• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

212 Courses delivered Online

Blockchain Security Training

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Blockchain Architects Blockchain DevelopersApplication Developers Blockchain System AdministratorsNetwork Security Architects Cyber Security ExpertsIT Professionals w/cyber security experience Overview Those who attend the Security for Blockchain Professionals course and pass the exam certification will have a demonstrated knowledge of:Identifying and differentiating between security threats and attacks on a Blockchain network.Blockchain security methods, best practices, risk mitigation, and more.All known (to date) cyber-attack vectors on the Blockchain.Performing Blockchain network security risk analysis.A complete understanding of Blockchain?s inherent security features and risks.An excellent knowledge of best security practices for Blockchain System/Network Administrators.Demonstrating appropriate Blockchain data safeguarding techniques. This course covers all known aspects of Blockchain security that exist in the Blockchain environment today and provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. Fundamental Blockchain Security Cryptography for the Blockchain Hash Functions Public Key Cryptography Elliptic Curve Cryptography A Brief Introduction to Blockchain The Blocks The Chains The Network Promises of the Blockchain Blockchain Security Assumptions Digital Signature Security Hash Function Security Limitations of Basic Blockchain Security Public Key Cryptography Review Real-Life Public Key Protection Cryptography and Quantum Computers Lab 1 (Tentative) Finding Hash Function Collisions Reversible hash function Hash function with poor non-locality Hash function with small search space Breaking Public Key Cryptography Brute Forcing a Short Private Key Brute Forcing a Poorly-Chosen Private Key Consensus in the Blockchain Blockchain Consensus and Byzantine Generals Blockchain Networking Review Byzantine Generals Problem Relation to Blockchain Byzantine Fault Tolerance Introduction to Blockchain Consensus Security Blockchain Consensus Breakthrough Proof of Work What is Proof of Work? How does Proof of Work Solve BGP? Proof of Work Security Assumptions Attacking Proof of Work Proof of Stake What is Proof of Stake? How does Proof of Stake Solve BGP? Proof of Stake Security Assumptions Attacking Proof of Stake General Attacks on Blockchain Consensus Other Blockchain Consensus Algorithms Lab 2 (Tentative) Attacking Proof of Work Performing a 51% Attack Performing a Selfish Mining Attack Attacking Proof of Stake Performing a XX% Attack Performing a Long-Range Attack Malleable Transaction Attacks Advanced Blockchain Security Mechanisms Architectural Security Measures Permissioned Blockchains Checkpointing Advanced Cryptographic Solutions Multiparty Signatures Zero-Knowledge Proofs Stealth Addresses Ring Signatures Confidential Transactions Lab 3 (Tentative) Permissioned Blockchains 51% on a Checkpointed Blockchain Data mining on a blockchain with/without stealth addresses Zero-Knowledge Proof Simulation Trying to fake knowledge of a ZKP Module 4: Blockchain for Business Introduction to Ethereum Security What is Ethereum Consensus in Ethereum Smart Contracts in Ethereum Ethereum Security Pros and Cons of Ethereum Blockchains Introduction to Hyperledger Security What is Hyperledger Consensus in Hyperledger Smart Contracts in Hyperledger Hyperledger Security Pros and Cons of Hyperledger Blockchains Introduction to Corda Security What is Corda Consensus in Corda Smart Contracts in Corda Corda Security Pros and Cons of Corda Blockchains Lab 4 Blockchain Risk Assessment What are the Risks of the Blockchain? Information Security Information Sensitivity Data being placed on blockchain Risks of disclosure Regulatory Requirements Data encryption Data control PII protection Blockchain Architectural Design Public and Private Blockchains Open and Permissioned Blockchains Choosing a Blockchain Architecture Lab 5 Exploring public/private open/permissioned blockchains? Basic Blockchain Security Blockchain Architecture User Security Protecting Private Keys Malware Update Node Security Configuring MSPs Network Security Lab 6 (TBD) Smart Contract Security Introduction to Smart Contracts Smart Contract Security Considerations Turing-Complete Lifetime External Software Smart Contract Code Auditing Difficulties Techniques Tools Lab 7 (Tentative) Try a couple of smart contract code auditing tool against different contracts with built-in vulnerabilities Module 8: Security Implementing Business Blockchains Ethereum Best Practices Hyperledger Best Practices Corda Best Practices Lab 8 Network-Level Vulnerabilities and Attacks Introduction to Blockchain Network Attacks 51% Attacks Denial of Service Attacks Eclipse Attacks Routing Attacks Sybil Attacks Lab 9 Perform different network-level attacks System-Level Vulnerabilities and Attacks Introduction to Blockchain System Vulnerabilities The Bitcoin Hack The Verge Hack The EOS Vulnerability Lab 10 Smart Contract Vulnerabilities and Attacks Introduction to Common Smart Contract Vulnerabilities Reentrancy Access Control Arithmetic Unchecked Return Values Denial of Service Bad Randomness Race Conditions Timestamp Dependence Short Addresses Lab 11 Exploiting vulnerable smart contracts Security of Alternative DLT Architectures What Are Alternative DLT Architectures? Introduction to Directed Acyclic Graphs (DAGs) DAGs vs. Blockchains Advantages of DAGs DAG Vulnerabilities and Security Lab 12 Exploring a DAG network

Blockchain Security Training
Delivered OnlineFlexible Dates
Price on Enquiry

Veeam Availability Suite v11: Configuration and Management (VASv11CM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. Students should be experienced professionals with solid knowledge of servers, storage, networking and virtualization. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. The Veeam© Availability Suite? v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v11 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? Configuration backup Locate, migrate or restore backup configuration Additional course details: Nexus Humans Veeam Availability Suite v11: Configuration and Management (VASv11CM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Veeam Availability Suite v11: Configuration and Management (VASv11CM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Veeam Availability Suite v11: Configuration and Management (VASv11CM)
Delivered OnlineFlexible Dates
Price on Enquiry

