• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

286 Encryption courses delivered Online

55316 Administering a SQL Database

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is individuals who administer and maintain SQL Server databases. These individuals perform database administration and maintenance as their primary area of responsibility, or work in environments where databases play a key role in their primary job. The secondary audiences for this course are individuals who develop applications that deliver content from SQL Server databases. Overview After completing this course, you will be able to: Authenticate and authorize users Assign server and database roles Authorize users to access resources Use encryption and auditing features to protect data Describe recovery models and backup strategies Backup and Restore SQL Server databases Automate database management Configure security for the SQL Server agent Manage alerts and notifications Managing SQL Server using PowerShell Trace access to SQL Server Monitor a SQL Server infrastructure Troubleshoot a SQL Server infrastructure Import and export data This course will provide training in how to administer and maintain SQL Server, Azure SQL Database and other cloud-based SQL Server databases. IT professionals who work in environments where databases play a key role in their job will find this material useful. By using demonstrations and hands-on lab exercises, students will learn to carry out these important tasks. This course covers content that was in retired Microsoft Course 20764: Administering a SQL Database Infrastructure. 1 - Creating advanced functions Lesson 1: Converting a command into an advanced function Lesson 2: Creating a script module Lesson 3: Defining parameter attributes and input validation Lesson 4: Writing functions that accept pipeline input Lesson 5: Producing complex pipeline output Lesson 6: Using comment-based Help Lesson 7: Using Whatif and Confirm parameters 2 - Using Microsoft .NET Framework and REST API in Windows PowerShell Lesson 1: Using .NET Framework in PowerShell Lesson 2: Using REST API in PowerShell 3 - Writing controller scripts Lesson 1: Understanding controller scripts Lesson 2: Writing controller scripts with a user interface Lesson 3: Writing controller scripts that create reports 4 - Handling script errors Lesson 1: Understanding error handling Lesson 2: Handling errors in a script 5 - Using XML, JSON, and custom-formatted data Lesson 1: Working with XML formatted data Lesson 2: Working with JSON formatted data Lesson 3: Working with custom-formatted data 6 - Enhancing server management with Desired State Configuration and Just Enough Administration Lesson 1: Implementing Desired State Configuration Lesson 2: Implementing Just Enough Administration 7 - Analyzing and debugging scripts Lesson 1: Debugging in Windows PowerShell Lesson 2: Analyzing and debugging an existing script 8 - Understanding Windows PowerShell Workflow Lesson 1: Understanding Windows PowerShell Workflows Lesson 2: Running Windows PowerShell Workflows

55316 Administering a SQL Database
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Virtualization Security Expert (Advanced VMware Security) Training

4.3(43)

By John Academy

Description This Certified Virtualization Security Expert (Advanced VMware Security) Training covers everything you need to know becoming a Certified Virtualization Security Expert. In this course you will learn about routing and the security design of VMware, Remote DataStore security, Penetration Testing 101, information gathering, scanning and enumeration, penetration testing and the tools of the trade, DMZ virtualization and common attack vectors, hardening your ESX server, hardening your ESXi server, hardening your vCenter server, and 3rd party mitigation tools. This Advanced course provides a solid understanding of the various components that make up the VMware vSphere environment. You will have the opportunity to study and understand all aspects of the CIA triad as it pertains to the VMware vSphere infrastructure from the virtual CPU to the storage devices attached to your host and everything in and around that network, including the interconnectivity and design of all those components. So, get this course to learn more. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our Certified Virtualization Security Expert (Advanced VMware Security) Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Primer and Reaffirming Our Knowledge Primer and Reaffirming Our Knowledge FREE 00:25:00 Virtual Ports 00:21:00 Symmetric vs. Asymmetric Encryption 01:07:00 File System Structure 00:13:00 Accounts and Groups 00:35:00 Routing and the Security Design of VMware Routing and the Security Design of Vmware 00:11:00 Virtualization Layer 00:28:00 Memory Virtualization 00:28:00 Major Benefits of Using VLANs 00:13:00 Remote Data Store Security Remote DataStore Security 00:15:00 Fiber Channel Attacks - The Basics 00:22:00 Penetration Testing 101 Penetration Testing 101 00:33:00 The Evolving Threat 00:40:00 Information Gathering, Scanning and Enumeration Information Gathering, Scanning and Enumeration9 00:30:00 FireFox Fully Loaded 00:14:00 Introduction to Port Scanning 00:30:00 UDP Port Scan 00:42:00 Penetration Testing and the Tools of the Trade Penetration Testing and the Tools of the Trade 00:43:00 Windows Password Cracking 00:24:00 VASTO 00:22:00 DMZ Virtualization and Common Attack Vectors DMZ Virtualization and Common Attack Vectors9 00:21:00 Clearly Label Networks for Each Zone within the DMZ 00:22:00 Schmoo Con 2010 Virtualization Vulnerabilities Found! 00:08:00 Hardening Your ESX Server Hardening Your ESX Server 01:03:00 Configuring the ESX ESXi Host 02:19:00 Establish a Password Policy for Local User Accounts 00:21:00 Secure the SNMP Configuration 00:19:00 Hardening Your ESXi Server Hardening Your ESXi Server 00:20:00 Hardening Your vCenter Server Hardening Your vCenter Server 00:17:00 VMware Converter Enterprise 01:10:00 3rd Party Mitigation Tools 3rd Party Mitigation Tools 00:24:00 Mock Exam Mock Exam- Certified Virtualization Security Expert (Advanced VMware Security) Training 00:20:00 Final Exam Final Exam- Certified Virtualization Security Expert (Advanced VMware Security) Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Virtualization Security Expert (Advanced VMware Security) Training
Delivered Online On Demand17 hours
£24

