If you are looking forward to advance your skills with Microsoft Excel 2016 and want to learn more advanced skills or want to learn the topics covered in this course in the 2016 interface, this Excel 2016 Advanced will be the perfect choice for you! Through the course you will gain the skills necessary to use pivot tables, audit and analyze worksheet data, utilize data tools, collaborate with others, and create and manage macros. Additionally, you will experiment with auditing formulas and error checking, use the What-If Analysis tools, learn the options for worksheet and workbook protection, review advanced use of PivotTables and PowerPivot add-in, work with Macros, use form controls, and ensure data integrity in your worksheets and workbooks. You will also learn about Excel's many collaboration features, as well as how to import and export data to and from your workbooks. What Will I Learn? Use Advanced IF Statements Use Advanced Lookup Functions Use Complex Logical and Text Functions Auditing Formulas Working with What-If Analysis Tools Protecting Worksheet and Workbook Use Advanced PivotTables and PowerPivot Tools Automate with Macros Work with Form Controls Ensure Data Integrity Collaborate in Excel Import and Export Data to a Text File Requirements Excel Introduction and Intermediate courses or equivalent experience. Who is the target audience? Students who want to expand their Excel knowledge. Introduction Introduction FREE 00:01:00 Using Advanced IF Statements Summarize Data with SUMIF FREE 00:04:00 Summarize Data with AVERAGIF 00:03:00 Summarize Data with COUNTIF 00:02:00 Using Advanced Lookup Functions Using VLOOKUP with TRUE to find an Approximate Match 00:04:00 Using HLOOKUP TRUE to find an Approximate Match 00:01:00 Using the Index Function 00:03:00 Using the Match Function 00:02:00 Creating a Combined Index and Match Formula 00:04:00 Comparing Two Lists with VLOOKUP 00:02:00 Comparing Two Lists with VLOOKUP and ISNA 00:04:00 Using Complex Logical and Text Functions Creating a Nested IF Function 00:03:00 Using the IFERROR Function 00:02:00 Using the LEN Function 00:02:00 Using the TRIM Function 00:01:00 Using the Substitute Function 00:02:00 Formula Auditing Showing Formulas 00:01:00 Tracing Cell Precedents and Dependents 00:03:00 Adding a watch Window 00:02:00 Error Checking 00:02:00 What-If Analysis Tools Using the Scenario Manager 00:03:00 Using Goal Seek 00:02:00 Analyzing with Data Tables 00:02:00 Worksheet and Workbook Protection Protection Overview 00:02:00 Excel File Password Encryption 00:03:00 Allowing Specific Worksheet Changes 00:01:00 Adding Protection to only Certain Cells in a Worksheet 00:03:00 Additional Protection Features 00:02:00 Advanced Use of PivotTables and PowerPivot Using the Pivot Tables Charts Wizard 00:02:00 Adding a Calculated Field 00:02:00 Adding a Caculated Item 00:02:00 Apply Conditional Formatting to a Pivot Table 00:03:00 Using Filters in the Pivot Table Fields Pane 00:02:00 Creating Filter Pages for a Pivot Table 00:01:00 Enabling a Power Pivot Add In 00:04:00 Automating with Macros What are Macros 00:03:00 Displaying the Developer Tab and Enabling Macros in Excel 00:03:00 Creating a Basic Formatting Macro 00:03:00 Running a Macro 00:02:00 Assigning a Macro to a Button 00:02:00 Creating a More Complex Macro 00:02:00 Viewing and Editing the VBA Code for an Existing Macro 00:03:00 Adding a Macro to the Quick Access Toolbar 00:02:00 Working with Form Controls What are Form Controls 00:02:00 Adding Spin Buttons and Check Boxes to a Spreadsheet 00:02:00 Adding a Combo Box to a Spreadsheet 00:02:00 Ensuring Data Integrity What is Data Validation 00:01:00 Restricting Data Entries to Whole Numbers 00:02:00 Data Validation Restricting Data Entry to a List 00:01:00 Data Validation Restricting Data Entry to a Date 00:01:00 Data Validation Restricting Data Entry to Different Text Lengths 00:01:00 Composing Input Messages 00:02:00 Composing Error Alters 00:02:00 Finding Invalid Data 00:02:00 Editing and Deleting Data Validation Rules 00:01:00 Collaborating in Excel Working with Comments 00:03:00 Printing Comments and Errors 00:02:00 Sharing a Workbook 00:03:00 Tracking Changes in a Workbook 00:03:00 Working with Versions 00:02:00 Sharing Files via Email 00:02:00 Importing and Exporting Data to a Text File Importing a Text File 00:03:00 Exporting a Text File 00:01:00 Conclusion Course Recap 00:01:00 Course Certification
Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Course Overview Course Overview 00:04:00 Building Your Virtual Lab Environment Video - Downloading ISO and OVA Fles for VirtualBox 00:08:00 Video and lab - Creating a Virtual install of Kali using VirtualBox 00:12:00 Video and Lab - Creating a Virtual Install of CSI Linux 2021.2 00:12:00 Video and lab - Creating an Unattended Virtual Install of XP Using Virtualbox 00:08:00 Video - Installing the VirtualBox Extension pack 00:02:00 Video - Taking a Snapshot of Your Current Configuration 00:04:00 Passive Reconnaissance Video and Lab - Gathering Information Using Maltego 00:09:00 Video and Lab - Gathering Information Using CSI Linux Investigator 00:08:00 Video and Lab - Preparing CSI Linux to Use Shodan 00:05:00 Video and Lab - Using Shodan to Find Vulnerable Devices 00:16:00 Nmap Video and Lab - Introduction to NMap 00:17:00 Video and lab - NMap Scripting Engine (NSE) 00:19:00 Video and lab - Scanning for WannaCry Ransomware 00:14:00 Scanning for Vulnerabilities Using Nessus Video and Lab - Installing NESSUS Using Docker 00:11:00 Video and lab - Scanning for Vulnerabilities Using Nessus 00:10:00 Video - Using Your Nessus Scan Results 00:12:00 Scanning for Vulnerabilities Using OpenVAS Video and Lab - Installing OpenVAS Using Docker 00:09:00 Video and Lab - Scanning for Vulnerabilities Using OpenVAS 00:10:00 Exploiting Microsoft Windows Video and Lab- Using Metasploit to Launch a DOS Attack Against Windows XP 00:09:00 Video and Lab - Establishing A VNC Shell Using Meterpreter 00:18:00 Video and Lab - Using Meterpreter to backdoor Windows XP 00:11:00 Exploiting Linux Video and lab - Installing Metasploitable2 Using VirtualBox 00:10:00 Social Engineering Video and Lab - Using the Social Engineering Toolkit (SET) 00:07:00 BASH Scripting for Pentesters Video and Lab - Introduction to BASH Scripting 00:08:00 Video and Lab - Creating a BASH Script for Scanning Vulnerable Ports 00:16:00 Video and Lab - Password Cracking Using Medusa 00:06:00 Video and Lab - Passwords Cracking Using Mimikatz 00:11:00 Pentesting Wireless Networks Video and Lab - Installing a Wireless Adapter in Kali 00:09:00 Video and Lab - Hacking a Wireless Network Using Kali Linux 00:14:00 Wireless Deauthentication Attack 00:06:00 PMKID Client-less Wireless Attack Using Bettercap 00:10:00 Web Based Application Attacks Video and Lab - Installing w3af in Kali Linux Using Docker 00:13:00 Video and Lab - Conducting A Website Vulnerability Scan Using w3af 00:05:00 Video and Lab - Performing a Browser Based Attack 00:12:00 Video and lab - SQL Injection Attack Using SQLmap 00:12:00 Browser Exploitation Framework (BeEF) Video - Configure Kali for Exploitation the WAN 00:16:00 Video and lab - The Browser Exploitation Framework (BeEF) 00:19:00 Remaining anonymous Video and Lab - Anonymize Kali Using Whonix 00:10:00 Capture The Flag Walkthrough - Mr. Robot Video Walk Through -Key #1 00:13:00 Video Walk through - Key #2 00:19:00 Video Walk Through - Key #3 00:08:00 Capture The Flag Walkthrough - Stapler Video - Capture the Flag - Stapler Part 1 00:18:00 Video - Capture the Flag - Stapler Part 2 00:17:00 Video - Capture the Flag - Stapler Part 3 00:17:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00
Description: Windows Internet Explorer 8 is a web browser developed by Microsoft in the Internet Explorer browser, released on October 22, 2009. It is the latest version of Microsoft's widely used Windows operating system. By taking this Microsoft Internet Explorer 8 you will get a complete overview of the new start screen, a comprehensive look at touch gesture, an introduction to the default Windows 8 applications (including Mail, Messaging, Photo, Travel, and Sports), and information on using the desktop and its applications. If are thinking to improve your skills and knowledge on Windows system, you are welcome to join this course. Learning Outcomes: Understanding the requirements of internet connection, different types of connections, and opening, setting up and closing Internet Explorer Get an overview of the user interface by using the command area, menu bar, explorer bar, search bar and status bar Discover the application window by learning how to minimize, maximize, restore, and manually resize the window; differences between full screen vs. normal mode; and using zoom feature Enabling, disabling and locking toolbars, along with customizing the command toolbar Get help from help menu, help file, using the table of contents, searching the help file, taking internet explorer tour and online support Learn how to use the navigation buttons, understand parts of web addresses, access your homepage, access websites using address bar and/or hyperlink, and opening page in a new window Opening and closing tabs, switching between tabs, access tabbed help, using tabbed thumbnails and tab list Search the web using search boxes, search engines, within a page, and get some general tips for searching and change the search options Copying text and pictures from the web, saving pictures and web pages, and sending page, link or picture using emails Examine the print preview, page setup, printing page or selection options Understand Favourites; opening, pinning and closing favourites centre; and accessing favourites without Internet Explorer Marking pages or multiple tabs, deleting, maintaining and accessing favourites Organise your favourites by renaming them, adding folders to favourites, and saving and moving them into the folders Understand and manage