• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

38208 Courses in Nottingham delivered Online

Definitive Kamailio for engineers

5.0(3)

By Systems & Network Training

Kamailio training course description Kamailio (formerly known as OpenSER) provides a scalable SIP server suitable for small through to carrier grade installations. This course will teach you how to install, configure and troubleshoot the Kamailio product. What will you learn Install Kamailio. Control Kamailio. Configure Kamailio. Troubleshoot Kamailio. Kamailio training course details Who will benefit: Technical staff working with Kamailio. Prerequisites: Definitive SIP for engineers. UNIX fundamentals. Duration 3 days Kamailio training course contents What is Kamailio? What is SER? SER history, OpenSER, versions. Kamailio. Supported platforms, SIP review. Hands on Simple SIP telephony without a SIP server. Installing Kamailio Downloading Kamailio, Installation from source, package installation, CVS, default passwords Hands on Kamailio installation. Controlling Kamailio Starting, stopping and controlling Kamailio. Starting Kamailio automatically at boot time. Hands on Controlling the server First configuration Basic configuration. Hands on SIP telephony with Kamailio. Monitoring Logs, xlog, openserctl, syslog. Hands on Logging. Kamailio architecture Kamailio core, Kamailio modules, file locations, persistent data storage, database structure. Hands on Database integration. Core configuration Keywords, values, parameters, functions, routing blocks, constructs. Hands on Advanced Kamailio configuration. Module configuration Overview of modules available, AAA integration, least cost routing. Redirects Hands on Configuring modules. Architectures DNS integration, peering, OSP, NAT traversal, SIP to GSM. Hands on peering. Asterisk integration Altering tables to work with Asterisk, Asterisk as a voicemail system. Design issues, High availability. Hands on Integrating Kamailio with Asterisk.

Definitive Kamailio for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,497

Suse system administration

5.0(3)

By Systems & Network Training

Suse training course description This three day hands on course provides a comprehensive coverage of core Linux administration tasks on Suse Linux. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. Suse training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals Duration 3 days Suse training course contents Managing software Package Concepts, RPM, rpm Commands, Yum, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and editing files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Administering the system Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring basic networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Securing your systems Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures.

Suse system administration
Delivered in Internationally or OnlineFlexible Dates
£3,497

15th May Thérèse Coen #Agent121. Looking for: MG, YA, ADULT FICTION, NON-FICTION

5.0(2)

By I Am In Print

LOOKING FOR: MG, YA, ADULT FICTION, NON-FICTION Thérèse is a Literary and Rights Agent at Susanna Lea Associates and Director of the London branch, @SLALondon. Born and raised in Belgium, on a diet of frites and Tintin she moved to England in her late teens with her family, then stayed in London to do a History degree and Masters at University College London. Having been brought up bilingual, translation rights seemed like her logical next step. She started off in the rights department at Bloomsbury Publishing, before hopping across the square to Ed Victor’s agency, and found experiencing both the publishing and agency side of publishing incredibly valuable. She has been building her own list of authors alongside selling translation rights since early 2016, which she has hugely enjoyed; working with authors right from the book’s conception, while also experiencing the thrill of selling her own authors’ works in the UK and US as well as in translation to publishers across the globe. In terms of adult fiction, Thérèse has a huge soft spot for historical fiction, having read Early Modern History at university, but is also very much on the hunt for crime/thrillers, bookclub, high-concept love stories and literary fiction. She loves strong female characters, in particular when they go through an evolution or journey as the story progresses and gradually find that inner strength. On the children’s fiction front, Thérèse is all about finding a fresh, new voice. She loves all things funny, fantasy and adventure – across lands, time and space, and involving strong friendships and strong lead characters - and wants to be transported straight away when reading a manuscript. She likes very vivid, well-crafted and imaginative worlds, such as stories set in a toy factory or in an underwater world. Thérèse would love some more adventures set in space, mysteries, quirky characters, explorers and imaginary friends. And last, but not least, in non-fiction, history features heavily in her interests, but Thérèse would also love to see books about big ideas, culture, sociology, science, anthropology and memoir. Anything that helps expand the mind and questions or informs the way in which we view ourselves, the world and how we fit into it, all written in an engaging and accessible manner. Thérèse would like you to submit a covering letter, 1 page synopsis and the first three chapters or 5,000 words of your manuscript in a single word document. (In addition to the paid sessions, Thérèse is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Thursday 8th May 2025

