• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

6237 Courses in Cardiff delivered Online

Computer Networks Security

4.7(160)

By Janets

Register on the Computer Networks Security today and build the experience, skills and knowledge you need to enhance your expert development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a digital certificate as a proof of your course completion. The Computer Networks Security course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Computer Networks Security course Receive a e-certificate upon successful completion of the course Get taught by experienced, expert instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certificate of Achievement Endorsed Certificate of Achievement from the Quality Licence Scheme Once the course has been completed and the assessment has been passed, all students are entitled to receive an endorsed certificate. This will provide proof that you have completed your training objectives, and each endorsed certificate can be ordered and delivered to your address for only £99.00. Please note that overseas students may be charged an additional £10 for postage. CPD Certificate of Achievement from Janets Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Endorsement This course and/or training programme has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course and/or training programme is not regulated by Ofqual and is not an accredited qualification. Your training provider will be able to advise you on any further recognition, for example progression routes into further and/or higher education. For further information please visit the Learner FAQs on the Quality Licence Scheme website. Method of Assessment In order to ensure the Quality Licensing scheme endorsed and CPD acknowledged certificate, learners need to score at least 60% pass marks on the assessment process. After submitting assignments, our expert tutors will evaluate the assignments and give feedback based on the performance. After passing the assessment, one can apply for a certificate. Who Is This Course For The course is ideal for those who already work in this sector or are an aspiring expert . This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a expert lesson to prove your newly-acquired knowledge. Requirements The online training is open to all students and has no formal entry requirements. To study the Computer Networks Security  course, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Introduction Introduction 1122 00:10:00 Section 01: An Introduction to Computer Networks 1.1 Computer Network 00:11:00 1.2 Computer Network Topologies 00:11:00 1.3 Categories of Computer Network 00:10:00 1.4 Computer Network Devices 00:11:00 1.5 Transmission Media 00:09:00 Section 02: ISO/OSI Model 2.1 ISO/OSI Model 00:10:00 2.2 Application, Presentation, and Session Layers 00:12:00 2.3 Transport and Network Layers 00:11:00 2.4 Data Link and Physical Layers 00:09:00 2.5 ISO/OSI Model in Action 00:10:00 Section 03: TCP/IP Protocols 3.1 Introduction to Computer Networks Protocols 00:11:00 3.2 IP Protocol 00:13:00 3.3 TCP and UDP Protocols 00:12:00 3.4 Application Protocols 00:12:00 3.5 TCP/IP Characteristics and Tools 00:11:00 Section 04: Wireless Networks 4.1 Wireless Networks Benefits 00:09:00 4.2 Types of Wireless Networks 00:12:00 4.3 Wireless Networks Protocol (Wi-Fi) 00:07:00 4.4 Wireless Networks Devices 00:10:00 4.5 Wireless Networks Drawbacks 00:09:00 Section 05: Network Security 5.1 Security Goals 00:09:00 5.2 Securing the Network Design 00:10:00 5.3 TCP/IP Security and Tools 00:12:00 5.4 Port Scanning and Tools 00:12:00 5.5 Sniffing and Tools 00:10:00 Section 06: Firewalls and Honeypots 6.1 Reasons to Use Firewall 00:13:00 6.2 Firewalls Rules 00:11:00 6.3 Firewalls Filtering 00:09:00 6.4 Honeypots 00:07:00 6.5 Bypassing Firewalls 00:08:00 Section 07: Intrusion Detection and Prevention System 7.1 Intrusion Detection System: IDS 00:11:00 7.2 Network IDS: NIDS 00:06:00 7.3 NIDS Challenges 00:09:00 7.4 Snort as NIDS 00:08:00 7.5 Intrusion Prevention Systems: IPS 00:07:00 Section 08: Wireless Network Security 8.1 Wired Equivalent Privacy WEP Attacking 00:11:00 8.2 WPA and AES Protocols 00:09:00 8.3 Wireless Security Misconceptions 00:09:00 8.4 Wireless Attacks and Mitigation 00:09:00 8.5 Secure Network Design with Wireless 00:09:00 Section 09: Physical Security and Incident Handling 9.1 Physical Security Objectives 00:11:00 9.2 Physical Threats and Mitigation 00:11:00 9.3 Defense in Depth (DiD) 00:07:00 9.4 Incident 00:06:00 9.5 Incident Handling 00:14:00 Section 10: Network Security: Conclusion 10.1 Confidentiality, Integrity, and Availability (CIA) 00:06:00 10.2 Assets, Threats, and Vulnerabilities 00:04:00 10.3 Risks and Network Intrusion 00:06:00 10.4 Common Attacks 00:09:00 10.5 Security Recommendations 00:06:00 Assignment Assignment - Computer Networks Security 2 weeks, 1 day Order Your Certificate Order your Certificate QLS 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Computer Networks Security
Delivered Online On Demand3 weeks
£25