VASCM-11 Veeam Availability Suite v11: Configuration and Management

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks The Veeam© Availability Suite? v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v11 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. This course is based on Veeam Availability Suite v11. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE Configuration backup Locate, migrate or restore backup configuration Additional course details: Nexus Humans VASCM-11 Veeam Availability Suite v11: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VASCM-11 Veeam Availability Suite v11: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VASCM-11 Veeam Availability Suite v11: Configuration and Management
Delivered OnlineFlexible Dates
Price on Enquiry

Database Administrator Courses

4.9(27)

By Apex Learning

***Limited Time Exclusive Bundle*** Get Hard Copy + PDF Certificates + Transcript + Student ID Card + e-Learning App as a Gift - Enrol Now Tired of browsing and searching for a Database Administrator course you are looking for? Can't find the complete package that fulfils all your needs? Then don't worry as you have just found the solution. Take a minute and look through this extensive bundle that has everything you need to succeed. After surveying thousands of learners just like you and considering their valuable feedback, this all-in-one Database Administrator bundle has been designed by industry experts. We prioritised what learners were looking for in a complete package and developed this in-demand Database Administrator course that will enhance your skills and prepare you for the competitive job market. Also, our experts are available for answering your queries on Database Administrator and help you along your learning journey. Advanced audio-visual learning modules of these Database Administrator courses are broken down into little chunks so that you can learn at your own pace without being overwhelmed by too much material at once. Furthermore, to help you showcase your expertise in Database Administrator, we have prepared a special gift of 1 hardcopy certificate and 1 PDF certificate for the title course completely free of cost. These certificates will enhance your credibility and encourage possible employers to pick you over the rest. This Database Administrator Bundle Consists of the following Premium courses: Course 01: Introduction to Data Analysis Course 02: Data Center Training Essentials: General Introduction Course 03: Data Analytics with Tableau Course 04: Basic Google Data Studio Course 05: Complete Google Analytics Course Course 06: Python for Data Analysis Course 07: Data Analysis in Excel Level 3 Course Course 08: Microsoft Excel: Automated Dashboard Using Advanced Formula, VBA, Power Query Course 09: GDPR Data Protection Level 5 Course 10: Level 3 Cyber Security Course 11: Encryption Course 12: Windows 10 Pro Complete Training Course 13: Functional Skills IT Course 14: Learning Computers and Internet Level 2 Benefits you'll get choosing Apex Learning: Pay once and get lifetime access to 14 CPD courses Free e-Learning App for engaging reading materials & helpful assistance Certificates, student ID for the title course included in a one-time fee Free up your time - don't waste time and money travelling for classes Accessible, informative modules designed by expert instructors Learn at your ease - anytime, from anywhere Study the course from your computer, tablet or mobile device CPD accredited course - improve the chance of gaining professional skills Gain valuable knowledge without leaving your home How will I get my Certificate? After successfully completing the course, you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (For The Title Course) Hard Copy Certificate: Free (For The Title Course) The bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your Database Administrator expertise and essential knowledge, which will assist you in reaching your goal. Curriculum of Bundle Course 01: Introduction to Data Analysis Module 01: Introduction Module 02: Agenda and Principles of Process Management Module 03: The Voice of the Process Module 04: Working as One Team for Improvement Module 05: Exercise: The Voice of the Customer Module 06: Tools for Data Analysis Module 07: The Pareto Chart Module 08: The Histogram Module 09: The Run Chart Module 10: Exercise: Presenting Performance Data Module 11: Understanding Variation Module 12: The Control Chart Module 13: Control Chart Example Module 14: Control Chart Special Cases Module 15: Interpreting the Control Chart Module 16: Control Chart Exercise Module 17: Strategies to Deal with Variation Module 18: Using Data to Drive Improvement Module 19: A Structure for Performance Measurement Module 20: Data Analysis Exercise Module 21: Course Project Module 22: Test your Understanding Course 02: Data Center Training Essentials: General Introduction Module 01: Data Center Introduction Module 02: Data Center Reliability Module 03: Data Center Equipment Module 04: Data Center White Space Module 05: Data Center Support Spaces Module 06: Data Center Security, Safety, Networks and IT Course 03: Data Analytics with Tableau Module 01: Introduction to the Course Module 02: Project 1: Discount Mart (Sales and Profit Analytics) Module 03: Project 2: Green Destinations (HR Analytics) Module 04: Project 3: Superstore (Sales Agent Tracker) Module 05: Northwind Trade (Shipping Analytics) Module 06: Project 5: Tesla (Stock Price Analytics) Module 07: Bonus: Introduction to Database Concepts Module 08: Tableau Stories Course 04: Basic Google Data Studio Module 01: Introduction to GDS Module 02: Data Visualization Module 03: Geo-visualization Module 04: A Socio-Economic Case Study Course 05: Complete Google Analytics Course Module 01: Overview Module 02: Navigation and Admin Module 03: Creating a New Google Analytics Account Module 04: Website Account Creation Module 05: Connecting To WordPress Website Module 06: Connecting To HTML Site Module 07: Connect Custom Page and Site Builders Module 08: Setting Up Annotations Module 09: Setting Up Intelligence Events Module 10: Set Up Custom Segments Module 11: Export Data for Analysis Module 12: Set Up Custom Reports Module 13: Set Up Google Integrations Module 14: Google Analytics Templates Module 15: Real Time Reporting Module 16: Setting Up Goals Module 17: Third Party Integrations Module 18: Audience Menu Overview Module 19: Interests and Geography Module 20: Conclusion Course 06: Python for Data Analysis Welcome, Course Introduction & overview, and Environment set-up Python Essentials Python for Data Analysis using NumPy Python for Data Analysis using Pandas Python for Data Visualization using matplotlib Python for Data Visualization using Seaborn Python for Data Visualization using pandas Python for interactive & geographical plotting using Plotly and Cufflinks Capstone Project - Python for Data Analysis & Visualization Python for Machine Learning (ML) - scikit-learn - Linear Regression Model Python for Machine Learning - scikit-learn - Logistic Regression Model Python for Machine Learning - scikit-learn - K Nearest Neighbors Python for Machine Learning - scikit-learn - Decision Tree and Random Forests Python for Machine Learning - scikit-learn -Support Vector Machines (SVMs) Python for Machine Learning - scikit-learn - K Means Clustering Python for Machine Learning - scikit-learn - Principal Component Analysis (PCA) Recommender Systems with Python - (Additional Topic) Python for Natural Language Processing (NLP) - NLTK - (Additional Topic) Course 07: Data Analysis in Excel Level 3 Course Modifying a Worksheet Working with Lists Analyzing Data Visualizing Data with Charts Using PivotTables and PivotCharts Working with Multiple Worksheets and Workbooks Using Lookup Functions and Formula Auditing Automating Workbook Functionality Creating Sparklines and Mapping Data Forecasting Data Course 08: Microsoft Excel: Automated Dashboard Using Advanced Formula, VBA, Power Query Introduction Prepaid Expenses Models: Resources Download Accounting for Prepaid Expenses Excel Formulas Detailed: Introduction to three Excel Models Formula Based Prepaid Expenses Model Calculate Prepaid Expenses Amortisation from Exact Start Date Prepaid Expenses Summary with Power Query and Pivot Table Advanced VBA Prepaid Expenses Amortisation Model BONUS: Dynamic Dashboard for Divisional Profit and Loss statements: Easy Way Power Query & Pivot Tables based Dashboard without any Formulas, Fully Dynamic Thankyou Course 09: GDPR Data Protection Level 5 Module 01: GDPR Basics Module 02: GDPR Explained Module 03: Lawful Basis for Preparation Module 04: Rights and Breaches Module 05: Responsibilities and Obligations Course 10: Level 3 Cyber Security FUNDAMENTALS OF NETWORKING GETTING STARTED WITH CYBER SECURITY LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY DIVING DEEP INTO CYBER SECURITY TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES FIREWALLS AND ANTIVIRUS KEY SECURITY CONCEPTS Course 11: Encryption Section 01: Introduction Section 02: Basics of Common Encryption Section 03: Technical Aspects of Encryption Section 04: AES Basic Tech Demo Section 05: File and System Encryption Section 06: Conclusion Course 12: Windows 10 Pro Complete Training Module 01: Course Overview Module 02: Building Your Virtual Lab Environment Module 03: Upgrading Windows 7, 8, or 8.1 to Windows 10 Module 04: Building a Microsoft Server 2016 Domain Module 05: Windows Deployment Services (WDS) Module 06: Windows 10 Firewall, Windows Defender and UAC Module 07: Networking Module 08: Troubleshooting Module 09: User Preferences Module 10: Maintenance Course 13: Functional Skills IT Section 1: Introduction Section 2: Information Technology Section 3: Components of IT Section 4: Hardware Section 5: Operating System Section 6: Application/Software Section 7: Networking Section 8: Security Section 9: Traffic Flow & Enterprise Level IT Components Section 10: Storage Section 11: Database Section 12: Virtualisation & Cloud Section 13: Management & Other IT Jobs Course 14: Learning Computers and Internet Level 2 Module 01 : Computer Operating and Troubleshooting Module 02 : Internet and Computing - Key Applications Module 03 : Internet and Computing - Tools & Networking Module 04 : Windows 8 for PC Module 05 : Windows 10 - New Developments Module 06 : Cyber Security Awareness CPD 160 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Database Administrator bundle. Requirements Our Database Administrator course is fully compatible with PCs, Macs, laptops, tablets and Smartphone devices. Career path Having this Database Administrator expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included P.S. The delivery charge inside the UK is £3.99, and the international students have to pay £9.99.