15th May Thérèse Coen #Agent121. Looking for: MG, YA, ADULT FICTION, NON-FICTION
Delivered Online + more
£72

AZ-801T00 Configuring Windows Server Hybrid Advanced Services

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators who already implement and manage on-premises core technologies want to secure and protect their environments, migrate virtual and physical workloads to Azure Iaas, enable a highly available, fully redundant environment, and perform monitoring and troubleshooting. This course teaches IT Professionals to configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to leverage the hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, and how to secure Azure VMs running Windows Server. The course also teaches IT Professionals how to perform tasks related to high availability, troubleshooting, and disaster recovery. The course highlights administrative tools and technologies including Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate, and Azure Monitor. Prerequisites An understanding of the following concepts as related to Windows Server technologies: High availability and disaster recovery Automation Monitoring Troubleshooting 1 - Secure Windows Server user accounts Configure user account rights Protect user accounts with the Protected Users group Describe Windows Defender Credential Guard Block NTLM authentication Locate problematic accounts 2 - Hardening Windows Server Describe Local Password Administrator Solution Configure Privileged Access Workstations Secure domain controllers Analyze security configuration with Security Compliance Toolkit Secure SMB traffic 3 - Windows Server update management Explore Windows Update Outline Windows Server Update Services server deployment options Define Windows Server Update Services update management process Describe the process of Update Management 4 - Secure Windows Server DNS Implement split-horizon DNS Create DNS policies Implement DNS policies Secure Windows Server DNS Implement DNSSEC 5 - Implement Windows Server IaaS VM network security Implement network security groups and Windows IaaS VMs Implement adaptive network hardening Implement Azure Firewall and Windows IaaS VMs Implement Windows firewall with Windows Server IaaS VMs Choose the appropriate filtering solution Deploy and configure Azure firewall using the Azure portal Capture network traffic with network watcher Log network traffic to and from a VM using the Azure portal 6 - Audit the security of Windows Server IaaS Virtual Machines Describe Azure Security Center Enable Azure Security Center in hybrid environments Implement and assess security policies Protect your resources with Azure Security Center Implement Azure Sentinel 7 - Manage Azure updates Describe update management Enable update management Deploy updates View update assessments Manage updates for your Azure Virtual Machines 8 - Create and implement application allowlists with adaptive application control Describe adaptive application control Implement adaptive application control policies 9 - Configure BitLocker disk encryption for Windows IaaS Virtual Machines Describe Azure Disk Encryption and server-side encryption Configure Key Vault for Azure Disk Encryption Encrypt Azure IaaS Virtual Machine hard disks Back up and recover data from encrypted disks Create and encrypt a Windows Virtual Machine 10 - Implement change tracking and file integrity monitoring for Windows IaaS VMs Implement Change Tracking and Inventory Manage Change Tracking and Inventory Manage tracked files Implement File Integrity Monitoring Select and monitor entities Use File Integrity Monitoring 11 - Introduction to Cluster Shared Volumes Determine the functionality of Cluster Shared Volumes Explore the architecture and components of Cluster Shared Volumes Implement Cluster Shared Volumes 12 - Implement Windows Server failover clustering Define Windows Server failover clustering Plan Windows Server failover clustering Implement Windows Server failover clustering Manage Windows Server failover clustering Implement stretch clusters Define cluster sets 13 - Implement high availability of Windows Server VMs Select high-availability options for Hyper-V Consider network load balancing for Hyper-V VMs Implement Hyper-V VM live migration Implement Hyper-V VMs storage migration 14 - Implement Windows Server File Server high availability Explore the Windows Server File Server high-availability options Define Cluster Shared Volumes Implement Scale-Out File Server Implement Storage Replica 15 - Implement scale and high availability with Windows Server VM Describe virtual machine scale sets Implement scaling Implement load-balancing VMs Create a virtual machine scale set in the Azure portal Describe Azure Site Recovery Implement Azure Site Recovery 16 - Implement Hyper-V Replica Define Hyper-V Replica Plan for Hyper-V Replica Configure and implement Hyper-V Replica Define extended replication Define Azure Site Recovery Implement Site Recovery from on-premises site to Azure Implement Site Recovery from on-premises site to on-premises site 17 - Protect your on-premises infrastructure from disasters with Azure Site Recovery Azure Site Recovery overview Workloads supported for protection with Azure Site Recovery Run a disaster recovery drill Failover and failback 18 - Implement hybrid backup and recovery with Windows Server IaaS Describe Azure Backup Implement recovery vaults Implement Azure Backup policies Recover Windows IaaS Virtual Machines Perform file and folder recovery Perform backup and restore of on-premises workloads Manage Azure Virtual Machine backups with Azure Backup service 19 - Protect your Azure infrastructure with Azure Site Recovery What is Azure Site Recovery Prepare for disaster recovery with Azure Site Recovery Run a disaster recovery drill Failover and failback using Azure Site Recovery 20 - Protect your virtual machines by using Azure Backup Azure Backup features and scenarios Back up an Azure virtual machine by using Azure Backup Restore virtual machine data 21 - Active Directory Domain Services migration Examine upgrade vs. migration Upgrade a previous version of Active Directory Domain Services to Windows Server 2022 Migrate to Active Directory Domain Services in Windows Server 2022 from a previous version Explore the Active Directory Migration Tool 22 - Migrate file server workloads using Storage Migration Service Storage Migration Service overview and usage scenarios Storage migration requirements Migrate a server with Storage migration Evaluate storage migration considerations 23 - Migrate Windows Server roles Describe the Windows Server Migration Tools Install the Migration Tools Migrate roles using the Migration Tools 24 - Migrate on-premises Windows Server instances to Azure IaaS virtual machines Plan your migration Describe Azure Migrate Perform server assessment Assess physical servers with Azure Migrate Migrate Windows Server workloads by using Azure Migrate 25 - Upgrade and migrate Windows Server IaaS virtual machines Describe Azure Migrate Migrate Windows Server workloads by using Azure Migrate Describe storage migration Migrate file servers by using Storage Migration Service 26 - Containerize and migrate ASP.NET applications to Azure App Service Azure Migrate App Containerization overview 27 - Monitor Windows Server performance Use Performance Monitor to identify performance problems Use Resource Monitor to review current resource usage Review reliability with Reliability Monitor Implement a performance monitoring methodology Use Data Collector Sets to analyze server performance Monitor network infrastructure services Monitor virtual machines running Windows Server Monitor performance with Windows Admin Center Use System Insights to help predict future capacity issues Optimize the performance of Windows Server 28 - Manage and monitor Windows Server event logs Describe Windows Server event logs Use Windows Admin Center to review logs Use Server Manager to review logs Use custom views Implement event log subscriptions 29 - Implement Windows Server auditing and diagnostics Describe basic auditing categories Describe advanced categories Log user access Enable setup and boot event collection 30 - Troubleshoot Active Directory Recover objects from the AD recycle bin Recover the AD DS database Recover SYSVOL Troubleshoot AD DS replication Troubleshoot hybrid authentication issues 31 - Monitor Windows Server IaaS Virtual Machines and hybrid instances Enable Azure Monitor for Virtual Machines Monitor an Azure Virtual Machine with Azure Monitor Enable Azure Monitor in hybrid scenarios Collect data from a Windows computer in a hybrid environment Integrate Azure Monitor with Microsoft Operations Manager 32 - Monitor your Azure virtual machines with Azure Monitor Monitoring for Azure VMs Monitor VM host data Use Metrics Explorer to view detailed host metrics Collect client performance counters by using VM insights Collect VM client event logs 33 - Troubleshoot on-premises and hybrid networking Diagnose DHCP proble