Diploma in Quality Management

4.7(160)

By Janets

Register on the Diploma in Quality Management today and build the experience, skills and knowledge you need to enhance your development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a digital certificate as a proof of your course completion. The Diploma in Quality Management is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! Why Choose this Course Earn a digital Certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Benefit from instant feedback through mock exams and multiple-choice assessments Get 24/7 help or advice from our email and live chat teams Full Tutor Support on Weekdays Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of- Video lessons Online study supplies Assignment Certificate of Achievement Endorsed Certificate of Achievement from the Quality Licence Scheme Once the course has been completed and the assessment has been passed, all students are entitled to receive an endorsed certificate. This will provide proof that you have completed your training objectives, and each endorsed certificate can be ordered and delivered to your address for only £99. Please note that overseas students may be charged an additional £10 for postage. CPD Certificate of Achievement from Janets Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Endorsement This course and/or training programme has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course and/or training programme is not regulated by Ofqual and is not an accredited qualification. Your training provider will be able to advise you on any further recognition, for example progression routes into further and/or higher education. For further information please visit the Learner FAQs on the Quality Licence Scheme website. Method of Assessment In order to ensure the Quality Licensing scheme endorsed and CPD acknowledged certificate, learners need to score at least 60% pass marks on the assessment process. After submitting assignments, our expert tutors will evaluate the assignments and give feedback based on the performance. After passing the assessment, one can apply for a certificate. Who is this course for? The course is ideal for those who already work in this sector or are an aspiring expert. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a lesson to prove your newly-acquired knowledge. Course Content Introduction. Summary of the course. 00:01:00 About the instructor. 00:01:00 The 7 basic quality tools. The 7 basic quality tools. 00:01:00 Tool 1 : The Check sheet. 00:01:00 Tool 1 : The Check sheet in practice. 00:06:00 Tool 2 : The Brainstorming. 00:01:00 Tool 3 : The Brainstorming in practice. 00:06:00 Tool 3 : The Cause & Effect diagram. 00:01:00 Tool 3 : The C&E diagram in practice. 00:08:00 Tool 4 : The Histogram. 00:01:00 Tool 4 : The Histogram in practice. 00:10:00 Tool 5 : The Pareto diagram. 00:01:00 Tool 5 : The Pareto diagram in practice. 00:09:00 Tool 6 - A : The Control chart. 00:01:00 Tool 6 - A : The Control chart in practice p1. 00:11:00 Tool 6 - A : The Control chart in practice p2. 00:10:00 Tool 6 - B : The Scatter plot . 00:01:00 Tool 6 - B : The Scatter plot in practice. 00:07:00 Tool 7 : Flowchart / Process mapping. 00:01:00 Tool 7: Flowchart / Process mapping in practice. 00:10:00 Overview of the section. 00:02:00 The Problem Solving Process. The Problem Solving Process (PSP). 00:04:00 The PSP in detail. 00:08:00 Overview of the section. 00:01:00 Problem Solving Methods. The Problem Solving Methods. 00:01:00 Method 1 : The A3. 00:01:00 Method 1 : The A3 sheet. 00:04:00 Method 2 : The 8D. 00:01:00 Method 2 : The 8D sheet 00:04:00 Method 3-A : The PDCA. 00:01:00 Method 3-B : The 5 Why. 00:01:00 Method 1 : The A3 in practice. 00:15:00 Method 2 : The 8D in practice. 00:12:00 Method 4 : Six Sigma. 00:01:00 Method 4 : More about Six Sigma. 00:05:00 Method 5 : The Shainin Methodology. 00:01:00 Method 5 : The Shaining System. 00:06:00 Overview of the section. 00:01:00 The Preventive tools. The preventive tools. 00:01:00 Tool 1 : The FMEA. 00:01:00 Tool 1 : The FMEA process. 00:14:00 Tool 1 : The FMEA in practice. 00:12:00 Tool 2 : The Control plan. 00:01:00 Tool 2 : The Control plan in practice. 00:07:00 Overview of the section. 00:01:00 Conclusion. And the Quality Management in all of this? 00:01:00 It's only the beginning ! 00:04:00 Resources Resources - Diploma in Quality Management 00:00:00 Assignment Assignment - Diploma in Quality Management 2 weeks, 1 day Order Your Certificate Order your Certificate QLS 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Diploma in Quality Management
Delivered Online On Demand3 weeks
£25

