• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4518 Courses delivered Online

CompTIA IT Fundamentals+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course will prepare participants to take the FC0-U61 exam to obtain the IT Fundamentals+ certification and help participants learn some of the basic principles and techniques of providing PC, mobile, applications, and network support. Overview On course completion, participants will be able to: - Set up a computer workstation and use basic software applications. - Explain the functions and types of devices used within a computer system. - Apply basic computer maintenance and support principles. - Describe some principles of software and database development. - Configure computers and mobile devices to connect to home networks and to the Internet. - Identify security issues affecting the use of computers and networks. This course will prepare participants to take the FC0-U61 exam to obtain the IT Fundamentals+ certification and help participants learn some of the basic principles and techniques of providing PC, mobile, applications, and network support. 1 - Identifying Computer Hardware Identify Types of Computing Devices Identify Internal Computer Components Common Computer Connector Types Identify Common Peripheral Devices 2 - Identifying Computer Software Compare Functions and Features of Common Operating Systems Identify Application Software 3 - Setting Up a Basic Workstation Connect Hardware Install and Configure Operating Systems Install and Configure Applications Configure Accessibility Options 4 - Configuring Network Access Network Connection Types Install and Configure a SOHO Router Network and Alternative Technologies Sharing and Storage Methods 5 - Working with Files, Folders, and Applications Create Files Navigate a File Structure Manage Files and Folders Compress and Extract Files Create Screen Captures 6 - Configuring and Using Wireless Devices Configuring Wireless Devices Use Wireless Devices 7 - Securing Computing Devices Identify Security Threats Apply Security Best Practices Perform Secure Web Browsing 8 - Supporting Computers and Users Environmental and Safety Concepts Back Up and Restore Data Manage Software Implement Basic Support Measures Additional course details: Nexus Humans CompTIA IT Fundamentals Plus Certification (ITF Plus) (Exam FCO-U61) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA IT Fundamentals Plus Certification (ITF Plus) (Exam FCO-U61) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA IT Fundamentals+
Delivered OnlineFlexible Dates
£2,475

Professional Certificate Course in Recognizing the Legal and Security Framework of E-Commerce in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

The aim of this course is to provide a comprehensive understanding of E-commerce security fundamentals, business laws and regulations, ethical, social and political issues, basic ethical concepts, privacy and information rights, customer data collection methods, and the concept of E-Governance and its types. After the successful completion of this lecture, you will be able tolearn the following: Understand E-commerce Security Fundamentals and deal with issues arising. Understand and comply with E-commerce Business Laws and Regulations. Understand Ethics, Social and Political Issues. Learn about the Basic Ethical Concepts: Responsibility, Accountability and Liability. Understand Privacy and Information Rights. Understand What is Customer Data, the Importance of Collecting Customer Data, and Data Collection Methods. Understand the concept of E-Governance and its types. The aim of this course is to provide students with a comprehensive understanding of E-commerce Security Fundamentals and the ability to deal with the issues arising in this field. The course will also cover the E-commerce Business Laws and Regulations that apply to this field. Students will learn about the ethical, social, and political issues surrounding E-commerce, as well as the basic ethical concepts of responsibility, accountability, and liability. They will gain an understanding of privacy and information rights and learn about customer data, including its importance and methods for collecting it. Finally, the course will cover the concept of E-Governance and its various types, providing students with an understanding of how it applies to E-commerce. The aim of this course is to provide students with a comprehensive understanding of E-commerce Security Fundamentals and the ability to deal with the issues arising in this field. The course will also cover the E-commerce Business Laws and Regulations that apply to this field. Students will learn about the ethical, social, and political issues surrounding E-commerce, as well as the basic ethical concepts of responsibility, accountability, and liability. They will gain an understanding of privacy and information rights and learn about customer data, including its importance and methods for collecting it. Finally, the course will cover the concept of E-Governance and its various types, providing students with an understanding of how it applies to E-commerce. VIDEO - Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Recognizing the Legal and Security Framework of E-commerce Self-paced pre-recorded learning content on this topic. Recognizing The Legal And Security Framework Of E-Commerce Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course.The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience. E-commerce Legal and Security Consultant E-commerce Compliance Manager E-commerce Security Analyst E-commerce Legal Analyst E-commerce Privacy Officer E-commerce Compliance Analyst E-commerce Risk Management Specialist E-commerce Fraud Investigator E-commerce Contract Administrator E-commerce Data Protection Officer Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in Recognizing the Legal and Security Framework of E-Commerce in London 2024
Delivered Online On Demand14 days
£37

