skills and knowledge you need to propel your career forward as a ethical hacker. The ethical hacking and pentesting ultimate hands-on online training course will set you up with the appropriate skills and experience needed for the job and is ideal for both beginners and those currently working as a ethical hacker. This comprehensive ethical hacking and pentesting ultimate hands-on online training course is the perfect way to kickstart your career in the field of ethical hacker. This ethical hacking and pentesting ultimate hands-on online training course will give you a competitive advantage in your career, making you stand out from all other applicants and employees. If you're interested in working as a ethical hacking and pentesting ultimate hands-on online training or want to learn more skills on ethical hacker but unsure of where to start, then this ethical hacking and pentesting ultimate hands-on online training course will set you up with a solid foundation to become a confident ethical hacker and develop more advanced skills. As one of the leading course providers and most renowned e-learning specialists online, we're dedicated to giving you the best educational experience possible. This ethical hacking and pentesting ultimate hands-on online training course is crafted by industry expert, to enable you to learn quickly and efficiently, and at your own pace and convenience. Who is this Ethical Hacking and Pentesting Ultimate Hands-on Online Training course for? This comprehensive ethical hacking and pentesting ultimate hands-on online training course is suitable for anyone looking to improve their job prospects or aspiring to accelerate their career in this sector and want to gain in-depth knowledge of ethical hacker. Entry Requirement There are no academic entry requirements for this ethical hacking and pentesting ultimate hands-on online training course, and it is open to students of all academic backgrounds. As long as you are aged seventeen or over and have a basic grasp of English, numeracy and ICT, you will be eligible to enrol. Assessment Method This ethical hacking and pentesting ultimate hands-on online training course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner can grasp from each section. In the assessment pass mark is 60%. Course Curriculum Course Overview Course Overview Building Your Virtual Lab Environment Video - Downloading ISO and OVA Fles for VirtualBox Video and lab - Creating a Virtual install of Kali using VirtualBox Video and Lab - Creating a Virtual Install of CSI Linux 2021.2 Video and lab - Creating an Unattended Virtual Install of XP Using Virtualbox Video - Installing the VirtualBox Extension pack Video - Taking a Snapshot of Your Current Configuration Passive Reconnaissance Video and Lab - Gathering Information Using Maltego Video and Lab - Gathering Information Using CSI Linux Investigator Video and Lab - Preparing CSI Linux to Use Shodan Video and Lab - Using Shodan to Find Vulnerable Devices Nmap Video and Lab - Introduction to NMap Video and lab - NMap Scripting Engine (NSE) Video and lab - Scanning for WannaCry Ransomware Scanning for Vulnerabilities Using Nessus Video and Lab - Installing NESSUS Using Docker Video and lab - Scanning for Vulnerabilities Using Nessus Video - Using Your Nessus Scan Results Scanning for Vulnerabilities Using OpenVAS Video and Lab - Installing OpenVAS Using Docker Video and Lab - Scanning for Vulnerabilities Using OpenVAS Exploiting Microsoft Windows Video and Lab- Using Metasploit to Launch a DOS Attack Against Windows XP Video and Lab - Establishing A VNC Shell Using Meterpreter Video and Lab - Using Meterpreter to backdoor Windows XP Exploiting Linux Video and lab - Installing Metasploitable2 Using VirtualBox Social Engineering Video and Lab - Using the Social Engineering Toolkit (SET) BASH Scripting for Pentesters Video and Lab - Introduction to BASH Scripting Video and Lab - Creating a BASH Script for Scanning Vulnerable Ports Video and Lab - Password Cracking Using Medusa Video and Lab - Passwords Cracking Using Mimikatz Pentesting Wireless Networks Video and Lab - Installing a Wireless Adapter in Kali Video and Lab - Hacking a Wireless Network Using Kali Linux Wireless Deauthentication Attack PMKID Client-less Wireless Attack Using Bettercap Web Based Application Attacks Video and Lab - Installing w3af in Kali Linux Using Docker Video and Lab - Conducting A Website Vulnerability Scan Using w3af Video and Lab - Performing a Browser Based Attack Video and lab - SQL Injection Attack Using SQLmap Browser Exploitation Framework (BeEF) Video - Configure Kali for Exploitation the WAN Video and lab - The Browser Exploitation Framework (BeEF) Remaining anonymous Video and Lab - Anonymize Kali Using Whonix,,,,, Capture The Flag Walkthrough - Mr. Robot Video Walk Through -Key #1 Video Walk through - Key #2 Video Walk Through - Key #3 Capture The Flag Walkthrough - Stapler Video - Capture the Flag - Stapler Part 1 Video - Capture the Flag - Stapler Part 2 Video - Capture the Flag - Stapler Part 3 Order Your Certificate Now Order Your Certificate Now Get Your Insurance Now Get Your Insurance Now Feedback Feedback Certificate of Achievement Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. FAQs Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Ethical Hacking and Pentesting Ultimate Hands-on Online Training
Delivered Online On Demand
£25

