• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4517 Courses delivered Online

Intelligence Analyst Certification

By Online Training Academy

Are you ready to dive into the world of intelligence analysis and make a significant impact in national security and beyond? Our comprehensive Intelligence Analyst Certification is designed to equip you with the essential skills and knowledge needed to excel in this critical field. Key Features: CPD Certified Free Certificate from Reed CIQ Approved Developed by Specialist Lifetime Access In the Intelligence Analyst Certification course, learners delve into the fundamental aspects of intelligence analysis. They start by understanding the essence of intelligence analysis, its historical evolution, and current best practices. The course emphasizes the intelligence cycle, teaching how information is gathered, processed, and disseminated to support decision-making. Participants learn about their roles and responsibilities as analysts, honing critical thinking skills and techniques for organizing information effectively. Legal and ethical considerations in intelligence operations are also covered, ensuring analysts understand boundaries and responsibilities in their work. Lastly, the course explores the broader context of intelligence in national security, highlighting its importance and impact on policies and strategies. Overall, learners gain comprehensive knowledge and skills necessary to perform effectively as intelligence analysts in various professional settings. Course Curriculum Module 01: Introduction to the Course Module 02: Defining Intelligence Analysis Module 03: Development of Intelligence Analysis Module 04: Intelligence Analysis and Best Practice Module 05: The Intelligence Cycle Module 06: Your Role, Responsibilities, and Functions as an Analyst Module 07: Critical Thinking and Structuring Module 08: Legal Issues and Ethics Module 09: Intelligence and National Security Learning Outcomes: Understand the fundamentals of Intelligence Analysis and its historical evolution. Apply critical thinking techniques to structure intelligence reports effectively. Comprehend legal and ethical considerations in the context of intelligence operations. Demonstrate proficiency in the Intelligence Cycle and its application in practice. Identify roles, responsibilities, and functions within the scope of intelligence analysis. Analyse the relationship between intelligence and national security issues. CPD 10 CPD hours / points Accredited by CPD Quality Standards Intelligence Analyst Certification 2:29:21 1: Module 01: Introduction to the Course 01:52 2: Module 02: Defining Intelligence Analysis 17:29 3: Module 03: Development of Intelligence Analysis 18:04 4: Module 04: Intelligence Analysis and Best Practice 25:15 5: Module 05: The Intelligence Cycle 12:19 6: Module 06: Your Role, Responsibilities, and Functions as an Analyst 21:28 7: Module 07: Critical Thinking and Structuring 17:12 8: Module 08: Legal Issues and Ethics 17:40 9: Module 09: Intelligence and National Security 17:02 10: CPD Certificate - Free 01:00 Who is this course for? Individuals aspiring to work in intelligence-related governmental departments. Professionals seeking to enhance their analytical skills in national security contexts. Graduates aiming to start a career in intelligence analysis roles. Military personnel transitioning to civilian intelligence roles. Law enforcement officers interested in intelligence gathering and analysis. Career path Intelligence Analyst Counterintelligence Officer Risk Assessment Analyst Security Intelligence Specialist National Security Analyst Cyber Intelligence Analyst Certificates Digital certificate Digital certificate - Included Reed Courses Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.

Intelligence Analyst Certification
Delivered Online On Demand3 minutes
£12

Financial Crime Prevention Course

3.5(2)

