• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

453 Courses delivered Online

IT Support Technician

4.5(3)

By Studyhub UK

Navigate the multifaceted domain of IT support with our 'IT Support Technician' course, a pathway to mastering the essentials of technology support in diverse environments. This curriculum embarks on a comprehensive journey, beginning with the foundational aspects of software, including operating systems and application management. As you move through the modules, you'll encounter a blend of technical knowledge and practical application, from understanding the intricacies of software licensing to mastering hardware devices and peripherals. This course is meticulously structured to equip you with not just the theoretical aspects of IT support, but also the hands-on skills required for effective troubleshooting and problem-solving in real-world scenarios. Progressing further, the course delves into the critical areas of security, including risk management, cybersecurity, and data protection. You'll gain insights into managing various threats and vulnerabilities, alongside learning the importance of robust security protocols. The course also encompasses essential knowledge in networking, covering topics from OSI layers to wireless security, preparing you for the complex nature of modern networks. Concluding with modules on basic IT literacy, the program ensures you are well-versed in healthcare IT, server management, and effective communication within IT roles. By the end of this course, you'll have a thorough understanding of the diverse components that make up IT support, ready to tackle challenges and advance your career in this dynamic field. Learning Outcomes Develop a comprehensive understanding of software systems and operating system configurations. Master the skills in hardware setup, peripheral management, and troubleshooting. Acquire in-depth knowledge of network infrastructure and wireless security. Learn to manage IT risks and implement robust cybersecurity measures. Gain expertise in healthcare IT and the implementation of EMR/EHR systems. Why choose this IT Support Technician course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this IT Support Technician course for? Aspiring IT support technicians and helpdesk professionals. Individuals seeking to transition into IT roles or enhance their tech skills. Professionals in healthcare IT looking to deepen their understanding of EMR systems. Small business owners or managers responsible for their IT infrastructure. Students pursuing a career in network or systems administration. Career path IT Support Technician: £20,000 - £35,000 Network Administrator: £25,000 - £40,000 Systems Administrator: £27,000 - £45,000 Cybersecurity Analyst: £30,000 - £55,000 Healthcare IT Specialist: £26,000 - £42,000 Helpdesk Manager: £28,000 - £48,000 Prerequisites This IT Support Technician does not require you to have any prior qualifications or experience. You can just enrol and start learning.This IT Support Technician was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Software: What is an Operating System 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:11:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:05:00 Hardware: Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:24:00 Integrate Documentation into Risk Management 00:15:00 Classify Threats and Threat Profiles 00:08:00 Perform Ongoing Threat Research 00:13:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:10:00 Assess the Impact of Reconnaissance Incidents 00:11:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:11:00 Assessing the impact of Social Engineering 00:08:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:21:00 Rogue Devices 00:04:00 Public Hotspots 00:07:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:18:00 WLAN Security Infrastructure 00:38:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:16:00 Security: Recover from a Security Incident 00:10:00 Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Common Scams 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle 00:37:00 Information Security Controls 00:36:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:32:00 Malware 00:25:00 Software-Based Threats 00:22:00 Based Threats 00:39:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:55:00 Manage Device and Host Security 01:08:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:05:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Hardware and Peripherals 00:07:00 Networking: OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:17:00 Converters and Connectors 00:27:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:07:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 01:00:00 Common Problems 00:32:00 Troubleshooting 00:28:00 Network Technician Tools 00:50:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT 00:06:00 EMR EHR Issues 00:05:00 Regulations, Standards, and Stakeholders 00:14:00 HIPAA Controls and Compliance 00:08:00 Roles and Responsibilities 00:10:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:02:00 Computing Essentials 00:05:00 Networking 00:33:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:20:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:08:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:15:00 Perform Backups and Disaster Recovery 00:16:00

IT Support Technician
Delivered Online On Demand3 days
£10.99

AZ-303 Azure Architecture Technologies Exam Prep 2021

By Packt

This course covers all the requirements of the Microsoft AZ-300 and AZ-303 exams. You will get a detail-oriented approach to all the important concepts that will help you pass the exams and design solutions for the Microsoft Azure platform.

