• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

41257 Courses in Cardiff delivered Online

Arcserv (3 - Days )

By Nexus Human

Duration 3 Days 18 CPD hours

Arcserv (3 - Days )
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Tester Foundation Level (CTFL)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Anyone who wants to qualify as a professional tester. The certification also offers good qualifications for builders, designers, programmers and project managers Overview This three-day training provides a general introduction to information systems testing. The objective of the training is to prepare the students for the ISTQB Foundation exam. Some important topics that will certainly be discussed here are the importance of testing, testing in relation to system development and the fundamentals of a structured testing process. The different phases in a test project are explained, after which some test techniques (both black box and white box) are also discussed. This foundation training therefore contains the basis in testing for both test managers and testers. In addition to theory, the training also includes a number of mock exams, so that the topics covered are placed even better in the exam context. Course Outline test principles life cycle testing static techniques test specification techniques blackbox techniques whitebox techniques and experienced based techniques Additional course details: Nexus Humans Certified Tester Foundation Level (CTFL) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Tester Foundation Level (CTFL) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Tester Foundation Level (CTFL)
Delivered OnlineFlexible Dates
Price on Enquiry

NIST Cyber Security Professional (NCSP) Foundation

By Nexus Human

Duration 1 Days 6 CPD hours Overview The purpose of this document is to provide the learning outcomes for the course and the assessment criteria. It also provides an overview of the examination design in terms of the types of questions asked.Starting with Chapter 2, Digital Transformation, the BL 1 & 2 (for Bloom's Taxonomy 1 & 2) provides the number of questions that will appear on the exam. This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain. Digital Transformation Explain what it means to ?become digital.? Discuss the difference between industrial and digital era enterprises. Explain how cybersecurity supports an organization?s digital transformation. Understanding cyber Risks Explain the cyber risk equation. Identify and explain each component of the cyber risk equation. Describe the basics of a risk assessment. NIST Cybersecurity Framework Fundamentals9 Explain the genesis of the NIST-CSF. List and describe the components of the NIST-CSF. Describe each of the NIST-CSF?s objectives. Core Functions, Categories & Subcategories Understand and explain the a.Core Functions b.Framework Categories c.Informative References. Implementation Tiers & Profiles Understand and explain Implementation Tier terms and their use. Understand and explain each Implementation Tier. Understand and describe the three risk categories Understand and explain Profiles and their use a.Current b.Target Understand and describe the use of Profiles when a.Determining gaps b.Identify & prioritize focus areas Cybersecurity Improvement Understand and explain how an organization can approach the adoption and adaptation of the NIST-CSF Understand and describe how to implement cybersecurity controls using an incremental improvement approach. Understand and describe CIIS as a practice within an organization.

NIST Cyber Security Professional (NCSP) Foundation
Delivered OnlineFlexible Dates
Price on Enquiry

CCSP Certification Prep Course

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Anyone whose position requires CCSP certificationIndividuals whose responsibilities involve procuring, securing, and managing cloud environments or purchased cloud services Overview In-depth coverage of the six domains required to pass the CCSP exam:Architectural concepts and design requirementsCloud data securityCloud platform and infrastructure securityCloud application securityOperationsLegal and compliance This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the CCSP Common Body of Knowledge (CBK). You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments. You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes. Architectural Concepts and Design Requirements Cloud Data SecurityCloud Platform and Infrastucture Security Cloud Application SecurityOperations Legal and compliance

CCSP Certification Prep Course
Delivered OnlineFlexible Dates
Price on Enquiry

C)VA - Certified Vulnerability Assessor Mile 2

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Information System Owners Analysts Ethical Hackers ISSOs Cyber Security Managers IT Engineers Overview Upon completion, the Certified Vulnerability Assessor candidate will be able to competently take the exam. This course provides a solid understanding of the tools an IT engineer needs to review an Information System. In this course, you will learn the importance of vulnerability assessments and how they are used to prevent serious cyber break-ins. Lessons include understanding malware and viruses and how they can infiltrate an organization?s network. After you take this course, you will be able to assess a company?s security posture and perform a basic vulnerability test.ÿPlus, you will be able to generate reports to guide new security implementation. Course Outline Why Vulnerability Assessment Vulnerability Types Assessing the Network Assessing Web Servers and Applications Assessing Remote and VPN Services Vulnerability Assessments & Tools of the Trade Output Analysis