Database Administrator Courses
Delivered Online On Demand
£65

CompTIA CySA+ Cybersecurity Analyst (CS0-002)

4.9(27)

By Apex Learning

Overview The demand for skilled cybersecurity professionals is soaring in today's digital landscape. The CompTIA CySA+ Cybersecurity Analyst (CS0-002) course is your gateway to a lucrative and rewarding career in this high-demand industry. This course delves deep into various aspects of cybersecurity, from threat analysis and vulnerability identification to incident response and digital forensics. It's designed to ensure you're ready to excel in the field. This course covers various topics, including threat intelligence, vulnerability identification, incident response, and forensics analysis.  With 60+ hours of engaging content, our expert instructors will equip you with the knowledge and skills required to excel in the CompTIA CySA+ certification exam and kickstart your career in cybersecurity. Enrol in the CompTIA CySA+ Cybersecurity Analyst (CS0-002) course today and secure your future in this high-demand industry! How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA CySA+ Cybersecurity Analyst (CS0-002). It is available to all students, of all academic backgrounds. Requirements Our CompTIA CySA+ Cybersecurity Analyst (CS0-002) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 22 sections • 96 lectures • 11:35:00 total length •Introduction: 00:02:00 •All about the Exam: 00:08:00 •What's New on the CompTIA CySA+ Exam?: 00:05:00 •Meet the Instructors: 00:02:00 •Thinking like the Enemy: 00:09:00 •Tools of the Trade: 00:08:00 •Intelligence Sources and Confidence Levels: 00:08:00 •Threat Indicators and Actors: 00:08:00 •Threat Trends: 00:07:00 •Intelligence Cycle and ISACs: 00:06:00 •Attack Frameworks: 00:06:00 •Threat Research: 00:11:00 •Threat Modeling and Intelligence Sharing: 00:06:00 •Vulnerability Identification: 00:07:00 •Scanning Parameters and Criteria: 00:09:00 •Scanning Special Considerations: 00:06:00 •Validation: 00:03:00 •Remediation and Mitigation: 00:08:00 •Inhibitors to Remediation: 00:07:00 •Web Applications Scanners, Part 1: 00:10:00 •Web Applications Scanners, Part 2: 00:05:00 •Scanning: 00:06:00 •Configuring and Executing Scans: 00:08:00 •Vulnerability Scanning: 00:10:00 •Reverse Engineering: 00:08:00 •Enumeration: 00:06:00 •Wireless Assessment Tools: 00:08:00 •Cloud Assessment Tools: 00:04:00 •Mobile and IoT: 00:10:00 •Embedded and Firmware Systems (RTOS, SoC, and FPGA): 00:09:00 •Access and Vehicles Risk: 00:08:00 •Automation and Control Risk: 00:10:00 •Cloud Models: 00:07:00 •Remote Service Invocation (FaaS, IaC, API): 00:10:00 •Cloud Vulnerabilities: 00:06:00 •Injection and Overflow Attacks: 00:09:00 •Injection and Overflow Attacks: 00:09:00 •Exploits: 00:08:00 •Application Vulnerabilities, Part 1: 00:08:00 •Application Vulnerabilities, Part 2: 00:07:00 •Network Architecture and Asset Management: 00:09:00 •Protecting Your Territory: 00:05:00 •Identity and Access Management: 00:11:00 •Encryption and Active Defense: 00:08:00 •Platforms: 00:07:00 •SOA and DevSecOps: 00:09:00 •Secure Software Development: 00:08:00 •Best Coding Practices: 00:04:00 •Trusted Hardware: 00:10:00 •Hardware Encryption: 00:04:00 •Hardware Security: 00:08:00 •Data Analytics: 00:10:00 •Endpoint Security: 00:08:00 •Recon Results, Part 1: 00:13:00 •Recon Results, Part 2: 00:05:00 •Impact Analysis: 00:05:00 •Collective Tools: 00:09:00 •Query Writing: 00:07:00 •E-mail Analysis, Part 1: 00:10:00 •E-mail Analysis, Part 2: 00:08:00 •Permissions: 00:09:00 •Firewalls: 00:08:00 •Intrusion Prevention Rules: 00:05:00 •DLP and Endpoint Detection: 00:05:00 •Threat Hunting and the Hypothesis: 00:06:00 •Threat Hunting Process: 00:07:00 •Results and Benefits: 00:05:00 •Workflow and Scripting: 00:07:00 •API and Malware Signature Creation: 00:08:00 •Threat Feeds and Machine Learning: 00:06:00 •Protocols, Standards, and Software Engineering: 00:05:00 •IR Roles and Responsibilities: 00:08:00 •IR Active Preparation: 00:10:00 •Incident Response Process: 00:07:00 •Network Symptoms: 00:04:00 •Host Symptoms: 00:08:00 •Application Symptoms: 00:04:00 •Digital Forensics: 00:10:00 •Seizure and Acquisitions: 00:05:00 •Forensics Acquisition Tools: 00:09:00 •Mobile, Virtualization, and Cloud: 00:06:00 •Forensics Analysis, Part 1: 00:04:00 •Forensics Analysis, Part 2: 00:08:00 •Packet Capture: 00:12:00 •Data Privacy and Security: 00:06:00 •Nontechnical Controls: 00:09:00 •Technical Controls: 00:08:00 •Business Impact Analysis: 00:05:00 •Risk Identification: 00:05:00 •Risk Calculation and Communication: 00:06:00 •Training: 00:04:00 •Supply Chain Assessment: 00:04:00 •Frameworks: 00:13:00 •Policies and Procedures: 00:05:00 •Controls and Procedures: 00:08:00 •Verification: 00:06:00

CompTIA CySA+ Cybersecurity Analyst (CS0-002)
Delivered Online On Demand11 hours 35 minutes
£12

Learning Computer and Internet Level 2

4.9(27)