By Elearncollege

Description Financial Crime Prevention Diploma A comprehensive online course designed to equip learners with essential knowledge and insights into the dynamic world of financial crime, its implications, and measures to counteract it. This course aims to ensure that professionals and individuals alike are well-versed in understanding the nuances of the financial crime ecosystem and how to stay ahead of the perpetrators. The course covers a broad spectrum of topics starting with the landscape of financial crime. Learners will gain a thorough understanding of the current financial crime landscape, understanding the factors that drive these activities and how they impact our economy and society. Next, the course delves into the legal framework for financial crime prevention. This segment provides an overview of the legal parameters set for controlling and preventing financial crime. The importance of this framework cannot be overstated, as it lays the foundation for how businesses and professionals navigate the complex realm of financial crime. To further understand the checks and balances in place, the Financial Crime Prevention Diploma elaborates on the role of regulatory bodies in financial crime control. These institutions play a pivotal role in setting standards, enforcing compliance, and ensuring that financial systems remain robust against threats. One cannot discuss financial crime without understanding the role of financial institutions in its prevention. This segment of the course elaborates on the duties, responsibilities, and mechanisms financial institutions employ to detect, report, and prevent fraudulent activities. With the rise of technology, cybercrimes are at an all-time high. Therefore, the course provides a deep insight into technological solutions to financial crime. From sophisticated software to advanced AI-driven systems, learners will understand how technology aids in battling financial crime. Among the various forms of financial crime, money laundering remains one of the most sophisticated and widespread. The Financial Crime Prevention Diploma comprehensively tackles money laundering and its countermeasures, giving learners the tools to identify and combat such activities. Similarly, terrorism financing poses a significant threat to global security. This course provides an exhaustive understanding of its mechanisms and the countermeasures set in place to deter such activities. Equally important, tax evasion is addressed in detail, highlighting its consequences and the countermeasures businesses and professionals can employ. Cybercrime is another domain that the course delves into with precision. As digital platforms become integral to our daily lives, understanding cybercrimes and their countermeasures is paramount to ensuring the safety and security of our financial systems. Lastly, the course discusses the future of financial crime prevention. Given the ever-evolving nature of financial crimes, understanding its future trajectory is crucial for staying ahead and being prepared. In conclusion, the Financial Crime Prevention Diploma is a meticulously designed online course that ensures a holistic understanding of financial crime and its prevention. Whether you're a professional in the finance sector or an individual seeking to broaden your knowledge, this course is an invaluable asset in navigating the complex world of financial crime prevention. What you will learn 1:The Landscape of Financial Crime 2:The Legal Framework for Financial Crime Prevention 3:Regulatory Bodies and Financial Crime Control 4:The Role of Financial Institutions in Preventing Financial Crime 5:Technological Solutions to Financial Crime 6:Money Laundering and Counter Measures 7:Financing of Terrorism and Counter Measures 8:Tax Evasion and Counter Measures 9:Cybercrime and Counter Measures 10:The Future of Financial Crime Prevention Course Outcomes After completing the course, you will receive a diploma certificate and an academic transcript from Elearn college. Assessment Each unit concludes with a multiple-choice examination. This exercise will help you recall the major aspects covered in the unit and help you ensure that you have not missed anything important in the unit. The results are readily available, which will help you see your mistakes and look at the topic once again. If the result is satisfactory, it is a green light for you to proceed to the next chapter. Accreditation Elearn College is a registered Ed-tech company under the UK Register of Learning( Ref No:10062668). After completing a course, you will be able to download the certificate and the transcript of the course from the website. For the learners who require a hard copy of the certificate and transcript, we will post it for them for an additional charge.

Financial Crime Prevention Course
Delivered Online On Demand9 days
£99

Linux PAM Security Administration

By Packt

This course will help you understand the importance of Linux PAM (Pluggable Authentication Module) and its configuration file, module interface, control flags, and modules. You will also discover PAM-aware services and stacks and learn how to verify if a service or program is linked with PAM. No prior knowledge of Linux is required to take this course.

Linux PAM Security Administration
Delivered Online On Demand1 hour 52 minutes
£22.99

Safety, Security & Situational Awareness For Everyone

By Stirling Defence

Safety, Security & Situational Awareness For Everyone The S3AFE™ Skills Program covers the fundamentals of situational awareness, demonstrates how to translate human behaviour, recognise observable indicators, both verbal and non-verbal and communicate or act in a way that will pre-empt violence. Course curriculum 1 Welcome & Administration How to navigate the learning platform Enrollment Process Trouble Shooting Student booklet - Note: Please download it and use it to take notes and follow the course. 2 Physiological Effects Lesson 1 - Introduction to S3AFE ACT Video Lesson 2 - Maslow & the Left of bang model Lesson 3 - Principles of Real-time Behaviour Lesson 4 - The Predator Mindset Lesson 5 - Dynamics of the brain in times of Stress or Under Threat Test 1 - Physiological Effects 3 Non-Verbal Communication Lesson 6 - Kinesics.pdf Behavioural analysis Lesson 7 - Pacifying behaviour Lesson 8 - Behavioural Indicators Handout 1 - Kinesic Cues Test 2 - Non-verbal Communication 4 Proxemics & Atmospherics Lesson 9 - Introduction to Proxemics Lesson 10 - Proxemics, distance and threat Lesson 11 - Being MADE Lesson 12 - Introduction to Atmospherics Lesson 13 - What atmospherics tell us Test 3 - Proxemics & Atmospherics 5situatiionalSafety & Security Lesson 14 - Colour Codes of Awareness.pdf Handout 2 - Colour Codes of Awareness Lesson 15 - Colour Coded Risk Evaluation.pdf Handout 3 - Risk Evaluation Guide Handout 4 - Recommended Reading List Final Assessment Training and Evaluation Feedback Form