C)VA - Certified Vulnerability Assessor Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

C)CSA: Cybersecurity Analyst Mile 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security Professionals Incident Handling Professionals Anyone in a Security Operations Center Forensics Experts Cybersecurity Analysts Overview Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time. Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today's needs. When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today's exploits. This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time.Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today?s needs.When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today?s exploits.This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Blue Team?Principles Network Architecture?and how it lays the groundwork Defensive Network Security Data Locations?and how they tie together Security?Operations?Center The People, Processes, and Technology Triage and Analysis Digital Forensics Incident Handling Vulnerability Management Automation, Improvement, and Tuning Digital?Forensics Investigative Theory and?Processes Digital Acquisition Evidence Protocols Evidence Presentation Computer Forensics?Laboratory Protocols Processing Techniques Specialized?Artifacts Advanced Forensics for Today?s?Exploitations Malware Analysis Creating the Safe Environment Static Analysis Dynamic Analysis Behavior Based Analysis What is different about?Ransomware? Manual Code Reversing Traffic Analysis Manual Analysis Principles Automated?Analysis Principles Signatures?compared to?Behaviors Application Protocols Analysis Principles Networking Forensics Assessing the Current State of Defense with the?Organization Network Architecture and Monitoring Endpoint Architecture and Monitoring Automation, Improvement, and continuous?monitoring Leveraging SIEM for Advanced Analytics Architectural Benefits Profiling and?Baselining Advanced Analytics Defeating the Red Team with Purple Team tactics Penetration Testing?with full knowledge Reconnaissance Scanning Enumeration Exploitation Lateral Movement Additional course details: Nexus Humans C)CSA: Cybersecurity Analyst Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)CSA: Cybersecurity Analyst Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)CSA: Cybersecurity Analyst Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Although there are no mandatory prerequisites, the course is particularly suited for the following audiences: Cybersecurity engineer Cybersecurity investigator Incident manager Incident responder Network engineer SOC analysts currently functioning at entry level with 2+ years of experience Overview After taking this course, you should be able to: Describe the types of service coverage within a SOC and operational responsibilities associated with each. Compare security operations considerations of cloud platforms. Describe the general methodologies of SOC platforms development, management, and automation. Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections. Describe Zero Trust and associated approaches, as part of asset controls and protections. Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC. Use different types of core security technology platforms for security monitoring, investigation, and response. Describe the DevOps and SecDevOps processes. Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, CommaSeparated Values (CSV). Describe API authentication mechanisms. Analyze the approach and strategies of threat detection, during monitoring, investigation, and response. Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs). Interpret the sequence of events during an attack based on analysis of traffic patterns. Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools). Analyze anomalous user and entity behavior (UEBA). Perform proactive threat hunting following best practices. The Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity fundamentals and prepares you for the role of Information Security Analyst on a Security Operations Center team. You?ll learn to automate for security using cloud platforms and how to apply your knowledge to real-world scenarios Course Outline Understanding Risk Management and SOC Operations Understanding Analytical Processes and Playbooks Investigating Packet Captures, Logs, and Traffic Analysis Investigating Endpoint and Appliance Logs Understanding Cloud Service Model Security Responsibilities Understanding Enterprise Environment Assets Threat Tuning Threat Researching and Threat Intelligence Practices Understanding APIs Understanding SOC Development and Deployment Models Performing Security Analytics and Reports in a SOC Malware Forensics Basics Threat Hunting Basics Additional course details: Nexus Humans Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Introduction to Application Delivery Controller with NSX Advanced Load Balancer

