• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

265 Courses in Leicester delivered Online

70-417 - Upgrading Your Skills to MCSA Windows Server 2012

4.3(43)

By John Academy

Description: The 70-417 - Upgrading Your Skills to MCSA Windows Server 2012 course provides all the essential topics and skills that you need to know for MCSA Windows Server. The course will upgrade your skills to MCSA Windows Server 2012. Throughout the course, you will learn how to install and configure servers, configure server roles, features and Hyper-V, install and administer Active Directory, configure network services and access, configure a network policy server infrastructure, and deploy, manage, and maintain servers. The course will also show you how to configure and manage Active Directory, group policy and high availability, configure file and storage solutions, implement business continuity and disaster recovery, configure network services, identity and access solutions. If you pass the exam, you will be qualified as a Microsoft Certified Solutions Associate (MCSA) in Windows Server 2012. The purpose of the course is to prepare you for the Exam. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? 70-417 - Upgrading Your Skills to MCSA Windows Server 2012 is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our 70-417 - Upgrading Your Skills to MCSA Windows Server 2012 is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Install and Configure Servers Install and Configure Servers FREE 00:17:00 Features with Windows Server 2012 00:11:00 Installing Windows 2012 Enterprise 00:09:00 Windows Server Installation 00:12:00 Introduction to Server Manager 00:07:00 Post Server Installation Tasks 00:11:00 Configure Server Roles and Features Configure Server Roles and Features 00:08:00 Add Roles Server Manager 00:16:00 Event Viewer 00:04:00 Best Practice Analyzer 00:06:00 Administrative Tools Available 00:08:00 Delegation of Domain Administration 00:09:00 Advanced Services 00:11:00 Introduction to PowerShell 00:16:00 Installing Server Core 00:07:00 PowerShell 00:11:00 Server Core Tools 00:16:00 Recover from Closing Command Prompt 00:01:00 Netsh-Firewall 00:04:00 Sconfig on Server Core 00:08:00 PowerShell Examples for User Management 00:12:00 Configure Hyper-V Configure Hyper-V 00:12:00 Enable Remote Management 00:05:00 Remote Desktop 00:08:00 Server Groups 00:01:00 Virtualization 00:17:00 Create a VM 00:07:00 Hyper-V Settings 00:03:00 Virtual Hard Disk 00:17:00 Managing VHD's 00:12:00 Virtual Networks 00:08:00 Hyper-V Network Settings33 00:06:00 Creating Network Adapters66 00:02:00 Considerations for VM Network Configuration 00:12:00 Install and Administer Active Directory Install and Administer Active Directory 00:48:00 Overview of Domain Controllers 00:19:00 Best Practices - FSMO and GC 00:25:00 RODC 00:11:00 Install Domain Controllers 00:31:00 Active Directory Management Tools 00:20:00 Groups 00:39:00 Delegate Management of Active Directory Objects 00:11:00 Deploy, Manage, and Maintain Servers Deploy, Manage, and Maintain Servers 00:32:00 Types of Images 00:43:00 Unattended Installations 00:18:00 WSUS 00:40:00 Monitoring Servers 01:30:00 Configure Network Services and Access Configure Network Services and Access 00:40:00 How DNS Forwarding Works 00:21:00 Zone Transfers 00:24:00 DNS Caching 00:04:00 Configure a Network Policy Server Infrastructure Configure a Network Policy Server Infrastructure 00:46:00 VPN Access ss 00:37:00 Components of Network Policy 00:07:00 Direct Access Features 00:18:00 Troubleshooting Tools 00:29:00 Certificates 00:03:00 Configure and Manage Active Directory Configure and Manage Active Directory 01:02:00 Managed Service Accounts 00:16:00 Create Account Policies and User Rights Assignments 00:40:00 Maintain Active Directory Domain Services 00:42:00 Configure and Manage Group Policy Configure and Manage Group Policy 00:22:00 Windows Client Policy Processing 00:08:00 Starter GPO's 00:30:00 Group Policy Links 00:20:00 Other Group Policy Options 01:07:00 Configure and Manage High Availability Configure and Manage High Availability 00:36:00 Server 2012 Failover Clustering 00:19:00 Quorum Definitions 00:20:00 Multi-Site Failover Cluster 00:10:00 Management Tools 00:11:00 Configure File and Storage Solutions Configure File and Storage Solutions 00:17:00 Discretionary Access Control 00:10:00 Creating Claims 00:19:00 File Classification 00:34:00 iSCSI 00:35:00 Implement Business Continuity and Disaster Recovery Implement Business Continuity and Disaster Recovery 00:15:00 Backup Types 00:16:00 System Restore 00:26:00 Windows RE 00:17:00 Configure Network Services Configure Network Services 00:20:00 Super Scopes and Multinetting 00:21:00 DNS Solutions s 00:23:00 DNS Cache Locking 00:26:00 IPAM (IP Address Management) 00:13:00 IPAM Abilities s 00:10:00 GPO Provisioning 00:29:00 Configure Identity and Access Solutions Configure Identity and Access Solutions 00:13:00 Web Services 00:09:00 C AD FS Components 00:16:00 Mock Exam Mock Exam- 70-417 - Upgrading Your Skills to MCSA Windows Server 2012 00:20:00 Final Exam Final Exam- 70-417 - Upgrading Your Skills to MCSA Windows Server 2012 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