Ethical Hacking and CompTIA PenTest+ Exam Prep (PT0-002)

By Packt

The course focuses on the five domains that should be known for the CompTIA PenTest+ PT0-002 exam. Learn to successfully plan and scope a pen test engagement with a client, find vulnerabilities, exploit them to get into a network, then report on those findings to the client with the help of this comprehensive course.

Ethical Hacking and CompTIA PenTest+ Exam Prep (PT0-002)
Delivered Online On Demand14 hours 39 minutes
£261.99

Building Data Analytics Solutions Using Amazon Redshift

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for data warehouse engineers, data platform engineers, and architects and operators who build and manage data analytics pipelines. Completed either AWS Technical Essentials or Architecting on AWS Completed Building Data Lakes on AWS Overview In this course, you will learn to: Compare the features and benefits of data warehouses, data lakes, and modern data architectures Design and implement a data warehouse analytics solution Identify and apply appropriate techniques, including compression, to optimize data storage Select and deploy appropriate options to ingest, transform, and store data Choose the appropriate instance and node types, clusters, auto scaling, and network topology for a particular business use case Understand how data storage and processing affect the analysis and visualization mechanisms needed to gain actionable business insights Secure data at rest and in transit Monitor analytics workloads to identify and remediate problems Apply cost management best practices In this course, you will build a data analytics solution using Amazon Redshift, a cloud data warehouse service. The course focuses on the data collection, ingestion, cataloging, storage, and processing components of the analytics pipeline. You will learn to integrate Amazon Redshift with a data lake to support both analytics and machine learning workloads. You will also learn to apply security, performance, and cost management best practices to the operation of Amazon Redshift. Module A: Overview of Data Analytics and the Data Pipeline Data analytics use cases Using the data pipeline for analytics Module 1: Using Amazon Redshift in the Data Analytics Pipeline Why Amazon Redshift for data warehousing? Overview of Amazon Redshift Module 2: Introduction to Amazon Redshift Amazon Redshift architecture Interactive Demo 1: Touring the Amazon Redshift console Amazon Redshift features Practice Lab 1: Load and query data in an Amazon Redshift cluster Module 3: Ingestion and Storage Ingestion Interactive Demo 2: Connecting your Amazon Redshift cluster using a Jupyter notebook with Data API Data distribution and storage Interactive Demo 3: Analyzing semi-structured data using the SUPER data type Querying data in Amazon Redshift Practice Lab 2: Data analytics using Amazon Redshift Spectrum Module 4: Processing and Optimizing Data Data transformation Advanced querying Practice Lab 3: Data transformation and querying in Amazon Redshift Resource management Interactive Demo 4: Applying mixed workload management on Amazon Redshift Automation and optimization Interactive demo 5: Amazon Redshift cluster resizing from the dc2.large to ra3.xlplus cluster Module 5: Security and Monitoring of Amazon Redshift Clusters Securing the Amazon Redshift cluster Monitoring and troubleshooting Amazon Redshift clusters Module 6: Designing Data Warehouse Analytics Solutions Data warehouse use case review Activity: Designing a data warehouse analytics workflow Module B: Developing Modern Data Architectures on AWS Modern data architectures