AZ-801T00 Configuring Windows Server Hybrid Advanced Services
Delivered OnlineFlexible Dates
£2,380

Fire Alarm Foundation Course

By Hi-Tech Training

The Fire Alarm Foundation course is designed to give participants a practical knowledge of the operation and installation of Fire Alarm Systems at a foundation level. During this practical and theory-based course students will gain the skills and knowledge to install and wire up a Fire Alarm Control Panel to typical auxiliary equipment such as Break Glass Units, Smoke Detectors, Heat Detectors, Bells, and Sirens.

Fire Alarm Foundation Course
Delivered Online
£85 to £685

ISO 27032: 2023 Lead Cybersecurity Manager

By Training Centre

  ISO/IEC 27032: 2023 Lead Cybersecurity Manager training enables you to acquire the expertise and competence needed to support an organization in implementing and managing a Cybersecurity program based on ISO 27032: 2023 and the NIST Cybersecurity framework. About This Course   During this training course, you will gain a comprehensive knowledge of Cybersecurity, the relationship between Cybersecurity and other types of IT security, and stakeholders' role in Cybersecurity.    After mastering all the necessary concepts of Cybersecurity, you can sit for the exam and gain "Certified ISO/IEC 27032 Lead Cybersecurity Manager' Certification. By holding this certification, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead a team in managing Cybersecurity.   Learning objectives   Acquire comprehensive knowledge on the elements and operations of a Cybersecurity Program in conformance with ISO/IEC 27032 and NIST Cybersecurity framework Acknowledge the correlation between ISO 27032, NIST Cybersecurity framework and other standards and operating frameworks Master the concepts, approaches, standards, methods and techniques used to effectively set up, implement, and manage a Cybersecurity program within an organization Learn how to interpret the guidelines of ISO/IEC 27032 in the specific context of an organization Master the necessary expertise to plan, implement, manage, control and maintain a Cybersecurity Program as specified in ISO/IEC 27032 and NIST Cybersecurity framework Acquire the necessary expertise to advise an organization on the best practices for managing Cybersecurity   Educational approach   This training is based on both theory and best practices used in the implementation and management of a Cybersecurity Program Lecture sessions are illustrated with examples based on case studies Practical exercises are based on a case study which includes role playing and discussions Practical tests are similar to the Certification Exam Prerequisites   A fundamental understanding of ISO/IEC 27032: 2023 and comprehensive knowledge of Cybersecurity. What's Included?   Refreshments & Lunch (Classroom courses only) Course Slide Deck Official Study Guides CPD Certificate The Exam Who Should Attend?   Cybersecurity professionals Information Security experts Professionals seeking to manage a Cybersecurity program Individuals responsible to develop a Cybersecurity program IT specialists Information Technology expert advisors IT professionals looking to enhance their technical skills and knowledge Accreditation Assessment     Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 4 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Provided by   This course is Accredited by NACS and Administered by the IECB

ISO 27032: 2023 Lead Cybersecurity Manager
Delivered OnlineFlexible Dates
£1,450

Qualifi Diploma in Information Technology - Level 4

4.0(2)

By London School Of Business And Research

This Diploma in Information Technology - Level 4 rationale for the qualification (Accredited by Qualifi, UK) is that it provides a career path for learners who wish to develop a broad base of knowledge and skills that will enable them to work in a variety of roles in the information technology (IT) industry, notably in programming, website design or PC maintenance. The Qualifi Diploma in Information Technology - Level 4 technical skills and knowledge delivered through the successful achievement of the qualification are required and recognised internationally. The diploma is accredited at Level 4 and has a total equivalence of 120 credits. Key Highlights of thisDiploma in Information Technology - Level 4 qualification are: Program Duration: 9 Months (Fast track 6 months duration mode Available) Program Credits: 120 Designed for working Professionals Format: Online No Written Exam. The Assessment is done via Submission of Assignment Tutor Assist available Dedicated Student Success Manager Timely Doubt Resolution Regular Networking Events with Industry Professionals Become eligible to gain direct entry into relevant Undergraduate degree programme. Alumni Status No Cost EMI Option Requirements This Diploma in Information Technology - Level 4 (Accredited by Qualifi, UK) qualifications has been designed to be accessible without artificial barriers that restrict access and progression. Entry to the qualification will be through centre interview and learners will be expected to hold the following: Qualifications at Level 3 OR A Level 3 qualification in another discipline and want to develop their careers in business and entrepreneurship. Career path Learners completing this Course progress to: Combined Level 5 + Level 6 Diploma in Information Technology , or BSc (Hons) in Business Computing and Information Systems degree, or Combined Level 4 + Level 5 Diploma in Cyber Security, or Level 5 Diploma in Information Technology, or The Second year of Undergraduate study, or Directly into employment in an associated profession. Certificates Certificate of Achievement Hard copy certificate - Included Once you complete the course, you would be receiving a Physical hard copy of your Diploma along with its Transcript which we would Courier to your address via DHL or Royal Mail without any additional charge

Qualifi Diploma in Information Technology - Level 4
Delivered Online On Demand
£1,499