70-417 - Upgrading Your Skills to MCSA Windows Server 2012
Delivered Online On Demand29 hours
£24

Certified Kubernetes Security Specialist (CKS) Course

By Packt

Want to learn about Kubernetes security or need to pass the Certified Kubernetes Security Specialist (CKS) exam? You are at the right place. A hands-on course to help you develop your Kubernetes security skills. You need to have a basic understanding of Kubernetes Administrator to get the best out of this course.

Certified Kubernetes Security Specialist (CKS) Course
Delivered Online On Demand6 hours 5 minutes
£19.99

70-413 - Designing and Implementing a Server Infrastructure (MCSE)

4.3(43)

By John Academy

Description: The 70-413 - Designing and Implementing a Server Infrastructure (MCSE) course will prepare you for the Exam 70-414: Implementing an Advanced Server Infrastructure. The course covers the advanced topics that IT professionals encounter in the enterprise environment. For passing the exam, you should have a thorough understanding of a fundamental server infra¬structure including monitoring, virtualisation, and high availability. There are four main objective areas on the 70-414 Exam which are discussed in the course thoroughly: Manage and maintain a server infrastructure Plan and implement a highly available enterprise infrastructure Plan and implement a server virtualisation infrastructure Design and implement identity and access solutions In the course, you will learn how to create the virtual infrastructure, plan and deploy virtual machines and implement solutions for the virtual administration. You will also learn about monitoring, high availability, updates, PKI, BCP and IDA. In short, the course will prepare you for the exam. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? 70-413 - Designing and Implementing a Server Infrastructure (MCSE) course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our 70-413 - Designing and Implementing a Server Infrastructure (MCSE) training course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Server Infrastructure - Upgrade and Migration Upgrade and Migration FREE 00:34:00 Windows Assessment and Deployment Kit (ADK) 00:20:00 HyperV Virtual Licensing 00:12:00 Cloning Domain Controllers 00:24:00 Imaging Strategies 00:19:00 Choosing a Deployment Method 00:07:00 Installing Windows AIK 00:07:00 New Features in Windows DS 00:04:00 Storage and File Services Storage and File Services 00:09:00 iSCSIes 00:14:00 DFS 00:15:00 Deploying and Configrueing DFS 00:14:00 BranchCache 00:06:00 Implementing BrancheCache 00:05:00 Discretionary Access Control 00:19:00 Resource Properties 00:09:00 Network Infrastructure Services Network Infrastructure Services 00:25:00 DHCP Server Placement Infrastructure 00:25:00 IPAM Definition and Benefits 00:25:00 DNS Namespace Design 00:26:00 DNS Records Needed by AD 00:09:00 DNS Design Considerations 00:11:00 Performance Monitor and DNS 00:08:00 Zone Transfers and Replications 00:09:00 Configuring Zone Transfers 00:05:00 Creating DNS Zones 00:08:00 DNS and High-Availability 00:11:00 Planning for External User Access Planning for External User Access 00:18:00 Authentication Protocols and Methods 00:15:00 Network Access Policies 00:10:00 Creating a VPN 00:18:00 Perimeter Networks 00:07:00 DirectAccess 00:16:00 RADIUS Authentication and NPS 00:10:00 Network Security 00:26:00 Connection Security Rules 00:03:00 Design and Implement Logical AD Infrastructure Design and Implement Logical AD Infrastructure 00:18:00 Guidelines for Designing AD DS Forests 00:19:00 Creating a Forest Root 00:18:00 Viewing and Editing the Schema 00:10:00 Creating a Forest Trust Part 1 00:06:00 Creating a Forest Trust Part 2 00:06:00 AD DS Domains 00:18:00 Install Second Domain Controller to Domain 00:12:00 Trust Relationships 00:29:00 OU Strategies 00:21:00 Exploring AD Permissions within OU Structure 00:09:00 Protecting OUs using PowerShell 00:08:00 Active Directory Groups 00:24:00 Creating Groups with Active Directory Administration Center 00:11:00 Creating Groups with PowerShell 00:05:00 Special Identities 00:05:00 D GPO AD GPO 00:14:00 Group Policy Categories 00:18:00 Group Policy Preferences 00:11:00 PowerShell Cmdlets 00:06:00 Designing a Physical AD Infrastructure Designing a Physical AD Infrastructure 00:19:00 Replication Topologies Ring 00:09:00 Site Links 00:12:00 Domain Controllers Domain Controllers 00:12:00 Best Practices Analyzer 00:07:00 HighAvailability 00:15:00 Mock Exam Mock Exam- 70-413 - Designing and Implementing a Server Infrastructure (MCSE) 00:20:00 Final Exam Final Exam- 70-413 - Designing and Implementing a Server Infrastructure (MCSE) 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