AZ-303 Azure Architecture Technologies Exam Prep 2021
Delivered Online On Demand12 hours 29 minutes
£103.99

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)

4.7(160)

By Janets

CyberSec First Responder: Threat Detection and Response (Exam CFR-210) Course Description The CyberSec First Responder: Threat Detection and Response (Exam CFR-210)  is organized into 12 modules and includes everything you need to become successful in this profession. To make this course more accessible for you, we have designed it for both part-time and full-time students. You can study at your own pace or become an expert in just 12 hours! If you require support, our experienced tutors are always available to help you throughout the comprehensive syllabus of this course and answer all your queries through email. Why choose this CyberSec First Responder: Threat Detection and Response (Exam CFR-210) course Earn an e-certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Benefit from instant feedback through mock exams and multiple-choice assessments Get 24/7 help or advice from our email and live chat teams Full Tutor Support on Weekdays Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Mock exams Multiple-choice assessment Certificate of Achievement Endorsed Certificate of Achievement from the Quality Licence Scheme Once the course has been completed and the assessment has been passed, all students are entitled to receive an endorsed certificate. This will provide proof that you have completed your training objectives, and each endorsed certificate can be ordered and delivered to your address for only £119.00. Please note that overseas students may be charged an additional £10 for postage. CPD Certificate of Achievement from Janets Upon successful completion of the course, you will be able to obtain your course completion e-certificate. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Endorsement This course and/or training programme has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course and/or training programme is not regulated by Ofqual and is not an accredited qualification. Your training provider will be able to advise you on any further recognition, for example progression routes into further and/or higher education. For further information please visit the Learner FAQs on the Quality Licence Scheme website. Method of Assessment To successfully complete the course, students will have to take an automated multiple-choice exam. This exam will be online and you will need to score 60% or above to pass the course. After successfully passing the exam, you will be able to apply for Quality Licence Scheme endorsed certificate of achievement. To verify your enhanced skills in the subject, we recommend that you also complete the assignment questions. These can be completed at any time which is convenient for yourself and will be assessed by our in-house specialised tutors. Full feedback will then be given on your current performance, along with any further advice or support. Course Content Overview of Wireless Communications Identify the Importance of Risk Management 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:22:00 Integrate Documentation into Risk Management 00:14:00 Analyzing the Threat Landscape Classify Threats and Threat Profiles 00:07:00 Perform Ongoing Threat Research 00:12:00 Resources that Aid in Research of Threats 00:03:00 Analyzing Recon Threats to Computing and Network Environments Implement Threat Modeling 00:09:00 Assess the