Introduction to Cloud Security with Microsoft Azure

By Packt

Get up to speed with effectively securing your cloud systems

Introduction to Cloud Security with Microsoft Azure
Delivered Online On Demand2 hours 14 minutes
£93.99

GDPR Compliance, Data Protection & Cyber Security - 8 Courses Bundle

By NextGen Learning

The digital landscape is brimming with opportunities. As our reliance on technology continues to burgeon, so does the demand for rigorous data protection, cyber security, and the legal frameworks surrounding them. At the epicentre of this evolution stands GDPR. Seize the opportunity to lead this thriving industry with our "GDPR Compliance, Data Protection & Cyber Security" bundle. This 8-course bundle seamlessly integrates key areas from GDPR to AML. Tailored for the digital age, it offers a comprehensive grasp of data protection, cyber security, and relevant laws, ensuring professionals are equipped for modern challenges. The CPD Accredited Eight Courses Are: Course 1: GDPR Course 2: Data Protection Course 3: Paralegal Training Course 4: Commercial Law Course 5: Cyber Law Online Course Course 6: Business Law Course 7: Cyber Security Awareness Training Course 8: Anti-Money Laundering (AML) Training Learning Outcomes of the GDPR Compliance, Data Protection & Cyber Security Bundle: Understand GDPR's core principles, compliance needs, and business implications. Implement best practices for safeguarding sensitive information. Grasp essential concepts in paralegal, commercial, cyber, and business law. Recognise and prevent potential money laundering activities in line with global regulations. Understand the interplay between commercial law and GDPR within business operations. Navigate GDPR, data protection, and related legal landscapes with confidence. Course 1: GDPR Dive deep into the core principles of the General Data Protection Regulation (GDPR). Understand its purpose, implications, and the necessary compliance mechanisms for businesses. Course 2: Data Protection Beyond just GDPR, explore the broader landscape of data protection. Equip yourself with the tools and strategies to safeguard sensitive information in various contexts. Course 3: Paralegal Training A cornerstone for those keen to step into the legal world, this course lays down the groundwork for legal principles, processes, and professional responsibilities. Course 4: Commercial Law Engage with the intricacies of commercial law. Gain insights into business contracts, trade, and the legal framework that governs commercial operations. Course 5: Cyber Law Online Course The digital realm is rife with its own set of legal challenges. This course delves into the regulations, rights, and responsibilities of online activities and digital interactions. Course 6: Business Law A comprehensive look into the rules, regulations, and laws that dictate how a business should operate. Ideal for professionals, entrepreneurs, and those interested in the legal side of business. Course 7: Cyber Security Awareness Training With cyber threats escalating, this course heightens awareness about the importance of cybersecurity. Learn the best practices to keep data safe and recognise potential cyber threats. Course 8: Anti-Money Laundering (AML) Training Tackle the dark side of finance. Grasp the essential principles behind AML, the mechanisms to detect suspicious activities, and the protocols to prevent illegal money movements. CPD 45 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This GDPR Compliance, Data Protection & Cyber Security Course are suitable for: Business Professionals: Understand GDPR's impact on operations. Legal Enthusiasts: Deepen knowledge in data and cyber law. IT Experts: Enhance cybersecurity and data protection strategies. Entrepreneurs: Navigate legal and compliance landscapes. Finance Experts: Grasp anti-money laundering protocols. DPOs: Master GDPR implementation and related areas. After Completing this bundle, anyone can later enroll in this following course: NCFE Level 2 Certificate in the Principles of Cyber Security Certified Governance & Compliance Audit Professional Association of Governance, Risk and Compliance Highfield Awarding Body for Compliance Exam SC-900: Microsoft Security, Compliance, and Identity Fundamentals Level 7 Diploma in International Business Law Requirements Without any formal requirements, you can delightfully enrol in this GDPR Compliance, Data Protection & Cyber Security course. Just get a device with internet connectivity, and you are ready to start your learning journey. Thus, complete this GDPR course at your own pace. Career path Our GDPR Compliance, Data Protection & Cyber Security course will prepare you for a range of careers, including: Paralegal GDPR Consultant Data Protection Officer (DPO) Cybersecurity Specialist Legal Consultant in Cyber Law Compliance Officer AML Analyst Business Law Advisor The Combined Salary Range for this bundle is approximately £35,000 to £135,000+ per annum. Certificates Certificate of Completion Digital certificate - Included Certificate of Completion Hard copy certificate - £9.99

