*Understanding Worry* is a FREE, interactive, hands-on workshop, focused on helping you understand uncontrollable, excessive worrying.
Learn how to build real-world applications using Spring Framework 5 and Spring Boot 2
Advanced RF training course description This course provides a follow on to our popular RF fundamentals course for those that need to know more. What will you learn Explain RF propagation Describe the importance of transmission lines in RF systems. Recognise the issues in RF systems. Describe transmission measurements. Advanced RF training course details Who will benefit: Those working with RF systems. Prerequisites: RF fundamentals. Duration 3 days Advanced RF training course contents RF propagation The Electromagnetic Spectrum, Electromagnetic Radiation, Spherical Wave Front, The Space Wave, Receive Antenna below the Horizon, Bending the Space Wave , Surface Wave Path, Tilting of Surface Wave, Conductivity, Layers of the Atmosphere, Variations of the Ionosphere, Variations caused by Solar Activity, Multi Hop Transmission, Classification of Radio Waves, Fading, Fading Reduction, Free Space Path Loss, Shadowing of Radio Wave, Signal Levels after Shadowing, Radio Waves as Wavelets, Fresnel Zone. Transmission Lines Transmission Line Construction, Primary Line Constants, 'T' Networks, Input Impedence, Lossless Unbalanced Line, Standing Waves, Open Circuit / Short Circuit Termination, Short Circuit Standing Waves, Open Circuit Standing Waves, Voltage Standing Wave Pattern, Short Circuit Termination, Open Circuit Termination, The Directional Coupler, Effect of E and M Coupling, Practical Reflectometer. Antenna Theory The Open Circuit Line, Dipole V/I Distribution, Polar Diagram, Power Pattern ½ Wave Dipole, Half Wave Dipole, Vehicle Mount, Centre Fed Whip Antenna, Antenna Beamwidth, The Yagi Array, Uda Yagi array, Antenna Characteristics, 6 Element Yagi Polar Diagram, Log Periodic Antenna, Helical Antenna. Microwave Dish Array, Typical Microwave Dish Antenna. Transmission Measurements Transmission Measurements, Effective Isotropic Radiated Power, Fade Margin. Noise Noise in Communications, Noise Voltage Equivalent Circuit. Satellite Communications Satellite Communications, Large Earth Station, The Satellite Payload, Geo Stationary Orbit, Basic Orbits, VSAT Terminal, Iridium Phone, The Space Segment, Satellite Footprint, Typical System Hardware. Mobile Communications Mobile Evolution, The Path to UMTS, Technologies Bit Rate and Mobility, Systems and Specifications, Wireless Networks, Diffraction, Multi Path Propagation, Loss Models, GSM Architecture, OSI Model - GSM, OSI Reference Model, OSI Layers.
Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.
Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces
Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
These events are designed to work on the ideas introduced in Level 1: Understanding & Dealing with Everyday Racism The Six Stages Framework
These events are designed to introduce the BOOK & basic ideas behind Understanding & Dealing with Everyday Racism The Six Stages Framework
These events are designed to introduce the BOOK & basic ideas behind Understanding & Dealing with Everyday Racism The Six Stages Framework
Learn the ways of an Office Admin and Customer Service provider Customers are always important for any business which is why Customer Service is essential. Not only the customers, but the Administrative side of a company is also essential for a company to run smoothly. If you are interested in Office Administration and Customer Service then this course will be beneficial to you. Office administration involves a set of day to day activities related to financial planning, maintaining personnel records, processing of payroll, record keeping, maintaining files, billing, distribution of data, logistics are part of office administration. It involves the main task of ensuring that resources are available for smooth functioning like coordinating repairs of office equipment required for work. While customer service will make sure all the Customers are taken care of with all their queries. During this course you will about both on how to be a capable and efficient Office Admin and an engaging Customer Service provider. This course gives you the benefit of both profession and you be able learn and kickstart your career in Office Administration or Customer Service. Course Highlights Diploma in Office Admin and Customer Service is an award winning and the best selling course that has been given the CPD Certification & IAO accreditation. It is the most suitable course anyone looking to work in this or relevant sector. It is considered one of the perfect courses in the UK that can help students/learners to get familiar with the topic and gain necessary skills to perform well in this field. We have packed Diploma in Office Admin and Customer Service into 97 modules for teaching you everything you need to become successful in this profession. To provide you ease of access, this course is designed for both part-time and full-time students. You can become accredited in just 3 days, 18 hours hours and it is also possible to study at your own pace. We have experienced tutors who will help you throughout the comprehensive syllabus of this course and answer all your queries through email. For further clarification, you will be able to recognize your qualification by checking the validity