City & Guilds Level 3 Certificate in Assessing Vocational Achievement This qualification is for anyone working in or looking to enter an assessment role. It is designed for use in England, Wales and Northern Ireland – alternative arrangements exist in Scotland. Learn about the Cavity Training Dental Nurse Assessor Course The units and qualification will provide people who carry out assessment in their organisation with the opportunity to develop and improve their practice as well as achieving a professional qualification for the role. They are available to anyone working in: accredited learning; non accredited learning (where people may assess performance but do not assess for a qualification) and the NQF. Achievers will understand the principles of assessment and have the knowledge to develop and improve systems at their centre. You will gain access to our unique E library of text books. We also have special discounted rates for hard copy text books for our students. Frequently Asked Questions How long is the course? The course duration is 4 to 6 months. When are the classes held? You will attend a live webinar class every Thursday for 16 weeks. Is there an exam at the end? There is no exam at the end, you need to successfully complete 8 assessments and a final professional discussion with your tutor. What if I don’t have student nurses in my practice? We may be able to support you by providing you with learners to assess. Please get in touch. What qualifications do I need to start the course? Preferable English and Maths level 4 and above, you must also be GDC registered. What opportunities for progression is there? This qualification allows candidates to further progress onto various post registration qualifications or career opportunities, such as: – Dental Nurse Teaching – Internal Quality Assurer (IQA) Course Dates 11th April 2024 9:00am - 4:00pm 29th August 2024 9:00am - 4:00pm 2nd January 2025 9:00am - 4:00pm 8th May 2025 9:00am - 4:00pm Costs £800.00 per person (inc. VAT) Other payment options Deposit - £267.00 with 2 further payments Please choose from one of the course start dates above. Each course includes 16 weeks of lessons and up to two months to complete a portfolio and professional discussion.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security
Advanced Junos SP Routing course description This is designed to provide students with detailed coverage of OSPF, IS-IS, BGP, and routing policy. Students will gain experience in configuring, monitoring, and troubleshooting the Junos operating system and in monitoring device and protocol operations. This course uses Juniper Networks vMX Series Routers for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. What will you learn Describe and configure OSPF area types and operations. Configure and monitor IS-IS. Describe basic BGP operation. Explain the causes for route instability. Describe how to troubleshoot routing policy. Explain the default behaviour of damping on links. Advanced Junos SP Routing course details Who will benefit: Network staff working with Junos at layer 3. Prerequisites: Junos Intermediate Routing Duration 5 days Advanced Junos SP Routing course contents OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication Lab: OSPF Multi-Area Networks Chapter 3: OSPF Areas Review of OSPF Areas Stub Area Operation and Configuration NSSA Operation and Configuration Route Summarization Lab: OSPF Route Summarization OSPF Case Studies and Solutions Virtual Links OSPF Multiarea Adjacencies External Reachability Lab: Advanced OSPF Options and Routing Policy Troubleshooting OSPF Troubleshooting OSPF Lab: OSPF Troubleshooting IS-IS Overview of IS-IS IS-IS PDUs Neighbors and Adjacencies Configuring and Monitoring IS-IS Lab: IS-IS Configuration and Monitoring Advanced IS-IS Operations and Configuration Options IS-IS Operations IS-IS Configuration Options IS-IS Routing Policy Lab: Advanced IS-IS Configuration Options and Routing Policy Multilevel IS-IS Networks Level 1 and Level 2 Operations Multilevel Configuration Lab: Configuring a Multilevel IS-IS Network Troubleshooting IS-IS Troubleshooting IS-IS Lab: IS-IS Troubleshooting BGP Review of BGP BGP Operations BGP Path Selection Options Configuration Options Lab: BGP and BGP Attributes BGP Attributes and Policy - Part1 BGP Policy Next Hop Origin and MED AS Path Lab: BGP Attributes - Next Hop, Origin, MED, and AS Path Attributes and Policy - Part2 Local Preference Communities Lab: BGP Attributes - Local Preference and Communities Route Reflection and Confederations Route Reflection Operation Configuration and Routing Knowledge BGP Confederations Lab: Scaling BGP BGP Route Damping Route Flap and Damping Overview Route Damping Parameters Configuring and Monitoring Route Damping Lab: BGP Route Damping Troubleshooting BGP Troubleshooting BGP Lab: BGP Troubleshooting Troubleshooting Policy Troubleshooting Policy Lab: Policy Troubleshooting