Network Hacking Continued - Intermediate to Advanced

By iStudy UK

Want to know the secrets to network hacking? Do you dream of becoming the ultimate script kiddie? If you want to become an ethical hacker, this advanced computer hacking course will teach you how to break into computer systems and networks to gain access to Wi-Fi passwords and much more. This network hacking course will train you how to identify and exploit weaknesses in computer systems and networks, helping you to outsmart computer security and gain unauthorized access to a computer's system. You'll learn essential password cracking techniques and how to create Trojan horse viruses and other malicious codes. You'll also familiarise with hacking operating systems and different types of attacks. Additionally, you'll be trained on how to run attacks on HTTPS websites and write your own Python scripts to implement custom MITM attacks. This advanced network hacking course is ideal for students who are already familiar with the basics of network hacking. Topics include captive portals, WEP cracking, WPA/WPA2 cracking, evil twin attacks and post-connection attacks, What you'll learn Learn how to write custom scripts to gather important hacking information Discover the secrets of how to unlock WPS on routers, even if they're locked Understand how wireless phishing works and how to create fake captive portals Uncover the names of hidden networks and discover how to connect to them Learn how to replace downloaded files from a network with trojans Discover how to create trojans and combine any file in any format with an evil file Familiarise with common types of cybersecurity attacks and hacking techniques Understand how to exploit the WPS feature and hack Wi-Fi passwords Requirements Computer with a minimum of 4GB ram/memory Operating System: Windows / OS X / Linux Finished the networks section of my general ethical hacking course OR Finished my network hacking course. For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course). Who this course is for: People who want to take their network hacking skills to the next level. People who want to have a better understanding of the subject and enhance their skills. People who want to be able to run attacks manually & write their own MITM scripts. Introduction Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam FREE 00:07:00 Course Overview FREE 00:05:00 Back To Basics/Pre-Connection Attacks Pre-connection Attacks Overview 00:02:00 Spoofing Mac Address Manually 00:03:00 Targeting 5 GHz Networks 00:07:00 Deauthenticating a Client From Protected WiFi Networks 00:07:00 Deauthenticating Multiple Clients From Protected WiFi Networks 00:08:00 Deauthenticating All Clients From Protected WiFi Network 00:06:00 Gaining Access Gaining Access Overview 00:02:00 Discovering Names of Hidden Networks 00:08:00 Connecting To Hidden Networks 00:05:00 Bypassing Mac Filtering (Blacklists & Whitelists) 00:09:00 Cracking SKA WEP Network 00:09:00 Securing Systems From The Above Attacks 00:03:00 Gaining Access - Captive Portals Sniffing Captive Portal Login Information In Monitor Mode 00:10:00 Sniffing Captive Portal Login Information Using ARP Spoofing 00:09:00 Creating a Fake Captive Portal - Introduction 00:04:00 Creating Login Page - Cloning a Login Page 00:07:00 Creating Login Page - Fixing Relative Links 00:07:00 Creating Login Page - Adding Form Tag 00:08:00 Creating Login Page - Adding Submit Button 00:07:00 Preparing Computer To Run Fake Captive Portal 00:08:00 