Safety, Security & Situational Awareness For Everyone
Delivered Online On Demand
£95

Certified Incident Handling Engineer (CIHE) - Complete Video Training

4.3(43)

By John Academy

Description: This Certified Incident Handling Engineer (CIHE) - Complete Video Training covers everything you need to know about becoming a Certified Incident Handling Engineer. In this course, you will learn about threats, vulnerabilities and exploits, IH preparation, request trackers for incident handling, preliminary responses, identification and initial responses, Sysinternals, containment, eradication, follow-up, recovery, virtualization security, and malware incident handling. In this in-depth training, you will learn step-by-step approaches used by hackers globally, the latest attack vectors and how to safeguard against them, Incident Handling procedures (including developing the process from start to finish and establishing your Incident Handling team), strategies for each type of attack, recovering from attacks and much more. With the help of this course will be able to confidently undertake the CIHE certification examination (recommended). You will enjoy an in-depth course that is continuously updated to maintain and incorporate the ever-changing security world. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Incident Handling Engineer (CIHE) - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Incident Handling Engineer (CIHE) - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Introduction Introduction FREE 00:09:00 Threats, Vulnerabilities and Exploits Threats, Vulnerabilities and Exploits 00:48:00 IH Preparation IH Preparation 00:45:00 Request Tracker for Incident Handling Request Tracker for Incident Handling 00:12:00 Preliminary Response Preliminary Response 00:30:00 Identification and Initial Response Identification and Initial Response 00:12:00 Sysinternals Sysinternals 00:13:00 Containment Containment 00:16:00 Eradication Eradication 00:29:00 Follow-up Follow-up 00:12:00 Recovery Recovery 00:16:00 Virtualization Security Virtualization Security 00:13:00 Malware Incident Handling Malware Incident Handling 01:14:00 Mock Exam Mock Exam- Certified Incident Handling Engineer (CIHE) - Complete Video Training 00:20:00 Final Exam Final Exam- Certified Incident Handling Engineer (CIHE) - Complete Video Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Incident Handling Engineer (CIHE) - Complete Video Training
Delivered Online On Demand6 hours 9 minutes
£23

LINX 3 training course description A detailed study of BGP, from the basics of how it works through to advanced issues such as route reflectors, policy, filtering, route selection and routing registries. The course culminates with a study of an industrial strength BGP template illustrating important issues such as bogon filtering. Practical hands on with routers follow the major sessions to reinforce the theory. A multiple choice exam, leading to the LAIT III certification, is available after the course. The exam consists of 60 questions and lasts 2 hours. What will you learn Connect enterprises to the Internet, and ISPs to each other. Describe how BGP works. List, describe and configure the main BGP attributes. Implement and troubleshoot BGP. Work with route aggregation and calculate CIDR prefixes in seconds. Influence traffic paths with BGP. LINX 3 training course details Who will benefit: Network engineers. Prerequisites: LAIT I and II OR CCNP and take LAIT I and LAIT II exams whilst on this course. Duration 5 days LINX 3 training course contents Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. The Internet and peering ASs, AS numbers, Internet structure, ISP types, ISP network design, IXs, peering vs. transit, public/ private peering, bi/multi-lateral peering. Hands on AS information gathering. How BGP works Incremental updates, Path vector protocols, BGP protocol stack, the BGP header, message types, NLRI, withdrawn routes, route refresh, route dampening. Hands on More troubleshooting, packet analysis. MBGP and IPv6 Multiprotocol routing, AFI, SAFI, MBGP and multicasts, IPv6, MPLS VPNs. Hands on IPv6 BGPv4 aggregation CIDR, benefits, techniques, shortcuts, configuring BGP aggregation, leaking routes. Hands on Reducing routing table size. BGP path selection BGP attributes, attribute types, route selection order, Local preference, AS prepend, MEDs. Hands on Influencing traffic with BGP. BGP routing policies What is policy? Examples, route filtering, AS filtering, REs, applying preference selectively, peer groups. Hands on Sophisticated policies. RIPE and routing registries RIRs, Allocations, assignments, PI vs. PA. Objects, RPSL, routing registry, Hands on The RIPE database. Automating BGP configuration Automation tools, whois, IRRToolSet, Bogon lists, tracking bogon lists, HTTP, Peering, routing registries, DNS. Communities What is a community? Community names, communities for: peer types and geography. RFC 1998, default communities. Hands on Setting local preference on other routers. Route servers What are route servers? LINX route servers, route server policy control, What are route collectors, Looking glasses. Hands on Setting up and working with a route server. Peer relationships IBGP, EBGP, next hop self, advertising routes into/out of BGP, synchronisation. Hands on IBGP, troubleshooting a large BGP network. Route reflectors and confederations Full mesh IBGP, Route reflectors, RR configuration and design, confederations, migration issues. Hands on RR configuration. BGP architectures Stub vs. transit AS, when to use BGP, multihoming strategies and issues, default routes. Multihop EBGP, load balancing. Hands on Multihoming. BGP security RFC 7454, security steps, BGP TTL security, filters, RPKI, ROAs, rsync, rrdp, validators. A secure BGP template. Hands on RPKI prefix validation.