CompTIA A+ 900 Certification - Complete Video Course

4.3(43)

By John Academy

Description: The series CompTIA A+ 900 Certification - Complete Video Course provides an extensive lesson about CompTIA A+ 900 Certification. A+ Certification is one of the leading certificates in the computer industry. It certifies the competency of PC Service Specialists. Sponsored by CompTIA - the Computing Technology Industry Association, and tests, the course is administered by Pearson VUE. The course includes more than 50 lessons related to the Computer industry. The course starts by describing firmware and BIOS configuration options. After that, the course will teach you about the motherboard basics including motherboard sizes, form factors, and AMD CPU socket types. The course also includes topics such as Expansion slots, RAM types and features, install and configure PC expansion cards, install and configure storage device, CPU's and cooling methods and PC connection interfaces. The course will also focus on power supplies, PC connectors, printing technologies, networking tools, etc. In short, the course provides all the necessary information about computer hardware and operating system. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our CompTIA A+ 900 Certification - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Configuring BIOS Firmware FREE 00:07:00 BIOS Configuration Options 00:25:00 Motherboards Motherboard Sizes Form Factors 00:14:00 The Motherboard 00:12:00 AMD CPU Socket Types 00:11:00 Expansion Slots Expansion Cards 00:13:00 Bus Speeds 00:28:00 RAM Types and Features Memory 00:06:00 Types of RAM 00:07:00 Install and Configure PC Expansion Cards Ports 00:11:00 SCSI Connections 00:14:00 Audio Video Connections 00:26:00 Install and Configure Storage Devices Storage Devices 00:17:00 Hard Drives 00:17:00 Media Capacity 00:21:00 CPU's and Cooling Methods CPU Types and Characteristics 00:14:00 PC Connection Interfaces Physical Connections USB 00:11:00 Physical Connections VGA 00:11:00 Wireless Connections Bluetooth 00:06:00 Power Supplies Power Supply Specifications 00:16:00 Custom Computer Specifications What is a Standard Client 00:13:00 Audio Video Editing Workstations 00:08:00 Installing Displays Display Device Types 00:20:00 Backlighting 00:12:00 PC Connectors DVI to HDMI 00:13:00 Installing Peripheral Standard Input Device Types 00:16:00 Expansion Card Types 00:11:00 Multimedia Devices 00:11:00 Installing Multifunction Devices and SOHO Networks SOHO Networks 00:17:00 WPS 00:16:00 Encryption 00:14:00 Printer Technologies Printers 00:02:00 Printer Technologies Topic B Inkjet Printers 00:13:00 Printer Maintenance Technical Printer Components 00:09:00 Local and Network-Based Printers 00:22:00 Networking Network Interface Card Characteristics 00:20:00 Fiber Optic Cables 00:14:00 Properties and Characteristics of TCP/IP TCP IP 00:14:00 IP Address Classes 00:14:00 Addressing Schemes 00:17:00 TCP vs. UDP Ports 00:09:00 LDAP 00:04:00 Wi-Fi Networking Standards and Encryption Types Standards 00:03:00 Install and Configure SOHO Wireless/Wired Router Setting up your Router 00:10:00 Define Appropriate NAT Policies 00:16:00 Architecture and Internet Connection Types LANs 00:08:00 Network Topologies 00:11:00 ISPs 00:06:00 Networking Tools Cable Testers 00:13:00 Laptop Hardware Components Laptops 00:09:00 Laptop Expansion Options 00:10:00 Auto-Switching and Fixed Input Power Supplies 00:09:00 Mobile Devices What is Mobile Technology 00:09:00 Mobile Device Features 00:09:00 Bluetooth Configuration Method 00:08:00 Mobile Device Ports and Accessories Mobile Device Connection Types 00:10:00 Troubleshooting Mobile Devices 00:11:00 Troubleshooting Theory Troubleshooting Theory 00:16:00 Boot to Incorrect Device 00:16:00 PC Indicator Lights 00:10:00 Repair vs. Replace 00:10:00 Troubleshooting RAID Arrays and Hard Drives Drive and Array Troubleshooting Tools 00:06:00 Common RAID Array Issues 00:17:00 Troubleshooting Video Common Video and Display Issues 00:01:00 Troubleshooting Network Issues Common Network Issues 00:12:00 Troubleshooting Printers Common Printer Troubleshooting Tools 00:14:00 Windows Operating Systems Microsoft Windows 00:12:00 Microsoft Windows Features 00:17:00 Other Operating Systems 00:15:00 Installation Types 00:14:00 Customizing System Options 00:19:00 Command Line Tools The Command Prompt 00:12:00 Microsoft Operating System Features and Tools Administrative Tools 00:41:00 Task Manager 00:28:00 Memory Diagnostic Tool 00:46:00 Control Panel Utilities The Control Panel 00:11:00 Internet Options 00:10:00 Types of User Accounts 00:11:00 Computer My Computer 00:13:00 Permissions 00:31:00 System 00:10:00 Windows Networking on Client Desktops Workgroups 00:20:00 Network Connection Types 00:18:00 Preventative Maintenance Data Backup and Restoration 00:11:00 Scheduling Tasks 00:26:00 Features and Functionality of the Mac OS and Linux Operating Systems Patch Management in Mac OS X and Linux 00:09:00 Screen Sharing 00:06:00 Mac OS Multitouch Gestures - Touchscreen 00:09:00 Client Side Virtualization What is Virtualization 00:08:00 Virtual Desktop Infrastructure 00:12:00 Cloud-based Concepts SaaS (Software as Service) 00:09:00 Network Host Properties Server Roles 00:12:00 Mobile Operating Systems Open Source Software 00:03:00 Mobile Device Network and E-mail Mobile Device Hotspot 00:10:00 Security Malware 00:09:00 Social Engineering 00:13:00 Prevention Methods Physical Security 00:14:00 Hard Drive Sanitation 00:14:00 User Education 00:26:00 Windows Security Settings Users and Groups 00:11:00 Security Best Practices Password Best Practices 00:04:00 Securing Mobile Devices Locks 00:07:00 Troubleshooting Common PC Tools Operating System Troubleshooting Tools 00:12:00 Application Errors 00:16:00 Common Network Issues 00:12:00 Common Security Issues 00:10:00 Common PC Security Issues Browser Issues 00:06:00 Common Mobile Operating Systems Troubleshooting Dim Display 00:09:00 No Sound from Speakers 00:07:00 Common Safety Practices Static Electricity 00:14:00 Electrical Hazards 00:12:00 General Power Issues 00:10:00 Hazardous Material Disposal Procedures 00:07:00 Maintenance Tools and Techniques Professional Conduct 00:11:00 Types of Hardware Toolkits 00:11:00 Hard Drive Self-Tests 00:05:00 Computer Component Maintenance Techniques 00:10:00 Privacy and Licensing Concepts Incident Response 00:08:00 Proper Communication and Professionalism 00:07:00 Set Expectations 00:06:00 Mock Exam Mock Exam- CompTIA A+ 900 Certification - Complete Video Course 00:20:00 Final Exam Final Exam- CompTIA A+ 900 Certification - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

