• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1416 Courses delivered Online

Your guide to Artificial Intelligence (AI)

4.4(5)

By The Security Company (International) Limited

Information on the risks and practical advice to address them TSC's eBooks, whitepapers, and reports cover some of the most important risks in information and cyber security — risks that constantly challenge information and cyber security professionals who work tirelessly to reduce them across their organisations and home users alike.

Your guide to Artificial Intelligence (AI)
Delivered Online On Demand20 minutes
FREE

Certificate in Compliance and Risk Management

By Online Training Academy

Just as a detective meticulously investigates a case, equips you with the skills to manage Compliance Systems. You become the Sherlock Holmes of corporate structure, ensuring every element aligns seamlessly with our Certificate in Compliance and Risk Management. Step into the shoes of an auditor, peeling back layers to unveil any lurking irregularities. The narrative takes an ethical turn, where you grapple with the moral compass guiding compliance. Uncover the many faces of risk management, and later modules act as your guide through the intricate process of risk management, transforming you into a vigilant guardian of corporate stability. Join us on this riveting adventure, where knowledge becomes your compass and resilience your armour. Key Features This Certificate in Compliance and Risk Management Course Includes: This Certificate in Compliance and Risk Management Course is CPD Certified Free Certificate from Reed CIQ Approved Compliance and Risk Management Course Developed by Specialist Lifetime Access Course Curriculum Module 01 Overview of Compliance Module 02 The 5 Core Components of Compliance Module 03 Managing Compliance Systems (CMS) Module 04 Conducting Compliance Audits Module 05 Ethics in Compliance Module 06 Understanding Risk and Its Types Module 07 Basics of Risk Management Module 08 The Process of Risk Management Learning Outcomes After completing this Compliance and Risk Management Course, you will be able to: Demonstrate understanding of compliance principles through practical application in scenarios. Identify core components of compliance and integrate them into organisational processes. Implement and manage Compliance Management Systems (CMS) for effective regulatory adherence. Conduct thorough compliance audits using established methodologies and reporting techniques for risk management. Evaluate ethical considerations within compliance frameworks and make informed ethical decisions. Apply risk management principles to identify, assess, and mitigate potential risks. Certification After completing this Compliance and Risk Management Course, you will get a free Certificate. Please note: The CPD approved course is owned by E-Learning Solutions Ltd and is distributed under license. CPD 10 CPD hours / points Accredited by The CPD Certification Service Certificate in Compliance and Risk Management 1:44:33 1: Module 01: Overview of Compliance 07:51 2: Module 02: The 5 Core Components of Compliance 13:20 3: Module 03: Managing Compliance Systems (CMS) 12:04 4: Module 04: Conducting Compliance Audits 17:42 5: Module 05: Ethics in Compliance 16:32 6: Module 06: Understanding Risk and Its Types 12:01 7: Module 07: Basics of Risk Management 13:47 8: Module 08: The Process of Risk Management 09:16 9: CPD Certificate - Free 01:00 10: Leave A Review 01:00 Who is this course for? This Certificate in Compliance and Risk Management course is accessible to anyone eager to learn more about this topic. Through this course, you'll gain a solid understanding of Compliance and Risk Management. Moreover, this course is ideal for: Professionals seeking comprehensive knowledge in compliance and risk management. Individuals aiming to enhance their skills for regulatory compliance roles. Managers responsible for implementing compliance systems within their organisations. Auditors looking to specialise in compliance audit procedures and methodologies. Ethical decision-makers committed to incorporating ethical practices into compliance frameworks. Requirements There are no requirements needed to enrol into this Certificate in Compliance and Risk Managementcourse. We welcome individuals from all backgrounds and levels of experience to enrol into this Certificate in Compliance and Risk Management course. Career path After finishing this Certificate in Compliance and Risk Management course you will have multiple job opportunities waiting for you. Some of the following Job sectors of Compliance and Risk Management are: Compliance Officer Risk Analyst Regulatory Affairs Specialist Audit Manager Ethics and Compliance Manager Risk Management Consultant Certificates Reed Courses Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.

