Securing Kubernetes training course description This course introduces concepts, procedures, and best practices to harden Kubernetes based systems and container-based applications against security threats. It deals with the main areas of cloud-native security: Kubernetes cluster setup, Kubernetes cluster hardening, hardening the underlying operating system and networks, minimizing microservices vulnerabilities, obtaining supply chain security as well as monitoring, logging, and runtime security. What will you learn Harden Kubernetes systems and clusters. Harden containers. Configure and use Kubernetes audit logs. Securing Kubernetes training course details Who will benefit: Technical staff working with Kubernetes Prerequisites: Kubernetes_for_engineers_course.htm Definitive Docker for engineers Duration 2 days Securing Kubernetes training course contents This course does not only deal with the daily security administration of Kubernetes-based systems but also prepares delegates for the official Certified Kubernetes Security Specialist (CKS) exams of the Cloud Native Computing Foundation (CNCF). Structure: 50% theory 50% hands on lab exercise Module 1: User and authorization management Users and service accounts in Kubernetes Authenticating users Managing authorizations with RBAC Module 2: Supply chain security Vulnerabilit checking for images Image validation in Kubernetes Reducing image footprint Secure image registries Module 3: Validating cluster setup and penetration testing Use CIS benchmark to review the security configuration of Kubernetes components. Modify the cluster components' configuration to match the CIS Benchmark. Penetration testing Kubernetes for known vulnerabilities. Module 4: System hardening Use kernel hardening tools Setup appropriate OS level security domains Container runtime sandboxes Limit network access Module 5: Monitoring and logging Configure Kubernetes audit logs Configure Audit Policies Monitor applications behaviour with Falco
Work Breakdown Structures - Français: On-Demand It's amazing how often project managers start the project planning process by making a list of all the tasks they think will be needed to complete a project, then proclaiming that they've created the breakdown structure. (WBS) for the project.The result is a list of hundreds or even thousands of tasks, many of which have a duration of a few days or a few hours. Essentially what they did was create a 'to do' list, which they then use as a 'checklist' to measure progress.This approach leads to, and even encourages, the micromanagement of resources working on the project without considering the more critical aspects of project management such as: requirements management, risk management, procurement management, estimating , planning, execution and control.Moreover, it is impossible to see the big picture, at detailed levels, in line with the needs of sponsors, customers, project and functional managers, team leaders and project implementers. Join us for this exciting program and learn how to use the WBS to make more informed business decisions. What You Will Learn You will learn how: Describe the need for a WBS project Describe the role of WBS in the project Gain hands-on experience in developing, decomposing, and using WBS Determine the appropriate level of detail in the WBS. Explain how the WBS integrates with project requirements, risks, procurement, estimating, planning, and overall project execution. Provide the basic tools to improve the effective reuse of key information in your future projects Getting started Concepts de base WBS & Perimeter WBS & Risks WBS & Estimations WBS & Echéancier WBS & Execution and Mastery Summary and Next Steps
Effective Presentation Skills (Virtual) In today's results-oriented, global working environment, the ability to create and deliver presentations effectively is a necessary skill set for people at all levels of an organization. Regardless of your role, it's important to know how to synthesize your ideas into a coherent and focused narrative, add visuals that support and reinforce your message, and deliver it in a way that resonates with your audience. In this highly interactive course, we will unpack and practice some of the tools and techniques used by top speakers and influencers all over the world. In this engaging two-day course, you will plan, write, refine, practice, and deliver a presentation to the class. Your presentation will be filmed on both days, and you will leave the course with a flash-drive copy of your videos; participants of the virtual classroom workshop should be prepared to present via webcam. In addition to discovering and enhancing your own personal delivery style, you will learn how to create an overarching goal for your presentation and then organize and structure it for maximum impact. You'll gain insight into how to anticipate your audience's needs and tailor the content and delivery in a way that connects with them and sustains their attention and engagement. You will also learn skills that will help you control nervous energy, remain focused on and attuned to your audience, improvise under pressure, deal effectively with questions, and build a compelling call to action. What you will Learn At the end of this program, you will be able to: Construct an effective presentation goal statement, opening, body, and