CompTIA A+ 900 Certification - Complete Video Course
Delivered Online On Demand26 hours
£24

OTHM Level 7 Diploma in Immersive Software Engineering

By School of Business and Technology London

Getting Started The OTHM Level 7 Diploma in Immersive Software Engineering aims to equip learners with advanced-level knowledge and skills to design, develop, and evaluate immersive software engineering systems. By completing this qualification, learners will acquire the skills to support research and innovation in various domains, such as Web and cloud technologies, Security, Automation, Data analytics, and Project methodologies. The primary objective of this diploma is to develop critical thinking and research skills in learners to identify and address complex problems in the software engineering field. Key Benefits This qualification will bring you many vital benefits, such as; The study program is designed to be both stimulating and challenging, providing learners with a chance to gain essential subject knowledge to help them succeed in further studies or the workforce. The program's content has been updated to match the latest employer and higher education requirements. Assessments evaluate both cognitive and affective skills, along with applied skills. Learners will develop valuable knowledge and academic skills, including active research, effective writing and analysis, creative problem-solving, decision-making, and digital literacy. Key Highlights Are you aspiring to become a Software Developer? Then, the OTHM Level 7 Diploma in Immersive Software Engineering program offered by the School of Business and Technology London is the right solution for you. Remember! The assessment for the qualification is done based on assignments only, and you do not need to worry about writing any exam. With the School of Business and Technology London, you can complete the qualification at your own pace, choosing online or blended learning from the comfort of your home. Learning and pathway materials and study guides developed by our OTHM-approved tutors will be available around the clock in our cutting-edge learning management system. Most importantly, at the School of Business and Technology London, we will provide comprehensive tutor support through our dedicated support desk. If you choose your course with blended learning, you will also enjoy live sessions with an assigned tutor, which you can book at your convenience. Career Pathways The OTHM Level 7 Diploma in Immersive Software Engineering can open many career pathways including, but not limited to: Chief technology officer; Est. Salary £1,41,489 per annum Senior software engineer; Est. Salary £55,913 per annum Junior software engineer; Est. Salary £25,904 per annum Team Leader; Est. salary £27,903 per annum     About Awarding Body OTHM is an established and recognised Awarding Organisation (Certification Body) launched in 2003. OTHM has already made a mark in the UK and global online education scenario by creating and maintaining a user-friendly and skill based learning environment. OTHM has both local and international recognition which aids OTHM graduates to enhance their employability skills as well as allowing them to join degree and/or Master top-up programmes. OTHM qualifications has assembled a reputation for maintaining significant skills in a wide range of job roles and industries which comprises Business Studies, Leadership, Tourism and Hospitality Management, Health and Social Care, Information Technology, Accounting and Finance, Logistics and Supply Chain Management. Learners must request before enrolment to interchange unit(s) other than the preselected units shown in the SBTL website because we need to make sure the availability of learning materials for the requested unit(s). SBTL will reject an application if the learning materials for the requested interchange unit(s) are unavailable. Learners are not allowed to make any request to interchange unit(s) once enrolment is complete. UNIT1- Security Engineering Reference No : Unit 1 - F/650/7994 Credit : 20 || TQT : 200 Hours This unit teaches secure software development, system hardening, authentication, encryption, network security, and web application architecture. UNIT2- Software Programming Principles and Practices in Java I Reference No : Unit 2 - H/650/7995 Credit : 20 || TQT : 200 Hours This unit teaches learners about programming languages, including what it is, how it works, and how to interact with computers. Learners will learn the basics through real-world coding examples and regular coding assignments. UNIT3- Agile Project Management Reference No : Unit 3 - J/650/7996 Credit : 20 || TQT : 200 Hours This unit covers project management, Scrum, and Kanab for IT product development. Build products iteratively and optimize value flow for customers. UNIT4- Cloud Computing & DevOps Reference No : Unit 4 - K/650/7997 Credit : 20 || TQT : 200 Hours This unit teaches cloud computing, DevOps, and various cloud models (IaaS, PaaS, SaaS), including different cloud services. UNIT5- Database & SQL Programming Reference No : Unit 5 - L/650/7998 Credit : 20 || TQT : 200 Hours The unit teaches learners the limitations of traditional storage systems, how modern relational databases overcome these challenges, and programming skills to communicate with databases using SQL. UNIT6- Web Designing Reference No : Unit 6 - M/650/7999 Credit : 20 || TQT : 200 Hours This course teaches learners to create HTML, CSS, and JavaScript web pages. Design sites, use styles, tables, lists, and HTML user input properties, and learn JavaScript basics. Delivery Methods School of Business & Technology London provides various flexible delivery methods to its learners, including online learning and blended learning. Thus, learners can choose the mode of study as per their choice and convenience. The program is self-paced and accomplished through our cutting-edge Learning Management System. Learners can interact with tutors by messaging through the SBTL Support Desk Portal System to discuss the course materials, get guidance and assistance and request assessment feedbacks on assignments. We at SBTL offer outstanding support and infrastructure for both online and blended learning. We indeed pursue an innovative learning approach where traditional regular classroom-based learning is replaced by web-based learning and incredibly high support level. Learners enrolled at SBTL are allocated a dedicated tutor, whether online or blended learning, who provide learners with comprehensive guidance and support from start to finish. The significant difference between blended learning and online learning methods at SBTL is the Block Delivery of Online Live Sessions. Learners enrolled at SBTL on blended learning are offered a block delivery of online live sessions, which can be booked in advance on their convenience at additional cost. These live sessions are relevant to the learners' program of study and aim to enhance the student's comprehension of research, methodology and other essential study skills. We try to make these live sessions as communicating as possible by providing interactive activities and presentations. Resources and Support School of Business & Technology London is dedicated to offering excellent support on every step of your learning journey. School of Business & Technology London occupies a centralised tutor support desk portal. Our support team liaises with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receives a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and streamline all the support processes efficiently. Quality learning materials made by industry experts is a significant competitive edge of the School of Business & Technology London. Quality learning materials comprised of structured lecture notes, study guides, practical applications which includes real-world examples, and case studies that will enable you to apply your knowledge. Learning materials are provided in one of the three formats, such as PDF, PowerPoint, or Interactive Text Content on the learning portal. How does the Online Learning work at SBTL? We at SBTL follow a unique approach which differentiates us from other institutions. Indeed, we have taken distance education to a new phase where the support level is incredibly high.Now a days, convenience, flexibility and user-friendliness outweigh demands. Today, the transition from traditional classroom-based learning to online platforms is a significant result of these specifications. In this context, a crucial role played by online learning by leveraging the opportunities for convenience and easier access. It benefits the people who want to enhance their career, life and education in parallel streams. SBTL's simplified online learning facilitates an individual to progress towards the accomplishment of higher career growth without stress and dilemmas. How will you study online? With the School of Business & Technology London, you can study wherever you are. You finish your program with the utmost flexibility. You will be provided with comprehensive tutor support online through SBTL Support Desk portal. How will I get tutor support online? School of Business & Technology London occupies a centralised tutor support desk portal, through which our support team liaise with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receive a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and to streamline all the support process efficiently. Learners should expect to receive a response on queries like guidance and assistance within 1 - 2 working days. However, if the support request is for assessment feedback, learners will receive the reply with feedback as per the time frame outlined in the Assessment Feedback Policy.