Certificate in Compliance and Risk Management
Delivered Online On Demand1 hour 42 minutes
£12

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Cisco integrators, resellers, and partners Network administrators Security administrators Security consultants Systems engineers Technical support personnel Overview After taking this course, you should be able to: Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors. Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0 is a 3-day course that shows you how to deploy and use Cisco© AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. The course qualifies for 24 Cisco Continuing Education credits (CE) towards recertification.This class will help you:Learn how to deploy and manage Cisco AMP for EndpointsSucceed in today?s high-demand security operations roles Course Outline This course will cover the following topics: Introducing to Cisco AMP Technologies Introducing AMP for Endpoints Overview and Architecture Navigating the Console Interface Using Cisco AMP for Endpoints Identifying Attacks Analyzing Malware Managing Outbreak Control Creating Endpoint Policies Working with AMP for Endpoint Groups Using Orbital for Endpoint Visibility Introducing AMP REST API Navigating Accounts

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0
Delivered OnlineFlexible Dates
Price on Enquiry

AN220 IBM AIX Network Installation Management - Concepts and Configuration

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This intermediate course is appropriate for anyone with system administrative duties installing and managing an AIX operating system in a multiuser POWER (System p) environment. Overview Explain key NIM concepts and terminology Display NIM-related information Set up a NIM master Perform a base AIX (RTE) install Define and use several types of NIM objects Perform an automated install Create and use mksysb resources Maintain lpp_source and SPOT resources Update NIM clients In this course you will learn the fundamental capabilities of the Network Installation Management (NIM) facility of the AIX 6 operating system Day 1 NIM overview Setting up the master RTE installation Customizing install operations Day 2 NIM backups and restores Managing key NIM resources Client updates

AN220 IBM AIX Network Installation Management - Concepts and Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180)

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for Security EngineersNetwork Engineers Overview This course is intended to provide a top-level overview of Palo Alto Networks© Traps? Endpoint protection product. Upon completion of the class the student will be able to understand these principles: Explain the core technologies of Traps? and how it differs from traditional signature recognition technologies. Understand the advantages of these technologies over existing solutions. Understand Traps? product architecture and deployment requirements. Installation requirements for Traps? installations. Deploy Exploit Prevention Module defenses to endpoints with Policies. Deploy Malware Protection defenses to endpoints. Provide Application Execution Control in conjunction with WildFire?. Understand deployment strategies and tactics for Workstations, VDI and Server endpoints. Gather and analyze Security Event reports and forensics. Foundation classes are just introductory trainings, NOT a full technical training. Compromise isn?t inevitable, or, at least, it shouldn?t be. Traditional endpoint protection simply cannot keep up with the rapidly evolving threat landscape, leaving organizations vulnerable to advanced attacks. A new approach is needed, one that can rebuild confidence in endpoint security. This new approach needs to prevent advanced attacks originating from executables, data files or network-based exploits ? known and unknown ? before any malicious activity could successfully run. Palo Alto Networks© call this ?advanced endpoint protection.? By focusing on the attacker?s core techniques and putting up barriers to mitigate them, the attacker?s path for exploitation becomes known, even when the attack isn?t. Traps? focuses on the core techniques leveraged by exploits in advanced cyberattacks and renders these techniques ineffective by breaking the exploit sequence and blocking the technique the moment it is attempted. IntroductionThe Traps? technology alternative to endpoint defenseTraps? Exploit and Malware protectionTraps? Product ArchitectureTraps? DeploymentTraps? Exploit Policy ManagementTraps? Malware Protection PoliciesTraps? ForensicsPractical Traps? Implementation considerations Additional course details: Nexus Humans Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180)
Delivered OnlineFlexible Dates
Price on Enquiry