LINX 3
Delivered in Internationally or OnlineFlexible Dates
£2,797

Securing an Ubuntu Linux Server against Hackers Masterclass

4.5(3)

By Studyhub UK

Discover the vital techniques to fortify your Ubuntu Linux server against potential security threats and hackers with this comprehensive masterclass. Explore a step-by-step journey through essential security measures and configurations to safeguard your server. From password management and user privileges to SSH setup, firewall installation, and time synchronization, this course equips you with the skills needed to bolster your server's defenses. Gain insights into fail2ban installation, DDOS attack prevention, and system time synchronization. By mastering these techniques, you'll be prepared to maintain a robust and secure Ubuntu Linux server environment. Learning Outcomes: Understand the importance of securing an Ubuntu Linux server against hackers. Learn to choose a server host, access the server, and manage users. Implement SSH security measures including key-based logins and port change. Set up firewall protection with UFW to mitigate potential attacks. Configure time synchronization and system time accuracy using ntp. Explore the significance of fail2ban and its role in blocking IP addresses. Discover preventive measures against DDOS attacks through UFW. Gain practical insights into server maintenance and troubleshooting. Why buy this Securing an Ubuntu Linux Server against Hackers Masterclass?  Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Securing an Ubuntu Linux Server against Hackers Masterclass you will be able to take the MCQ test that will assess your knowledge. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Securing an Ubuntu Linux Server against Hackers Masterclass course is ideal for System administrators and IT professionals responsible for server security. Linux enthusiasts seeking to enhance their Ubuntu server security skills. Individuals interested in learning practical techniques to secure their servers. Anyone aiming to improve their knowledge of Linux server security. Prerequisites This Securing an Ubuntu Linux Server against Hackers Masterclass was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Junior Linux Administrator - Average Earnings: £25,000 - £35,000 per year. Linux System Administrator - Average Earnings: £35,000 - £50,000 per year. Senior Linux Administrator - Average Earnings: £45,000 - £65,000 per year. IT Security Specialist - Average Earnings: £40,000 - £60,000 per year. DevOps Engineer - Average Earnings: £45,000 - £70,000 per year. Course Curriculum Secure an Ubuntu Linux Server against Hackers Module 01: Secure an Ubuntu Linux Server from Hackers Today 00:09:00 Module 02: Choosing a server host and setup 00:03:00 Module 03: Accessing the Ubuntu Linux server with putty 00:03:00 Module 04: How to download Putty for Windows 00:01:00 Module 05: Using a password manager like LastPass 00:03:00 Module 06: Changing the password with passwd 00:02:00 Module 07: Adding a new user with adduser 00:03:00 Module 08: Signing in with the added user 00:01:00 Module 09: Usermod to give the user sudo or root privileges 00:01:00 Module 10: Verify sudo access on user 00:01:00 Module 11: Key basic Linux commands cd pwd and ls 00:04:00 Module 12: Updating with apt get update 00:01:00 Module 13: Installing nano text editor 00:01:00 Module 14: Updating sshd config with nano to Permit Root Login no 00:09:00 Module 15: Changing the SSH port from 22 to another number 00:04:00 Module 16: Setting up RSA login by generating keys with puttygen 00:11:00 Module 17: Disabling password logins and ipv6 listening 00:02:00 Module 18: Locked out of server and have to start over! 00:02:00 Module 19: Back in with a fresh install! 00:02:00 Module 20: Installing fail2ban to block IPs from repeated failed logins 00:07:00 Module 21: Install UFW or Uniform Fire Wall to block some DDOS attacks 00:03:00 Module 22: Install and configure ntp to sync time 00:05:00 Module 23: Thank you very much for watching this complete Ubuntu Linux server 00:05:00 Module 24: Steem witness setup downloading blocks 00:03:00 Module 25: Steem witness setup finishing adding a new user 00:01:00 Module 26: Steem witness setup installing steem docker 00:04:00 Assignment Assignment - Securing an Ubuntu Linux Server against Hackers Masterclass 00:00:00