Building Data Analytics Solutions Using Amazon Redshift
Delivered OnlineFlexible Dates
Price on Enquiry

Data Science Projects with Python

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for If you are a data analyst, data scientist, or a business analyst who wants to get started with using Python and machine learning techniques to analyze data and predict outcomes, this book is for you. Basic knowledge of computer programming and data analytics is a must. Familiarity with mathematical concepts such as algebra and basic statistics will be useful. Overview By the end of this course, you will have the skills you need to confidently use various machine learning algorithms to perform detailed data analysis and extract meaningful insights from data. This course is designed to give you practical guidance on industry-standard data analysis and machine learning tools in Python, with the help of realistic data. The course will help you understand how you can use pandas and Matplotlib to critically examine a dataset with summary statistics and graphs, and extract the insights you seek to derive. You will continue to build on your knowledge as you learn how to prepare data and feed it to machine learning algorithms, such as regularized logistic regression and random forest, using the scikit-learn package. You?ll discover how to tune the algorithms to provide the best predictions on new and unseen data. As you delve into later sections, you?ll be able to understand the working and output of these algorithms and gain insight into not only the predictive capabilities of the models but also their reasons for making these predictions. Data Exploration and Cleaning Python and the Anaconda Package Management System Different Types of Data Science Problems Loading the Case Study Data with Jupyter and pandas Data Quality Assurance and Exploration Exploring the Financial History Features in the Dataset Activity 1: Exploring Remaining Financial Features in the Dataset Introduction to Scikit-Learn and Model Evaluation Introduction Model Performance Metrics for Binary Classification Activity 2: Performing Logistic Regression with a New Feature and Creating a Precision-Recall Curve Details of Logistic Regression and Feature Exploration Introduction Examining the Relationships between Features and the Response Univariate Feature Selection: What It Does and Doesn't Do Building Cloud-Native Applications Activity 3: Fitting a Logistic Regression Model and Directly Using the Coefficients The Bias-Variance Trade-off Introduction Estimating the Coefficients and Intercepts of Logistic Regression Cross Validation: Choosing the Regularization Parameter and Other Hyperparameters Activity 4: Cross-Validation and Feature Engineering with the Case Study Data Decision Trees and Random Forests Introduction Decision trees Random Forests: Ensembles of Decision Trees Activity 5: Cross-Validation Grid Search with Random Forest Imputation of Missing Data, Financial Analysis, and Delivery to Client Introduction Review of Modeling Results Dealing with Missing Data: Imputation Strategies Activity 6: Deriving Financial Insights Final Thoughts on Delivering the Predictive Model to the Client