OTHM Level 7 Diploma in Immersive Software Engineering
Delivered Online On Demand11 months
£1,164.24

Network Security on an Ubuntu Linux Server

By Compete High

🔒 Unlock the Power of Network Security on an Ubuntu Linux Server! 🔒 Are you ready to safeguard your digital fortress? Dive into the world of Network Security with our comprehensive online course tailored specifically for Ubuntu Linux Server users! 🛡️ What You'll Learn:     Master the fundamentals of network security protocols and practices. Implement robust firewall configurations on your Ubuntu Linux Server. Discover advanced encryption techniques to secure your data transmission. Harden your server against cyber threats and unauthorized access. Learn best practices for intrusion detection and prevention. Explore real-world scenarios and case studies for hands-on learning.   👨‍💻 Who Is This Course For? IT professionals seeking to enhance their network security skills. System administrators responsible for securing Ubuntu Linux Servers. Beginners eager to delve into the world of cybersecurity on Linux systems.   🚀 Why Choose Our Course? Expert-led tutorials designed for all skill levels. Practical demonstrations and step-by-step guidance. Access to a supportive online community and forums. Updated content reflecting the latest industry standards. Lifetime access to course materials for continuous learning.   🎓 Take control of your server's security and fortify your knowledge in Ubuntu Linux network security! Enroll now and fortify your digital defenses today! Course Curriculum Module 1- Secure an Ubuntu Linux Server from Hackers Today! Secure an Ubuntu Linux Server from Hackers Today! 00:00 Module 2- Choosing a server host and setup Choosing a server host and setup 00:00 Module 3- Accessing the Ubuntu Linux server with putty Accessing the Ubuntu Linux server with putty 00:00 Module 4- How to download Putty for Windows How to download Putty for Windows 00:00 Module 5- Using a password manager like LastPass Using a password manager like LastPass 00:00 Module 6- Changing the password with passwd Changing the password with passwd 00:00 Module 7- Adding a new user with adduser Adding a new user with adduser 00:00 Module 8- Signing in with the added user Signing in with the added user 00:00 Module 9- Usermod to give the user sudo or root privileges Usermod to give the user sudo or root privileges 00:00 Module 10- Verify sudo access on user Verify sudo access on user 00:00 Module 11- Key basic Linux commands cd pwd and ls Key basic Linux commands cd pwd and ls 00:00 Module 12- Updating with apt-get update Draft Lesson 00:00 Module 13- Installing nano text editor Installing nano text editor 00:00 Module 14- Updating sshd_config with nano to PermitRootLogin no Updating sshd_config with nano to PermitRootLogin no 00:00 Module 15- Changing the SSH port from 22 to another number Changing the SSH port from 22 to another number 00:00 Module 16- Setting up RSA login by generating keys with puttygen Setting up RSA login by generating keys with puttygen 00:00 Module 17- Disabling password logins and ipv6 listening Disabling password logins and ipv6 listening 00:00 Module 18- Locked out of server and have to start over! Locked out of server and have to start over! 00:00 Module 19- Back in with a fresh install! Back in with a fresh install! 00:00 Module 20- Installing fail2ban to block IPs from repeated failed logins Installing fail2ban to block IPs from repeated failed logins 00:00 Module 21- Install UFW or Uniform Fire Wall to block some DDOS attacks and hacking attempts Install UFW or Uniform Fire Wall to block some DDOS attacks and hacking attempts 00:00 Module 22- Install and configure ntp to sync time Install and configure ntp to sync time 00:00 Module 23- Thank you very much for watching this complete Ubuntu Linux server security setup tutorial Thank you very much for watching this complete Ubuntu Linux server security setup tutorial 00:00

Network Security on an Ubuntu Linux Server
Delivered Online On Demand1 hour 20 minutes
£25