By Apex Learning

Course Overview: About 87% of global consumers use at least one computer or device to access the internet daily. Mastering the essentials of computer and the internet is crucial in today’s digital age. The Learning Computer and Internet Level 2 course provides an in-depth exploration of computer systems, internet functionalities, and software applications, offering you the knowledge to navigate the digital world with ease. This course covers a wide range of computer-related topics, from fundamental operating systems and hardware to advanced concepts like cybersecurity and data protection. With engaging, interactive content, you’ll gain practical skills and insights that enhance your computer proficiency and digital competence. Embark on an enlightening journey through the digital landscape. Enrol in Learning Computer and Internet Level 2 today and elevate your computer skills to thrive in a connected world! Key Features of the Course: FREE Learning Computer and Internet Level 2 CPD-accredited certificate Get a free student ID card with Learning Computer and Internet Level 2 training (£10 applicable for international delivery) Lifetime access to the Learning Computer and Internet Level 2 course materials The Learning Computer and Internet Level 2 program comes with 24/7 tutor support Get instant access to this Learning Computer and Internet Level 2 course Learn Learning Computer and Internet Level 2 training from anywhere in the world The Learning Computer and Internet Level 2 training is affordable and simple to understand The Learning Computer and Internet Level 2 training is entirely online Who is This Course For? This course is designed for individuals seeking to build upon foundational knowledge of computer and the internet. Whether a student, professional, or enthusiast, this course will elevate your proficiency. Learning Outcome Grasp the intricacies of various operating systems and their configurations. Understand the diverse range of applications and their functionalities. Navigate through storage solutions, network components, and software tools. Comprehend the concept of licensing and its implications. Become adept in word processing, spreadsheets, and creating presentations. Learn the terminologies of networking, ensuring smooth connectivity. Safeguard yourself online and understand the fundamentals of digital security. Acquire skills to use browsers, e-mails, and collaborative platforms effectively. Why Enrol in This Course: Enrolling in "Learning Computer and Internet Level 2" is your gateway to a world of opportunities and possibilities. You will develop essential skills in high demand across various industries, making you a valuable asset in the job market. Our course is top-reviewed, recently updated to reflect the latest trends, and aligns with the evolving digital landscape, ensuring you stay ahead in the digital race. Requirements: Enrolling in this Learning Computer and Internet Level 2 course requires a basic understanding of computer usage. No prior technical knowledge is needed, making it accessible to beginners and those looking to refresh their skills. Career Path: Upon completing this Learning Computer and Internet Level 2 course, you'll be well-equipped to pursue various professions in the digital domain. Here are seven course-related professions in the UK, along with their average salaries: IT Support Specialist: £25,000 - £40,000 per year Data Entry Clerk: £18,000 - £25,000 per year Digital Marketing Assistant: £20,000 - £30,000 per year Office Administrator: £18,000 - £25,000 per year Cybersecurity Analyst: £30,000 - £50,000 per year Web Developer: £25,000 - £45,000 per year Database Administrator: £30,000 - £50,000 per year Certification: Upon completing the Learning Computer and Internet Level 2 course, learners will be awarded a CPD certificate, validating their enhanced knowledge of computer and the Internet. Course Curriculum 6 sections • 81 lectures • 22:23:00 total length •What is an Operating System: 00:48:00 •Configuring the Operating System: 00:06:00 •What is an Application: 00:10:00 •Using Control Panel: 00:18:00 •Hardware and Peripherals: 00:07:00 •Storage: 00:12:00 •Connectivity Devices: 00:05:00 •Network Components: 00:09:00 •Software and Concepts: 00:11:00 •Licensing: 00:06:00 •Using Software: 00:07:00 •Software Tools: 00:10:00 •Software: 00:14:00 •Hardware, Devices, and Peripherals: 00:05:00 •Backup and Restore: 00:03:00 •Application Features: 01:21:00 •Working with Word Processing: 00:44:00 •Working with Spreadsheets: 00:49:00 •Making a Presentation: 01:08:00 •Databases: 00:34:00 •Collaboration: 00:03:00 •Course Introduction: 00:02:00 •Web Browsers: 00:46:00 •Networking Terminology: 00:35:00 •E-mail: 00:38:00 •Communicating in the Modern World: 00:14:00 •Protecting Yourself: 00:15:00 •Web Searching: 00:31:00 •Protecting Yourself: 00:31:00 •Identify Components of a Personal Computer IPU: 00:08:00 •Sign In to Windows 8: 00:07:00 •Signing In to Windows 8 and Managing Tiles: 00:08:00 •Navigate the Start Screen: 00:18:00 •Using the Account ID Menu: 00:02:00 •Access and Identify the Charms: 00:03:00 •Viewing the Charms: 00:02:00 •Modern Apps and Common Navigation Features: 00:03:00 •Navigating a Modern App: 00:07:00 •Multitasking with Apps: 00:05:00 •Working with Multiple Apps: 00:05:00 •Navigate the Desktop IPU: 00:07:00 •Navigating The desktop: 00:07:00 •Manage Files and Folders with File Explorer IPU: 00:09:00 •Managing Files and Folders: 00:15:00 •Elements of a Desktop Window: 00:12:00 •Working with the Elements of a Desktop Window: 00:10:00 •Creating and Modifying Files with Wordpad: 00:14:00 •Printing a Document: 00:05:00 •Navigate Internet Explorer 10: 00:08:00 •Navigating Internet Explorer 10: 00:09:00 •Browse the Web: 00:12:00 •Using Internet Explorer and Share: 00:08:00 •Customize the Start Screen: 00:07:00 •Creating Groups on the Start Screen: 00:03:00 •Changing PC Setting: 00:07:00 •Customize the Desktop IPU: 00:09:00 •Personalizing the Desktop: 00:11:00 •Set Privacy Levels and Passwords: 00:05:00 •Changing Your Password: 00:05:00 •Use Windows Defender IPU: 00:05:00 •Changing Windows Defender Settings: 00:06:00 •Store and Share Files with SkyDrive: 00:03:00 •What Makes Windows 10 Different?: 00:14:00 •Primary Feature Overview: 00:14:00 •Navigating and Using Windows 10: 00:36:00 •Course Overview: 00:13:00 •Types of Security Threats: 00:29:00 •Social Engineering: 00:30:00 •Identity Theft: 00:29:00 •Data Classification: 00:28:00 •Types of Classifications: 00:18:00 •Protecting Your Digital Information: 00:45:00 •Password Management: 00:13:00 •Malware: 00:17:00 •Software Detection: 00:28:00 •Security from End-to-End: 00:26:00 •Secure E-mail Use: 00:21:00 •Secure Web Browsing: 00:29:00 •Piracy: 00:16:00 •Security Policies: 00:18:00 •Moving Forward: 00:12:00

Learning Computer and Internet Level 2
Delivered Online On Demand23 hours
£9.99

Raising Healthy Children Course Level 3

4.3(43)

By John Academy

Description:  Raising children can be a difficult task if you are not skilled or willing to learn. To know how to raise them healthily, you need to learn and know the skills in child raising. You need to learn about child psychology, social behaviour, child safety online, and healthy lifestyle. All of these lessons could help you succeed in raising healthy children without sacrificing your own happiness. Who is the course for? Teachers or professionals who are working with kids Anyone who loves to become a teacher and likes children in general Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at a cost of £39 or in PDF format at a cost of £24. PDF certificate's turnaround time is 24 hours and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognised accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path: The Raising Healthy Children Course Level 3 will be useful and would be beneficial for every kind of occupations and careers like: Child Care Specialist Child and Family Social Worker Early Educator Paediatric Nurse Pediatric Physical Therapist. Module 1: Raising Children Raising Children Who Succeed 01:00:00 How Do We Define Success? 00:30:00 What The Children Don't Need 01:00:00 What They Do Need 01:00:00 The Legacy of Books 01:00:00 The Power of Role Models 01:00:00 Teaching Social Skills 01:00:00 Money, Money, Money 00:30:00 Module 2: Child Psychology The Basics On Nurturing Your Child 00:30:00 Build Your Child's Self Esteem 00:30:00 Catch The Good And Not Always The Bad 00:30:00 Demonstrate The Love Is Unconditional 00:30:00 Make Rules And Be Consistent 01:00:00 Make Special Time For Your Child 00:30:00 Always Set An Example 00:30:00 Don't Dominate A Conversation 00:30:00 Learn To Be A Good Communicator 01:00:00 An Unnourished Child has A Long Road Ahead 00:30:00 Module 3: Social Behavior Training The Three Modes of Management 01:00:00 What Are Gentle Measures? 01:00:00 There Must be Authority 01:00:00 Gentle Punishment Of Disobedience 01:00:00 The Philosophy of Punishment Action 01:00:00 Rewarding Obedience 01:00:00 The Art of Training Delivery 01:00:00 Methods Exemplified 03:00:00 Della and The Dolls 01:00:00 The Child With The Parent 01:00:00 The Parent With The Child 01:00:00 Difference Between Commendation and Encouragement 01:00:00 Faults of Immaturity 01:00:00 Activities for kids Early Learning 01:00:00 The Role of Imagination in Children`s development 01:00:00 Truth and Falsehood 01:00:00 Judgement and Reasoning 01:00:00 Wishes and Requests 01:00:00 Children`s Questions 01:00:00 The Use of Money 01:00:00 Corporal Punishment 01:00:00 Gratitude in Children 01:00:00 Religious Training 01:00:00 Conclusion 00:15:00 Module 4: Child Safety Online Introduction to Child Safety 00:30:00 Warning Signs 01:00:00 Parental Monitoring 00:15:00 Monitoring and Protection Software 01:00:00 Tips to Avoid Sexual Predators 00:30:00 The Truth About Online Content 01:00:00 Identity Theft 00:30:00 Spyware And Malware 01:00:00 The Children's Online Privacy Protection Act (COPPA) 00:15:00 Privacy Policy 00:15:00 Social Networking Safety 01:00:00 Additional Rules For Child Safety Online 00:30:00 Warnings For Children Online 00:15:00 Additional Tips For Parents 01:00:00 Module 5: Healthy Lifestyle for Children Strong Kids Basics 00:30:00 Child Obesity Is A Serious Issue 00:30:00 The Benefits Of An Active Lifestyle 01:00:00 Shut Off The TV And Video Games 01:00:00 Outdoor Activities For Your Kids 01:00:00 Keep An Eye On Nutrition 01:00:00 Final Exam Mock Exam-Raising Healthy Children Course Level 3 00:30:00 Mock Exam Final Exam-Raising Healthy Children Course Level 3 00:30:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Raising Healthy Children Course Level 3
Delivered Online On Demand48 hours
£11.99