OTHM Level 5 Extended Diploma in Information Technology

By School of Business and Technology London

Getting Started The OTHM Level 5 Extended Diploma in Information Technology, aims to offer learners a strong groundwork for a career across various organisations. This program prepares each learner to be 'business ready,' possessing confidence, independent thinking abilities, a comprehensive understanding of Information Technology, and the aptitude to adapt to evolving circumstances swiftly. Certainly, here are the key points: - This qualification suits individuals either embarking on or contemplating a private or public sector business career. - Attaining the Level 5 Diploma in Information Technology opens up avenues for further educational pursuits or employment opportunities. Key Benefits Comprehend methods and strategies for protecting against cyber security threats and vulnerabilities. Acquire the capability to develop a software program that addresses a problem using object-oriented programming principles. Acquire the ability to create a system design utilising modelling techniques. Acquire the capability to develop a website or mobile application that meets client and user requirements. Develop the ability to assist and resolve computing issues and problems effectively. Comprehend the compliance requirements and regulations associated with digital information. Key Highlights Are you worried about the recent changes in the IT sector? Then, OTHM Level 5 Extended Diploma in Information Technology is the ideal starting point for your career journey. The course will ensure access to the first-class education needed to achieve your goals and dreams and maximise future opportunities. Remember! The assessment for the qualification is done based on assignments only, and you do not need to worry about writing any exam. With the School of Business and Technology London, you can complete the qualification at your own pace, choosing online or blended learning from the comfort of your home. Learning and pathway materials and study guides developed by our OTHM-approved tutors will be available around the clock in our cutting-edge learning management system. Most importantly, at the School of Business and Technology London, we will provide comprehensive tutor support through our dedicated support desk. If you choose your course with blended learning, you will also enjoy live sessions with an assigned tutor, which you can book at your convenience.   Career Pathways After completing a Level 5 Extended Diploma in Information Technology, individuals can explore various career opportunities in the legal field and related professions. Here are some potential career paths:  Software Developer with an average salary of £46,384 per year Cyber security Analyst with an average salary of £49,002 per year Database Administrator, with an average salary of £41,063 per year IT Support Specialist with an average salary of £33,824 per year. About Awarding Body OTHM is an established and recognised Awarding Organisation (Certification Body) launched in 2003. OTHM has already made a mark in the UK and global online education scenario by creating and maintaining a user-friendly and skill based learning environment. OTHM has both local and international recognition which aids OTHM graduates to enhance their employability skills as well as allowing them to join degree and/or Master top-up programmes. OTHM qualifications has assembled a reputation for maintaining significant skills in a wide range of job roles and industries which comprises Business Studies, Leadership, Tourism and Hospitality Management, Health and Social Care, Information Technology, Accounting and Finance, Logistics and Supply Chain Management. What is included? Outstanding tutor support that gives you supportive guidance all through the course accomplishment through the SBTL Support Desk Portal. Access our cutting-edge learning management platform to access vital learning resources and communicate with the support desk team. Quality learning materials such as structured lecture notes, study guides, and practical applications, which include real-world examples and case studies, will enable you to apply your knowledge. Learning materials are provided in one of the three formats: PDF, PowerPoint, or Interactive Text Content on the learning portal. The tutors will provide Formative assessment feedback to improve the learners' achievements. Assessment materials are accessible through our online learning platform. Supervision for all modules. Multiplatform accessibility through an online learning platform facilitates SBTL in providing learners with course materials directly through smartphones, laptops, tablets or desktops, allowing students to study at their convenience. Live Classes (for Blended Learning Students only) Assessment Assignment-based assessment (Formative and Summative) No exam Entry Requirements These qualifications are intended for learners typically 18 years and older. Learners' entry profiles are expected to encompass at least one of the following criteria:  A relevant Level 3 Diploma qualification or its equivalent credential. Completion of GCE Advanced level courses in 2 subjects or an equivalent qualification. Mature learners aged over 21 with pertinent management experience (prior experience verification required from the delivery centre before registration) International students whose first language is not English must score 5.5 or above in IELTS (International English Language Testing System).   