from our dedicated website. Why You Should Choose Diploma in Office Admin and Customer Service Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? Diploma in Office Admin and Customer Service is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our Diploma in Office Admin and Customer Service is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. Admin Support Module One - Getting Started FREE 00:30:00 Module Two - Getting Organized (I) FREE 01:00:00 Module Three - Getting Organized (II) 01:00:00 Module Four - Managing Time 01:00:00 Module Five - Getting It All Done On Time 01:00:00 Module Six - Special Tasks 01:00:00 Module Seven - Verbal Communication Skills 01:00:00 Module Eight - Non-Verbal Communication Skills 01:00:00 Module Nine - Empowering Yourself 01:00:00 Module Ten - The Team of Two 01:00:00 Module Eleven - Taking Care of Yourself 01:00:00 Module Twelve - Wrapping Up 00:30:00 Administrative Management Module One - Getting Started FREE 01:00:00 Module Two - Why Your Office Needs Administrative Procedures FREE 01:00:00 Module Three - Gathering the Right Tools 01:00:00 Module Four - Identifying Procedures to Include 01:00:00 Module Five - Top Five Procedures to Record 01:00:00 Module Six - What to Include in Your Binder (I) 01:00:00 Module Seven - What to Include in Your Binder (II) 01:00:00 Module Eight - Organizing Your Binder 01:00:00 Module Nine - What Not to Include in the Procedure Guide 01:00:00 Module Ten - Share Office Procedure Guide 01:00:00 Module Eleven - Successfully Executing the Guide 01:00:00 Module Twelve - Wrapping Up 01:00:00 Organisational Skills Module One - Getting Started FREE 00:30:00 Module Two - Remove the Clutter FREE 01:00:00 Module Three - Prioritize 01:00:00 Module Four - Scheduling Your Time 01:00:00 Module Five - To Do Lists 01:00:00 Module Six - Paper and Paperless Storage 01:00:00 Module Seven - Organization in Your Work Area 01:00:00 Module Eight - Tools to Fight Procrastination 01:00:00 Module Nine - Organizing Your Inbox 01:00:00 Module Ten - Avoid the Causes of Disorganization 01:00:00 Module Eleven - Discipline is the Key to Stay Organized 01:00:00 Module Twelve - Wrapping Up 00:30:00 Administrative Skills Developing Diploma- Activities 00:00:00 Customer Relations and Dealings Module One - Getting Started 00:30:00 Module Two - The Right Attitude Starts with You 01:00:00 Module Three - Stress Management (Internal Stressors) 01:00:00 Module Four - Stress Management (External Stressors) 00:30:00 Module Five - Transactional Analysis 01:00:00 Module Six - Why are Some Customers Difficult 01:00:00 Module Seven - Dealing with the Customer Over the Phone 01:00:00 Module Eight - Dealing with the Customer In Person 01:00:00 Module Nine - Sensitivity in Dealing with Customers 01:00:00 Module Ten - Scenarios of Dealing with a Difficult Customer 01:00:00 Module Eleven - Following up With a Customer Once You Have Addressed Their Issue 01:00:00 Module Twelve - Wrapping Up 00:30:00 Customer Service: Telephone Etiquette Module One - Getting Started 00:30:00 Module Two - Aspects of Phone Etiquette 01:00:00 Module Three - Using Proper Phone Language 01:00:00 Module Four - Eliminate Phone Distractions 01:00:00 Module Five - Inbound Calls 01:00:00 Module Six - Outbound Calls 01:00:00 Module Seven - Handling Rude or Angry Callers 01:00:00 Module Eight - Handling Interoffice Calls 01:00:00 Module Nine - Handling Voicemail Messages 01:00:00 Module Ten - Methods of Training Employees 01:00:00 Module Eleven - Correcting Poor Telephone Etiquette 01:00:00 Module Twelve - Wrapping Up 00:30:00 Microsoft Office Word Module One - Getting Started FREE 00:30:00 Module Two - Opening Word FREE 01:00:00 Module Three - Working with the Interface 01:00:00 Module Four - Your First Document 01:00:00 Module Five - Basic Editing Tasks 01:00:00 Module Six - Basic Formatting Tasks 01:00:00 Module Seven - Formatting Paragraphs 01:00:00 Module Eight - Advanced Formatting Tasks 01:00:00 Module Nine - Working with Styles 01:00:00 Module Ten - Formatting the Page 01:00:00 Module Eleven - Sharing Your Document 01:00:00 Module Twelve - Wrapping Up 00:30:00 Microsoft Office Powerpoint Module One - Getting Started FREE 00:30:00 Module Two - Opening PowerPoint FREE 01:00:00 Module Three - Working with the Interface 01:00:00 Module Four - Your First Presentation 01:00:00 Module Five - Working with Text 01:00:00 Module Six - Formatting Text and Paragraphs 01:00:00 Module Seven - Adding Pictures 01:00:00 Module Eight - Advanced Formatting Tasks 01:00:00 Module Nine - Working with Transitions and Animations 01:00:00 Module Ten - Setting Up Your Slide Show 01:00:00 Module Eleven - Showtime! 01:00:00 Module Twelve - Wrapping Up 00:30:00 Microsoft Office Excel Module One - Getting Started FREE 00:30:00 Module Two - Opening Excel FREE 01:00:00 Module Three - Working with the Interface 01:00:00 Module Four - Your First Worksheet 01:00:00 Module Five - Viewing Excel Data 01:00:00 Module Six - Building Formulas 01:00:00 Module Seven - Using Excel Functions 01:00:00 Module Eight - Using Quick Analysis 01:00:00 Module Nine - Formatting Your Data 01:00:00 Module Ten - Using Styles, Themes, and Effects 01:00:00 Module Eleven - Printing and Sharing Your Workbook 01:00:00 Module Twelve - Wrapping Up 01:00:00 Mock Exam Mock Exam- Diploma in Office Admin and Customer Service 00:30:00 Final Exam Final Exam- Diploma in Office Admin and Customer Service 00:30:00