Programming for Network Engineers (PRNE) v2.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for: Network administrators Network engineers with little or no programming or Python experience Network managers Systems engineers Overview After taking this course, you should be able to: Create a Python script Describe data types commonly used in Python coding Describe Python strings and their use cases Describe Python loops, conditionals, operators, and their purposes and use cases Describe Python classes, methods, functions, namespaces, and scopes Describe the options for Python data manipulation and storage Describe Python modules and packages, their uses, and their benefits Explain how to manipulate user input in Python Describe error and exception management in Python Describe Python code debugging methods The Programming for Network Engineers (PRNE) v2.0 course is designed to equip you with fundamental skills in Python programming. Through a combination of lectures and lab experience in simulated network environments, you will learn to use Python basics to create useful and practical scripts with Netmiko to retrieve data and configure network devices. Upon completion of this course, you should have a basic understanding of Python, including the knowledge to create, apply, and troubleshoot simple network automation scripts. Course outline Introducing Programmability and Python for Network Engineers Scripting with Python Examining Python Data Types Manipulating Strings Describing Conditionals, Loops, and Operators Exploring Classes, Methods, Functions, Namespaces, and Scopes Exploring Data Storage Options Exploring Python Modules and Packages Gathering and Validating User Input Analyzing Exceptions and Error Management Examining Debugging Methods Course Summary Lab outline Execute Your First Python Program Use the Python Interactive Shell Explore Foundation Python Data Types Explore Complex Python Data Types Use Standard String Operations Use Basic Pattern Matching Reformat MAC Addresses Use the if-else Construct Use for Loops Use while Loops Create and Use Functions Create and Use Classes Use the Python main() Construct Traverse the File Structure Read Data in Comma-Separated Values (CSV) Format Read, Store, and Retrieve Data in XML Format Read, Store, and Retrieve Date in JavaScript Object Notation (JSON) Format Read, Store, and Retrieve Data in a Raw or Unstructured Format Import Modules from the Python Standard Library Import External Libraries Create a Python Module Prompt the User for Input Use Command-Line Arguments Manage Exceptions with the try-except Structure Manage Exceptions with the try-except-finally Structure Use Assertions Use Simple Debugging Methods Use the Python Debugger Code a Practical Debugging Script