Oracle Database 19c Multitenant Architecture (TTOR20719)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is introductory-level, but technical in nature. In order to participate in the hands-pon labs you should have a basic understanding of database principles, basic scripting skills (in relation to Oracle) and basic analytics skills. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our Oracle Certified expert facilitator, students will learn how to: Core concepts of regular PDBs Creating a CDB, and then using different methods to create PDBs. How to start and shut down a CDB and how to open and close a PDB. Security aspects in CDBs and PDBs in various areas like privileges and roles, lockdown profiles, auditing, Database Vault, and encryption. Availability through backup, duplicate, recovery, and flashback topics and then performance, monitoring, and resources allocation management in CDBs and PDBs. How you can move data from a non-CDB environment to a PDB. How to move data between PDBs by using utilities such as the export and import features of Oracle Data Pump, SQL*Loader, external tables, and Oracle Recovery Manager. The multitenant architecture enables you to have many pluggable databases inside a single Oracle Database instance. Oracle Database 19c Multitenant Architecture is a three-day hands on course that explores the multitenant architecture and the different types of pluggable databases (PDBs) in multitenant container databases (CDBs). Multitenant Architecture CDB Basics CDB and Regular PDBs Application PDBs and Application Installation PDB Creation PDB Creation CDB and PDB Management Storage Security Security Backup and Duplicate Recovery and Flashback Performance Resources Allocation Data Movement Data Movement Upgrade Methods Miscellaneous Additional course details: Nexus Humans Oracle Database 19c Multitenant Architecture (TTOR20719) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database 19c Multitenant Architecture (TTOR20719) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle Database 19c Multitenant Architecture (TTOR20719)
Delivered OnlineFlexible Dates
Price on Enquiry

Linux Professional Institute Certification (LPIC-1) 102

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Linux Professional Institute Certification (LPIC-1) 102 training is suitable for individuals with roles of: System administrator Network administrator Technician DevOps Overview Upon successful completion of this course, students will be able to: customize shell environments to meet users' needs customize existing scripts or write simple new Bash scripts install and configure X11 add, remove, suspend and change user accounts use cron and systemd timers to run jobs at regular intervals and to use at to run jobs at a specific time localize a system in a different language than English properly maintain the system time and synchronize the clock via NTP manage print queues and user print jobs using CUPS and the LPD compatibility interface manage the persistent network configuration of a Linux host configure DNS on a client host review system configuration to ensure host security in accordance with local security policies know how to set up a basic level of host security use public key techniques to secure data and communication. This course prepares students to take the 102 exam of the LPI level 1 certification. Shells and Shell Scripting Customize and use the shell environment Customize or write simple scripts User Interfaces and Desktops Install and configure X11 Graphical Desktops Accessibility Administrative Tasks Manage user and group accounts and related system files Automate system administration tasks by scheduling jobs Localisation and internationalisation Essential System Services Maintain system time System logging Mail Transfer Agent (MTA) basics Manage printers and printing Networking Fundamentals Fundamentals of internet protocols Persistent network configuration Basic network troubleshooting Configure client side DNS Security Perform security administration tasks Setup host security Securing data with encryption Additional course details: Nexus Humans Linux Professional Institute Certification (LPIC-1) 102 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Linux Professional Institute Certification (LPIC-1) 102 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Linux Professional Institute Certification (LPIC-1) 102
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle 19c Database Multitenant Architecture (TTOR20719)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is introductory-level, but technical in nature. In order to participate in the hands-pon labs you should have a basic understanding of database principles, basic scripting skills (in relation to Oracle) and basic analytics skills. Overview This course is approximately 50% hands-on lab to lecture ratio, combining engaging expert lessons, demos and group discussions with real-world, skills-focused machine-based labs and exercises. Working in a hands-on learning environment led by our expert facilitator, you'll explore: Core concepts of regular PDBs Creating a CDB, and then using different methods to create PDBs. How to start and shut down a CDB and how to open and close a PDB. Security aspects in CDBs and PDBs in various areas like privileges and roles, lockdown profiles, auditing, Database Vault, and encryption. Availability through backup, duplicate, recovery, and flashback topics and then performance, monitoring, and resources allocation management in CDBs and PDBs. How you can move data from a non-CDB environment to a PDB. How to move data between PDBs by using utilities such as the export and import features of Oracle Data Pump, SQL*Loader, external tables, and Oracle Recovery Manager. The multitenant architecture enables you to have many pluggable databases inside a single Oracle Database instance. Oracle Database 19c Multitenant Architecture is a three-day hands-on course that explores the multitenant architecture and the different types of pluggable databases (PDBs) in multitenant container databases (CDBs). Multitenant Architecture CDB Basics CDB and Regular PDBs Application PDBs and Application Installation PDB Creation PDB Creation CDB and PDB Management Storage Security Security Backup and Duplicate Recovery and Flashback Performance Resources Allocation Data Movement Data Movement Upgrade Methods Miscellaneous Additional course details: Nexus Humans Oracle 19c Database Multitenant Architecture (TTOR20719) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 19c Database Multitenant Architecture (TTOR20719) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle 19c Database Multitenant Architecture (TTOR20719)
Delivered OnlineFlexible Dates
Price on Enquiry

CompTIA CySA+ Cybersecurity Analyst Course

4.5(3)