GDPR Compliance, Data Protection & Cyber Security - 8 Courses Bundle
Delivered Online On Demand45 hours
£39

Definitive OpenSSL for engineers

5.0(3)

By Systems & Network Training

OpenSSL for engineers training course description A hands on course covering OpenSSL. The course focusses on the use of OpenSSL from the command line as opposed to using its extensive libraries. Certificate authorities are configured along with key generation, HTTPS and a SSL VPN. What will you learn Describe OpenSSL. Use OpenSSL. Describe and implement: Explain how the various technologies involved in an OpenSSL work. OpenSSL for engineers training course details Who will benefit: Network personnel. Prerequisites: IP security foundation for engineers Duration 2 days OpenSSL for engineers training course contents What is OpenSSL? What is SSL? SSL versions, TLS, TLS negotiation, TLS authentication, What is OpenSSL, Command line tool, SSL library. OpenSSH, OpenVPN. Hands on TLS packet analysis. Getting started with OpenSSL Downloading, source code, packages, installing, versions, configuration, openssl command. Cipher suite selection. Hands on Encrypting a file with openssl. Public and private keys Algorithms, creating keys, public keys, private keys, encrypting the private key. Hands on Encrypting a file with keys. Digital signatures Creating signatures, checking validity of signatures, Self signing SSL certificates. Viewing certificates. Certificate files. Converting between formats. Hands on Securing a web server with HTTPS. Simple PKI with OpenSSL Root CA, signing CA, configuration files, Certificate signing requests. Email certificates, TLS server certificates. Hands on Implementing a simple PKI with OpenSSL.

Definitive OpenSSL for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

EC-Council Certified Security Specialist (ECSS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for ECSS is designed for anyone who wants to enhance their skills and make a career in information security, network security, and computer forensics fields. It can be IT Specialists, Network Administrators, or System Administrators. Overview Upon successful completion of this course, students will learn: Key issues plaguing the information security, network security, and computer forensics. Fundamentals of networks and various components of the OSI and TCP/IP model. Various network security protocols. Various types of information security threats and attacks, and their countermeasures. Social engineering techniques, identify theft, and social engineering countermeasures. Different stages of the hacking cycle Identification, authentication, and authorization concepts Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private Network, and Honeypot. Fundamentals of IDS and IDS evasion techniques. Data backup techniques and VPN security. Wireless Encryption, wireless threats, wireless hacking tools, and Wi-Fi security. Different types of web server and web application attacks, and countermeasures. Fundamentals of ethical hacking and pen testing. Incident handling and response process. Cyber-crime and computer forensics investigation methodology. Different types of digital evidence and digital evidence examination process. Different type of file systems and their comparison (based on limit and features). Gathering volatile and non-volatile information from Windows and network forensics analysis mechanism. Steganography and its techniques. Different types of log capturing, time synchronization, and log capturing tools. E-mails tracking and e-mail crimes investigation. Writing investigation report. This is an entry-level security program covering the fundamental concepts and giving a holistic overview of the key components of information security, computer forensics, and network security. Course Outline Information Security Fundamentals Networking Fundamentals Secure Network Protocols Information Security Threats and Attacks Social Engineering Hacking Cycle Identification, Authentication, and Authorization Cryptography Firewalls Intrusion Detection System Data Backup Virtual Private Network Wireless Network Security Web Security Ethical Hacking and Pen Testing Incident Response Computer Forensics Fundamentals Digital Evidence Understanding File Systems Windows Forensics Network Forensics and Investigating Network Traffic Steganography Analyzing Logs E-mail Crime and Computer Forensics Writing Investigative Report Additional course details: Nexus Humans EC-Council Certified Security Specialist (ECSS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Security Specialist (ECSS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Security Specialist (ECSS)
Delivered OnlineFlexible Dates
Price on Enquiry