Perfect Parenting Skills Training

By iStudy UK

Raise your Child the best way you possibly can Raising healthy children sounds pretty simple: Good nutrition and 60 minutes of physical activity a day protects kids from obesity, diabetes, and a host of chronic diseases later in life. However it is more complicated than that. So learn how to effectively raise your child in a healthy way with this useful course. These days though, health-conscious parents have to compete against any number of unhealthy temptations. One hour of physical activity a day may seem like a lot. But those 60 minutes can happen in short bursts throughout the day. This ensure that your child is active and having healthy exercise regularly. Different parents support their kids' physical activity in different ways. What matters most is that your kids know how much you value and support their active pursuits. So learn all you can with this course and keep your children healthy and active. Make yourself a better by keeping an eye on your children's activity and whether they are living a healthy life. Course Highlights Perfect Parenting Skills Training is an award winning and the best selling course that has been given the CPD Certification & IAO accreditation. It is the most suitable course anyone looking to work in this or relevant sector. It is considered one of the perfect courses in the UK that can help students/learners to get familiar with the topic and gain necessary skills to perform well in this field. We have packed Perfect Parenting Skills Training into several modules for teaching you everything you need to become successful in this profession. To provide you ease of access, this course is designed for both part-time and full-time students. You can become accredited in just 20/30 hours and it is also possible to study at your own pace. We have experienced tutors who will help you throughout the comprehensive syllabus of this course and answer all your queries through email. For further clarification, you will be able to recognize your qualification by checking the validity from our dedicated website. Why You Should Choose Perfect Parenting Skills Training Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? Perfect Parenting Skills Training is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our Perfect Parenting Skills Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. Module 1: Raising Children Raising Children Who Succeed FREE 01:00:00 How Do We Define Success? FREE 01:00:00 What The Children Don't Need 01:00:00 What They Do Need 01:00:00 The Legacy of Books 01:00:00 The Power of Role Models 01:00:00 Teaching Social Skills 01:00:00 Money, Money, Money 01:00:00 Module 2: Child Psychology The Basics On Nurturing Your Child 00:30:00 Build Your Child's Self Esteem 01:00:00 Catch The Good And Not Always The Bad 01:00:00 Demonstrate The Love Is Unconditional 01:00:00 Make Rules And Be Consistent 01:00:00 Make Special Time For Your Child 00:30:00 Always Set An Example 01:00:00 Don't Dominate A Conversation 00:30:00 Learn To Be A Good Communicator 01:00:00 An Unnourished Child has A Long Road Ahead 00:30:00 Module 3: Social Behavior Training The Three Modes of Management FREE 01:00:00 What Are Gentle Measures? FREE 01:00:00 There Must be Authority 01:00:00 Gentle Punishment Of Disobedience 01:00:00 The Philosophy of Punishment Action 01:00:00 Rewarding Obedience 01:00:00 The Art of Training Delivery 01:00:00 Methods Exemplified 03:00:00 Della and The Dolls 01:00:00 The Child With The Parent 01:00:00 The Parent With The Child 01:00:00 Difference Between Commendation and Encouragement 01:00:00 Faults of Immaturity 01:00:00 Activities for kids Early Learning 01:00:00 The Role of Imagination in Children`s development 01:00:00 Truth and Falsehood 01:00:00 Judgement and Reasoning 01:00:00 Wishes and Requests 01:00:00 Children`s Questions 01:00:00 The Use of Money 01:00:00 Corporal Punishment 01:00:00 Gratitude in Children 01:00:00 Religious Training 01:00:00 Conclusion 00:15:00 Module 4: Child Safety Online Introduction to Child Safety 00:30:00 Warning Signs 01:00:00 Parental Monitoring 00:30:00 Monitoring and Protection Software 01:00:00 Tips to Avoid Sexual Predators 00:30:00 The Truth About Online Content 00:30:00 Identity Theft 00:30:00 Spyware And Malware 01:00:00 The Children's Online Privacy Protection Act (COPPA) 00:30:00 Privacy Policy 00:15:00 Social Networking Safety 01:00:00 Additional Rules For Child Safety Online 01:00:00 Warnings For Children Online 00:15:00 Additional Tips For Parents 01:00:00 Module 5: Healthy Lifestyle for Children Strong Kids Basics FREE 00:30:00 Child Obesity Is A Serious Issue FREE 00:30:00 The Benefits Of An Active Lifestyle 00:30:00 Shut Off The TV And Video Games 01:00:00 Outdoor Activities For Your Kids 00:30:00 Keep An Eye On Nutrition 01:00:00 Final Exam Mock Exam-Perfect Parenting Skills Training 00:30:00 Mock Exam Final Exam-Perfect Parenting Skills Training 00:30:00