Starting The Fake Captive Portal 00:12:00 Redirecting Requests To Captive Portal Login Page 00:12:00 Generating Fake SSL Certificate 00:06:00 Enabling SSL/HTTPS On Webserver 00:08:00 Sniffing & Analysing Login Credentials 00:06:00 Gaining Access - WPA/WPA2 Cracking - Exploiting WPS Exploiting WPS - Introduction 00:02:00 Bypassing 'Failed to associate' Issue 00:08:00 Bypassing 0x3 and 0x4 Errors 00:08:00 WPS Lock - What Is It & How To Bypass It 00:07:00 Unlocking WPS 00:09:00 Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack Advanced Wordlist Attacks - Introduction 00:02:00 Saving Aircrack-ng Cracking Progress 00:10:00 Using Huge Wordlists With Aircrack-ng Without Wasting Storage 00:08:00 Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage 00:10:00 Cracking WPA/WPA2 Much Faster Using GPU - Part 1 00:07:00 Cracking WPA/WPA2 Much Faster Using GPU - Part 2 00:11:00 Gaining Access - WPA/WPA Cracking - Evil Twin Attack What is It & How it Works 00:07:00 Installing Needed Software 00:08:00 Stealing WPA/WPA2 Key Using Evil Twin Attack Without Guessing 00:10:00 Debugging & Fixing Login Interface 00:12:00 Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise What is WPA/WPA2 Enterprise & How it Works 00:05:00 How To Hack WPA/WPA2 Enterprise 00:07:00 Stealing Login Credentials 00:08:00 Cracking Login Credentials 00:07:00 Securing Systems From The Above Gaining Access Attacks 00:05:00 Post Connection Attacks Post Connection Attacks Overview 00:04:00 Ettercap - Basic Overview 00:07:00 Ettercap - ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords 00:10:00 Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites 00:13:00 Automatically ARP Poisoning New Clients 00:07:00 DNS Spoofing Using Ettercap 00:06:00 Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms 00:09:00 Post Connection Attacks - Analysing Data Flows & Running Custom Attacks MITMproxy - What is It & How To Install It 00:04:00 Using MITMproxy In Explicit Mode 00:07:00 Analysing (Filtering & Highlighting) Flows 00:05:00 Intercepting Network Flows 00:05:00 Modifying Responses & Injecting Javascript Manually 00:09:00 Intercepting & Modifying Responses In Transparent Mode 00:08:00 Editing Responses & Injecting BeEF's Code On The Fly 00:09:00 Editing Responses Automatically Based On Regex 00:09:00 Stealing Login Info Using Fake Login Promo 00:07:00 [Bonus] - Hacking Windows 10 Using A Fake Update 00:05:00 Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks What Do Mean By MITM Scripts? 00:06:00 Capturing & Printing Requests/Responses 00:09:00 Filtering Flows & Extracting Useful Data 00:09:00 Using Conditions To Execute Code On Useful Flows 00:10:00 Generating Custom HTTP Responses 00:09:00 Testing Script Locally 00:09:00 Generating Trojans - Installing The Trojan Factory 00:06:00 Generating Trojans - Converting Any File (eg: mage) To a Trojan 00:10:00 Testing Script On Remote Computer To Replace Downloads With a Generic Trojan 00:07:00 Executing Bash Commands & Calling Trojan Factory From Our Script 00:09:00 Using Variables & More Complex Conditions 00:09:00 Converting Downloads To Trojans On The Fly 00:10:00 Configuring The Trojan Factory's MITMproxy Script 00:08:00 Using The Trojan Factory MITMproxy Script 00:08:00 Post-Connection Attacks - Doing All Of The Above On HTTPS Websites Bypassing HTTPS With MITMproxy 00:06:00 Replacing Downloads From HTTPS 00:05:00 Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites 00:06:00 Securing Systems From The Above Post Connection Attacks 00:06:00