By Studyhub UK

Embark on a transformative journey with the 'CompTIA CySA+ Cybersecurity Analyst Course,' designed to fortify the digital frontiers of business. This comprehensive training program begins with an immersive introduction to the cybersecurity realm, setting the stage for a deep dive into the sophisticated world of threat data and intelligence. With an emphasis on real-world application, participants will gain invaluable insights into organizational security, developing the acumen to anticipate, identify, and neutralize digital threats. Mastery over vulnerability assessment tools and mitigation strategies forms the bedrock of this curriculum, providing learners with a robust skill set pivotal for the modern cybersecurity landscape. Learning Outcomes Interpret threat data to reinforce organizational security frameworks. Assess vulnerabilities using state-of-the-art tools and methodologies. Apply best practices for ensuring software and hardware assurance. Analyze security solutions for robust infrastructure management. Implement and manage incident response protocols to address potential compromises effectively. Why choose this CompTIA CySA+ Cybersecurity Analyst Course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the CompTIA CySA+ Cybersecurity Analyst Course Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this CompTIA CySA+ Cybersecurity Analyst Course for? Individuals aiming to specialize in cybersecurity analysis. IT professionals seeking to broaden their cybersecurity knowledge. Organizational staff responsible for managing digital security risks. Security consultants requiring up-to-date threat intelligence expertise. System administrators looking to implement enhanced security measures. Career path Cybersecurity Analyst - £25,000 to £60,000 Vulnerability Analyst - £30,000 to £65,000 Security Operations Centre (SOC) Analyst - £32,000 to £70,000 Incident Responder - £27,000 to £68,000 Digital Forensics Specialist - £35,000 to £75,000 Information Security Consultant - £40,000 to £80,000 Prerequisites This CompTIA CySA+ Cybersecurity Analyst Course does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA CySA+ Cybersecurity Analyst Course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Section 01: Introduction Introduction 00:02:00 All about the Exam 00:08:00 What's New on the CompTIA CySA+ Exam? 00:05:00 Meet the Instructors 00:02:00 Thinking like the Enemy 00:09:00 Section 02: The Importance of Threat Data and Intelligence Intelligence Sources and Confidence Levels 00:08:00 Threat Indicators and Actors 00:08:00 Threat Trends 00:07:00 Intelligence Cycle and ISACs 00:06:00 Section 03: Threat Intelligence in Support of Organizational Security Attack Frameworks 00:06:00 Threat Research 00:11:00 Threat Modeling and Intelligence Sharing 00:06:00 Section 04: Vulnerability Assessment Tools Vulnerability Identification 00:07:00 Scanning Parameters and Criteria 00:09:00 Scanning Special Considerations 00:06:00 Validation 00:03:00 Remediation and Mitigation 00:08:00 Inhibitors to Remediation 00:07:00 Section 05: Threats and Vulnerabilities Associated with Specialized Technology Web Applications Scanners, Part 1 00:10:00 Web Applications Scanners, Part 2 00:05:00 Scanning 00:06:00 Configuring and Executing Scans 00:08:00 Vulnerability Scanning 00:10:00 Reverse Engineering 00:08:00 Enumeration 00:06:00 Wireless Assessment Tools 00:08:00 Cloud Assessment Tools 00:04:00 Section 06: Threats and Vulnerabilities Associated with Specialized Technology Mobile and IoT 00:10:00 Embedded and Firmware Systems (RTOS, SoC, and FPGA) 00:09:00 Access and Vehicles Risk 00:08:00 Automation and Control Risk 00:10:00 Section 07: Threats and Vulnerabilities Associated with Operating in the Cloud Cloud Models 00:07:00 Remote Service Invocation (FaaS, IaC, API) 00:10:00 Cloud Vulnerabilities 00:06:00 Section 08: Mitigating Controls for Attacks and Software Vulnerabilities Injection and Overflow Attacks 00:09:00 Authentication Attacks 00:07:00 Exploits 00:08:00 Application Vulnerabilities, Part 1 00:08:00 Application Vulnerabilities, Part 2 00:07:00 Section 09: Security Solutions for Infrastructure Management Network Architecture and Asset Management 00:09:00 Protecting Your Territory 00:05:00 Identity and Access Management 00:11:00 Encryption and Active Defense 00:08:00 Section 10: Software Assurance Best Practices Platforms 00:07:00 SOA and DevSecOps 00:09:00 Secure Software Development 00:08:00 Best Coding Practices 00:04:00 Section 11: Hardware Assurance Best Practices Trusted Hardware 00:10:00 Hardware Encryption 00:04:00 Hardware Security 00:08:00 Section 12: Data Analysis in Security Monitoring Activities Data Analytics 00:10:00 Endpoint Security 00:08:00 Recon Results, Part 1 00:13:00 Recon Results, Part 2 00:05:00 Impact Analysis 00:05:00 Collective Tools 00:09:00 Query Writing 00:07:00 E-mail Analysis, Part 1 00:10:00 E-mail Analysis, Part 2 00:08:00 Section 13: Implement Configuration Changes to Existing Controls to Improve Security Permissions 00:09:00 Firewalls 00:08:00 Intrusion Prevention Rules 00:05:00 DLP and Endpoint Detection 00:05:00 Section 14: The Importance of Proactive Threat Hunting Threat Hunting and the Hypothesis 00:06:00 Threat Hunting Process 00:07:00 Results and Benefits 00:05:00 Section 15: Compare and Contrast Automation Concepts and Technologies Workflow and Scripting 00:07:00 API and Malware Signature Creation 00:08:00 Threat Feeds and Machine Learning 00:06:00 Protocols, Standards, and Software Engineering 00:05:00 Section 16: The Importance of the Incident Response Process IR Roles and Responsibilities 00:08:00 IR Active Preparation 00:10:00 Section 17: Appropriate Incident Response Procedures Incident Response Process 00:07:00 Section 18: Analyze Potential Indicators of Compromise Network Symptoms 00:04:00 Host Symptoms 00:08:00 Application Symptoms 00:04:00 Section 19: Utilize Basic Digital Forensics Techniques Digital Forensics 00:10:00 Seizure and Acquisitions 00:05:00 Forensics Acquisition Tools 00:09:00 Mobile, Virtualization, and Cloud 00:06:00 Forensics Analysis, Part 1 00:04:00 Forensics Analysis, Part 2 00:08:00 Packet Capture 00:12:00 Section 20: The Importance of Data Privacy and Protection Data Privacy and Security 00:06:00 Nontechnical Controls 00:09:00 Technical Controls 00:08:00 Section 21: Security Concepts in Support of Organizational Risk Mitigation Business Impact Analysis 00:05:00 Risk Identification 00:05:00 Risk Calculation and Communication 00:06:00 Training 00:04:00 Supply Chain Assessment 00:04:00 Section 22: The Importance of Frameworks, Policies, Procedures, and Controls Frameworks 00:13:00 Policies and Procedures 00:05:00 Controls and Procedures 00:08:00 Verification 00:06:00 Assignment Assignment - CompTIA CySA+ Cybersecurity Analyst Course 00:00:00