Cyber Security and Digital Forensics for Pentesters - Hands-on

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 8 hours 13 minutes Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about forensic investigation Understand the core competencies and principles of forensic investigation Explore the various areas of forensic investigation Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert pentester Cyber Security and Digital Forensics for Pentesters - Hands-on Course Master the skills you need to propel your career forward in digital forensic investigation. This course will equip you with the essential knowledge and skillset that will make you a confident pentester and take your career to the next level. This comprehensive cyber security and digital forensics course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this cyber security and digital forensics course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This cyber security and digital forensics course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries.  This comprehensive course will teach you the theory of effective digital forensic investigation practice and equip you with the essential skills, confidence and competence to assist you in the digital forensic investigation industry. You'll gain a solid understanding of the core competencies required to drive a successful career in digital forensic investigation. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for pentester or for people who are aspiring to specialise in digital forensic investigation. This cyber security and digital forensics course has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course is not regulated by Ofqual and is not an accredited qualification.  Enrol in this cyber security and digital forensics course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive cyber security and digital forensics course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this digital forensic investigation can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This cyber security and digital forensics course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This cyber security and digital forensics course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This cyber security and digital forensics course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Course Overview Course Overview 00:06:00 Building Your Forensics Lab Environment Using VirtualBox Video - Downloading ISO and OVA Files for VirtualBox 00:08:00 Video and lab - Create a Virtual Install of CSI Linux 2021.2 00:12:00 Video and Lab - Create a Kali Live (Forensic Mode) VM Using VirtualBox 00:06:00 Video and lab - Create a Virtual Install Kali Image Using VirtualBox 00:11:00 Video and Lab - Create Virtual Install of Windows 10 Using VirtualBox 00:08:00 Video and Lab - Create a Virtual Install of Metasploitable2 Using VirtualBox 00:10:00 Using Kali Forensic Mode and Autopsy Video and Lab -Getting Started with Autopsy 00:10:00 Video and Lab - Simulate Creating a Disk Image for a Forensic Analysis 00:11:00 Video and Lab - Examining a forensic Disk Image Using Autopsy 00:12:00 Digital Forensics Case Management Video and Lab - Installing the WebMap-Nmap Dashboard 00:12:00 Open-source Intelligence (OSINT) Video and Lab - Conducting OSINT Using CSI Linux Investigator 00:08:00 Video and Lab - Find Social Media Accounts Using Sherlock 00:07:00 Video - OSINT Framework - Overview 00:16:00 Using Shodan to Search for Vulnerable Devices Video and Lab - Preparing CSI Investigator to Use Shodan 00:05:00 Video and Lab - Using Shodan to Find Vulnerable Devices 00:16:00 Video and lab - Using Shodan to Search for Vulnerable Databases 00:08:00 Computer Forensics Video - Attaching an External USB Device in Kali 00:07:00 Video and Lab - Acquiring a Forensic Copy of the Windows Registry 00:15:00 Video and Lab - Analyzing the Windows Registry for Evidence 00:14:00 Video and Lab - Dumping Wi-Fi Credentials Using netsh 00:04:00 Video and Lab - Email Header Analysis 00:17:00 Video and Lab - Using Shellbags to View Hidden or Deleted Folders 00:06:00 Video and Lab - Extracting Thumbnail Images From a Suspects Machine 00:05:00 Video and lab - Memory Forensics Using the Volatility Framework 00:19:00 Reverse Engineering and Malware Analysis Video and Lab - Install Ghidra on CSI Linux 00:07:00 Video and Lab - Introduction to Using Ghidra 00:14:00 Video and Lab - Reverse Engineering crackme0x00 Using Ghidra 00:06:00 Video and Lab - Reverse Engineering crackme0x05 Using Ghidra 00:12:00 Video and Lab - Analyzing the WannaCry KillSwitch Using Ghidra 00:17:00 Malware Hunting with Sysinternal Tools Video - Overview of Sysinternal Tools 00:08:00 Video - Overview of Sysinternal's Process Explorer 00:00:00 Video and Lab - Finding Malware with Sysinternals Process Explorer 00:09:00 Stenography Video and Lab - Using Steghide for Hiding and Extracting Data 00:11:00 Video and Lab - Using the EXIFtool to Read and Write EXIF Tags 00:10:00 Network Forensics Using Wireshark Video - Overview of Wireshark 3.2 00:11:00 Video - Wireshark Capture Options 00:07:00 Video - Wireshark Toolbar Icons 00:03:00 Video and Lab - Installing a Wireless Adapter in Kali 00:09:00 Video and Lab - Hacking a Wireless Network Using Kali Linux 00:14:00 Video - Capturing Wireless Traffic Using Wireshark 00:05:00 Practice What You Learned Video and Lab - CTF Lab Build for HA: Forensics 00:11:00 Video and lab - Capture flag #1 00:12:00 Video and lab - Capture flag #2 00:10:00 Video and lab - Capture flag #3 00:20:00 Video and lab - Capture flag #4 00:09:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Cyber Security and Digital Forensics for Pentesters - Hands-on
Delivered Online On Demand
£19