accelerators, use and get new ones Get to know what are web slices, and how to get, use and find them See the differences between secure and non-secure sites, learn about encryption, digital signatures, cookies, browser cache, and display options Protect your sites using passwords, form filling, learning about the Password Manager, and CAPTCHA Discover more about information bar, pop-up blocker, phishing filter, InPrivate browsing and filtering, and finally managing add-ons Get safety tips and learn about antiviral software, anti-spam software, and firewalls Import and export favourites and cookies Understand and open dialog boxes, set up your homepage, delete temporary internet files, setup parental filtering, automatically disconnect, and set internet explorer as default browser Manage browser history by understanding what it is, access history from address bar, manually delete history items, clear entire history, and set up history options Discover the meaning of RSS Feed, how to view it, subscribing and using feeds, changing feed properties and unsubscribing from feeds Explore HTML, JavaScript, and ActiveX; view and edit HTML source code, more plugins and add-ons, and reset options for internet explorer Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Microsoft Internet Explorer 8 is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Microsoft Internet Explorer 8 is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Getting Started Definitions 00:15:00 Internet Explorer Basics 00:30:00 The Internet Explorer Interface 01:00:00 The Internet Explorer Window 00:30:00 More about Toolbars 00:15:00 Getting Help 01:00:00 Browsing the Web Accessing a Web Site 00:30:00 Using Tabs 00:30:00 Searching the Web 01:00:00 Working with Data 01:15:00 Printing from the Web 00:30:00 Favorites, Accelerators, and Web Slices Favorite Basics 00:15:00 Creating and Using Favorites 00:30:00 Organizing Favorites 00:30:00 Accelerators 01:00:00 Web Slices 00:15:00 Security Secure Sites 00:15:00 Accessing Protected Sites 00:15:00 Security Features 01:00:00 Keeping Yourself Safe 00:15:00 Managing Information 00:30:00 Advanced Topics Setting Your Options 01:00:00 Managing your History 00:30:00 RSS Feeds 00:30:00 Additional Components 00:30:00 Mock Exam Mock Exam- Microsoft Internet Explorer 8 00:20:00 Final Exam Final Exam- Microsoft Internet Explorer 8 00:20:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Duration 3 Days 18 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager. This three-day course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Module 2: Configuring Web Application Access Review of BIG-IP LTM Introduction to the Access Policy Web Access Application Configuration Overview Web Application Access Configuration in Detail Module 3: Exploring the Access Policy Navigating the Access Policy Module 4: Managing BIG-IP APM BIG-IP APM Sessions and Access Licenses Session Variables and sessiondump Session Cookies Access Policy General Purpose Agents List Module 5: Using Authentication Introduction to Access Policy Authentication Active Directory AAA Server RADIUS One-Time Password Local User Database Module 6: Understanding Assignment Agents List of Assignment Agents Module 7: Configuring Portal Access Introduction to Portal Access Portal Access Configuration Overview Portal Access Configuration Portal Access in Action Module 8: Configuring Network Access Concurrent User Licensing VPN Concepts Network Access Configuration Overview Network Access Configuration Network Access in Action Module 9: Deploying Macros Access Policy Macros Configuring Macros An Access Policy is a Flowchart Access Policy Logon Agents Configuring Logon Agents Module 10: Exploring Client-Side Checks Client-Side Endpoint Security Module 11: Exploring Server-Side Checks Server-Side Endpoint Security Agents List Server-Side and Client-Side Checks Differences Module 12: Using Authorization Active Directory Query Active Directory Nested Groups Configuration in Detail Module 13: Configuring App Tunnels Application Access Remote Desktop Network Access Optimized Tunnels Landing Page Bookmarks Module 14: Deploying Access Control Lists Introduction to Access Control Lists Configuration Overview Dynamic ACLs Portal Access ACLs Module 15: Signing On with SSO Remote Desktop Single Sign-On Portal Access Single Sign-On Module 16: Using iRules iRules Introduction Basic TCL Syntax iRules and Advanced Access Policy Rules Module 17: Customizing BIG-IP APM Customization Overview BIG-IP Edge Client Advanced Edit Mode Customization Landing Page Sections Module 18: Deploying SAML SAML Conceptual Overview SAML Configuration Overview Module 19: Exploring Webtops and Wizards Webtops Wizards Module 20: Using BIG-IP Edge Client BIG-IP Edge Client for Windows Installation BIG-IP Edge Client in Action Module 21: Configuration Project Configuration Project Additional course details: Nexus Humans F5 Networks Configuring BIG-IP APM : Access Policy Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Networks Configuring BIG-IP APM : Access Policy Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This course will help you master Spring, Spring Boot, Spring Modules - JDBC, AOP, and Data JPA through a hands-on, step-by-step approach. You will also be introduced to unit testing with JUnit and Mockito and learn how to communicate with the database using the Spring framework.