70-413 - Designing and Implementing a Server Infrastructure (MCSE)
Delivered Online On Demand14 hours 45 minutes
£23

AZ-900 | Microsoft Azure Fundamentals Full Course

4.3(43)

By John Academy

Course Overview Learn about the functions of Microsoft Azure from this AZ-900 | Microsoft Azure Fundamentals Full Course course. The course will give you a clear understanding of the basics of Microsoft Azure and how you can use this cloud platform to grow and strengthen your online existence. In this AZ-900 | Microsoft Azure Fundamentals Full Course course, you will learn about the tools and basic functions of Microsoft Azure. You will be familiarized with the core Azure services, security, privacy and compliance policies. This course will teach you how you can secure your website and account using multi-factor authentication and protect data from hackers. This course will also help you to understand the supports Azure can offer you and get the best suitable one for you. Microsoft Azure is one of the most popular and safe cloud platforms. This AZ-900 | Microsoft Azure Fundamentals Full Course course will teach you the functions of Microsoft Azure from scratch. You don't need any prior knowledge or technical background to understand the lessons of this course. Learning Outcomes familiarize with the fundamentals of cloud services Understand the benefits of using cloud services Learn about the differences between capital expenditure and operational expenditure Be able to compare and contrast the IAAS, PAAS and SAAS service Learn about different cloud models and how they work Understand the core Azure architectural components Learn about the solutions you will get from Azure Learn about the management tools of Azure Get to know about the security and private privacy protocols of Microsoft Azure Understand how Azure identity services work Familiarize with role-based access control system Understand the policies and compliance standards in Azure Who is this course for? This comprehensive AZ-900 | Microsoft Azure Fundamentals Full Course is ideal for those who want to learn more about the functions of Microsoft Azure. You will learn about the application of Microsoft Azure and the career prospect from this course. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path AZ-900 | Microsoft Azure Fundamentals Full Course is a useful qualification to possess and would be beneficial for any related profession or industry such as: Managers Managing Directors Management Executives Data Security Officers Programmers Microsoft Azure Developers Technicians Computer Operators Cloud Engineers Cloud Data Consultants Azure Consultants Data Scientists Course Introduction Introduction 00:04:00 Module 1 : Cloud Concepts What is Cloud Computing - I 00:05:00 What is Cloud Computing - II 00:06:00 Benefits of Cloud Computing 00:09:00 Key Concepts and Terminology 00:06:00 Economies of Scale 00:01:00 CapEx Vs OpEx 00:03:00 Cloud Models : What is Public Cloud 00:02:00 Cloud Models : Characteristics of Public Cloud 00:02:00 Cloud Models : What is Private Cloud 00:01:00 Cloud Models : Characteristics of Private Cloud 00:01:00 Cloud Models : Hybrid Cloud 00:01:00 Cloud Models : Characteristics of Hybrid Cloud 00:01:00 Review and What Next!! 00:01:00 What is IAAS 00:04:00 Use Cases of IAAS 00:02:00 What is PAAS ? 00:02:00 Use Cases of PAAS 00:04:00 What is SAAS ? 00:02:00 Cloud Models : Shared Responsibility Model 00:09:00 Module 2 : Core Azure Services Introduction 00:01:00 Azure Regions 00:01:00 Special Azure regions 00:01:00 Region pairs 00:01:00 Feature Availability Region Wise 00:01:00 Availability Zones 00:01:00 Availability Sets 00:02:00 What are Resource Groups? 00:02:00 Azure Resource Manager 00:01:00 What Next!! - Azure Core Services and Products 00:02:00 What is Azure Compute 00:01:00 Azure Virtual Machines - Audiocast Only 00:01:00 Azure Virtual Machines I - LAB 00:15:00 Azure Virtual Machines II - LAB 00:01:00 Azure Virtual Machines III - LAB 00:02:00 Azure Virtual Machines IV - LAB 00:04:00 Azure Virtual Machines V - LAB 00:03:00 Azure Virtual Machines VI - LAB 00:03:00 What are Containers? 