Network Hacking Continued - Intermediate to Advanced
Delivered Online On Demand10 hours 2 minutes
£25

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations

4.3(43)

By John Academy

Description: This CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations will help you to understand the anatomy of cyber-attacks. You will gain the skills needed to serve your organizations before, during, and after a breach. A CyberSec First Responder is the first line of defence against cyber-attacks. You will be able to prepare to analyze threats, design secure computing and network environments, proactively defend networks and respond/investigate cybersecurity incidents. It covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a computer security incident response team (CSIRT), and more. So, learn to assess and respond to security threats and operating systems and network security analysis platform by taking this course. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Overview of Wireless Communications Identify the Importance of Risk Management FREE 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:22:00 Integrate Documentation into Risk Management 00:14:00 Analyzing the Threat Landscape Classify Threats and Threat Profiles 00:07:00 Perform Ongoing Threat Research 00:12:00 Resources that Aid in Research of Threats 00:03:00 Analyzing Recon Threats to Computing and Network Environments Implement Threat Modeling 00:09:00 Assess the Impact of Reconnaissance Incidents 00:10:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:10:00 Assessing the impact of Social Engineering 00:07:00 Assessing the Impact of Phishing 00:03:00 Analyzing Attacks on Computing and Network Environments Assess the Impact of System Hacking Attacks 00:10:00 Cracking Passwords Using a Password File 00:08:00 Assess the Impact of Web Based Attacks 00:11:00 Assessing the Impact of Web-Based Threats 00:03:00 Assess the Impact of Malware 00:08:00 Malware Detection and Removal 00:05:00 Assess the Impact of Hijacking and Impersonation Attacks 00:13:00 Assess the Impact of DoS Incidents 00:09:00 Assessing the Impact of DoS Attacks 00:04:00 Assess the Impact of Threats to Mobile Security 00:08:00 Assess the Impact of Threats to Cloud Security 00:10:00 Analyzing Post-Attack Techniques Assess Command and Control Techniques 00:08:00 Assessing Command and Control Techniques 00:10:00 Assess Persistence Techniques 00:05:00 Detecting Rootkits 00:03:00 Assess Lateral Movement and Pivoting Techniques 00:13:00 Assess Data Exfiltration Techniques 00:04:00 Steganography 00:03:00 Assess Anti Forensics Techniques 00:09:00 Assessing Anti-Forensics 00:03:00 Evaluating the Organization's Security Posture Conduct Vulnerability Assessments 00:16:00 Perform a Vulnerability Scan with Nessus 00:07:00 Perform a Vulnerability Scan with MBSA 00:05:00 Conduct Penetration Tests on Network Assets 00:18:00 Follow Up on Penetration Testing 00:06:00 Collecting Cyber security Intelligence Deploy a Security Intelligence Collection and Analysis Platform 00:19:00 Collect Data from Network Based Intelligence Sources 00:15:00 Collecting Network-Based Security Intelligence 00:07:00 Collect Data from Host Based Intelligence Sources 00:13:00 Collecting Host-Based Security Intelligence 00:15:00 Parsing Log files 00:03:00 Analyzing Log Data Use Common Tools to Analyze Logs 00:22:00 Analyzing Linux Logs for Security Intelligence 00:08:00 Use SIEM Tools for Analysis 00:07:00 Incorporating SIEMs into Security Intelligence Analysis 00:18:00 Parse Log Files with Regular Expressions 00:25:00 Performing Active Asset and Network Analysis Analyze Incidents with Windows-Based Tools 00:17:00 Windows-Based Incident Analysis Tools 00:19:00 Analyze Incidents with Linux Based Tools 00:05:00 Linux-Based Incident Analysis Tools 00:07:00 Analyze Malware 00:11:00 Analyzing Malware 00:03:00 Analyze Indicators of Compromise 00:20:00 Analyzing Indicators of Compromise 00:15:00 Responding to Cyber security Incidents Deploy an Incident Handling and Response Architecture 00:22:00 Mitigate Incidents 00:16:00 Hardening Windows Servers 00:14:00 DNS Filtering 00:05:00 Blacklisting and Whitelisting 00:09:00 Prepare for Forensic Investigation as a CSIRT 00:03:00 Investigating Cyber security Incidents Apply a Forensic Investigation Plan 00:10:00 Securely Collect and Analyze Electronic Evidence 00:08:00 Securely Collecting Electronic Evidence 00:05:00 Analyzing Forensic Evidence 00:07:00 Follow Up on the Results of an Investigation 00:04:00 Mock Exam Mock Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations 00:20:00 Final Exam Final Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations
Delivered Online On Demand12 hours 7 minutes
£11.99