Progression Successful completion of the OTHM Level 5 Extended Diploma in Information Technology provides learners the opportunity to: Option for OTHM Level 6 Extended Diploma in Information Technology or Learners may be eligible to gain direct entry into the final year of a three-year UK Bachelor's degree. Why gain a OTHM Qualification? Quality, Standards and Recognitions- OTHM qualifications are approved and regulated by Ofqual (Office of the Qualifications and Examinations Regulation); hence, the learners can be very confident about the quality of the qualifications as well. Career Development to increase credibility with employers- All OTHM qualifications are developed to equip learners with the skills and knowledge every employer seeks. The learners pursuing an OTHM qualification will obtain an opportunity to enhance their knowledge and grow key competencies to tackle situations and work on projects more effectively, which will, in turn, give learners the potential to get promotions within the workplace. Alternatively, it allows them to progress onto an MBA top-up/Bachelor's degree / Master's degree programme around the World. Flexible study options- All OTHM qualifications have a credit value, which tells you how many credits are awarded when a unit is completed. The credit value will indicate how long it will normally take you to prepare for a unit or qualification. Three different types of qualification are: The award is achieved with 1 - 12 credits The certificate is completed with 13 - 36 credits The diploma is completed with at least 37 credits Learners must request before enrolment to interchange unit(s) other than the preselected units shown in the SBTL website because we need to make sure the availability of learning materials for the requested unit(s). SBTL will reject an application if the learning materials for the requested interchange unit(s) are unavailable. Learners are not allowed to make any request to interchange unit(s) once enrolment is complete. UNIT1- CYBER SECURITY Reference No : D/650/3383 Credit : 20 || TQT : 200 In this unit, learners will acquire foundational knowledge about cyber security, including its historical evolution, legal and regulatory aspects, risk assessment and management, and its repercussions on individuals and organisations. Additionally, learners will gain insights into methods for safeguarding against cyber threats and how to respond to a cyber security breach effectively. UNIT2- PRINCIPLES OF COMPUTER PROGRAMMING Reference No : F/650/3384 Credit : 20 || TQT : 200 This unit aims to provide learners with a foundational comprehension of object-oriented programming languages and the ability to create efficient code. Additionally, it offers learners insight into software development and fundamental principles of algorithms. UNIT3- SYSTEMS ANALYSIS AND DESIGN Reference No : F/617/2266 Credit : 20 || TQT : 200 This unit aims to cultivate learners' understanding of system analysis and design within an organisational context. This unit introduces learners to various techniques employed in systems analysis and design and the methodologies utilised in system development. UNIT4- WEB AND MOBILE APPLICATIONS Reference No : H/650/3385 Credit : 20 || TQT : 200 This unit aims to provide learners with knowledge about contemporary web and mobile application design technology, along with the practices and tools commonly employed in this field. Learners will gain the skills needed to develop websites or mobile applications according to the provided design specifications. UNIT5- COMPUTER AND NETWORK TECHNOLOGY Reference No : L/617/2268 Credit : 20 || TQT : 200 This unit offers learners an insight into the fundamental concepts of computer networking and cloud technologies, including their operational principles, protocols, standards, security aspects, and associated prototypes. Learners will delve into various hardware and software alternatives and gain proficiency in configuring and installing these technologies. UNIT6- MANAGING DIGITAL INFORMATION Reference No : J/650/3386 Credit : 20 || TQT : 200 This unit aims to demonstrate how communication, knowledge, and information can be enhanced within an organisation, including optimising the utilisation of IT systems. UNIT7- SOFTWARE ENGINEERING Reference No : K/617/2276 Credit : 20 || TQT : 200 This unit aims to provide learners with an understanding of software development, its evolution as an engineering discipline, and the ability to develop, maintain, and enhance high-quality software systems. UNIT8- DATABASE SYSTEMS Reference No : H/617/2275 Credit : 20 || TQT : 200 This unit aims to equip learners with knowledge in the development of database systems and to facilitate the development of robust skills in database design and development. UNIT9- ADVANCED SYSTEMS ANALYSIS & DESIGN Reference No : D/617/2274 Credit : 20 || TQT : 200 This unit aims to impart a comprehensive understanding of the roles of systems analysts and designers and enable learners to apply contemporary techniques associated with these roles. UNIT10- MANAGEMENT INFORMATION SYSTEMS Reference No : Y/617/2273 Credit : 20 || TQT : 200 This unit aims to provide learners with an understanding of how organisations utilise information to create, implement, maintain, and oversee secure information systems that facilitate their operations. This unit explores how systems can support essential business functions and empower organisations to enhance productivity and competitiveness in the global marketplace. UNIT11- NETWORK INFORMATION SYSTEMS Reference No : R/617/2272 Credit : 20 || TQT : 200 This unit aims to foster learners' understanding and proficiency in the planning, configuration, establishment, and administration of various