Overview The Dental Assistant course is designed to provide learners with an insight into the role of a Dental Assistant and the career path, skills and education of this profession. Through this course, you will develop a range of core professional skills that every dental professional must have to work expertly and competently in their field. This dental training course covers a wide range of topics, from dental office management to oral terminology. Through an experienced instructor, you will learn how to carry out duties such as conducting an oral diagnosis and designing an oral treatment plan, with tips and guidance on how to use a range of common dental tools and work safely with chemicals. What's more, you'll develop the skills and characteristics needed to enhance your professional image and stand out to prospective employers when exploring career opportunities in this field. This qualification is industry recognised, meaning you can use it to enhance your resume with brand new credentials and skills. Learning outcomes: Gain an in-depth understanding of the role and responsibilities of a Dental Assistant Understand the career path, education and skills needed for the dentistry profession Know how to use general dentistry instruments such as condensers and friction grip burns Learn the fundamental principles and rules of dental office management Know how to conduct an oral diagnosis and design an oral treatment plan for patients Have an excellent understanding of oral terminology, symbols and colour coding Comply with chemical safety regulations and understand infection control measures and labelling Enhance your professional image and develop your professional attitude Method of Assessment To assess your learning, you have to participate in an automated multiple-choice question exam. You have to score at least 60% to pass the exam and to qualify for CPD accredited certificates. After passing the exam, you will be able to apply for a certificate. To enhance your knowledge regarding the course and to further assess your learning, you are advised to complete the assignment questions provided at the end of the course, which you can complete anytime you wish. After submitting the assignment, our expert tutor will assess your assignment and will give you feedback on your performance. Who is this course for? This Dental Assistant training course is suitable for aspiring professionals looking for a formal online qualification and those who are new to the field who wish to develop their skillset. There are no specific entry requirements for this course, which can be studied on a part-time or full-time basis. Requirements There are no specific prerequisites to enrol in this Dental Assistant course. Anyone and everyone can take this course. The Dental Assistant course is fully accessible from any internet-enabled smart device. So, you can study from the comfort of your home! All you need is a passion for learning, literacy, and to be over the age of 16. Career Path On successful completion, you will have a range of skills required to work in this profession and establish a successful career as a Dental Assistant, with the opportunity to work in private dental offices and hospitals. Related professions in this field include: Dental Assistant Dental Hygienist Dentist Dental Nurse Course Content Section 1: Introduction Introduction 00:01:00 Course Overview 00:04:00 Section 2: Setup a Lab Unit 1: Download and Install VirtualBox 00:06:00 Unit 2: Creating First Virtual Machine 00:06:00 Unit 3: Linux Installation 00:25:00 Unit 4: Linux CentOS8 Installation 00:25:00 Section 3: Linux FileSystem Unit 1: Introduction to Unix and Linux 00:02:00 Unit 2: Accessing Linux System 00:03:00 Unit 3: Download and Install Putty 00:03:00 Protected: Unit 4: Connect Linux via Putty 00:05:00 Unit 5: Introduction to Linux FileSystem 00:05:00 Unit 6: FileSystem Structure and Description 00:13:00 Unit 7: FileSystem Navigation Commands 00:10:00 Protected: Unit 8: Absolute and Relative Paths 00:05:00 Unit 9: Directory Listing Attributes 00:03:00 Protected: Unit 10: Creating Files and Directories 00:09:00 Unit 11: Linux File Type 00:01:00 Unit 12: Difference Between Find and Locate Commands 00:06:00 Protected: Unit 13: Hard and Soft Link 00:12:00 Protected: Unit 14: Important Things to Remember 00:01:00 Unit 15: Understanding Wildcards 00:10:00 Unit 16: Command Prompts and Getting prompts Back 00:04:00 Unit 17: Changing Systems password 00:05:00 Assignment Assignment - Linux File System 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.