Programming for Network Engineers (PRNE) v2.0
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks : Cortex XSOAR 6.8: Automation and Orchestration (EDU-380)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security-operations (SecOps), or security, orchestration, automation, and response (SOAR) engineers, managed security service providers (MSSPs), service delivery partners, system integrators, and professional services engineers Overview This training is designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow.The course includes coverage of a complete playbook-development process for automating a typical analyst workflow to address phishing incidents. This end-to-end view of the development process provides a framework for more focused discussions of individual topics that are covered in the course. The Cortex? XSOAR 6.2: Automation and Orchestration (EDU-380) course is four days of instructor-led training that will help you: Configure integrations, create tasks, and develop playbooks.Build incident layouts that enable analysts to triage and investigate incidents efficientlyIdentify how to categorize event information and map that information to display fields.Develop automations, manage content, indicator data, and artifact stores, schedule jobs, organize users and user roles, oversee case management, and foster collaboration Course Outline 1 - Core functionality and Feature Sets 2 - Enabling and Configuring Integrations 3 - Playbook Development 4 - Classification and Mapping 5 - Layout Builder 6 - Solution Architecture - Docker 8 - Automation Development & Debugging 9 - Content Management 10 - Indicators 11 - Jobs and Job Scheduling 12 - Users and Role Management 13 - Integration Development Additional course details: Nexus Humans Palo Alto Networks : Cortex XSOAR 6.8: Automation and Orchestration (EDU-380) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Cortex XSOAR 6.8: Automation and Orchestration (EDU-380) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks : Cortex XSOAR 6.8: Automation and Orchestration (EDU-380)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Optical Technology Intermediate v3.0 (OPT200)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is intended for: System engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe Cisco DWDM platform basics Describe DWDM network topologies Describe the management software used for managing Cisco DWDM networks List the different hardware components of the Cisco ONS and Cisco NCS DWDM systems Provision nodes and circuits in a Cisco DWDM network Perform node and multishelf configurations Implement SMR-based rings Provision optical circuit protection mechanisms Configure Any Rate cards Describe the function of Raman amplifiers Perform basic maintenance and troubleshooting of a Cisco DWDM network The Cisco Optical Technology Intermediate (OPT200) v3.0 course is designed to teach you the skills necessary to deploy the Cisco© Optical Networking System (ONS), 15454 Multiservice Transport Platform (MSTP), and Cisco Network Convergence System (NCS) 2000 Series Dense Wavelength-Division Multiplexing (DWDM) networks from installation to protection. Through a combination of lecture and hands-on experience, you will learn installation, configuration, circuit protection, maintenance, and basic troubleshooting using the Cisco Transport Controller for the Cisco ONS 15454 M6 and M12 shelves, and for the Cisco NCS 2016 shelf.Additionally, in this course you will review DWDM terminology and components, explore available chassis and cards, and discuss hardware installation. You will learn to use the Cisco Transport Controller server software to connect to the nodes, perform network turn-up and circuit creation, and deploy linear and single-module ROADM (SMR) DWDM multishelf topologies. Using this software, you will also configure Raman amplifiers and Any Rate cards, and configure protected and unprotected circuits. The course covers a variety of card options: controllers, transponders, multiplexer-demultiplexer, add/drop, Raman amplifiers, and Cisco Any Rate muxponder cards. You will use the various cards to configure terminal, amplifier, mesh, split, Optical Service Channel (OSC) regenerator, and Reconfigurable Optical Add/Drop Multiplexing (ROADM) nodes. Finally, you will learn how to use many of the tools and features available with the Cisco Transport Controller to perform maintenance, testing, and basic troubleshooting of your optical network. Course Outline DWDM Optical Platform Foundation Chassis and Cards Hardware Installation Node Turn-Up and Circuit Creation Node and Multishelf Configurations SMR-Based Rings 10Gb Circuit Protection Any Rate Card Configuration Raman Amplifiers Maintenance and Basic Troubleshooting Additional course details: Nexus Humans Cisco Optical Technology Intermediate v3.0 (OPT200) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Optical Technology Intermediate v3.0 (OPT200) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Optical Technology Intermediate v3.0 (OPT200)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints v6.0 (SSFAMP)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security administrators Security consultants Network administrators Systems engineers Technical support personnel Cisco integrators, resellers, and partners Overview Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection· Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations This course shows you how to deploy and use Cisco AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. Course Outline Introducing Cisco AMP Technologies Introducing AMP for Endpoints Overview and Architecture Navigating the Console Interface Using Cisco AMP for Endpoints Identifying Attacks Analyzing Malware Managing Outbreak Control Creating Endpoint Policies Working with AMP for Endpoint Groups Using Orbital for Endpoint Visibility Introducing AMP REST API Navigating Accounts

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints v6.0 (SSFAMP)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Tester Foundation Level (CTFL)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Anyone who wants to qualify as a professional tester. The certification also offers good qualifications for builders, designers, programmers and project managers Overview This three-day training provides a general introduction to information systems testing. The objective of the training is to prepare the students for the ISTQB Foundation exam. Some important topics that will certainly be discussed here are the importance of testing, testing in relation to system development and the fundamentals of a structured testing process. The different phases in a test project are explained, after which some test techniques (both black box and white box) are also discussed. This foundation training therefore contains the basis in testing for both test managers and testers. In addition to theory, the training also includes a number of mock exams, so that the topics covered are placed even better in the exam context. Course Outline test principles life cycle testing static techniques test specification techniques blackbox techniques whitebox techniques and experienced based techniques Additional course details: Nexus Humans Certified Tester Foundation Level (CTFL) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Tester Foundation Level (CTFL) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Tester Foundation Level (CTFL)
Delivered OnlineFlexible Dates
Price on Enquiry