Securing an Ubuntu Linux Server against Hackers Masterclass
Delivered Online On Demand1 hour 31 minutes
£10.99

Network management technologies

5.0(3)

By Systems & Network Training

Network management technologies course description A comprehensive tour of the available network management technologies available for todays networks. The course starts with basic tools such as syslog along with Python network automation. SNMP is then covered with the *flow technologies and streaming telemetry. Configuration management with ansible, Python, NETCONF and RESTCONF is then studied. The final part of the course looks at SDN. Hands on sessions are used throughout to reinforce the theory rather than teach specific manufacturer equipment. Note that sections are available as individual courses. What will you learn Evaluate network management technologies. Evaluate network management technologies. Recognise the weaknesses of SNMP versus NETCONF and streaming telemetry. Explain the role of NETCONF and RESTCONF. Compare & contrast *flow and streaming telemetry. Explain the role of SDN in network management. Automate network configuration with ansible and Python. Network management technologies course details Who will benefit: Those wishing to manage networks. (Previous Python experience is NOT needed) Prerequisites: Intro to data comms Duration 5 days Network management technologies course content Basic network management Network management What is network management? Benefits, issues. FCAPS model. Fault management, Configuration management, accounting, performance, security. What to manage, what not to manage. Managing network devices, managing servers. Monitoring networks Traditional network tools Ping..., SSH, syslog, TFTP for configurations. nmap. Wireshark. CLI. Web based management. Splunk. Nessus, snort, Kali. Hands on syslog, network inventories. Network automation using the CLI Programming and automating networks, netOps. Python, Git. Python network modules, SSH, paramiko, netmiko. EVE-NG. Hands onPython network modules. Structured versus unstructured data Problems with automation and unstructured data. XML, JSON, YAML. The role of YANG. Hands on Parsing data. SNMP SNMP architecture, SNMP MIBs, SMI, the SNMP protocol, polling security. Configuring SNMP. SNMPv1, v2, v3, SNMP security. Which version should you use? MIBs and MIB structure. mib-2, extra parts of mib-2, Private enterprise MIBs. Summary: What SNMP is good/bad at. Hands on Configuring agents and a NMS. MIB browsing. Server management Microsoft, Linux, application polling. WMI vs SNMP. Hands on: Application polling. Performance management *flow Polling, push vs pull, netflow, sflow, IPFIX, *flow. Flows. Where to monitor traffic. Comparing *flow with SNMP. Architecture: Generators and collectors. When flows are exported. NetFlow reporting products. SolarWinds. Hands on Netflow configuration. Collectors. Streaming telemetry Model driven telemetry, periodic/on change. Structured data. Telemetry protocol stack. gRPC and gNMI. Protobuf. gNMI operations. Telemetry architecture. Telegraf, databases, Grafana. Hands on Telemetry example. Configuration management Configuration management tools Chef, puppet, ansible, saltstack. Ansible architecture, controlling machines, nodes, agentless, SSH, modules. Inventories, playbooks, modules, network modules, jinja2 templates. Hands on Network configuration with ansible. NETCONF What is NETCONF? Protocol stack, Data stores, traffic flows, validating configurations, rollback. YANG data models and how YANG is used by NETCONF. XML. Explorers and other tools. Hands on anx, Python and NETCONF. RESTCONF The REST API, HTTP, What is RESTCONF? Tools including Postman. Comparison with NETCONF. Hands on Configuration with RESTCONF. Python network automation: configuration SSH issues. Using structured data. Jinja2. ncclient, requests, NAPALM, Nornir. Automated testing. Hands on Python network device configuration with nornir. Software Defined Networks and orchestration Classic SDN What is SDN? benefits. SDN architecture. SDN applications, SDN switches, SDN controllers, Network Operating Systems. Control plane, data plane. Northbound interfaces. SDN components. Southbound interfaces. OpenFlow. ONF, OpenFlow ports, Flow tables. Network virtualization Virtual networks, virtual switches, NfV. Service chaining. NfV and SDN. SDN implementations Classic SDN, Hybrid SDN, SDN via APIs, SDN via overlays. Data centre SDN, VXLAN, Service Provider SDN, SD WAN, Enterprise SDN, WiFi. SDN and open source OpenDaylight, OpenVSwitch, Open Networking Forum, Open Network Operating System. Hands onOpenStack. SD-WAN What is SD-WAN? Architecture: Edge, gateway, orchestrator, controller. Overlay and underlay. Use of MPLS, 4G/5G. Benefits and features. Secure Access Service Edge (SASE).