Impact of Reconnaissance Incidents 00:10:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:10:00 Assessing the impact of Social Engineering 00:07:00 Assessing the Impact of Phishing 00:03:00 Analyzing Attacks on Computing and Network Environments Assess the Impact of System Hacking Attacks 00:10:00 Cracking Passwords Using a Password File 00:08:00 Assess the Impact of Web Based Attacks 00:11:00 Assessing the Impact of Web-Based Threats 00:03:00 Assess the Impact of Malware 00:08:00 Malware Detection and Removal 00:05:00 Assess the Impact of Hijacking and Impersonation Attacks 00:13:00 Assess the Impact of DoS Incidents 00:09:00 Assessing the Impact of DoS Attacks 00:04:00 Assess the Impact of Threats to Mobile Security 00:08:00 Assess the Impact of Threats to Cloud Security 00:10:00 Analyzing Post-Attack Techniques Assess Command and Control Techniques 00:08:00 Assessing Command and Control Techniques 00:10:00 Assess Persistence Techniques 00:05:00 Detecting Rootkits 00:03:00 Assess Lateral Movement and Pivoting Techniques 00:13:00 Assess Data Exfiltration Techniques 00:04:00 Steganography 00:03:00 Assess Anti Forensics Techniques 00:09:00 Assessing Anti-Forensics 00:03:00 Evaluating the Organization's Security Posture Conduct Vulnerability Assessments 00:16:00 Perform a Vulnerability Scan with Nessus 00:07:00 Perform a Vulnerability Scan with MBSA 00:05:00 Conduct Penetration Tests on Network Assets 00:18:00 Follow Up on Penetration Testing 00:06:00 Collecting Cyber security Intelligence Deploy a Security Intelligence Collection and Analysis Platform 00:19:00 Collect Data from Network Based Intelligence Sources 00:15:00 Collecting Network-Based Security Intelligence 00:07:00 Collect Data from Host Based Intelligence Sources 00:13:00 Collecting Host-Based Security Intelligence 00:15:00 Parsing Log files 00:03:00 Analyzing Log Data Use Common Tools to Analyze Logs 00:22:00 Analyzing Linux Logs for Security Intelligence 00:08:00 Use SIEM Tools for Analysis 00:07:00 Incorporating SIEMs into Security Intelligence Analysis 00:18:00 Parse Log Files with Regular Expressions 00:25:00 Performing Active Asset and Network Analysis Analyze Incidents with Windows-Based Tools 00:17:00 Windows-Based Incident Analysis Tools 00:19:00 Analyze Incidents with Linux Based Tools 00:05:00 Linux-Based Incident Analysis Tools 00:07:00 Analyze Malware 00:11:00 Analyzing Malware 00:03:00 Analyze Indicators of Compromise 00:20:00 Analyzing Indicators of Compromise 00:15:00 Responding to Cyber security Incidents Deploy an Incident Handling and Response Architecture 00:22:00 Mitigate Incidents 00:16:00 Hardening Windows Servers 00:14:00 DNS Filtering 00:05:00 Blacklisting and Whitelisting 00:09:00 Prepare for Forensic Investigation as a CSIRT 00:03:00 Investigating Cyber security Incidents Apply a Forensic Investigation Plan 00:10:00 Securely Collect and Analyze Electronic Evidence 00:08:00 Securely Collecting Electronic Evidence 00:05:00 Analyzing Forensic Evidence 00:07:00 Follow Up on the Results of an Investigation 00:04:00 Mock Exam Mock Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations Online Training 00:20:00 Final Exam Final Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations Online Training 00:20:00 Assignment Assignment - CyberSec First Responder: Threat Detection and Response (Exam CFR-210) 3 weeks, 3 days Order Your Certificate Order your Certificate QLS 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)
Delivered Online On Demand4 weeks
£9.99