Data Science Projects with Python
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Architect B2C Commerce Solutions (ARC300)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This class is designed for experienced B2C Commerce Technical Leads, Solution Architects, B2C Commerce Developers, Technical Directors, Owners of Technical Design and Quality Implementations, and anyone looking to earn their Salesforce B2C Commerce Architect credential. We recommend earning the Salesforce B2C Commerce Developer credential, or having equivalent experience, prior to attending this class. Overview When you complete this course, you will be able to: Familiarize yourself with B2C Commerce Cloud and industry best practices Understand ecommerce platform migration strategies Design B2C Commerce implementations that scale gracefully Design multi-site and multi-region solutions Maximize success on the B2C Commerce Architect Exam In this 4-day, expert-led class, learn the industry-standard steps to take a B2C Commerce site through the complete implementation lifecycle. Through expert-led demo, hands-on exercises, and workshops, learn how to design and build secure, scalable B2C Commerce sites that address real-world customer requirements and deliver better digital commerce experiences. Discovery and Design Assess Your Delivery Approach Document the System Landscape Plan for Growth Use the Commerce Cloud Partner LINK Marketplace Building Essentials Define the Implementation Process Review Implementation Best Practices Solve Complex Business Requirements Understand the Build Process and Unit Testing Learn How to Conduct Load Testing Integrations and Customizations Review the Available Integration Approaches Understand Integration Frameworks Review Integration Design Patterns Review Legacy Implementation Considerations Monitoring and Troubleshooting Learn About the Log Settings Capabilities in Business Manager Understand Platform Governance Best Practices Learn How to Do Performance Analysis Especially During Critical Sales Events Discover How to Optimize Implementations Launch Review SEO Configuration Best Practices Understand Launch Activities Monitor Post-Launch Activities Manage Launch Schedules Migrate Data from Legacy Systems Additional course details: Nexus Humans Salesforce Architect B2C Commerce Solutions (ARC300) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Architect B2C Commerce Solutions (ARC300) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Salesforce Architect B2C Commerce Solutions (ARC300)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Optical Technology Advanced (OPT300)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for the following technical professionals who need to use advanced features of fiber optics technology: System installers System integrators System administrators Network administrators Solutions designers Overview After taking this course, you should be able to: Perform the ONS 15454 MSTP node turn-up procedure Describe first generation mesh topologies Describe the Optical Channel Network Connection (OCHNC) prerequisite requirements for provisioning circuits in an ONS 15454 MSTP network Describe the ONS MSTP advanced protocols Describe the OCHNC circuit provisioning for Single Module (SM) Reconfigurable Optical Add-Drop Multiplexer (ROADM) rings Describe the Any-Rate Muxponder Crossponder (AR MXP/XP) cards Describe how the Pseudo Command Line can be used to configure muxponder cards Identify the advantages G.709 encapsulation brings to optical transponder cards Install and provision the Any Rate cards Describe the 100-Gbps and 200-Gbps cards Describe the NCS 2000 400-Gbps Xponder line card and how it is configured Describe the SM ROADM (SMR)-based configurations Describe the 10-Gbps transponder and muxponder cards List the 10GE_XP and GE_XP card options Describe ingress policing and basic egress queuing strategies, and implement the customer QoS scheme into the ONS 15454 crossponder network Identify the principles of Ethernet related to the operation of Cisco optical networking products Configure the 10GE_XP/XPE and GE_XP/XPE cards, install Layer 1 circuits, and read the performance counters for Layer 1 Gigabit Ethernet circuits Turn up an encrypted network and test to ensure that information being passed is secure Add a node to an existing DWDM ring Describe problems with interconnecting circuits between rings, the ONS 15454 MSTP 80-channel manual Multiring feature, and hardware components Describe the ONS 15454 MSTP Troubleshooting Guide The Cisco Optical Technology Advanced (OPT300) v2.0 course gives you the skills you need to deploy advanced features of the Cisco© Optical Networking Services (ONS) 15454 Multiservice Transport Platform (MSTP) and Cisco Network Convergence System (NCS) 2000 Series. In this course you?ll learn to how to use the Cisco Transport Planner Design Tool to create network topologies and advanced network topologies. You will learn how to use advanced Dense Wavelength Division Multiplexing (DWDM) features such as G.709 encapsulation, generic framing protocol G.7041, Layer 1 circuits, Quality of Service (QoS), crossponder networks using T1 over Ethernet, and encryption. Course Outline Cisco Transport Planner Design Tool First-Generation Mesh Topologies Ochnc In A Mesh Network Advanced Protocols Any Rate Muxponder And Crossponders 100-Gbps And 200-Gbps Transponders And Muxponders Cisco Ncs 2000 400-Gbps Xponder Line Card Cisco 10G Web Security Essentials (Wse) Network Encryption Card Adding A New Location With Cisco Transport Planner (Ctp) And Cisco Transport Controller (Ctc) Crossponders And Layer 1 Networks Crossponders And Layer 2 Networks Troubleshooting

Cisco Optical Technology Advanced (OPT300)
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Endpoint Protection 12.X - Install, Configure, And Deploy