00:04:00 Containers ( LAB Activity ) 00:07:00 Containers VS Virtual Machines 00:04:00 What Are Virtual Networks 00:01:00 Virtual Networks - LAB 00:15:00 Azure Load Balancer 00:01:00 VPN Gateway 00:01:00 Azure Application Gateway - I 00:02:00 Azure Application Gateway - II 00:01:00 Azure Content Delivery Networks (CDN's) 00:02:00 How CDN works ? 00:03:00 Azure CDN - Lab Activity 00:07:00 Azure Storage Services 00:01:00 Structured Data 00:01:00 Semi Structured Data 00:01:00 Unstructured Data 00:01:00 Azure Storage Account - Types 00:03:00 Azure Storage Account - Blob - Lab Activity - I 00:07:00 Azure Storage Account - Blog - Lab Activity - II 00:07:00 Azure Storage Account - Blob - Lab Activity - III 00:16:00 Azure Storage Account - Blog - Lab Activity - IV 00:09:00 Azure Storage Account - Blob - Lab Activity - V 00:04:00 Azure Storage Account - Blob - Lab Activity - VI 00:07:00 Azure Database Services 00:02:00 Azure SQL - Lab Demo 00:09:00 Azure MarketPlace 00:02:00 What is Internet of Things ( IOT ) - Intro 00:01:00 IOT Hub 00:01:00 IOT Hub Demo 00:09:00 Azure Big Data and Analytics 00:01:00 Azure SQL Data Warehouse 00:01:00 Azure HDInsights 00:01:00 Azure Data Lake Analytics 00:01:00 Machine Learning 00:02:00 Azure Machine Learning Services and Studio 00:02:00 What is Server less Computing ? 00:02:00 The concept of DevOps 00:03:00 Azure Management Tools 00:01:00 Creating Resources with Powershell - Lab Activity 00:05:00 Creating Resources with Azure CLI - Lab Activity 00:07:00 Provision Resources using Cloud Shell - Lab Activity 00:05:00 Deployment with JSON - Lab Activity 00:08:00 Azure Advisor 00:01:00 Module 2 : What did we learn 00:01:00 Module 3 Security, Privacy, Compliance and Trust What to expect in Module 3 00:01:00 Azure Firewalls 00:02:00 Azure Firewall - Lab Activity - notes 00:02:00 Azure Firewall - Lab Activity 00:19:00 Azure DDOS 00:02:00 Network Security Groups 00:03:00 Application Security Groups 00:02:00 Which Network Security Solution to choose from ? 00:04:00 AuthZ and AuthN 00:01:00 Azure Active Directory 00:02:00 Multi Factor Authentication 00:03:00 Azure Security Center 00:02:00 Azure Security center - LAB activity 00:08:00 Azure Key Vault 00:02:00 Azure Information Protection 00:02:00 Azure Advanced Threat Protection 00:04:00 What is Azure Policy 00:03:00 Azure Policy - Lab Activity 00:06:00 Azure Role Based Access Control ( RBAC ) 00:02:00 Azure Role Based Access Control ( RBAC ) - Lab Activity 00:07:00 Azure Locks 00:01:00 Azure Locks - Lab Activity 00:02:00 Azure Blueprints 00:01:00 Subscription Governance 00:02:00 Azure Tags 00:03:00 Azure Monitoring 00:02:00 Azure Monitor- Lab Activity 00:03:00 Azure Service Health 00:01:00 Monitoring Applications and Services 00:04:00 Compliance Terms and Requirements 00:02:00 Microsoft Privacy Statement 00:01:00 Microsoft Trust Center 00:01:00 Service Trust Portal 00:01:00 Azure Government Services 00:02:00 Azure Germany Services 00:01:00 Azure China 21Vianet 00:02:00 Module 4 : Azure Pricing and Support Module 4 Introduction : What tÌ¥o expect in this module 00:02:00 Azure Subscriptions 00:06:00 What are Management Groups 00:01:00 Purchase Azure Product & Services : Available Options 00:01:00 Usage Metrics 00:01:00 Factors Affecting Costs 00:02:00 The concept of Zones for Billing 00:02:00 Azure Pricing Calculator 00:04:00 Azure Total Cost of Ownership ( TCO ) 00:02:00 Ways to Minimize Costs in Azure 00:04:00 Azure Cost Management 00:02:00 Azure Support Plans 00:03:00 Alternative Support Options 00:02:00 Service Level Agreements ( SLA's ) 00:03:00 Composite SLA's 00:03:00 Improving Application SLA's 00:04:00 Public and Preview Features 00:01:00 Providing Feedback 00:01:00 General Availability 00:01:00 Azure Updates , Announcements and Roadmaps 00:01:00 Course Conclusion Course Conclusion 00:01:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