closing that connect with an audience Analyze an audience's needs and style preferences, including relevant DiSC®-related elements Deliver a complete criteria-based presentation that will persuade others Align usage of visuals as well as verbal and non-verbal techniques to maximize the impact of your presentation Getting Started Introductions and social agreements Course structure Course goals and objectives Opening activities Planning and Organizing Video: 'The Art of Misdirection' Setting your presentation goal Writing a goal statement Analyzing your audience Applying the 'reality' test Creating and strengthening supports Structuring your presentation 5 components of an effective opening Presentation body Presentation closing Write your presentation opening Audience Analysis Video: 'How to Tie Your Shoes' Everything DiSC® introduction Audience DiSC® Styles Analyzing your audience Further audience analysis Effective Delivery Delivery challenges and in-person Keeping your audience engaged Your body as your instrument Verbal / paraverbal elements Body stance and nonverbal communication What are your 'tells?' Controlling nervousness Staying attuned to your audience Responding to questions Review and edit your opening Deliver your opening Visuals and Enriching Elements Using images in your presentation Guidelines for visual composition Using questions to engage your audience The power of the pause Practicing and Applying What You've Learned Preparation Delivery Feedback Opportunity to put into practice the program content and receive a video copy Summary and Next Steps What did we learn and how can we implement this in our work environment? Your personal action plan
Project Management Fundamentals - Chinese: On-Demand The course provides practical skills, concepts and principles that can be brought back to the workplace, as well as the insights needed to adapt them to specific project contexts. Many projects are managed by competent and efficient project managers who have not received professional project management training. The work of these project managers includes optimizing processes, planning marketing, developing new products, event planning and implementation, and other project work. Project Management Fundamentals (PMF) is a project management course specially designed for such people, aiming to help such managers build a solid project management knowledge base without affecting their own work too much. The course covers practical skills, theoretical foundations, working principles required in real work situations, and how to flexibly apply the acquired knowledge to special project situations. The goal of this lesson is to improve the quality of work by learning how to plan, manage and control projects effectively. Based on this, the course will focus on a process-oriented, analytically-oriented and systems-oriented approach. These frameworks will help students improve their problem-solving and decision-making skills in real-world projects, with particular emphasis on the collaborative, effective communication, and interpersonal skills needed to manage projects. These contents will run through the entire PMF course, and will be explained in the following two units: People and Projects Execution , Communication , and Building Project Teams What You Will Learn At the end of the course you will be able to: Describe the value of strong project management Identify the characteristics of successful projects and project managers Recognize how current agile/adaptive practices fit into project management Explore the project management process, including initiating, planning, executing, monitoring and controlling, and closing Use project management processes and tools based on case studies and real-world contexts Create a preliminary project plan Use standard project management terminology Basic Concepts Project Management and Related Definitions The Value and Emphasis of Project Management Competitive Constraints and Project Success project life cycle People and Projects Overview of people and projects project manager project team people and projects in the organization Initiating and Defining Requirements Startup project Create a project charter Conduct stakeholder assessments define requirements Using a Work Breakdown Structure Define the Work Breakdown Structure (WBS) Create a working WBS use WBS Managing Project Risk Rationale for risk management Risk Planning Overview identify risks analyze risk Planning Risk Responses Implement response and monitor risks Adaptive Environmental Considerations Estimate Preparation Define estimates Estimation method Estimation practice estimated cost Verify estimates Scheduling Define the scheduling process and related terminology Sorting and defining dependencies Determine the critical path Consider Schedule Risk vs Optimizing Schedule Execution , Communication , and Building Project Teams From Baseline to Execution Project Communications and Stakeholder Relations efficient team Monitoring and Control Define Monitoring and Control Observing how to control from the perspective of competitive constraints Variance Analysis and Corrective Action (Earned Value) Adaptive Environmental Considerations Closing Project finishing project Focus on Project Transition Focus on post-project evaluation