Symantec Data Center Security - Server Advanced 6.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for information technology professionals, security professionals, network, system managers and administrators tasked with installing, configuring and maintaining Symantec Data Center Security: Server Advanced. Overview At the completion of the course, you will be able to: Describe the major components of Symantec Data Center Security: Server Advanced and how they communicate. Install the management server, console and agent. Define, manage and create assets, policies, events and configurations. Understand policy creation and editing in depth. course is an introduction to implementing and managing a Symantec Data Center Security: Server Advanced 6.0 deployment. Introduction Course Overview The Classroom Lab Environment Introduction to Security Risks and Risk Security Risks Security Risk Management Managing and Protecting Systems Corporate Security Policies and Security Assessments Host-Based Computer Security Issues SDCS:Server Advanced Overview SDCS: Server Advanced Component Overview Policy Types and Platforms Management Console Overview Agent User Interface Overview DEMO of Management Console Installation and Deployment Planning the Installation Deploying SDCS:SA for High Availability Scalability Installing the Management Server Installing the Management Console Installing a Windows Agent Installing a UNIX Agent LAB: Install Manager and Agents Configuring Assets Asset and Agent Overview Viewing Agents and Assets Managing Agents Managing Agents on Assets LAB: Create Asset Groups LAB: Examine Agent Interface Policy Overview Policies Defined Prevention Policy Overview Process Sets Resource Access Policy Options Detection Policy Overview IDS Capabilities Rules Collectors Policy Management Workspace User Interface on Agent Example Use Cases LAB: Paper Based Scenarios LAB: What type of security strategy should be used? Detailed Prevention Policies Policy Editor Policy Structure Global Policy Options Service Options Program Options Policy Processing Order Network Rules File Rules Registry Rules Process Sets Predefined Policies LAB: Deploy Strict policy LAB: Examine Functionality Advanced Prevention Profiling Applications Customizing Predefined Policies LAB: Modify Policy Previously Deployed LAB: Re-examine Functionality LAB: Preparing for Policy deployment LAB: Best Practice - Covering Basics LAB: Further Enhance Strict Policy LAB: Create Custom Process Set LAB :Secure an FTP Server LAB: Troubleshoot Policy/pset Assignment Using CLI Detection Policies Detection Policies Structure Collectors Rules Predefined Detection Policies Creating a Detection Policy Using the Template Policy LAB: Deploy Baseline Policy LAB: Create Custom Policy Event Management Events Defined Viewing Events Reports and Queries Overview Creating Queries and Reports Creating Alerts LAB: View Monitor Types and Search Events LAB: Create Real Time Monitor Agent Management and Troubleshooting Configurations Defined Creating and Editing Configurations Common Parameters Prevention Settings Detection Settings Analyzing Agent Log Files Diagnostic Policies Local Agent Tool ? sisipsconfig LAB: Create Custom Configurations LAB: Implement Bulk Logging LAB: Disable Prevention on Agent Using CLI LAB: Use Diagnostic Policy to Gather Logs LAB: Troubleshoot a Policy System Management Managing Users and Roles Server Security Viewing and Managing Server Settings Viewing and Managing Database Settings Viewing and Managing Tomcat Settings LAB: Create a New User LAB: View System Settings

