• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

283 Courses delivered Online

CompTIA Security+ (SY0-501): Complete Course and Practice Exam

By Packt

CompTIA Security+ Bootcamp: Your preparation course for the most popular cyber security certification in the world!

CompTIA Security+ (SY0-501): Complete Course and Practice Exam
Delivered Online On Demand15 hours 10 minutes
£53.99

Security Management Level 1 Diploma

5.0(1)

By Empower UK Employment Training

Step into the realm of Security Management with our comprehensive course. Master risk analysis, physical and information security, legal frameworks, and the use of technology in security. Elevate your skills for a robust career in security management.

Security Management Level 1 Diploma
Delivered Online On Demand1 hour 30 minutes
£5

Close Protection and Security Guard - QLS Endorsed Certificate

By Imperial Academy

Level 3 & 4 QLS Endorsed Diploma | QLS Hard Copy Certificate Included | 5 CPD Courses | Lifetime Access

Close Protection and Security Guard - QLS Endorsed Certificate
Delivered Online On Demand
£300

Cisco NSO Administration and DevOps v4.0 (NSO303)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for DevOps engineers Integration engineers Network and software architects Network engineers Software engineers System administrators Overview After completing this course, you should be able to: Describe network and IT convergence Describe Cisco NSO architecture Describe Linux Configure Cisco NSO Set up access control to Cisco NSO system Describe Cisco NSO Integration Options Explain version control systems and basic git concepts Describe the purpose of continuous integration and continuous delivery Implement Cisco NSO high availability Describe scalable system management Describe software development methodologies Describe service maintenance Perform NED upgrades Use Cisco NSO for managing services and their associated device configurations Describe Cisco NSO change management Explain service problem management Use Cisco NSO for service monitoring and compliance reporting Describe Cisco NSO inventory management Describe Cisco NSO use cases The Cisco Network Services Orchestrator (NSO) Administration and DevOps (NSO303) v4.0 course continues the learning journey of the NSO Essentials for Programmers and Network Architects (NSO201) v4.0 and NSO Advanced for Python Programmers (NSO300) v4.0 courses by introducing you to the system administration and DevOps focusing on NSO; the robust bridge linking network automation and orchestration tools, examining the development, operation, and administration task functions. You will learn how to set up, configure, deploy, and maintain a Cisco Network Services Orchestrator solution, and learn best practices for using DevOps. The examples shown in this course demonstrate real-world scenarios to prepare you for deployment and management of new or existing NSO instances. The course guides you through the setup of a production ready NSO instances using system installation with access control settings, the deployment of NSO in Docker containers, and introduces modern DevOps concepts and tools such as Git and Continuous Delivery/Continuous Deployment (CI/CD). You will learn how to migrate CDM devices, how to build NETCONF NEDs from the NSO CLI, how to handle NSO Alarms, and many more features that benefit you in your journey with Cisco NSO. Course Outline Introducing Network and IT Convergence Introducing Cisco NSO Architecture Introducing Linux Explaining Cisco NSO Setup Exploring Access Control Describing Integration Options Explaining Version Control System Describing Continuous Integration and Continuous Delivery Introducing Scalability and High Availability Describing Scalable System Management Describing Software Development Methodologies Introducing Service Maintenance Performing Network Element Driver (NED) Upgrades Introducing Configuration Management Describing Change Management Explaining Service Problem Management Explaining Service Monitoring and Compliance Reporting Introducing Inventory Management Describing Cisco NSO Use Cases