Perfect Parenting Skills Training
Delivered Online On Demand3 days
£25

VEEAM-VMCE Availability Suite v10.0: Configuration and Management

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v10 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to their own environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Install and configure Veeam Availability Suite into their environment, ensuring data is protected effectively. Adapt with an organization's evolving technical, business and regulatory needs. Ensure recovery is possible, effective, efficient, secure and compliant with business and legal requirements. Provide visibility of the business data assets, and produce effective reports and dashboards to monitor performance and risks. Conduct basic troubleshooting and analysis of their Veeam Availability Suite environment. This three-day, technical deep dive Veeam© Availability Suite? v10: Configuration and Management training course is focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v10 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios Building Backup Capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including NAS Backup jobs. Explore different tools and methods, such as BitLooker? and Deduplication, to maximize environment performance Global Settings and their usage to prevent production performance bottlenecks, encrypt network traffic data and control network jurisdiction Restoring from Backup Identify and describe the different restore tools and their features. Ensure you have the confidence to use the correct restore tool at the right time Using Secure Restore to prevent the restoration of malware Disaster recovery from backup, respond accordingly to a variety of real-world recovery scenarios Backup Copy Jobs Simple vs Advanced Backup Copy Jobs, how to create and modify them using best practices to ensure efficient recovery Utilizing tape jobs, how to create and modify Replication Identify and describe the options available for replication, the use cases and impacts of using Create, modify and delete replication jobs, outline considerations to ensure success Failover Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica, respond accordingly to a variety of real-world recovery scenarios Advanced Repository Capabilities Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Ensure scalability by integrating off-site S3 storage Ensure compatibility with existing deduplication appliances Testing Backup and Replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure Veeam DataLabs? and setup sandbox environments based on backup, replicas and storage snapshots Using Veeam DataLabs Staged Restore to manage and comply with General Data Protection Regulation (GDPR) legislation before releasing restores to production Veeam Backup Enterprise Manager Manage multiple Veeam Backup & Replication? installations from a single web console, maintaining a view of your entire virtual environment, ensuring data protection of ROBO and Enterprise environments. Create user and group roles, delegate workloads whilst maintaining data control Enable encryption password loss protection, helping to restore encrypted data in case of lost or forgotten encryption passwords Veeam ONE Monitor your Virtual, Physical and Cloud environments with Veeam ONE? and assess the different views available Configure Veeam ONE for your specific technical and business requirements, describe the alarm options available and how to customize their usage Set up, use and customize Veeam ONE Reporter, creating the reports and dashboards you require technically and for the business Support Locate, migrate or restore backup configuration Identify and locate appropriate support resources Troubleshooting methodology to identify, isolate and remediate support issues Additional course details: Nexus Humans VEEAM-VMCE Availability Suite v10.0: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VEEAM-VMCE Availability Suite v10.0: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VEEAM-VMCE Availability Suite v10.0: Configuration and Management
Delivered OnlineFlexible Dates
Price on Enquiry

Internet of Things (IoT)

4.9(27)