Project Management Fundamentals - Chinese: On-Demand The course provides practical skills, concepts and principles that can be brought back to the workplace, as well as the insights needed to adapt them to specific project contexts. Many projects are managed by competent and efficient project managers who have not received professional project management training. The work of these project managers includes optimizing processes, planning marketing, developing new products, event planning and implementation, and other project work. Project Management Fundamentals (PMF) is a project management course specially designed for such people, aiming to help such managers build a solid project management knowledge base without affecting their own work too much. The course covers practical skills, theoretical foundations, working principles required in real work situations, and how to flexibly apply the acquired knowledge to special project situations. The goal of this lesson is to improve the quality of work by learning how to plan, manage and control projects effectively. Based on this, the course will focus on a process-oriented, analytically-oriented and systems-oriented approach. These frameworks will help students improve their problem-solving and decision-making skills in real-world projects, with particular emphasis on the collaborative, effective communication, and interpersonal skills needed to manage projects. These contents will run through the entire PMF course, and will be explained in the following two units: People and Projects Execution , Communication , and Building Project Teams What You Will Learn At the end of the course you will be able to: Describe the value of strong project management Identify the characteristics of successful projects and project managers Recognize how current agile/adaptive practices fit into project management Explore the project management process, including initiating, planning, executing, monitoring and controlling, and closing Use project management processes and tools based on case studies and real-world contexts Create a preliminary project plan Use standard project management terminology Basic Concepts Project Management and Related Definitions The Value and Emphasis of Project Management Competitive Constraints and Project Success project life cycle People and Projects Overview of people and projects project manager project team people and projects in the organization Initiating and Defining Requirements Startup project Create a project charter Conduct stakeholder assessments define requirements Using a Work Breakdown Structure Define the Work Breakdown Structure (WBS) Create a working WBS use WBS Managing Project Risk Rationale for risk management Risk Planning Overview identify risks analyze risk Planning Risk Responses Implement response and monitor risks Adaptive Environmental Considerations Estimate Preparation Define estimates Estimation method Estimation practice estimated cost Verify estimates Scheduling Define the scheduling process and related terminology Sorting and defining dependencies Determine the critical path Consider Schedule Risk vs Optimizing Schedule Execution , Communication , and Building Project Teams From Baseline to Execution Project Communications and Stakeholder Relations efficient team Monitoring and Control Define Monitoring and Control Observing how to control from the perspective of competitive constraints Variance Analysis and Corrective Action (Earned Value) Adaptive Environmental Considerations Closing Project finishing project Focus on Project Transition Focus on post-project evaluation
Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices
APM Project Fundamentals Qualification (PFQ): In-House Training This practical course gives Participants a solid introduction to the fundamentals of project management and to prepare them for the one-hour, multiple-choice exam held at the end of the course. The APM Project Fundamentals Qualification (PFQ) is an entry-level qualification suitable for those who are new to project management and working in a project team, and who wish to understand the standard terminology. The goal of this course is to prepare you to successfully pass the exam. What you will Learn You'll learn how to: Identify project management terminology and context Identify project management processes Identify the roles involved in project management Describe project success criteria and benefits Prepare project documentation Acquire the level of understanding needed to pass the APM PFQ examination Getting Started Introductions Course structure Course goals and objective Project Context Project characteristics Project management processes Business and project context Organizational roles Project Lifecycle Programme and portfolio management Project Concept Phase Stakeholder management Project success and benefits management Business case Benefits People in Projects Leadership and teamwork Communication Project Definition Phase Project management plan Quality management Risk management Scope management Scheduling Resource management Estimating Procurement Project Implementation Phase Change control and configuration management Issue management Information management Project Hand-over and Close-out Phase Hand-over and close-out Post-project review Revision and Exam Revision and practice questions APM PFQ examination