Cisco NSO Administration and DevOps v4.0 (NSO303)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Networks with Cisco Firepower Next-Generation IPS v4.0 (SSFIPS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy and manage a Cisco Firepower NGIPS in their network environment. Security administrators Security consultants Network administrators System engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe the components of Cisco Firepower Threat Defense and the managed device registration process Detail Next-Generation Firewalls (NGFW) traffic control and configure the Cisco Firepower system for network discovery Implement access control policies and describe access control policy advanced features Configure security intelligences features and the Advanced Malware Protection (AMP) for Networks implementation procedure for file control and advanced malware protection Implement and manage intrusion and network analysis policies for NGIPS inspection Describe and demonstrate the detailed analysis techniques and reporting features provided by the Cisco Firepower Management Center Integrate the Cisco Firepower Management Center with an external logging destination Describe and demonstrate the external alerting options available to Cisco Firepower Management Center and configure a correlation policy Describe key Cisco Firepower Management Center software update and user account management features Identify commonly misconfigured settings within the Cisco Firepower Management Center and use basic commands to troubleshoot a Cisco Firepower Threat Defense device This course shows you how to deploy and use Cisco Firepower© Next-Generation Intrusion Prevention System (NGIPS). This hands-on course gives you the knowledge and skills to use the platform features and includes firewall security concepts, platform architecture and key features; in-depth event analysis including detection of network-based malware and file type, NGIPS tuning and configuration including application control, security intelligence, firewall, and network-based malware and file controls; Snort© rules language; file and malware inspection, security intelligence, and network analysis policy configuration designed to detect traffic patterns; configuration and deployment of correlation policies to take action based on events detected; troubleshooting; system and user administration tasks, and more. This course helps you prepare to take the exam, Securing Networks with Cisco Firepower (300-710 SNCF), which leads to CCNP Security and Cisco Certified Specialist ? Network Security Firepower certifications. The 300-710 SNCF exam has a second preparation course as well, Cisco© Securing Networks with Cisco© Firepower Next Generation Firewall (SSNGFW). You can take these courses in any order. Course Outline Cisco Firepower Threat Defense Overview Cisco Firepower NGFW Device Configuration Cisco Firepower NGFW Traffic Control Cisco Firepower Discovery Implementing Access Control Policies Security Intelligence File Control and Advanced Malware Protection Next-Generation Intrusion Prevention Systems Network Analysis Policies Detailed Analysis Techniques Cisco Firepower Platform Integration Alerting and Correlation Policies Performing System Administration Troubleshooting Cisco Firepower

Cisco Securing Networks with Cisco Firepower Next-Generation IPS v4.0 (SSFIPS)
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Oracle Database Security Ed 1

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for Administrator, Database Administrator, End User, Network Administrator, and Systems Administrator. Overview Upon completion of this course, students will be able to Describe and determine database security requirements, Understand Oracle security solutions to help meet security requirements, Implement basic database security, Configure network security, and Discover basic security configuration issues. This Introduction to Oracle Database Security Ed 1 training teaches you how to use Oracle Database features to help meet the security, privacy and compliance requirements of your organization. Introduction Course Objectives Course Schedule Detective Security Controls Preventive Security Controls Your Learning Aids Basic Workshop Architecture Understanding Security Requirements Fundamental Data Security Requirements Security Risks Techniques to Enforce Security Choosing Security Solutions Database Access Control: Authentication Protecting Against Database Bypass with Encryption Protecting Sensitive Data Protecting against Application Bypass Detecting Threats Compliance Implementing Basic Database Security Database Security Checklist Reducing Administrative Effort Principle of Least Privilege Objects Protection Configuring Network Security Network Access Control Listener Security Listener Usage Control Manage fine-grained access to external network services Discovering Basic Configuration Issues Accessing Enterprise Manager Security Reports Using Various Security Reports

Introduction to Oracle Database Security Ed 1
Delivered OnlineFlexible Dates
Price on Enquiry

TW108G IBM Security Verify Access Foundations

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for system administrators and implementors interested in learning IBM Security Verify Access. Overview Describe IBM Security Verify Access product and its key features Discuss the architecture and deployment process Configure IBM Security Verify Access users, groups, and domains Introduce concepts of a reverse proxy and how it fits in your web-based infrastructure Describe protected object space and the policy access control model Explain how to set up reverse proxy junctions to handle web requests Discuss and configure authentication mechanisms that are supported by Verify Access Explain and set up logging, auditing, and tracing for Verify Access components IBM Security Verify Access helps you simplify your users' access while more securely adopting web, mobile, IoT, and cloud technologies. It can be deployed on premises, in a virtual or hardware appliance, or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization's migration to identity as a service (IDaaS) at a comfortable pace. Using the skills taught in this course, you learn how to run Verify Access via Docker, configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests. Hands-on exercises reinforce the skills learned. Unit 1 Introduction to IBM Security Verify Access Unit 2 Architecture and deployment Unit 3 Managing users, groups, and domains Unit 4 Reverse Proxy (WebSEAL) concepts Unit 5 Managing access control Unit 6 Configuring junctions for back-end resources Unit 7 Authentication framework and methods Unit 8 Logging, auditing, and tracing Additional course details: Nexus Humans TW108G IBM Security Verify Access Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TW108G IBM Security Verify Access Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