IT Support Technician Training

4.9(27)

By Apex Learning

Explore our comprehensive IT Support Technician Training Course with 64 modules covering computer basics, hardware, operating systems, troubleshooting, databases, programming, and more. Perfect for beginners and professionals alike.

IT Support Technician Training
Delivered Online On Demand5 hours
£12

Microsoft Project 2021 From Beginners to Advanced

By Packt

Microsoft Project 2021 is a complete lifecycle project management tool that manages complex projects efficiently. This all-encompassing course molds you into an expert in project management with fundamentals to advanced techniques to handle projects of all sizes and gain confidence and proficiency in project planning, execution, and reporting.

Microsoft Project 2021 From Beginners to Advanced
Delivered Online On Demand11 hours 11 minutes
£74.99

Cisco Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security engineer Network engineer Network designer Network administrator Systems engineer Consulting systems engineer Technical solutions architect Network manager Cisco integrators and partners Overview After taking this course, you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW) Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco© CCNP© Security and CCIE© Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower© Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch© Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. Describing Information Security Concepts* Information Security Overview Assets, Vulnerabilities, and Countermeasures Managing Risk Vulnerability Assessment Understanding Common Vulnerability Scoring System (CVSS) Describing Common TCP/IP Attacks* Legacy TCP/IP Vulnerabilities IP Vulnerabilities Internet Control Message Protocol (ICMP) Vulnerabilities TCP Vulnerabilities User Datagram Protocol (UDP) Vulnerabilities Attack Surface and Attack Vectors Reconnaissance Attacks Access Attacks Man-in-the-Middle Attacks Denial of Service and Distributed Denial of Service Attacks Reflection and Amplification Attacks Spoofing Attacks Dynamic Host Configuration Protocol (DHCP) Attacks Describing Common Network Application Attacks* Password Attacks Domain Name System (DNS)-Based Attacks DNS Tunneling Web-Based Attacks HTTP 302 Cushioning Command Injections SQL Injections Cross-Site Scripting and Request Forgery Email-Based Attacks Describing Common Endpoint Attacks* Buffer Overflow Malware Reconnaissance Attack Gaining Access and Control Gaining Access via Social Engineering Gaining Access via Web-Based Attacks Exploit Kits and Rootkits Privilege Escalation Post-Exploitation Phase Angler Exploit Kit Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Stateful Firewall Overview Security Intelligence Overview Threat Information Standardization Network-Based Malware Protection Overview Intrusion Prevention System (IPS) Overview Next Generation Firewall Overview Email Content Security Overview Web Content Security Overview Threat Analytic Systems Overview DNS Security Overview Authentication, Authorization, and Accounting Overview Identity and Access Management Overview Virtual Private Network Technology Overview Network Security Device Form Factors Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Network Address Translation Cisco ASA Interface Access Control Lists (ACLs) Cisco ASA Global ACLs Cisco ASA Advanced Access Policies Cisco ASA High Availability Overview Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Cisco Firepower NGFW Network Address Translation (NAT) Cisco Firepower NGFW Prefilter Policies Cisco Firepower NGFW Access Control Policies Cisco Firepower NGFW Security Intelligence Cisco Firepower NGFW Discovery Policies Cisco Firepower NGFW IPS Policies Cisco Firepower NGFW Malware and File Policies Deploying Email Content Security Cisco Email Content Security Overview Simple Mail Transfer Protocol (SMTP) Overview Email Pipeline Overview Public and Private Listeners Host Access Table Overview Recipient Access Table Overview Mail Policies Overview Protection Against Spam and Graymail Anti-virus and Anti-malware Protection Outbreak Filters Content Filters Data Loss Prevention Email Encryption Deploying Web Content Security Cisco Web Security Appliance (WSA) Overview Deployment Options Network Users Authentication Secure HTTP (HTTPS) Traffic Decryption Access Policies and Identification Profiles Acceptable Use Controls Settings Anti-Malware Protection Deploying Cisco Umbrella* Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Managing Cisco Umbrella Cisco Umbrella Investigate Overview and Concepts Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Keys in Cryptography Public Key Infrastructure Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps IPsec Static Virtual Tunnel Interface Dynamic Multipoint VPN Cisco IOS FlexVPN Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs Cisco IOS VTIs Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies Secure Sockets Layer (SSL) Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Cisco ASA Remote Access VPN Configuration Cisco Firepower NGFW Remote Access VPN Configuration Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Cisco Identity Services Engine Cisco TrustSec Describing 802.1X Authentication 802.1X and Extensible Authentication Protocol (EAP) EAP Methods Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications RADIUS Change of Authorization Configuring 802.1X Authentication Cisco Catalyst© Switch 802.1X Configuration Cisco Wireless LAN Controller (WLC) 802.1X Configuration Cisco Identity Services Engine (ISE) 802.1X Configuration Supplicant 802.1x Configuration Cisco Central Web Authentication Describing Endpoint Security Technologies* Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Application Whitelists and Blacklists Host-Based Malware Protection Sandboxing Overview File Integrity Checking Deploying Cisco Advanced Malware Protection (AMP) for Endpoints* Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Cisco AMP Device and File Trajectory Managing Cisco AMP for Endpoints Introducing Network Infrastructure Protection* Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Network Telemetry Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Deploying Control Plane Security Controls* Infrastructure ACLs Control Plane Policing Control Plane Protection Routing Protocol Security Deploying Layer 2 Data Plane Security Controls* Overview of Layer 2 Data Plane Security Controls Virtual LAN (VLAN)-Based Attacks Mitigation Sp

Cisco Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR)
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle Certification: Mastering Java for Beginners and Experts

By Packt

Java is one of the most popular programming languages. Companies such as Facebook, Microsoft, and Apple all want Java.

Oracle Certification: Mastering Java for Beginners and Experts
Delivered Online On Demand5 hours 45 minutes
£134.99

Git and GitHub Complete Master Class: Beginner to Git Expert

By Packt

This course takes you through the full spectrum of basic to advanced topics, equipping you with the skills you need to get started with Git and GitHub. With the help of exercises and activities, you will be able to grasp all the concepts of Git and GitHub with ease.

Git and GitHub Complete Master Class: Beginner to Git Expert
Delivered Online On Demand13 hours 22 minutes
£93.99

Build your first iOS 14 apps using swift 5

4.3(43)