Symantec Data Center Security - Server Advanced 6.0
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Cyber Ops Security Bundle with 5 Exams

By Hudson

This course bundle is ideal for anyone looking to launch their Cisco networking career, specifically in Cisco cyber ops and security. It consists of one Cisco Certified Technician (CCT) certification in Routing and Switching, one Cisco Certified Network Associate (CCNA) certification, one Cisco Certified CyberOps Associate certification, and one Cisco Certified Networking Professional (CCNP) certifications, specialising in Cisco security. Although there are no formal prerequisites to enrol on the CCNA, or CCNP certification courses and sit the exams, learners should have a good foundation knowledge in networking. The Cisco Certified Technician Routing and Switching (CCT Routing and Switching) certification focuses on the skills required for onsite support and maintenance of Cisco routers, switches, and operating environments. It’s a great starting point if you’re new to Cisco networking. Technicians in this area must be able to identify Cisco router and switch models, accessories, cabling, and interfaces; understand the Cisco IOS Software operating modes and identify commonly found software; and be able to use the Cisco Command Line Interface (CLI) to connect and service products. Achieving CCT Routing and Switching certification is considered the best foundation for supporting other Cisco devices and systems. Earning the CCNA is usually the first ‘major’ certification step in preparing for a career in Cisco networking technologies. To earn your CCNA certification, you only need to pass one exam – which covers a broad range of fundamentals for IT careers, based on the latest networking technologies. The Cisco Certified CyberOps Associate certification program validates the day-today, tactical knowledge and skills that Security Operations Center (SOC) teams need to detect and respond to cyber security threats. The certification validates the fundamentals needed for associate-level job roles, with one exam and one training course to help you prepare. The exam and training cover knowledge and skills related to security concepts, security monitoring, host-based analysis, network intrusion analysis, and security policies and procedures. From a recognized provider of security solutions and certifications, the CyberOps Associate certification and training program is your pathway to a career in cyber security operations. The CCNP Security certification is designed to help you prove your skills in the ever-changing landscape of security technologies. The program prepares you for today’s professional-level job roles in security technologies. One of the industry’s most respected certifications, CCNP validates the core knowledge you need while providing the flexibility to choose a focus area. To earn your CCNP Security, you must pass two exams: a core exam and a concentration exam of your choice. This course bundle includes the core exam and concentration exam. The core exam’s focus is ‘Securing Networks with Cisco Firepower Technologies‘ – Cisco CCNP Security SNCF (Exam 300-710).

Cisco Cyber Ops Security Bundle with 5 Exams
Delivered Online On Demand
£1,395

CompTIA Server+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for IT professionals such as PC, desktop, and help desk technicians who have experience supporting PC hardware who wish to make the transition to become server hardware and support specialists. This course is also designed for existing server managers who are preparing to take the CompTIA Server+ Exam SKO-005. Overview Upon successful completion of this course, you will be able to perform the duties of a server administrator. In this course, you will: - Manage server hardware. - Install server hardware and operating systems. - Configure networking hardware and protocols. - Perform basic server configuration tasks. - Create a virtual server environment. - Administer servers. - Implement server storage solutions. - Secure the server. - Plan and test disaster recovery. - Troubleshoot server issues. This course can also benefit you if you are preparing to take the CompTIA Server+ examination (Exam SK0-004). This course builds on existing professional experience with personal computer hardware support to present the next tier of skills & concepts students will use on the job when administering any type of network server. 1 - Outline Lesson 1: Understanding Server Administration Concepts Lesson 2: Understanding Virtualization and Cloud Computing Lesson 3: Understanding Physical and Network Security Concepts Lesson 4: Managing Physical Assets Lesson 5: Managing Server Hardware Lesson 6: Configuring Storage Management Lesson 7: Installing and Configuring an Operating System Lesson 8: Troubleshooting OS, Application, and Network Configurations Lesson 9: Managing Post-Installation Administrative Tasks Lesson 10: Managing Data Security Lesson 11: Managing Service and Data Availability Lesson 12: Decommissioning Servers Additional course details: Nexus Humans CompTIA Server Plus Certification (Exam SKO-005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Server Plus Certification (Exam SKO-005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Server+
Delivered OnlineFlexible Dates
£2,475