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Experienced system administrators or network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Explain and configure Local Load Balancing constructors such as Virtual Services, Pools, Health Monitors and related components During this one-day course, you gain an understanding of the architecture and features of VMware NSX Advanced Load Balancer (Avi Networks) solution. This course provides hands-on labs to provide a solid foundation to load balancing fundamentals and work with most common load balancing functionality offered by VMware NSX Advanced Load Balancer (Avi Networks) solution. Course Introduction Introductions and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Virtual Services Configuration Concepts Explain Virtual Service components Explain Virtual Service types Explain and configure basic virtual services components such as Application Profiles, Network Profiles, Pools and Health Monitors Profiles and Policies Explain and deep dive on Advanced Virtual Service creation Explain and deep dive on Application Profiles and Types such as L4, DNS, Syslog and HTTP Explain and configure advanced application HTTP Profile options Deep dive on Network Profiles and Types Explain and configure SSL Profiles and Certificates Explain and Configure HTTP and DNS policies Pools Configuration Concepts Explain and deep dive on Pools configuration options Describe available Load Balancing algorithms Explain multiple Health Monitor types Explain multiple Persistence Profiles Explain and configure Pool Groups

VMware Introduction to Application Delivery Controller with NSX Advanced Load Balancer
Delivered OnlineFlexible Dates
Price on Enquiry

SM100 SAP Solution Manager Configuration for Operations

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators, system architects, and technology consultants In this course, students learn how to manage the SAP Solutions Manager Configuration suite and discover how it can be integrated into their day-to-day operations. Course Outline SAP Solution Manager Overview: available Scenarios, Enhancements, Work Center Technical Overview: Installation, Architecture, Sizing SAP Solution Manager Configuration: SOLMAN_SETUP, SMSY, LMDB, Landscape Verification (LV), System Landscape Directory (SLD), Solution Manager Diagnostics Managing Authorizations in SAP Solution Manager Maintenance Optimizer, Maintenance Certificates, System Recommendations, Issue and Task Management Early Watch Alert Reporting: ABAP & Java, EarlyWatch Alert for Solutions Managing Solutions: Work Mode Management and additional administrative Tasks Monitoring and Alerting Infrastructure (MAI), Solution Monitoring and System Monitoring Service Level Reporting, Technical Reporting, Management Reporting SAP Mobile Apps for SAP Solution Manager Job Management: Job Request Management, Job Documentation, Job Monitoring, Job Scheduling Management Health Checks and more Additional course details: Nexus Humans SM100 SAP Solution Manager Configuration for Operations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SM100 SAP Solution Manager Configuration for Operations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SM100 SAP Solution Manager Configuration for Operations
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Configuring BIG-IQ

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for system and network administrators or operators responsible for the installation, setup, configuration, and administration of the BIG-IQ system or management of BIG-IP devices and F5 products running on those devices. This course uses lectures and hands-on exercises to give participants real-time experience in configuring and using the BIG-IQ© product. Students are introduced to BIG-IQ, its interface, and its various functionality. We first look at administering and operating the BIG-IQ system itself, then detail how it is used to remotely manage BIG-IP devices running BIG-IP Local Traffic Manager (LTM). We then look configuring a BIG-IQ Data Collection Device (DCD) system and see how it is used for the remote storage and examination of BIG-IP log events and statistics. Module 1: BIG-IQ Overview BIG-IQ Centralized Management BIG-IQ Components BIG-IQ Core Functionality REST API BIG-IQ Data Collection Device (DCD) BIG-IP Cloud Edition (CE) Setting up the BIG-IQ System Module 2: Administering the BIG-IQ System Controlling Access to the BIG-IQ Creating, Authenticating, Configuring Users Backups Local Host Settings Configuring DNS, NTP, and SMTP Monitoring BIG-IQ, DCD, and BIG-IP Events with Alerts Monitoring BIG-IQ with iHealth Post Installation Issues; Licensing, Changing Management IP, Master Key, Restoring Backups Module 3: Managing BIG-IP LTM Devices BIG-IP LTM Device Discovery BIG-IP Device Backup Deploying to BIG-IP Devices Deployment and Deployment Logs Configuration Snapshots Managing BIG-IP Certificates Managing BIG-IP Licenses Monitoring BIG-IP Devices with iHealth Management of QKView Reports from Managed BIG-IP Devices Module 4: Setting Up the BIG-IQ Data Collection Device Custom Roles Types and Groups Setting up User Accounts with custom roles and privileges Managing BIG-IP DSC Discovery and management of BIG-IP Device Clusters (DSC) with BIG-IQ Administering BIG-IQ High Availability Configuration and management of BIG-IQ systems in a High Availability pair

F5 Networks Configuring BIG-IQ
Delivered OnlineFlexible Dates
Price on Enquiry