TW108G IBM Security Verify Access Foundations
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle 19c SQL Programming Fundamentals (TTOR11019)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is appropriate for anyone needing to interface with an Oracle database or those needing a general understanding of Oracle database functionality. That would include end users, business analysts, application developers and database administrators. Overview Working in a hands-on learning environment led by our expert pracitioner you'll learn how to: Add Data, Retrieve, Sort and Organize a SQL Database Combine Data, Set Operators and Subqueries Manipulate Data and Data Definition Languages in SQL Work with Data Dictionary Views and Create Sequences, Indexes and Views Use Database Objects and Subqueries Perform Data and access control Perform other Advanced Level Database operations. Oracle 19C SQL Programming Fundamentals Is a three-day, hands-on course designed to equip you with the fundamental skills needed to set up, run and manage SQL databases using Oracle Database Technology. You will also be discovering all the tools and concepts required to organize data efficiently. Our engaging instructors and mentors are highly-experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working within in a hands-on learning environment, guided by our expert team, attendees will develop a practical approach to Oracle Database Technology. Throughout the course, you will learn the key elements of a database, and the way Oracle systems facilitate their induction in the system. You?ll also learn the tools and strategies you can implement to store, retrieve, compare and organize data according to your requirements. You?ll also explore the process of creating simple to complex reports from existing data. By the end of this course, you will also have hands-on knowledge of SQL systems that are required to proceed to other advanced to professional programs. Adding Data, Retrieving, Sorting and Organizing a SQL Database The building blocks of a database. How to add data to the database. The process of retrieving data using SQL functions. Multiple methods of sorting and organizing data. Using SQL functions to get the required simple to complex output. Various strategies for using functions and conditions to organize data. Combining Data, Set Operators And Subqueries Consolidating data using multiple functions and group operators. Fetching intelligent data reports using simple functions. Fetching data from multiple sources in the tables. Using Subqueries to compile data as required. Using Set operators to create smart data reports. Data Manipulation and Data Definition Languages in SQL Describing and managing data transaction using Data Definition Language. Categorize and review data tables using Data Definition Language. Data Dictionary Views and Creating Sequences, Indexes and Views How to manage and query Data Dictionary Views. The process of creating and using Sequences. How to create various types of Synonyms and Indexes. Creating simple and complex views and retrieving data. Understanding and using Database Objects and Subqueries Core concept and application of Schema Objects. Fetching required data with Subqueries. Using Subqueries to organize Data in SQL. Data and access control Assigning and revoking data access. Managing data access control according to user levels. Performing Advanced Level Database operations. Using advanced functions and performing data queries. Creating and managing time zone-based databases.

Oracle 19c SQL Programming Fundamentals (TTOR11019)
Delivered OnlineFlexible Dates
Price on Enquiry

CCTA Check Point Troubleshooting Administration

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for security administrators and Check Point resellers who need to manage and monitor issues that may occur within their Security Management environment. Overview Understand how to use Check Point resources for support. Understand how to perform packet captures using tcmdump and FW Monitor command tools. Understand the basic process of kernel debugging, and how debug commands are structured. Recognize how to use various Linux commands for troubleshooting system issues. Recognize communication issues that may occur between SmartConsole and the SMS and how to resolve them. Understand how to troubleshoot SmartConsole login and authentication issues. Understand how to prevent and resolve licensing and contract issues. Understand how to troubleshoot issues that may occur during policy installation. Understand communication issues that may occur when collecting logs and how to resolve them. Recall various tools to use when analyzing issues with logs. Understand how to restore interrupted communications during heavy logging. Understand how NAT works and how to troubleshoot issues. Understand Client Side and Server Side NAT. Understand how the Access Control Policy functions and how the access control applications work together. Understand how to troubleshoot issues that may occur with Application Control and URL Filtering. Understand how the HTTPS Inspection process works and how to resolve issues that may occur during the process. Understand how to troubleshoot Content Awareness issues. Recognize how to troubleshoot VPN-related issues. Understand how to monitor cluster status and work with critical devices. Recognize how to troubleshoot State Synchronization. Understand how to troubleshoot communication issues between Identity Sources and Security Gateways. Understand how to troubleshoot and debug issues with internal Identity Awareness processes. The goal of this course is to provide an understanding of the concepts and skills necessary to troubleshoot issues which may occur when managing the Check Point Security Management architecture and Security Gateways. Course Outline An Introduction to Troubleshooting SmartConsole and Policy Management Troubleshooting Monitoring Logging Activity Troubleshooting Issues with NAT Understanding the Unified Access Control Policy Basic VPN Troubleshooting Monitoring ClusterXL Connections Understanding Identity Awareness Additional course details: Nexus Humans CCTA Check Point Troubleshooting Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCTA Check Point Troubleshooting Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCTA Check Point Troubleshooting Administration
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Certified Cloud Practitioner CLF-C01: Exam and Beyond

By Packt

In this course, you will learn everything a candidate needs to excel in the AWS Certificate Practitioner exam CLF-C01 . This course contains a practice test along with the solutions to make sure how to clear the exam by analyzing each of the options and putting your knowledge into practice.

AWS Certified Cloud Practitioner CLF-C01: Exam and Beyond
Delivered Online On Demand13 hours 34 minutes
£67.99