By John Academy

Course Overview The demand for iOS apps is increasing every day. If you want to build your career as an app developer or programmer, learning iOS app development will be a smart choice for you. Learn how to create iOS apps using Swift 5 from this Build your first iOS 14 apps using swift 5 course and take your first step to be a pro developer. This course will help you understand Swift coding and solve your problems with app development. In this Build your first iOS 14 apps using swift 5 course, you will learn about the functions of Swift programming, variables and types, operations, collections, flow control, classes and inheritance. You will be able to create your first iOS app using swift 5 and enhance your skill to start your career as an iOS app developer.  This course will help you understand the app development process step by step with easily understandable bite-sized lessons.  Learning Outcomes Get a clear understanding of the fundamentals of iOS and Swift development Learn iOS development programming from scratch Be able to operate Swift 5 Learn the functions of Swift 5 Learn what you should consider before making an iOS app Gain the skills to be an efficient app developer Who is this course for? This course is designed for you to learn how to design iOS applications using swift 5. Anyone interested in app development can learn effective app development skills from this course Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path Build your first iOS 14 apps using swift 5 is a useful qualification to possess and would be beneficial for any related profession or industry such as: Ios Developers Programmers Designers Unit 01: Introduction Module 01: Setup 00:02:00 Module 01: A Quick Reminder 00:01:00 Unit 02: Variables and Types in Swift Programming Module 01: Variables Strings and Constants in Swift 00:08:00 Module 02: Solution - Variables Strings and Constants in Swift 00:01:00 Module 03: Variables and Numbers in Swift 00:07:00 Module 04: Solution - Variables and Numbers in Swift 00:01:00 Module 05: Type conversions in Swift - Danger Will Robinson 00:05:00 Module 06: Solution - Type conversions in Swift - Danger Will Robinson 00:02:00 Module 07: Tuple Types in Swift 00:05:00 Module 08: Solution - Tuple Types in Swift 00:02:00 Unit 03: Optionals in Swift and the Null Problem Module 01: Optionals Nulls and Variables in Swift 00:05:00 Module 02: Solution - Optionals Nulls and Variables in Swift 00:01:00 Unit 04: Operators in Swift Module 01: Operators in Swift - Assignment Arithmetic and Concatenation 00:04:00 Module 02: Solution - Operators in Swift - Assignment Arithmetic and Concatenation 00:01:00 Module 03: Operators in Swift - Unary Compound Logic and Comparison 00:04:00 Unit 05: Collections in Swift Module 01: Collections in Swift - Arrays 00:05:00 Module 02: Solution - Collections in Swift - Arrays 00:02:00 Module 03: Collections in Swift - Sets 00:06:00 Module 04: Collections in Swift - Dictionaries 00:05:00 Module 05: Solution - Collections in Swift - Dictionaries 00:03:00 Unit 06: Flow Control in Swift Module 01: Controlling Flow in Swift - for in loops 00:08:00 Module 02: Solution - Controlling Flow in Swift - for in loops 00:03:00 Module 03: Controlling Flow in Swift - While loops 00:04:00 Module 04: Solution - Controlling Flow in Swift - While loops 00:02:00 Unit 07: Conditional Statements in Swift Module 01: Conditional Statements in Swift - If Else 00:04:00 Module 02: Solution - Conditional Statements in Swift - If Else 00:02:00 Module 03: Conditional Statements in Swift - Switch Case 00:04:00 Module 04: Solution - Conditional Statements in Swift - Switch Case 00:02:00 Unit 08: Control Transfer in Swift Module 01: Control Transfer in Swift - continue break fallthrough return throw 00:06:00 Unit 09: Functions in Swift Module 01: Functions in Swift 00:10:00 Module 02: Solution - Functions in Swift 00:03:00 Module 03: Nested Functions in Swift 00:04:00 Module 04: Solution - Nested Functions in Swift 00:03:00 Unit 10: Enumerations in Swift Module 01: Enumerations in Swift 00:05:00 Module 02: Solution - Enumerations in Swift 00:01:00 Unit 11: Classes and Inheritance in Swift Module 01: Classes in Swift 00:05:00 Module 02: Solution 1 - Classes in Swift 00:02:00 Module 03: Solution 2 - Classes in Swift 00:02:00 Module 04: Inheritance in Swift 00:07:00 Module 05: Solution - Inheritance in Swift 00:04:00 Unit 12: Your First iOS App Module 01: Your First iOS App and Familiarisation 