CompTIA CySA+ Cybersecurity Analyst Course
Delivered Online On Demand11 hours 25 minutes
£10.99

Linux Security and Hardening

5.0(10)

By Apex Learning

Overview This comprehensive course on Linux Security and Hardening will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Linux Security and Hardening comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Linux Security and Hardening. It is available to all students, of all academic backgrounds. Requirements Our Linux Security and Hardening is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 8 sections • 52 lectures • 04:17:00 total length •Course Overview: 00:01:00 •Section Overview - General Security: 00:01:00 •Is Linux Secure?: 00:02:00 •What Makes Linux Secure?: 00:08:00 •Security Guidelines and Principles: 00:08:00 •Section Summary - General Security: 00:02:00 •Section Overview - Physical Security: 00:01:00 •Physical Security Concepts: 00:08:00 •Single User Mode Security: 00:07:00 •Single User Mode and Blank Passwords: 00:03:00 •Securing the Boot Loader: 00:07:00 •Disk Encryption: 00:06:00 •Encrypting a New Device, Part I: 00:09:00 •Encrypting a New Device, Part II: 00:04:00 •Encrypting an Existing Device: 00:01:00 •Disabling Control Alt Delete: 00:02:00 •Section Summary - Physical Security: 00:01:00 •Section Overview - Account Security: 00:01:00 •Intro to PAM: 00:05:00 •PAM Configuration Example: 00:04:00 •Password Security: 00:08:00 •Account Security Demo #1 (UID 0): 00:03:00 •Controlling Account Access: 00:05:00 •Security by Account Type: 00:06:00 •Account Security Demo #2: 00:03:00 •Account Security Demo #3 (Sudo): 00:05:00 •Section Overview - Network Security: 00:01:00 •Network Security, Part I: 00:08:00 •Network Security, Part II: 00:06:00 •Securing SSHD, Part I: 00:08:00 •Securing SSHD, Part II: 00:03:00 •Linux Firewall Fundamentals: 00:08:00 •Configuring the Firewall from the Command Line: 00:04:00 •Firewall Rule Specifications: 00:05:00 •Example Firewall Rules: 00:04:00 •Linux Firewall Demonstration: 00:10:00 •TCP Wrappers, Part I: 00:07:00 •TCP Wrappers, Part II: 00:04:00 •Section Overview - File System Security: 00:01:00 •File and Directory Permissions, Intro: 00:01:00 •File and Directory Permissions, Part I: 00:11:00 •File and Directory Permissions, Part II: 00:09:00 •Special Modes, Part I: 00:08:00 •Special Modes, Part II: 00:03:00 •File Attributes: 00:06:00 •File Attributes Demo: 00:03:00 •ACLs: 00:09:00 •ACLs Demo: 00:06:00 •Rootkits: 00:09:00 •Rootkit Hunter Demonstration: 00:07:00 •Additional Resources: 00:05:00 •Assignment - Linux Security and Hardening: 00:00:00

Linux Security and Hardening
Delivered Online On Demand4 hours 17 minutes
£12