AZ-900 | Microsoft Azure Fundamentals Full Course
Delivered Online On Demand7 hours 12 minutes
£18

Cyber Security Awareness - Video Training Course

4.3(43)

By John Academy

Description: This Cyber Security Awareness - Video Training Course has been designed to allow the learner garner knowledge about security issues and the importance of safeguarding data. Here, you will learn all the techniques to prevent security attacks and protect valuable data. Any computer connected to the internet is vulnerable to a cyber-attack. In this course, you will learn about the basic terms like social engineering, identity theft, data classification, malware, piracy, etc. These terms are associated with the security of any business and/or home users. You will also learn about access control, network security, government litigation, and risk management, security software development, security architecture and design, disaster recovery planning, legal regulations, physical security, etc. These concepts and techniques will help you train yourself in this professional field and prevent any loss of information by making your security system formidable. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Cyber Security Awareness - Video Training Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Cyber Security Awareness - Video Training Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Course Overview Course Overview FREE 00:14:00 Types of Security Threats Types of Security Threats 00:29:00 Social Engineering Social Engineering 00:30:00 Identity Theft Identity Theft 00:29:00 Data Classification Data Classification 00:28:00 Types of Classifications 00:18:00 Protecting Your Digital Information Protecting Your Digital Information 00:45:00 Password Management 00:13:00 Malware Malware 00:17:00 Software Detection 00:28:00 Security from End-to-End Security from End-to-End 00:27:00 Secure E-mail Use 00:21:00 Secure Web Browsing 00:29:00 Piracy Piracy 00:16:00 Security Policies Security Policies 00:17:00 Moving Forward Moving Forward 00:12:00 Mock Exam Mock Exam- Cyber Security Awareness - Video Training Course 00:20:00 Final Exam Final Exam- Cyber Security Awareness - Video Training Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Cyber Security Awareness - Video Training Course
Delivered Online On Demand6 hours 53 minutes
£22

Azure - Networking

By iStudy UK

Azure Virtual Network gives you an isolated and highly-secure environment to run your virtual machines and applications. Use your private IP addresses and define subnets, access control policies, and more. Use Virtual Network to treat Azure the same as you would your own datacenter. The Azure - Networking is designed to introduce to virtual network configuration through the Microsoft Azure Portal and network configuration files. You'll also see how to use network services to configure and load balance network traffic using tools such as Azure DNS. Load Balancer, Azure Traffic Manager, and Application Gateway. And because this is about the cloud, you'll see how to connect your on-premises computers to Azure virtual networks as well as establishing connectivity between sites. The course guides you to configure a Point to Site VPN and a Site to Site VPN. On completion this course, you will look at Azure Vnet peering, and how peering between Vnets can reduce the need to build Vnet-to-Vnet VPN gateways. What Will I Learn? Create a Vnet Configure a Point to Site VPN Understand Vnet Peering Understand DNS in Azure Vnets Who is the target audience? People interested in learning Networking Basics in Azure Requirements Some prior knowledge in Azure is required, or the completion of Introduction to Azure course Introduction Introduction FREE 00:02:00 Virtual Networks Virtual Network Overview 00:02:00 IP Address Space 00:03:00 DNS in Azure Vnets 00:03:00 Creating a VNet 00:03:00 VPNs with VNets 00:04:00 Configuring a Point to Site VPN 00:12:00 Configure Site to Site VPN 00:05:00 Azure Vnet Peering 00:02:00 Conclusion Course Recap 00:04:00 Course Certification