00:05:00 Module 02: The Key iOS Project Files 00:06:00 Module 03: How to Implement a Button in the User Interface 00:05:00 Module 04: How to Connect a Button to Code in Xcode 00:05:00 Module 05: Writing Code to Change a Views Appearance and a TASK 00:02:00 Module 06: Solution to the Task and If Else View Colors 00:07:00 Unit 13: Temperature Conversion App - iOS Layouts Positioning and Buttons Module 01: A Preview of the App We Will Build 00:01:00 Module 02: Create the App and Its User Interface 00:02:00 Module 03: iOS Layouts and Positioning 00:10:00 Module 04: Connecting UI Elements to Code 00:05:00 Module 05: Converting Temperature via Button Click 00:06:00 Module 06: Adding a Bit of Excellence to the UI and a Task for You 00:06:00 Module 07: Task Solution - Adding a Conversions Counter Label 00:07:00 Unit 14: Gods App - Navigation Table Views and Data Passing Module 01: What we are Building 00:02:00 Module 02: Creating the GreekGod Data Model 00:06:00 Module 03: Navigation Controllers in iOS 00:06:00 Module 04: Creating Fake Gods 00:04:00 Module 05: How to Set Up a Table View and Its Controller 00:11:00 Module 06: Task Solution - How to Fix the Table View 00:04:00 Module 07: How to Navigate from Table View to New View in iOS 00:04:00 Module 08: Create a View Controller for the Detail View 00:03:00 Module 09: Passing Data from Table View to View Controller 00:04:00 Module 10: Setting up a Detail View Controller with Passed Data 00:11:00 Module 11: Using Images and ImageViews in Swift - And a Task 00:04:00 Module 12: Solution to the Task 00:04:00 Unit 15: Will I Burn App - Accessing APIs and Device Hardware - GPS Module 01: Preview of the App We Will Make 00:02:00 Module 02: Structures Instead of Classes 00:05:00 Module 03: How to Request Permissions and Capabilities in iOS 00:04:00 Module 04: Requesting User Permissions in iOS - Part 2 00:09:00 Module 05: Requesting User Permissions in iOS - Part 3 00:07:00 Module 06: Creating a SWEET User Interface 00:09:00 Module 07: Task - Connect the UI to Code 00:01:00 Module 08: Connecting User Interface to Code 00:02:00 Module 09: Action Sheet Alerts in iOS 00:05:00 Module 10: Update a Label and Thoughts on Storage 00:03:00 Module 11: User Defaults Storage in iOS 00:05:00 Module 12: Getting and Setting User Defaults in iOS 00:04:00 Module 13: Getting a Location in Latitude and Longitude in iOS Apps 00:04:00 Module 14: Selecting an API Provider for Your Apps 00:07:00 Module 15: Generating an API Key and Exploring the Docs 00:04:00 Module 16: Create an API Access Class in Swift 00:04:00 Module 17: Using Third Party Libraries in iOS - AlamoFire 00:06:00 Module 18: How to Use AlamoFire in iOS 00:08:00 Module 19: How to Extract JSON Data from an API Call 00:06:00 Module 20: Performing Background Calculations in iOS 00:06:00 Module 21: Performing Background Calculations in iOS - Part 2 00:07:00 Module 22: Activity Indicators in iOS and Swift 00:07:00 Module 23: Local Notifications in iOS 00:06:00 Module 24: Solution to the Task - UI Smoothing 00:05:00 Unit 16: Whatsapp Clone Using Google Firebase Module 01: Preview of What We're Building 00:03:00 Module 02: Should you Choose Firebase or Firestore 00:10:00 Module 03: Create a Firebase Application 00:03:00 Module 04: Installing Firebase in your iOS App 00:09:00 Module 05: Firebase Authentication Options 00:05:00 Module 06: Designing the Auth Screen 00:10:00 Module 07: Connecting UI to Code 00:04:00 Module 08: Showing the Auth Screen 00:11:00 Module 09: Validating User Input for Firebase Authentication 00:08:00 Module 10: Register a User in Firebase 00:05:00 Module 11: Logging in via Firebase 00:06:00 Module 12: Set Activity Indicator to Show Network Processing 00:07:00 Module 13: How to Reset a Firebase User Password 00:11:00 Module 14: How to Prevent Dismissal of a View Controller 00:02:00 Module 15: Setting up a Table View and Cell Manually 00:11:00 Module 16: Connecting a TableView and ViewController Manually 00:05:00 Module 17: Implementing TableView Functions in the ViewController 00:06:00 Module 18: Listening to Firebase Data Streams on iOS 00:09:00 Module 19: Demo with Dummy Data 00:03:00 Module 20: Using a TextField Delegate in iOS 00:03:00 Module 21: Sending Data from iOS to Firebase Database 00:05:00 Module 22: Well Done and a Couple HARD TASKS with NO SOLUTION 00:05:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Build your first iOS 14 apps using swift 5
Delivered Online On Demand9 hours 8 minutes
£18