How to start a creative project working from your own source images. This course covers 5 lessons to get your new project started.
Duration 5 Days 30 CPD hours This course is intended for This course is geared toward Windows system administrators, network administrators, and other system administrators who are interested in supplementing current skills or backstopping other team members, in addition to Linux system administrators who are responsible for these tasks: Configuring, installing, upgrading, and maintaining Linux systems using established standards and procedures, Providing operational support, Managing systems for monitoring system performance and availability, Writing and deploying scripts for task automation and system administration, You will be expected to already understand fundamental Linux computing concepts and be ready to practice the Red Hat Enterprise Linux methods for performing system administration tasks. Significant field experience working with Linux as a system administrator is recommended. If you do not have experience with fundamental Linux computer concepts, we advise you to start with the Red Hat System Administration I (RH124) course instead. Overview You should be able to demonstrate these skills: - Access the command line locally and remotely - Manage files from the command line - Manage local users and groups - Monitor and manage Linux processes - Control services, daemons, and the boot process - Manage tuning profiles for system performance - Control access to files with file system permissions - Analyze and store log files - Configure and secure the OpenSSH service - Install and update software packages and appstreams - Manage Linux file systems and volumes - Manage Linux networking and firewalls This course combines the foundations and applications established and covered in Red Hat System Administration I (RH124) and Red Hat System Administration II (RH134). The rapid pace of review and consolidated course timeline allow you to focus on practical application, making this offering best suited for you if you already have significant experience with Linux© administration. This course is based on Red Hat© Enterprise Linux 8. 1 - Accessing the command line Log in to a Linux system and run simple commands using the shell. 2 - Managing Files from the command line Work with files from the bash shell prompt. 3 - Managing local Linux users and groups Manage Linux users and groups and administer local password policies. 4 - Controlling access to files with Linux file system permissions Set access permissions on files and interpret the security effects of different permission settings. 5 - Managing SELinux security Use SELinux to manage access to files and interpret and troubleshoot SELinux security effects. 6 - Monitoring and managing Linux processes Monitor and control processes running on the system. 7 - Installing and updating software packages Download, install, update, and manage software packages from Red Hat and yum package repositories. 8 - Controlling services and daemons Control and monitor network services and system daemons using systemd. 9 - Managing Red Hat Enterprise Linux networking Configure basic IPv4 networking on Red Hat Enterprise Linux systems. 10 - Analyzing and storing logs Locate and interpret relevant system log files for troubleshooting purposes. 11 - Managing storage and file systems Create and use disk partitions, logical volumes, file systems, and swap spaces. 12 - Scheduling system tasks Schedule recurring system tasks using cron and systemd timer units. 13 - Mounting network file systems Mount network file system (NFS) exports and server message block (SMB) shares from network file servers. 14 - Limiting network communication with firewalld Configure a basic local firewall. Additional course details: Nexus Humans Red Hat RHCSA Rapid Track Course (RH199) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat RHCSA Rapid Track Course (RH199) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This course will show you how you can use Bash shell scripting to automate repetitive tasks. With the help of exciting projects, you will cover the basic and advanced concepts and commands of shell scripting and learn how to write error-free shell scripts in Ubuntu.