Advanced RF training course description This course provides a follow on to our popular RF fundamentals course for those that need to know more. What will you learn Explain RF propagation Describe the importance of transmission lines in RF systems. Recognise the issues in RF systems. Describe transmission measurements. Advanced RF training course details Who will benefit: Those working with RF systems. Prerequisites: RF fundamentals. Duration 3 days Advanced RF training course contents RF propagation The Electromagnetic Spectrum, Electromagnetic Radiation, Spherical Wave Front, The Space Wave, Receive Antenna below the Horizon, Bending the Space Wave , Surface Wave Path, Tilting of Surface Wave, Conductivity, Layers of the Atmosphere, Variations of the Ionosphere, Variations caused by Solar Activity, Multi Hop Transmission, Classification of Radio Waves, Fading, Fading Reduction, Free Space Path Loss, Shadowing of Radio Wave, Signal Levels after Shadowing, Radio Waves as Wavelets, Fresnel Zone. Transmission Lines Transmission Line Construction, Primary Line Constants, 'T' Networks, Input Impedence, Lossless Unbalanced Line, Standing Waves, Open Circuit / Short Circuit Termination, Short Circuit Standing Waves, Open Circuit Standing Waves, Voltage Standing Wave Pattern, Short Circuit Termination, Open Circuit Termination, The Directional Coupler, Effect of E and M Coupling, Practical Reflectometer. Antenna Theory The Open Circuit Line, Dipole V/I Distribution, Polar Diagram, Power Pattern ½ Wave Dipole, Half Wave Dipole, Vehicle Mount, Centre Fed Whip Antenna, Antenna Beamwidth, The Yagi Array, Uda Yagi array, Antenna Characteristics, 6 Element Yagi Polar Diagram, Log Periodic Antenna, Helical Antenna. Microwave Dish Array, Typical Microwave Dish Antenna. Transmission Measurements Transmission Measurements, Effective Isotropic Radiated Power, Fade Margin. Noise Noise in Communications, Noise Voltage Equivalent Circuit. Satellite Communications Satellite Communications, Large Earth Station, The Satellite Payload, Geo Stationary Orbit, Basic Orbits, VSAT Terminal, Iridium Phone, The Space Segment, Satellite Footprint, Typical System Hardware. Mobile Communications Mobile Evolution, The Path to UMTS, Technologies Bit Rate and Mobility, Systems and Specifications, Wireless Networks, Diffraction, Multi Path Propagation, Loss Models, GSM Architecture, OSI Model - GSM, OSI Reference Model, OSI Layers.
Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
Satellite communications training course description This course starts by recaping some of the essential satellite knowledge required and proceeds to explore the deeper aspects of satellite communications, including hardware, communications and error control coding. What will you learn Explain how satellite communications work. Explain how RF works Explain the architecture of satellite systems. Use spectrum analysers. Satellite communications training course details Who will benefit: Anyone working with satellite systems. Prerequisites: None. Duration 3 days Satellite communications training course contents Basic Principles of Satellite Communications GEO, MEO and LEO satellites. Launching and orbits. Frequency bands and polarisation. Satellite footprints. Multibeam coverage. Power spectra. Link budgets. Modulation and coding. Access technologies. Earth station components. Space segment components. Satellite system services. Satellite operators. Radio frequency propagation Electromagnetic waves principles and generation. Reception of the EM wave. Space wave, sky wave and surface wave theory. The isotropic radiator. Types of antennae and their basic properties. Polar diagrams. International frequency allocation. Spectrum management and utilisation. Radio wave propagation. Line of sight propagation. Propagation for satellite comms. Free space path loss. Path attenuation. Noise and Interference. Power and its measurement. Satellite antennae and other hardware Power flux density. Effective aperture. Horn antennae. Parabolic reflector. Offset feed. Cassegrain and Gregorian antennae. Antenna feed systems - Horn, TMC, OMJ and polarizer. Antenna steering and mount systems. Array antennae. LNA, LNB, LNC. Microwave tubes - TWT and Klystron. Polarizers. Earth and Space Segments and the link Earth station antennae. Transponders. Antennae sub systems. Power supplies. Link budgets. System noise. System losses. Interference. Satellite switching. Ground Communications Equipment Baseband signals. Analogue and Digital systems. Overview of modulation - AM, FM, PM. Digital Modulation. Frequency conversion -up and down conversion. Filters, mixers, local oscillators, IF amplifiers and group delay equalisers. Access methods - single and multiple access systems. Data networks. Television transmission - analogue and digital. Digital signal compression. MPEG processing. Satellite Navigation Longitude, latitude, altitude, GPS, How GPS works, timing, alternatives to GPS. Mobile satellite services Voice and Phones, BGAN, TV, GPS to program aerial, VSAT. Error Control Coding The need for coding. Linear block codes. Cyclic codes. Convolution codes. Interleaving and concatenated codes. Coding gain. Turbo codes. Test and measurement Theory and practice of Spectrum Analysers.
Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.
This course bundle is aimed at absolute beginners to IT who want to start a career in Cisco networking or just develop their skills in this area. The course assumes you have no technical knowledge of IT whatsoever. To understand Cisco networking and practice it at a technical level, you must first possess an understanding of basic IT literacy as well as certain technologies, which you will be taught through this course. Through this course, you will gain a series of globally recognised networking certifications from CompTIA and Cisco. You will also possess a set of networking skills you can apply to a vast range of IT job roles. From the beginning, we teach you about basic IT literacy, basic software features and functions, basic networking, operating systems, and basic security threats. From there, the course steps up a notch exploring these areas in more depth. As you progress through the various stages, your knowledge of networking will gradually begin to develop. The course bundle is comprised of five separate courses in total. Once of which is skills based only with no exam, and four certification courses with a final exam after each course. The final course being the Cisco Certified Networking Associate (CCNA). The first course (CompTIA IT Fundamentals) provides a soft introduction to basic IT terminology, concepts and technology. To help you grasp the concepts and develop the skills within the course, simulators are also included. These allow you to practice your networking skills learnt on the course. In the IT world, these simulators are otherwise known as ‘Live Labs’.
Follow your dreams by enrolling on the Computer Administrator and Essential IT Skills course today and develop the experience, skills and knowledge you need to enhance your professional development. Computer Administrator and Essential IT Skills will help you arm yourself with the qualities you need to work towards your dream job. Study the Computer Administrator and Essential IT Skills training course online with Janets through our online learning platform and take the first steps towards a successful long-term career. The Computer Administrator and Essential IT Skills course will allow you to enhance your CV, impress potential employers, and stand out from the crowd. This Computer Administrator and Essential IT Skills course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Study the Computer Administrator and Essential IT Skills course through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the Computer Administrator and Essential IT Skills course, to ensure you are supported every step of the way. Get a digital certificate as proof of your Computer Administrator and Essential IT Skills course completion. Janets is one of the top online training course providers in the UK, and we want to make education accessible to everyone! Learn the essential skills you need to succeed and build a better future for yourself with the Computer Administrator and Essential IT Skills course. The Computer Administrator and Essential IT Skills course is designed by industry experts and is tailored to help you learn new skills with ease. The Computer Administrator and Essential IT Skills is incredibly great value and allows you to study at your own pace. With full course access for one year, you can complete the Computer Administrator and Essential IT Skills when it suits you. Access the Computer Administrator and Essential IT Skills course modules from any internet-enabled device, including computers, tablets, and smartphones. The Computer Administrator and Essential IT Skills course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the Computer Administrator and Essential IT Skills now and start learning instantly! What You Get Out Of Studying Computer Administrator and Essential IT Skills With Janets: Receive a digital Certificate upon successful completion of the Computer Administrator and Essential IT Skills course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Description The Computer Administrator and Essential IT Skills training course is delivered through Janets' online learning platform. Access the Computer Administrator and Essential IT Skills content from any internet-enabled device whenever or wherever you want to. The Computer Administrator and Essential IT Skills course has no formal teaching deadlines, meaning you are free to complete the course at your own pace. Method of Assessment To successfully complete the Computer Administrator and Essential IT Skills course, students will have to take an automated multiple-choice exam. This exam will be online and you will need to score 60% or above to pass the Computer Administrator and Essential IT Skills course. After successfully passing the Computer Administrator and Essential IT Skills course exam, you will be able to apply for a CPD-accredited certificate as proof of your Computer Administrator and Essential IT Skills qualification. Certification All students who successfully complete the Computer Administrator and Essential IT Skills course can instantly download their digital certificate. You can also purchase a hard copy of the Computer Administrator and Essential IT Skills course certificate, which will be delivered by post for £9.99. Who Is This Course For: The Computer Administrator and Essential IT Skills is ideal for those who already work in this sector or are an aspiring professional. This Computer Administrator and Essential IT Skills course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The Computer Administrator and Essential IT Skills is open to all students and has no formal entry requirements. To study the Computer Administrator and Essential IT Skills course, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Career Path: The Computer Administrator and Essential IT Skills is ideal for anyone who wants to pursue their dream career in a relevant industry. Learn the skills you need to boost your CV and go after the job you want. Complete the Computer Administrator and Essential IT Skills and gain an industry-recognised qualification that will help you excel in finding your ideal job.