Microsoft Excel Masterclass in 2021

4.3(43)

By John Academy

Course Overview Grasp the opportunity to learn Microsoft Excel from the ABCs to an advanced level within one course. The Microsoft Excel Masterclass in 2021 course will start with the basics with MS excel and gradually turn you into an expert user. The Microsoft Excel Masterclass in 2021 course will first focus on the tools and functions of excel. You will comprehend the skills to create basic formulas in excel. In this step by the step learning process, you will have the adequate knowledge and ability to make all sorts of adjustments to your worksheets. The course will teach you many strategies for cell formatting. From the easy to follow modules, you will grasp the techniques to insert shapes and images into your sheets. You will also understand how to visualize your data in charts. In the end, you will study the benefits of using excel templates. The Microsoft Excel Masterclass in 2021 course will provide you with first-hand training on excel. Enroll in the course and take your excel skills to the next level. Learning Outcomes Get an introduction to Microsoft Excel and its functions Understand the process of data validation and data visualization Learn how to adjust excel worksheets Know about the conditional functions Familiarize yourself with the process of inserting images and shapes Who is this course for? Those who want to learn Microsoft Excel. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path The Microsoft Excel Masterclass in 2021 course is a useful qualification to possess and would be beneficial for any related profession or industry such as: Business Professional Data Operator Administrative Officer Data Analyst Unit 01: Excel from A-Z Course Introduction Excel from A-Z Course Intro 00:03:00 Excel Job Opportunities 00:03:00 Excel Job Types 00:04:00 Microsoft Excel Marketplace 00:04:00 What is Microsoft Excel? 00:04:00 Who is This Course For? 00:04:00 Unit 02: Getting Started With Excel Finding & Opening Excel 00:01:00 Excel's Start Screen 00:03:00 Explaining the Excel Interface 00:03:00 Excel Interface Continued 00:01:00 Excel Workbook vs. Excel Worksheet 00:02:00 Saving an Excel Document 00:04:00 Customizing the Quick Access Toolbar 00:02:00 Customizing the Excel Ribbon 00:03:00 Excel Shortcut Keys 00:02:00 Unit 03: Values, Referencing and Formulas Creating Excel Labels 00:03:00 Entering Numeric Values in Excel 00:03:00 Formatting Date Values in Excel 00:05:00 Building Basic Formulas in Excel 00:05:00 Order of Operations 00:06:00 Relative vs. Absolute Cell References 00:07:00 Unit 04: Intro to Excel Functions Excel Functions Explained 00:03:00 The SUM() Function 00:08:00 The MIN() & MAX() Function 00:04:00 The AVERAGE() Function 00:02:00 COUNT() Functions 00:05:00 Unit 05: Adjusting Excel Worksheets Moving & Copying Data 00:07:00 Insert & Delete Rows and Columns 00:05:00 Adjusting the Width and Height of Cells 00:05:00 Hiding and Unhiding Excel Rows and Columns 00:04:00 Renaming, Moving & Deleting Excel Worksheets 00:05:00 Adding Protection to Specific Cells 00:04:00 Protecting the Structure of a Workbook 00:02:00 Adding a Workbook Password to Open File 00:02:00 Unit 06: Visually Pleasing Cell Formatting Formatting Fonts and Cell Background Color 00:05:00 Adding Cell Borders 00:05:00 Formatting Data Appropriately 00:05:00 The Magic behind Excel's Format Painter 00:04:00 Creating Styles for Formatting Efficiency 00:06:00 Merging Cells for a Cleaner Look 00:03:00 The Power of Conditional Formatting 00:06:00 Unit 07: How to Insert Images and Shapes! Grab User's Attention using Illustrations 00:09:00 Customizing Icons 00:05:00 Create Compelling Graphics with SmartArt 00:06:00 Unit 08: Visualize Data with Charts The Commonly Used Column Chart 00:03:00 Changing the Chart Design 00:02:00 Formatting Elements of a Chart 00:06:00 Modifying the Data, Type & Location of a Chart 00:06:00 Unit 09: Excel's Printing Options Print Preview Options 00:04:00 Excel's Page Layout View 00:07:00 Printing a Specific Range of Cells 00:03:00 Converting Spreadsheets to PDF Files 00:02:00 Unit 10: Benefits of Using Excel Templates Why Create an Excel Template 00:01:00 How to Create an Excel Template 00:05:00 Unit 11: Working with Excel Datasets How to Prepare Data for Analysis 00:04:00 How to Sort Data in Excel 00:03:00 Multi-Level Sorting 00:03:00 Custom Sorting Datasets in Excel 00:02:00 Applying Filters to Datasets 00:05:00 Creating Subtotals within a Dataset 00:06:00 Converting Datasets into Tables 00:06:00 Finding & Removing Duplicate Values 00:07:00 Unit 12: Excel Database Functions The SUMIF() Function 00:09:00 The DSUM() Function 00:08:00 The DSUM() Function Cont. 00:07:00 The SUBTOTAL() Function 00:06:00 Unit 13: Excel Data Validation What is Excel Data Validation? 