A structured approach to learning and master Linux quickly
SIP training course description A hands on course covering IP telephony with SIP. The course starts with a brief review of knowledge students should already possess including RTP and RTCP. The main focus is on SIP though, progressing from what SIP is through SIP signalling, call processing and architectures, moving onto more advanced issues including security, multimedia, and interoperability. Hands-on practicals follow each major theory session. What will you learn Explain how SIP works. Analyse SIP packets. Deploy SIP IP telephony solutions. Integrate SIP with other telephony solutions. SIP training course details Who will benefit: Technical staff working with SIP. Prerequisites: Definitive VoIP for engineers Duration 3 days SIP training course contents VoIP review What is VoIP? Brief review of IP, Brief review of telephones and voice. RTP, RTCP, mixers and translators. Hands on Analysing RTP packets. What is SIP? Why SIP? SIP history, SIP standards, SIP capabilities, key services, how SIP works, and a basic SIP call. Hands on Peer to peer SIP. SIP messages SIP sessions, SIP flows, Message structure, INVITE, ACK, BYE, CANCEL, OPTIONS, REGISTER. Extension methods. Response codes. SIP call flows. Hands on Analysing SIP packets. SIP architectures UA client, UA server, Proxy servers, Redirect servers, registrars. SIP phones, gateways, application servers, and other products. Stateful and stateless servers. Various call scenarios. Hands on SIP proxies. SIP addressing URLs, SIP addresses, registration, Location and Directory servers. Address tracking. Hands on SIP and DNS. Supplementary services SIP signalling, signalling compression, Call hold, Call forwarding, Home and away scenarios, transfers, conferences, call control. Hands on Analysing SIP supplementary services. SDP What is SDP? Multimedia, multimedia session announcement, invitation and others. Relationship with SIP. Hands on Video conferencing with SIP. SIP security Access control, Authentication, encryption, firewalls. Hands on SIP authentication. Interoperability Inter working with PSTN, ISUP to SIP mapping, SIP and 3G, SIP-T, SIP and SIGTRAN. SIP and H323. Hands on SIP and gateways. SIP mobility Terminal mobility, service mobility, personal mobility, Mobile IP, SIP signalling flows in 3G.
Supporting Microsoft IIS training course description This course provides students with the fundamental knowledge and skills to configure and manage Internet Information Services. This course is intended to help provide pre-requisite skills supporting a broad range of Internet web applications, security, and knowledge to help support other products that use IIS such as Exchange and SharePoint. What will you learn Install IIS. Configure IIS. Secure websites. Maintain IIS. Supporting Microsoft IIS training course details Who will benefit: Technical staff working with Microsoft IIS. Prerequisites: TCP/IP foundation for engineerss Supporting Windows ( XP or 2000 or 2003) Duration 5 days Supporting Microsoft IIS course contents Overview and Installing IIS Web Server infrastructure, installing IIS. Hands on Default install of IIS, verify and test.. Configuring the default website Default website, IIS Manager, default IIS file structure, configuring DNS records for a website, creating virtual directories and Applications. Hands on Configuring the Default website for public access. Creating Virtual Directories and Applications. Application Pools Application Pool Architecture, Application Pool recycling. Hands on Creating and managing Application Pools. Creating additional websites Multiple websites on a single server, website bindings. Hands on Creating new websites. Website and Web application support Configuring Common features, adding support for web applications. Hands on Adding support for web applications. Securing Websites and applications Access control, sites, applications, authentication and permissions. URL authorization rules. Hands on Configuring Authentication and permissions. Securing Data Transmissions with SSL Certificates and SSL, creating certificates for a web server, adding a certificate to a website. Hands on Certificates and HTTPS. Using the Central Certificate Store The Central Certificate Store. Hands on Install and configure the Central Certificate Store. Configuring Remote Administration Installing and Configuring the Management Service. Connecting to remote web servers and websites. Delegating Management Access. Hands on Remote administration. Implementing FTP Implementing FTP, configuring an FTP site. Hands on Install and configure a secured FTP site. Monitoring IIS IMonitoring IIS logs with Log Parser. Hands on Analyze a set of IIS log files for possible issues using Log Parser. Analyze performance data for performance related problems using PerfMon. Backing up and Restoring IIS The IIS environment. Hands on Performing a backup and restore of a website. Building Load-Balanced Web Farms Load-balancing mechanisms, building a Load-Balanced Web Farm using ARR, sharing content to a Web Farm using a network share, Sharing content to a Web Farm using DFS-R, Sharing IIS Configurations in a Web Farm. Hands on Installing and configuring ARR, sharing content to a Web Farm using network share and DFS-R, sharing IIS Configurations in a Web Farm.