Network management technologies
Delivered in Internationally or OnlineFlexible Dates
£3,697

CompTIA Linux+ Certification - Complete Video Course

4.3(43)

By John Academy

Description Linux has grown into an industry-leading software and service delivery platform that is used for everything from super computers and Web servers to virtualized systems and your Android phone. This growth creates a high demand for qualified Linux professionals. This CompTIA Linux+ Certification - Complete Video Course is designed to prepare you for the CompTIA Linux+ certification exam. It will provide you a comprehensive look at common tasks performed by system administrators. This includes installation, Management of Linux systems from the command line and the GUI, user administration, file permissions, customization, software configuration, Management of Linux-based clients, troubleshooting, and much more. Expanded coverage of networking and security are covered, which is in step with the CompTIA exam objectives. With this course, you'll acquire the fundamental skills and knowledge you need to successfully configure, manage and troubleshoot Linux systems. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our CompTIA Linux+ Certification - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Installation Linux Introduction FREE 00:25:00 Pre-installation Tasks 00:09:00 Linux Installation 00:18:00 Using Linux Graphical User Interfaces 00:26:00 Command Line Linux 00:56:00 File and Directory Management Directory Organization 00:33:00 File Management 00:58:00 Removable Storage 00:19:00 System Administration Users and Groups 00:57:00 File and Directory Permissions 00:53:00 User Environment Configuration 00:29:00 GUI Configuration 00:18:00 Application Management Packages and Package Managers 00:30:00 Source Code Software 00:20:00 System Configuration Disk Management 00:46:00 File System Management 00:29:00 Device Management 00:13:00 Process and Module Management Process Management 00:35:00 Process Priority and Execution 00:12:00 Kernel Modules 00:24:00 System Maintenance Backup and Restore 00:38:00 Scheduling Tasks 00:14:00 Performance Monitoring 00:26:00 Logging 00:39:00 Networking Networking Basics 00:58:00 Network Services 00:36:00 Domain Name Services 00:29:00 File Sharing and Printing Network File Resources 00:25:00 Printing 00:16:00 Interoperability Network Interoperability 00:18:00 Remote Desktop Access 00:08:00 Security System Security 00:23:00 Network Security 00:32:00 Web Environment Web Services 00:43:00 MySQL Services 00:13:00 FTP and Email Services FTP Services 00:36:00 Mail Services 00:05:00 Troubleshooting and Maintenance Booting Linux 00:28:00 Network Troubleshooting 00:11:00 Scripting Basics 00:08:00 Mock Exam Mock Exam- CompTIA Linux+ Certification - Complete Video Course 00:20:00 Final Exam Final Exam- CompTIA Linux+ Certification - Complete Video Course 00:20:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

CompTIA Linux+ Certification - Complete Video Course
Delivered Online On Demand19 hours 16 minutes
£23.99

Close Protection QLS Training

By Imperial Academy

Level 3 Diploma(FREE QLS Endorsed Certificate)| 11 CPD Courses+11 PDF Certificates| 155 CPD Points|CPD & CiQ Accredited

Close Protection QLS Training
Delivered Online On Demand
£129