IT Support Technician Training

4.5(3)

By Studyhub UK

Overview Uplift Your Career & Skill Up to Your Dream Job - Learning Simplified From Home! Kickstart your career & boost your employability by helping you discover your skills, talents and interests with our special IT Support Technician Training Course. You'll create a pathway to your ideal job as this course is designed to uplift your career in the relevant industry. It provides professional training that employers are looking for in today's workplaces. The IT Support Technician Training Course is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This IT Support Technician Training Course has been designed by industry experts to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This IT Support Technician Training Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into elementary modules, allowing our students to grasp each lesson quickly. At StudyHub, we don't just offer courses; we also provide a valuable teaching process. When you buy a course from StudyHub, you get unlimited Lifetime access with 24/7 dedicated tutor support. Why buy this IT Support Technician Training? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the IT Support Technician Training there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This IT Support Technician Training course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skill. Prerequisites This IT Support Technician Training does not require you to have any prior qualifications or experience. You can just enrol and start learning.This IT Support Technician Training was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This IT Support Technician Training is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Section 01: How People Use Computers The Case for Computer Literacy 00:03:00 Features Common to Every Computing Device 00:02:00 Common General-Purpose Computing Devices 00:02:00 Networks of Computing Devices 00:04:00 Remotely-Accessed Computer Systems 00:04:00 Specialized Computer Systems 00:02:00 Specialty I/O Devices 00:01:00 Section 02: System Hardware CPUs 00:03:00 Passive and Active Cooling 00:03:00 RAM and Active Memory 00:05:00 Motherboards 00:03:00 Power Supplies 00:03:00 AMA - Ask Me Anything about System Hardware 00:07:00 Section 03: Device Ports and Peripherals Ports and Connectors 00:03:00 General Use I/O Devices 00:02:00 AMA - Ask Me Anything about I/O, Ports and Peripherals 00:07:00 Section 04: Data Storage and Sharing Basics of Binary 00:04:00 Storage Technologies 00:04:00 Mass Storage Variation 00:03:00 AMA - Ask Me Anything about Data Storage and Sharing 00:07:00 Section 05: Understanding Operating Systems Operating System Functions 00:04:00 Operating System Interfaces 00:05:00 AMA - Ask Me Anything about Understanding OS's 00:05:00 Section 06: Setting Up and Configuring a PC Preparing the Work Area 00:02:00 Setting up a Desktop PC 00:01:00 Completing PC Setup 00:04:00 AMA - Ask Me Anything about Setting up and Configuring a PC 00:09:00 Section 07: Setting Up and Configuring a Mobile Device Personalizing a Tablet 00:08:00 AMA - Ask Me Anything about Mobile Devices Part 1 00:07:00 AMA - Ask Me Anything about Mobile Devices Part 2 00:07:00 Section 08: Managing Files File Management Tools 00:02:00 File Manipulation 00:06:00 Backups 00:03:00 AMA - Ask Me Anything about Managing Files 00:08:00 Section 09: Using and Managing Application Software Walking Survey of Applications 00:03:00 Managing Applications 00:03:00 Applications and Extensions 00:04:00 AMA - Ask Me Anything about Working with Applications 00:07:00 Section 10: Configuring Network and Internet Connectivity Wi-Fi Setup 00:06:00 Going High Speed 00:03:00 Setting Up and Sharing Printers 00:05:00 AMA - Ask Me Anything about Networks and Internet Connectivity Part 1 00:07:00 AMA - Ask Me Anything about Networks and Internet Connectivity Part 2 00:05:00 Section 11: IT Security Threat Mitigation Physical Security 00:05:00 Dealing with Malware 00:03:00 Password Management 00:03:00 Clickworthy 00:03:00 Perils of Public Internet 00:02:00 AMA - Ask Me Anything about IT Threat Mitigation Part 1 00:07:00 AMA - Ask Me Anything about IT Threat Mitigation Part 2 00:08:00 Section 12: Computer Maintenance and Management Power Management 00:02:00 Cleaning and Maintaining Computers 00:02:00 Trash it or Stash it? 00:02:00 AMA - Ask Me Anything about Computer Maintenance and Management 00:11:00 Section 13: IT Troubleshooting Troubleshooting 101 00:03:00 AMA - Ask Me Anything about Troubleshooting Computers Part 1 00:10:00 AMA - Ask Me Anything about Troubleshooting Computers Part 2 00:11:00 Section 14: Understanding Databases Introduction to Databases 00:06:00 Database Details 00:06:00 AMA - Ask Me Anything about Databases 00:06:00 Section 15: Developing and Implementing Software Introduction to Programming 00:04:00 Programming with a PBJ Sandwich 00:08:00 AMA - Ask Me Anything about Databases 00:06:00