Azure - Networking
Delivered Online On Demand40 minutes
£25

Cyber Security Officer Training - Complete Video Course

4.3(43)

By John Academy

Description: The Cyber Security Officer Training - Complete Video Course course is designed for the people who want to work as a cybersecurity professional and want to increase their knowledge regarding the cybersecurity. The course is sectioned into several part or chapters. Each focuses on a particular topic that will help you to be an excellent cyber security officer. At first, the course shows you the basics of ethical hacking including protocols, Windows hacking, attacking web technologies, etc. in the Ethical Hacking section. Then you will know the advanced techniques of becoming an ethical hacker and know the procedures of getting certification for ethical hacking. Then in part named Penetration Testing Consultant (CPTC), you will be introduced to the concept of packet capturing, Layer 2 attacks, Layer 3 attacks on Cisco-based infrastructures, VPN attacks, etc. In the next course, you will learn the advanced features of penetration testing. After that, the course, you will know about the web application security, Security Leadership Process, how to be a security Sentinel, etc. Finally, you will know the techniques of vulnerability assessments so that you can prevent severe break-ins to your company. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Cyber Security Officer Training - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Cyber Security Officer Training - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Ethical Hacking Overview FREE 00:35:00 Reconnaissance 00:25:00 Protocols 01:25:00 Windows Hacking 01:19:00 Attacking Web Technologies 00:56:00 Pen Testing Wireless Networks 01:34:00 Professional Hacking Security Fundamentals FREE 00:51:00 Access Controls 00:33:00 Protocols 00:36:00 Cryptography 00:52:00 Why Vulnerability Assessments? 00:36:00 Vulnerability Tools of the Trade 00:10:00 Output Analysis and Reports 00:13:00 Reconnaisance, Enumeration and Scanning 00:51:00 Gaining Access 00:31:00 Maintaining Access 00:17:00 Covering Tracks 00:18:00 Malware 00:09:00 Buffer Overflows 00:22:00 Password Cracking 00:33:00 Penetration Testing I Packet Capturing 00:38:00 Layer 2 Attacks 00:59:00 Layer 3 Attacks on Cisco Based Infrastructures 01:09:00 Pivoting and Relays 00:20:00 IPv6 Attacks 00:49:00 VPN Attacks 00:38:00 Defeating SSL 00:48:00 IDS/IPS Evasion 01:11:00 Penetration Testing II Logistics of Pen Testing FREE 00:25:00 Linux Fundamentals 00:22:00 Information Gathering 00:38:00 Detecting Live Systems 00:34:00 Enumeration 00:25:00 Vulnerability Assessments 00:20:00 Malware Goes Undercover 00:28:00 Windows Hacking 00:39:00 Hacking UNIX/Linux 00:36:00 Advanced Exploitation Techniques 00:28:00 Pen Testing Wireless Networks 00:34:00 Networks, Sniffing and IDS 00:42:00 Injecting the Database 00:26:00 Attacking Web Technologies 00:30:00 Project Documentation 00:17:00 Web Application Security Web Application Security FREE 01:20:00 Secure SDLC 00:26:00 OWASP TOP 10 00:28:00 Risk Management 00:35:00 Threat Modeling 00:18:00 Authentication and Authorization Attacks 00:24:00 Session Management 00:35:00 Security Architecture 00:29:00 Input Validation and Data Sanitization 00:24:00 AJAX Security 00:05:00 Insecurity Code Discovery and Mitigation 00:39:00 Application Mapping 00:07:00 Cryptography 00:28:00 Testing Methodologies 00:31:00 Security Leadership Security Management FREE 00:58:00 Risk Management 00:35:00 Encryption 00:31:00 Information Security - Access Control Concepts 00:31:00 Incident Handling and Evidence 01:01:00 Operations Security 00:48:00 Knowing Network Security 01:12:00 Security Sentinel Basic Security FREE 00:17:00 User Awareness 00:27:00 Implementing Countermeasures 00:09:00 Certified Security Sentinel 00:16:00 Using the Internet at Work 00:23:00 Accessing the Company's Network Through Your Assigned Computer 00:19:00 Accessing the Corporate Network Remotely 00:09:00 Social Engineering 00:13:00 Understanding and Manipulating our Target 00:16:00 Researching Our Target 00:11:00 Vulnerability Assessment Why Vulnerability Assessment FREE 00:46:00 Vulnerability Types 00:23:00 Assessing the Network 00:40:00 Assessing Web Servers & Applications 00:27:00 Assessing Remote & VPN Services 00:17:00 Vulnerability Assessment Tools of the Trade 00:15:00 Output Analysis 00:12:00 Mock Exam Mock Exam- Cyber Security Officer Training - Complete Video Course 00:30:00 Final Exam Final Exam- Cyber Security Officer Training - Complete Video Course 00:30:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Cyber Security Officer Training - Complete Video Course
Delivered Online On Demand46 hours
£22