network types, including LANs, PANs, MANs, and WANs. Additionally, it aims to cultivate skills in network monitoring and impart knowledge about Network Security, network protocols, and industry standards. UNIT12- IT PROJECT MANAGEMENT Reference No : L/617/2271 Credit : 20 || TQT : 200 This unit aims to cultivate learners' competencies in overseeing Information Technology projects aimed at implementing systems or effecting organisational change. Delivery Methods School of Business & Technology London provides various flexible delivery methods to its learners, including online learning and blended learning. Thus, learners can choose the mode of study as per their choice and convenience. The program is self-paced and accomplished through our cutting-edge Learning Management System. Learners can interact with tutors by messaging through the SBTL Support Desk Portal System to discuss the course materials, get guidance and assistance and request assessment feedbacks on assignments. We at SBTL offer outstanding support and infrastructure for both online and blended learning. We indeed pursue an innovative learning approach where traditional regular classroom-based learning is replaced by web-based learning and incredibly high support level. Learners enrolled at SBTL are allocated a dedicated tutor, whether online or blended learning, who provide learners with comprehensive guidance and support from start to finish. The significant difference between blended learning and online learning methods at SBTL is the Block Delivery of Online Live Sessions. Learners enrolled at SBTL on blended learning are offered a block delivery of online live sessions, which can be booked in advance on their convenience at additional cost. These live sessions are relevant to the learners' program of study and aim to enhance the student's comprehension of research, methodology and other essential study skills. We try to make these live sessions as communicating as possible by providing interactive activities and presentations. Resources and Support School of Business & Technology London is dedicated to offering excellent support on every step of your learning journey. School of Business & Technology London occupies a centralised tutor support desk portal. Our support team liaises with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receives a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and streamline all the support processes efficiently. Quality learning materials made by industry experts is a significant competitive edge of the School of Business & Technology London. Quality learning materials comprised of structured lecture notes, study guides, practical applications which includes real-world examples, and case studies that will enable you to apply your knowledge. Learning materials are provided in one of the three formats, such as PDF, PowerPoint, or Interactive Text Content on the learning portal. How does the Online Learning work at SBTL? We at SBTL follow a unique approach which differentiates us from other institutions. Indeed, we have taken distance education to a new phase where the support level is incredibly high.Now a days, convenience, flexibility and user-friendliness outweigh demands. Today, the transition from traditional classroom-based learning to online platforms is a significant result of these specifications. In this context, a crucial role played by online learning by leveraging the opportunities for convenience and easier access. It benefits the people who want to enhance their career, life and education in parallel streams. SBTL's simplified online learning facilitates an individual to progress towards the accomplishment of higher career growth without stress and dilemmas. How will you study online? With the School of Business & Technology London, you can study wherever you are. You finish your program with the utmost flexibility. You will be provided with comprehensive tutor support online through SBTL Support Desk portal. How will I get tutor support online? School of Business & Technology London occupies a centralised tutor support desk portal, through which our support team liaise with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receive a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and to streamline all the support process efficiently. Learners should expect to receive a response on queries like guidance and assistance within 1 - 2 working days. However, if the support request is for assessment feedback, learners will receive the reply with feedback as per the time frame outlined in the Assessment Feedback Policy.

OTHM Level 5 Extended Diploma in Information Technology
Delivered Online On Demand11 months
£1,439.94

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

Disciplined Agile Value Stream Consultant (DAVSC) Training Workshop: Virtual In-House Training

By IIL Europe Ltd

Disciplined Agile Value Stream Consultant (DAVSC) Training Workshop: Virtual In-House Training The Disciplined Agile Value Stream Consultant workshop teaches you how to use value stream management to create a tailored approach for any organization to accelerate delivery of value to their customers. It provides a combination of Lean, Flow, Theory of Constraints and Organizational Development theories and practices. The workshop integrates with the Disciplined Agile tool kit to provide those practices that will be most effective for where it is applied, whether it be a new Agile transition or continuing a stagnated SAFe® or Spotify one.

Disciplined Agile Value Stream Consultant (DAVSC) Training Workshop: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,550