IT Support Technician Training
Delivered Online On Demand4 hours 54 minutes
£10.99

Aruba OS-CX Switching Fundamentals, Rev. 20.21

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Ideal candidates are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies. Overview After you successfully complete this course, expect to be able to: Explain Networking Fundamentals Describe and review the Aruba Switching portfolio with customers Install and configure devices running the ArubaOS-CX Network Operating System Describe and configure VLANs Explain, describe and configure Spanning Tree Protocol Understand when to use VRRP and how to configure it Explain and configure Link Aggregation Understand and configure IP Routing Explain IP Subnetting Understand and configure OSPFv2 - Single Area Describe and configure Switch Stacking using VSF Configuration of Aruba solutions using Secure Management and Maintenance methodologies Manage, monitor, administer and operate Aruba solutions using Aruba's NetEdit tool This course teaches you the fundamental skills necessary to configure and manage modern, open standards-based networking solutions using Aruba's OS-CX routing and switching technologies. This course consists of approximately 60% lecture and 40% hands-on lab exercises to help you learn how to implement and validate small to medium enterprise network solutions. This 5-day course prepares candidates for the Aruba Certified Switching Associate exam.In this course, participants learn about ArubaOS-CX switch technologies including multi-layer switches. You will also learn about broadcast domains and Virtual Local Area Networks (VLANs); secure management protocols such as AAA, SSH, HTTPS, and Dynamic Segmentation using Aruba's Role-Based Access Control (RBAC); availability technologies such as Multiple Spanning Tree Protocol (MSTP); link aggregation techniques including Link Aggregation Control Protocol (LACP) and switch virtualization with Aruba?s Virtual Switching Framework (VSF). Static and dynamic IP routing protocols such as Open Shortest Path First (OSPF) are also covered. Network Fundamentals What is a network? What is a Protocol? OSI Reference Model Encapsulation, frames, packets, segments Layer 2 to Layer 7 headers Media, cabling, Ethernet/wifi headers Binary/Hex/Decimal theory and conversion TCP/IP Stack (IP addressing & Transport Protocols TCP/UDP) Types of traffic: Unicast, Broadcast, Multicast TCP/IP Stack Overview Ethernet frames IPv4 Header TCP Header ? Three-way Handshake TCP Header ? Sequence Numbers TCP Header ? Port Numbers TCP Header UPD Header Basic Networking with Aruba Solutions Networking devices: Switches, Routers, Multilayer Switches, APs, Mobility Controllers, Firewalls, Servers (HTTP, DHCP, DNS, Telnet, FTP) 2-Tier vs 3-Tier hierarchy Switching Portfolio (AOS switches & AOS-CX switches) is this introducing both portfolio on a couple of slide and few slides on AOS-CX hardware architecture, software architecture and intro to NAE high level. Introduction to AOS-CX and feature set Port numbering Accessing Aruba OS-CX CLI Prompt modes/levels and navigation Context sensitive help Show logs, configuration, interfaces, transceivers, flash, version Hostname/interface name, enabling interfaces Link Layer Discovery Protocol ICMP and