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants who are charged with the installation, configuration, and day-to-day management of Symantec Endpoint Protection in a variety of network environments, and who are responsible for troubleshooting and tuning the performance of this product in the enterprise environment. Overview At the completion of the course, you will be able to: Describe Symantec Endpoint Protection products, components, dependencies, and system hierarchy. Install and configure Symantec Endpoint Protection management and client components. Deploy Symantec Endpoint Protection Windows, Windows Embedded, Mac and Linux clients. Manage the client user interface. Manage content updates for Windows, Mac, and Linux. Perform server and database management. Configure replication and load balancing. Design a Symantec Endpoint Protection environment. This course is designed for the network, IT security, and systems administration professional tasked with architecting and implementing Symantec Endpoint Protection. Introduction Course overview The classroom lab environment Symantec Endpoint Protection Product Solution Why use Symantec Endpoint Protection? Symantec Endpoint Protection technologies Symantec Endpoint Protection services Symantec Endpoint Protection components Symantec Endpoint Protection policies and concepts Extending Symantec Endpoint Protection Installing the Symantec Endpoint Protection Manager Identifying system requirements Preparing servers for installation Installing and configuring the Symantec Endpoint Protection Manager Describing Symantec Endpoint Protection upgrades and version compatibility Configuring the Symantec Endpoint Protection Environment Starting and navigating the SEPM Describing policy types and components Console authentication Licensing the SEP environment Deploying Windows and Windows Embedded Clients Planning the client deployment Configuring client deployment package Deploying packages to clients Maintaining the client environment Upgrading Symantec Endpoint Protection clients Deploying Mac and Linux Clients Linux prerequisites Linux deployment Mac prerequisites Mac deployment Client and Policy Management Describing SEPM and client communications Administering clients Configuring groups Configuring locations Active Directory integration with SEP 12.1 Client configuration modes Configuring domains General client settings and Tamper Protection Configuring Content Updates for Windows Clients Introducing LiveUpdate Configuring the SEPM for LiveUpdate Configuring the LiveUpdate Settings and Content policies Configuring multiple group update providers (GUPs) Manually updating virus definitions Configuring Content Updates for Mac and Linux Clients Describing content update methods Configuring the LiveUpdate policy Configuring the SEPM as a reverse proxy Monitoring updates Performing Server and Database Management Managing SEPM servers Maintaining server security Communicating with other servers Managing administrators Managing the database Disaster recovery techniques Configuring Replication and Failover and Load Balancing About sites and replication How replication works Symantec Endpoint Protection replication scenarios Configuring replication Failover and load balancing Designing a Symantec Endpoint Environment Architecture components Architecture constraints Component placement Content delivery Determining client to SEPM ratios SEPM and database sizing best practices

Symantec Endpoint Protection 12.X - Install, Configure, And Deploy
Delivered OnlineFlexible Dates
Price on Enquiry

Project Management: Fundamentals of Predictive and Adaptive Methods

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for individuals in a variety of job roles whose primary responsibility is not project management, but who manage projects on an informal basis; who contribute as members of a project team; or who wish to incorporate project management practices into their personal work. It is also beneficial for anyone who is considering a career path in project management and desiring a complete overview of the field and its generally accepted practices. Overview In this course, you will identify the elements of sound project management and apply the generally recognized project management practices to successfully manage or participate in projects. You will: Identify the key processes and requirements of project management. Initiate a project. Use a Predictive approach to plan for time and cost. Use an Adaptive approach to plan a project. Plan for project risks, communication, and change control. Manage the execution of a project. Close a project. This course teaches the fundamentals of project management and its underlying structure and elements, including project phases, project life cycles, stakeholders, and areas of expertise. These, coupled with the ability to identify the project management processes that are recognized industry wide as good practice, will help you to apply effective project management techniques to improve the efficiency of your projects and ensure their success. This course is designed to cover various project management approaches and is not intended to focus on a single methodology or framework. Lesson 1: Getting Started with Project Management Topic A: Identify the Characteristics of a Project Topic B: Identify the Project Approach Topic C: Identify the Leadership Roles in a Project Lesson 2: Initiating a Project Topic A: Create a Project Scope/Vision Statement Topic B: Identify the Essential Skills for a Project Team Topic C: Identify the Risks to a Project Lesson 3: Planning for Time and Cost in Predictive Projects Topic A: Create a WBS Topic B: Create a Project Schedule Topic C: Determine Project Costs Lesson 4: Planning for Adaptive Projects Topic A: Create Epics and User Stories Topic B: Build a Product Backlog Topic C: Create an Initial Release Plan Topic D: Conduct a Sprint Planning Meeting Topic E: Replan the Project Lesson 5: Planning for Project Risks, Communication, and Change Control Topic A: Analyze the Risks to a Project Topic B: Create a Communication Plan Topic C: Develop a Change Control Plan Lesson 6: Managing a Project Topic A: Begin Project Work Topic B: Execute the Project Plan Topic C: Track the Progress of an Adaptive Project Topic D: Report Project Performance Topic E: Implement Change Control Lesson 7: Closing a Project Topic A: Close a Sprint, a Release, or an Adaptive Project Topic B: Close a Predictive Project Topic C: Create a Final Report