00:02:00 Creating a Drop Down List with Data Validation 00:07:00 Different Types of Excel Data Validation 00:06:00 Adding Custom Alerts to Data Validation 00:07:00 Creating a Dynamic Drop Down List 00:03:00 Complex Validation: Dependent Drop Down List! 00:09:00 Unit 14: Excel PivotTables Creating an Excel Pivot Table 00:06:00 Modifying Excel PivotTables 00:06:00 Grouping & Filtering PivotTable Data 00:07:00 Drilling Down into PivotTable Data 00:02:00 Creating Pivot Charts & Utilizing Slicers 00:08:00 Unit 15: Excel's PowerPivot Add-In What is PowerPivot? 00:04:00 Activating the Excel PowerPivot Add-In 00:02:00 Creating Relationships between Data Tables 00:06:00 Using Data Models to Create PivotTables 00:05:00 How to Create PowerPivot KPI's 00:08:00 Unit 16: Excel's Conditional Functions Excel's IF() Function 00:05:00 IF() Function with AND() Criteria 00:05:00 IF() Function with OR() Criteria 00:05:00 Nesting Multiple IF() Functions 00:07:00 The COUNTIF() Function 00:04:00 Key Benefits of Named Ranges 00:04:00 Unit 17: Excel's Lookup Function VLOOKUP() Function 00:09:00 The Beauty of Excel's IFERROR() Function 00:04:00 HLOOKUP() Function 00:06:00 INDEX() Function 00:05:00 MATCH() Function 00:05:00 INDEX() and MATCH() Combined 00:05:00 Two-Way Lookup with INDEX() and MATCH() 00:04:00 Unit 18: Text Based Functions in Excel LEFT(), RIGHT() and MID() Function 00:07:00 Extracting Specific Text using LEN() & SEARCH() 00:13:00 Combining Text with CONCATENATE() 00:06:00 Quick Tips & Other Text Based Functions 00:06:00 Unit 19: Auditing Formulas and Views in Excel Tracing Precedents & Dependents in Formulas 00:04:00 Showing Formulas 00:02:00 Grouping Data 00:03:00 3D Referencing in Formulas 00:05:00 Utilizing the Watch Window in Excel 00:03:00 How to Freeze Panes in Excel 00:03:00 Unit 20: Excel's 'what If?' Tools Excel's Scenario Manager Tool 00:06:00 Goal Seek in Excel 00:06:00 Compare Results with Excel Data Tables 00:04:00 Solver Tool 00:11:00 Unit 21: Welcome to Excel VBA The Power Behind Excel VBA 00:03:00 A Look Inside the Visual Basic Editor (VBE) 00:04:00 Recording a Macro 00:09:00 Saving & Opening a Macro-Enabled Workbook 00:02:00 Unit 22: The VBA Language Modules and Procedures 00:07:00 Objects, Methods and Properties 00:06:00 Excel VBA Variables 00:05:00 Unit 23: Writing VBA Code Referencing a Range 00:14:00 InputBox & MsgBox 00:06:00 Using Variables in VBA Code 00:05:00 If Then Else Statement 00:10:00 Worksheet Functions inside VBA 00:08:00 Creating User Defined Functions 00:09:00 User Defined Functions within VBA Scripts 00:06:00 Unit 24: Important VBA Tools and Logic Find Last Row of Data 00:06:00 Find Last Column of Data 00:03:00 With Statement 00:05:00 Debugging & Error Handling 00:07:00 Debugging & Error Handling Cont. 00:07:00 Unit 25: Excel VBA Lopps For Next Loop 00:09:00 Do Until Loop 00:06:00 For Each Loop 00:04:00 Unit 26: Triggering Macros Assigning Macros to Shapes 00:04:00 Form Controls vs ActiveX Controls 00:08:00 Worksheet Events 00:04:00 Workbook Events 00:03:00 Fun with VBA Events! 00:07:00 Unit 27: Excel User Forms Creating an Excel UserForm 00:03:00 Adding Controls to UserForms 00:10:00 How to Show an UserForm 00:03:00 Passing TextBox Values to Desired Cells 00:07:00 Passing Option Buttons to Desired Cells 00:07:00 UserForm ComboBoxes 00:08:00 Clearing Values from UserForm Controls 00:03:00 How to Close an UserForm 00:02:00 UserForms and Protected Sheets 00:05:00 Unit 28: Starting a Career in Excel Creating an Excel Resume 00:05:00 Getting Started with Freelancing 00:06:00 How to Become an Excel Freelancer 00:05:00 Top Freelance Websites 00:05:00 How to Get Your First Client 00:08:00 Personal Branding 00:07:00 Networking Do's and Don'ts 00:04:00 Importance of Having a Website 00:04:00 Resources Resources - Microsoft Excel Masterclass in 2021 00:00:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Microsoft Excel Masterclass in 2021
Delivered Online On Demand13 hours 1 minutes
£18