reachability testing tools: Ping and Traceroute PoE (standards one slide and what we support and one or two slide on configuration and verifications.) VLANs Broadcast/collision domains VLAN benefits VLAN creation DHCP server configuration in switches (optional) 802.1Q tagging Switchports vs. Routed ports MAC address table ARP table Packet Delivery part 1 Spanning Tree Protocol Redundant network L2 loops 802.1D Common Spanning Tree 802.1s 802.1w overview 802.1w load balancing 802.1w region configuration Link Aggregation Static Aggregation LACP Load Balancing IP Routing - Part 1 Default Gateway DHCP IP Helper Address IP Routing Service Inter-VLAN routing Packet Delivery Part 2 Need for layer 3 redundancy Introduction to VRF VRRP VRRP overview VRRP basic operation VRRP failover and preempt VRRP and MSTP coordination IP Routing - Part 2 Subnetting CIDR Static routes Administrative Distance Floating routes Scalability issues IP Routing - Part 3 IGP vs EGP Distance Vector vs Link State OSPF Router-ID and Hello Messages Passive interfaces States DR and BDR LSDB: LSA 1 and 2 Path selection and convergence Using cost to manipulate routes Stacking Control Plane, Management Plane, and Data Plane Introduction to Stacking technologies Stacking Benefits Centralized control and management plane Distributed Data Plane and Distributed Link Aggregation VSF VSF requirements VSF Link and member roles VSF member IDs and port numbers VSF Configuration VSF Provisioning use cases Tracing Layer 2 traffic: Unicast Tracing Layer 2 traffic: Broadcast, Multicast, and Unknown Unicast VSF Failover and OSFP Graceful-Restart VSF Link failure without MAD MAD VSX Introduction Secure Management and Maintenance OOBM port Management VRF Secure Management Protocols: AAA, SSH, HTTPS, RBAC Radius-based management auth (VSA) SNMP Web interface Configuration file management (Backup, restore, checkpoint and roll back) Operating System image management (backup and restore) Factory default/password recovery AOS-CX Management tools Intro to NetEdit NetEdit installation Basic monitoring with NetEdit AOS-CX Mobile App Additional course details: Nexus Humans Aruba OS-CX Switching Fundamentals, Rev. 20.21 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Aruba OS-CX Switching Fundamentals, Rev. 20.21 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Aruba OS-CX Switching Fundamentals, Rev. 20.21
Delivered OnlineFlexible Dates
Price on Enquiry

Django with Tailwind CSS

By Packt

Embark on a transformative Python web development journey with this course and dive deep into creating a dynamic book rental system from scratch. Master Django's import-export capabilities, design elegant UI with Tailwind CSS, implement advanced features, and more. Elevate your skills and build real-world applications effortlessly!

Django with Tailwind CSS
Delivered Online On Demand12 hours 38 minutes
£52.99

Git Essentials: Become a Git and GitHub Ninja

By Packt

In this course, you will learn everything you need to know about working with Git and GitHub. By the end of this course, you will have the knowledge and confidence you need in order to apply for a job, work in a team, or work on open-source projects.

Git Essentials: Become a Git and GitHub Ninja
Delivered Online On Demand3 hours 25 minutes
£29.99