Project Management: Fundamentals of Predictive and Adaptive Methods
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere: Troubleshooting [v7.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators System integrators Overview By the end of the course, you should be able to meet the following objectives: Introduce troubleshooting principles and procedures Practice Linux commands that aid in the troubleshooting process Use command-line interfaces, log files, and the vSphere Client to diagnose and resolve problems in the vSphere environment Explain the purpose of key vSphere log files Identify networking problems based on reported symptoms, validate and troubleshoot the reported problem, identify the root cause and implement the appropriate resolution Analyze storage failure scenarios using a logical troubleshooting methodology, identify the root cause, and apply the appropriate resolution to resolve the problem Troubleshoot vSphere cluster failure scenarios and analyze possible causes Diagnose common VMware vSphere High Availability problems and provide solutions Identify and validate VMware ESXi™ host and VMware vCenter Server problems, analyze failure scenarios, and select the correct resolution Troubleshoot virtual machine problems, including migration problems, snapshot problems, and connection problems Troubleshoot performance problems with vSphere components This five-day, hands-on training course provides you with the advanced knowledge, skills, and abilities to achieve competence in troubleshooting the VMware vSphere© 7.x environment. This workshop increases your skill and competence in using the command-line interface, VMware vSphere© Client?, log files, and other tools to analyze and solve problems Course Introduction Introductions and course logistics Course objectives Introduction to Troubleshooting Define the scope of troubleshooting Use a structured approach to solve configuration and operational problems Apply a troubleshooting methodology to logically diagnose faults and improve troubleshooting efficiency Troubleshooting Tools Use command-line tools (such as Linux commands, vSphere CLI, ESXCLI) to identify and troubleshoot vSphere problems Identify important vSphere log files and interpret the log file contents Troubleshooting Virtual Networking Analyze and resolve standard switch and distributed switch problems Analyze virtual machine connectivity problems and fix them Examine common management network connectivity problems and restore configurations Troubleshooting Storage Troubleshoot and resolve storage (iSCSI, NFS, and VMware vSphere© VMFS) connectivity and configuration problems Analyze and resolve common VM snapshot problems Identify multipathing-related problems, including common causes of permanent device loss (PDL) and all paths down (APD) events and resolve these problems Troubleshooting vSphere Clusters Identify and recover from problems related to vSphere HA Analyze and resolve VMware vSphere© vMotion© configuration and operational problems Analyze and resolve common VMware vSphere© Distributed Resource Scheduler? problems Troubleshooting Virtual Machines Identify possible causes and resolve virtual machine power-on problems Troubleshoot virtual machine connection state problems Resolve problems seen during VMware Tools? installations Troubleshooting vCenter Server and ESXi Analyze and fix problems with vCenter Server services Analyze and fix vCenter Server database problems Examine ESXi host and vCenter Server failure scenarios and resolve the problems

VMware vSphere: Troubleshooting [v7.0]
Delivered OnlineFlexible Dates
Price on Enquiry