By Apex Learning

**Don't Spend More; Spend Smarter** Boost Your Career with Apex Learning and Get Noticed By Recruiters in this Hiring Season! Get Hard Copy + PDF Certificates + Transcript + Student ID Card worth £160 as a Gift - Enrol Now Give a compliment to your career and take it to the next level. This Internet of Things (IoT) will provide you with the essential knowledge to shine in your professional career. Whether you want to develop skills for your next job or elevate skills for your next promotion, this Internet of Things (IoT) will help you keep ahead of the pack. The Internet of Things (IoT) incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your expertise and essential knowledge, which will assist you in reaching your goal. Further, this Internet of Things (IoT) will add extra value to your resume to stand out to potential employers. Throughout the programme, it stresses how to improve your competency as a person in your chosen field while also outlining essential career insights in this job sector. Consequently, you'll sharpen your knowledge and skills; on the other hand, see a clearer picture of your career growth in future. By the end of the Internet of Things (IoT), you can equip yourself with the essentials to keep you afloat in the competition. Along with this Internet of Things (IoT) course, you will get 10 premium courses, an original Hardcopy, 11 PDF Certificates (Main Course + Additional Courses) Student ID card as gifts. This Internet of Things (IoT) Bundle Consists of the following Premium courses: Course 01: Internet of Things Course 02: Internet of Things Hacking Course 03: Automation Course 04: Learning Computers and Internet Level 2 Course 05: AWS Essentials Course 06: Encryption Course 07: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 08: CompTIA Networking - Level 4 Course 09: Network Security Level 2 Course 10: Cyber Security Incident Handling and Incident Response Course 11: Data Center Training Essentials: General Introduction So, enrol now to advance your career! Benefits you'll get choosing Apex Learning for this Internet of Things (IoT): Pay once and get lifetime access to 11 CPD courses Free e-Learning App for engaging reading materials & helpful assistance Certificates, student ID for the title course included in a one-time fee Free up your time - don't waste time and money travelling for classes Accessible, informative modules designed by expert instructors Learn at your ease - anytime, from anywhere Study the course from your computer, tablet or mobile device CPD accredited course - improve the chance of gaining professional skills How will I get my Certificate? After successfully completing the course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) Curriculum of Internet of Things (IoT) Bundle Course 01: Internet of Things Course Agenda Unit 01: Introduction Unit 02: Raspberry Pi Installation Unit 03: Getting Around Raspberry Pi Unit 04: Raspberry Pi GPIO Output Unit 05: Output from Raspberry Pi Unit 06: Inputs to Raspberry Pi Unit 07: Sensor Interfacing Unit 08: Interfacing of I2C Based BMP180 Sensor with Raspberry Pi Unit 09: Internet of Things with Microsoft Azure Unit 10: IoT with Thingspeak Unit 11: Learn a new platform, Adafruit IO Unit 12: IOT Security Course 02: Internet of Things Hacking Module 01: IoT Part 1 Module 02: IoT Part 2 Module 03: IoT Hacking Tools and Technique Module 04: IoT Hacking Tools and Technique Part 2 Module 05: IoT Scenario Part 1 Module 06: IoT Scenario Part 2 Module 07: Smart Devices Module 08: AWS Basics Course 03: Automation Module 01: Introduction Module 02: Overview of Automation Concepts and Tools Module 03: Common Automation Workflows and Campaigns Module 04: Build Your First Workflow from Scratch Course 04: Cloud Computing / CompTIA Cloud+ (CV0-002) Section 01: What You Need to Know Section 02: Introducing the Cloud Section 03: System Requirements for Cloud Deployments Section 04: Cloud Storage Section 05: Cloud Compute Section 06: Cloud Networking Section 07: Cloud Security Section 08: Migrating to the Cloud Section 09: Maintaining Cloud Solutions Section 10: Troubleshooting Cloud Solutions Course 05: AWS Essentials Section 01: AWS Foundations and Services Section 02: AWS Security and Costs Course 06: Encryption Section 01: Introduction Section 02: Basics of Common Encryption Section 03: Technical Aspects of Encryption Section 04: AES Basic Tech Demo Section 05: File and System Encryption Section 06: Conclusion Course 07: Basics Blockchain Section 01: Introduction Section 02: Underlying technologies of Blockchain Section 03: Advantages of Blockchain Section 04: How Blockchain works Section 05: Types of blockchain and bitcoin Section 06: Libra [Facebook's cryptocurrency] Section 07: Ethereum [The revolution in Blockchain technology] Section 08: Forming Blockchain Solutions Course 08: Cisco ASA Firewall Training Lecture 01: Common Network Security Terms Lecture 02: Confidentiality, Integrity, Availability. Lecture 03: Security Concepts & Terms Lecture 04: Intro to Firewall Technologies Lecture 05: About Cisco ASA Firewall Lecture 06: Install Cisco ASAv Firewall in GNS3 Lecture 07: Install ASA 9 Cluster, Security Context enable in GNS3. Lecture 08: Install Cisco ASAv Firewall on EVE-NG Lecture 09: Install Cisco ASAv Firewall on VMWare Workstation. Lecture 10: Cisco ASA Firewall Basic Configuration Commands. Lecture 11: Device Management Cisco ASA Console Lecture 12: Device Management Cisco ASA Telnet Lecture 13: Device Management Cisco ASA SSH Lecture 14: Device Management Cisco ASA ASDM Lecture 15: Device Management Cisco ASA TFTP Lecture 16: Device Management Cisco ASA FTP Lecture 17: Security Levels and Zoning in Cisco ASA Lecture 18: Introduction to Routing & Static Routing Lecture 19: Network Route Configuration in Cisco ASA Lecture 20: Host Route Configuration in Cisco ASA Lecture 21: Default Route Configuration in Cisco ASA Lecture 22: Floating Static Route Configuration in ASA Lecture 23: IP SLA (Service Level Agreement) in ASA Lecture 24: Dynamic Routing Protocol RIP version 2 Lecture 25: Dynamic Routing Protocol EIGRP Configuration Lecture 26: Dynamic Routing Protocol OSPF Configuration Lecture 27: Routing Protocols Redistribution Lecture 28: Implement Access Control Lists in ASA Lecture 29: Configure & Verify Extended ACLs in ASA Lecture 30: Configure & Verify Infrastructure ACLs Lecture 31: Configure & Verify Time-Based ACLs Lecture 32: Configure & Verify Standard ACLs Lecture 33: Configure & Verify Object Groups ACLs Lecture 34: Configure & Verify DHCP Server in ASA Lecture 35: Configure & Verify DHCP Relay in ASA Lecture 36: Introduction & Theory of NAT and PAT ASA Lecture 37: Creating Lab Topology for NAT & PAT Lecture 38: Static NAT in Cisco ASA Lecture 39: Static PAT in Cisco ASA Lecture 40: Dynamic NAT in Cisco ASA Lecture 41: Dynamic PAT in Cisco ASA Lecture 42: Identity NAT in Cisco ASA Lecture 43: Policy NAT in Cisco ASA Lecture 44: Modular Policy Framework (MPF) Lecture 45: Transparent Firewall Lecture 46: ASDM Walkthrough Lecture 47: Security Contexts (Multi-Contexts) Lecture 48: Redundancy, HA, Active/Standby Failover Lecture 49: Packet Capture in Cisco ASA Firewall Lecture 50: Packet Tracer in Cisco ASA Firewall Lecture 51: Syslog Logging in Cisco ASA Firewall Lecture 52: Introduction and Concept of Cryptography & Terminologies Lecture 53: Introduction & Concept of Symmetric & Asymmetric Encryption Lecture 54: Introduction and Concept of Cryptography Hash (SHA, MD5) Lecture 55: Introduction and Concept of Virtual Private Network VPN Lecture 56: Introduction and Concept of IPSec Protocols Features Lecture 57: Introduction and Concept of Diffie-Hellman (DH) And Much More... Course 09: Network Security Level 2 Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security Course 10: Cyber Security Level 3 Module 01: Getting Started Module 02: Cyber security Fundamentals Module 03:Types of Malware Module 04: Cyber Security Breaches Module 05: Types of Cyber Attacks Module 06: Prevention Tips Module 07: Mobile Protection Module 08: Social Network Security Module 09: Prevention Software Module 10: Critical Cyber Threats Module 11: Defense Against Hackers Module 12: Closing Course 11: Data Center Training Essentials: General Introduction Module 01: Data Center Introduction Module 02: Data Center Reliability Module 03: Data Center Equipment Module 04: Data Center White Space Module 05: Data Center Support Spaces Module 06: Data Center Security, Safety, Networks and IT CPD 120 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Internet of Things (IoT) bundle. Persons with similar professions can also refresh or strengthen their skills by enrolling in this course. Students can take this course to gather professional knowledge besides their study or for the future. Requirements Our Internet of Things (IoT) is fully compatible with PC's, Mac's, laptops, tablets and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones, so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course; it can be studied in your own time at your own pace. Career path Having this various expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (Internet of Things) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

Internet of Things (IoT)
Delivered Online On Demand
£53