Advanced SQL Training Online

By Study Plex

Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction Course Overview! 00:04:00 Installation And Getting Started The Final Milestone! 00:01:00 Installing and setting up PostgreSQL 00:09:00 Case Study : Demo Case Study Part 1 00:04:00 Case Study Part 2 00:06:00 Fundamental SQL statements CREATE 00:11:00 Exercise 1: Create DB and Table 00:01:00 INSERT 00:09:00 Import data from File 00:05:00 Exercise 2: Inserting and Importing 00:01:00 SELECT statement 00:03:00 SELECT DISTINCT 00:06:00 WHERE 00:04:00 Logical Operators 00:06:00 Exercise 3: SELECT & WHERE 00:01:00 UPDATE 00:05:00 DELETE 00:04:00 ALTER 00:17:00 Exercise 4: Updating Table 00:01:00 Restore And Back-Up Restore and Back-up 00:07:00 Exercise 5: Restore and Back-up 00:01:00 Selection Commands: Filtering IN 00:04:00 BETWEEN 00:05:00 LIKE 00:08:00 Exercise 6: In, Like & Between 00:01:00 Selection Commands: Ordering Side Lecture: Commenting in SQL 00:01:00 ORDER BY 00:07:00 LIMIT 00:03:00 Exercise 7: Sorting 00:01:00 Alias AS 00:03:00 Aggregate Commands COUNT 00:05:00 SUM 00:03:00 AVERAGE 00:03:00 MIN & MAX 00:04:00 Exercise 8: Aggregate functions 00:01:00 Group By Commands GROUP BY 00:12:00 HAVING 00:05:00 Exercise 9: Group By 00:01:00 Conditional Statement CASE WHEN 00:05:00 Joins Introduction to Joins 00:02:00 Inner Join 00:08:00 Left Join 00:07:00 Right Join 00:06:00 Full Outer Join 00:05:00 Cross Join 00:04:00 Except 00:03:00 Union 00:03:00 Exercise 10: Joins 00:01:00 Subqueries Subqueries 00:14:00 Exercise 11: Subqueries 00:01:00 Views And Indexes VIEWS 00:07:00 INDEX 00:06:00 Exercise 12: Views 00:01:00 String Functions LENGTH 00:03:00 Upper Lower 00:02:00 REPLACE 00:04:00 TRIM, LTRIM, RTRIM 00:07:00 CONCATENATION 00:03:00 SUBSTRING 00:06:00 LIST AGGREGATION 00:05:00 Exercise 13: String Functions 00:02:00 Mathematical Functions CEIL & FLOOR 00:03:00 RANDOM 00:05:00 SETSEED 00:04:00 ROUND 00:02:00 POWER 00:02:00 Exercise 14: Mathematical Functions 00:01:00 Date-Time Functions CURRENT DATE & TIME 00:04:00 AGE 00:03:00 EXTRACT 00:08:00 Exercise 15: Date-time functions 00:01:00 Pattern (String) Matching PATTERN MATCHING BASICS 00:07:00 ADVANCE PATTERN MATCHING (REGULAR EXPRESSIONS) 00:15:00 Exercise 16: Pattern Matching 00:01:00 Data Type Conversion Functions Converting Numbers/ Date to String 00:11:00 Converting String to Numbers/ Date 00:06:00 User Access Control Functions User Access Control 00:13:00 Bonus Section: Nail That Interview! Tablespace 00:05:00 PRIMARY KEY & FOREIGN KEY 00:05:00 ACID compliance 00:06:00 Truncate 00:04:00 Performance Tuning Tips TIP 1 (EXPLAIN) 00:04:00 TIP 2 00:01:00 TIP 3 00:02:00 TIP 4 (VACCUM) 00:01:00 TIP 5 00:02:00 TIP 6 (STRING FUNCTIONS) 00:02:00 TIP 7 (JOINS) 00:02:00 TIP 8 (SCHEMAS) 00:04:00 Bonus Section : Database Basics What is SQL 00:02:00 Tables and DBMS 00:03:00 Types of SQL commands 00:04:00 PostgreSQL 00:02:00 The Final Milestone! 00:01:00 Supplementary Resources Supplementary Resources - SQL Masterclass 00:00:00 Assessment Assessment - SQL Masterclass 00:10:00 Certificate of Achievement Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Advanced SQL Training Online
Delivered Online On Demand
£19