Highlights of the Course Course Type: Online Learning Duration: 3 hours 56 minutes Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about functional skills ICT Understand the core competencies and principles of functional skills ICT Explore the various areas of functional skills ICT Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert functional skills ICT teacher IT Troubleshooting Training Advanced for Desktop Support Professional Course Master the skills you need to propel your career forward in functional skills ICT. This course will equip you with the essential knowledge and skillset that will make you a confident functional skills ICT teacher and take your career to the next level. This comprehensive IT troubleshooting training course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this IT troubleshooting training course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective functional skills ICT practice and equip you with the essential skills, confidence and competence to assist you in the functional skills ICT industry. You'll gain a solid understanding of the core competencies required to drive a successful career in functional skills ICT. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for functional skills ICT teacher or for people who are aspiring to specialise in functional skills ICT. Enrol in this IT troubleshooting training course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive IT troubleshooting training course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this functional skills ICT can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This IT troubleshooting training course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This IT troubleshooting training course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This IT troubleshooting training course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. Course Curriculum Course Introduction Course Introduction 00:00:00 Prepare Virtual Test Lab Install Hyper-V on Local System 00:02:00 Create Virtual Machine (VM) 00:02:00 Download Free Evaluation Windows 10 Image 00:02:00 Installing Windows OS With Multiple Media Installing Windows 10 00:06:00 Make USB Bootable with GUI Tool 00:07:00 Make USB Bootable with Command (CLI Tool) 00:05:00 Access Boot Menu 00:03:00 Hyper-V Interface Overview 00:05:00 Increase Disk and Memory of Virtual Machine 00:07:00 Use of Snapshot (Time Saving) 00:03:00 System Troubleshooting without Reboot Fix Stuck Windows Service 00:11:00 Fix 'Not Responding' Application or Desktop Error 00:03:00 Logoff Another User from Local System 00:03:00 Logoff user Remotely through PowerShell 00:02:00 Delay in Replication of Assigned Permission on Client 00:03:00 Fix Domain Trust issue without Re-joining & Reboot 00:05:00 Find & Kill High Utilization Process 00:02:00 Optimize System Performance (Fix Slowness Issue) Monitor CPU, Memory & HDD Utilization (Task Manager & Resource Monitor) 00:06:00 Find & Kill High Utilization Process 00:02:00 Check Recently System Uptime and Reboot 00:03:00 Uninstall Unwanted Applications 00:03:00 Run Disk Cleanup (Remove Not Required System Files) 00:06:00 Deep Cleaning Through TreeSize Free Tool 00:06:00 Disable Startup Applications (Speed Up Booting Time) 00:02:00 Disable Unwanted Startup Services (MSCONFIG) 00:03:00 Active Directory Server Setup (Optional) Module Introduction 00:02:00 Create Virtual Machine for Server 2019 00:02:00 Install Windows Server 2019 00:03:00 Rename System Name 00:02:00 Server Manager Introduction 00:02:00 Install Active Directory Role 00:03:00 Promote Active Directory Domain Controller 00:06:00 Set Static IP Address 00:02:00 Active Directory Introduction Active Directory Users and Computers (ADUC) 00:04:00 Active Directory Administrative Center (ADAC) 00:03:00 Create Active Directory User 00:06:00 Join System in Active Directory Domain 00:04:00 Computer Account Introduction & Solution 00:05:00 Info about Default Quota for Rejoining System 00:02:00 Check Password Expiration and Account Status 00:02:00 File System Related Troubleshooting Recycle Bin Settings 00:02:00 Cleanup Recycle Bin Data of Multiple Users Profile (Advance) 00:08:00 Close Locked Open Files on File Server 00:06:00 How To Fix Filename Is Too Long Issue 00:04:00 Supplementary Resources Supplementary Resources - Advance IT Troubleshooting for Desktop Support Professional 00:00:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00