CompTIA Security+ (SY0-401) Complete Training

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 10 Hours Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about CompTIA Security networking Understand the core competencies and principles of CompTIA Security networking Explore the various areas of CompTIA Security networking Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert networking engineer CompTIA Security+ (SY0-401) Complete Training Course Master the skills you need to propel your career forward in CompTIA Security networking . This course will equip you with the essential knowledge and skillset that will make you a confident networking engineer and take your career to the next level. This comprehensive compTIA security course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this compTIA security course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective CompTIA Security networking practice and equip you with the essential skills, confidence and competence to assist you in the CompTIA Security networking industry. You'll gain a solid understanding of the core competencies required to drive a successful career in CompTIA Security networking . This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for networking engineer or for people who are aspiring to specialise in CompTIA Security networking . Enrol in this compTIA security course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive compTIA security course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this CompTIA Security networking can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This compTIA security course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This compTIA security course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This compTIA security course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction to the Security+ course Introduction To The Section 00:01:00 Risk Assessment Learning Risk Assessment For Security 00:23:00 Computing Risk Assessment 00:18:00 Additional Risk Terminology 00:12:00 Acting On Your Risk Assessment 00:11:00 Risk Associated with Cloud Computing 00:08:00 Risk Associated With Virtualization 00:05:00 Summary Of Section 00:03:00 Understanding the Guidelines and Standards of Networking Developing Policies, Standards, And Guidelines 00:06:00 Implementing Policies 00:12:00 Understanding Control Types And False Positives/Negatives 00:08:00 Undertaking Business Impact Analysis 00:13:00 Disaster Recovery 00:10:00 Summary Of Section 00:04:00 Actively monitoring and servicing your network Network Monitors 00:05:00 Monitoring system logs 00:05:00 Understanding Hardening 00:06:00 Working With Services 00:12:00 Summary Of Section 00:03:00 Tools and Services to secure your network Securing The Network 00:06:00 Security Posture 00:13:00 Reporting Security Issues 00:08:00 Detection Controls vs. Prevention Controls 00:06:00 Summary Of Section 00:04:00 The TCP/IP Suite and It's Protocols Mastering TCP/IP 00:26:00 Protocols And Services 00:08:00 Summary Of Section 00:05:00 Networks Designing A Secure Network 00:39:00 Understanding The Various Network Infrastructure Devices 00:24:00 Intrusion Detection Systems 00:24:00 Network Based IDS 00:09:00 Working With NIPS 00:13:00 Summary Of Section 00:10:00 Access Control, Authentication and Authorization Understanding Access Control Basics 00:21:00 Working With Radius 00:14:00 Protecting Wireless Networks Working With Wireless Systems 00:17:00 Wireless Vulnerabilities To Know 00:21:00 Working with Virtualization and Cloud Computing Working With Cloud Computing 00:16:00 Working With Virtualization 00:16:00 Security Application Security 00:22:00 Best Practices For Security 00:09:00 Malware Vulnerabilities and Threats Malware Vulnerabilities And Threats 00:29:00 Summary of Course Summary Of Course 00:21:00 Assessment Assessment - CompTIA Security+ (SY0-401) Complete Training 00:10:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

CompTIA Security+ (SY0-401) Complete Training
Delivered Online On Demand
£19

Learn Python and Ethical Hacking from Scratch

By Packt

This course is designed to help you understand the basic and advanced concepts of ethical hacking with ease. The course features interesting examples and coding activities in each video to keep you engaged and guides you effectively through writing programs to hack a system.

Learn Python and Ethical Hacking from Scratch
Delivered Online On Demand24 hours 35 minutes
£13.99