Duration 4 Days 24 CPD hours This course is intended for Data center engineers Engineers (design, implementation, pre-sales, post-sales) Product managers and sales Overview After taking this course, you should be able to: Describe hyperconvergence, Cisco HyperFlex, and the components of Cisco HyperFlex Explain the Cisco Unified Computing System⢠(Cisco UCS) and what makes it valuable to business Describe how Cisco HyperFlex Data Platform (HXDP) works Describe the physical components of Cisco HyperFlex Describe Cisco Intersight and introduce functionalities relevant to HyperFlex Install standard ESXi-based vSphere Cisco HyperFlex Manage your Cisco HyperFlex VMware ESXi-based cluster Describe how to maintain Cisco HyperFlex Design a Cisco HyperFlex solution Protect the data on your Cisco HyperFlex cluster using replication and data at rest encryption Describe a stretched cluster and how is it different from a standard cluster Describe an Edge cluster and how is it different from a standard cluster Perform basic troubleshooting tasks and explain Cisco Intersight The Implementing Cisco HyperFlex (DCIHX) v1.3 course shows you how to deploy and use the Cisco© HyperFlex? data platform to support multicloud workloads. You will become familiar with HyperFlex components and learn how to install, design, manage, and troubleshoot Cisco HyperFlex to support highly scalable and resilient multicloud implementations. You will also gain hands-on experience focused on installation, management, maintenance, and native replication, and you will explore cluster technologies as well as Cisco Intersight.? Introducing Hyperconvergence and Cisco HyperFlex Traditional Data Center Design What Is Hyperconvergence? Describing Cisco UCS: The Foundation of Cisco HyperFlex Cisco Server Deployment Models: Standalone Versus Managed Cisco UCS Managed Model Benefits Describing Cisco HyperFlex Software Components Virtual Machine Hypervisor Log-Structured File System Describing Cisco HyperFlex Hardware Components Introducing Cisco HyperFlex Servers Storage Technologies in Cisco HyperFlex Introducing Cisco Intersight Introducing Cisco Intersight Installing and Expanding Standard ESXi Cisco HyperFlex Installation Summary Software Prerequisites Managing Cisco HyperFlex in vSphere Environment Management Interfaces Overview Cisco HyperFlex Plugin for vCenter Maintaining Cisco HyperFlex Cisco HyperFlex Upgrade Overview Cisco HyperFlex Online Upgrade Designing Cisco HyperFlex Cluster Resiliency: VM-Level Cluster Resiliency: HXDP-Level Protecting Your Data Disaster Recovery Overview Third-Party Data Restore Solutions Introducing Cisco HyperFlex Stretched Deployment Stretched Cluster Overview Prerequisites Introducing Cisco HyperFlex EDGE Cisco HyperFlex EDGE Cluster Overview Prerequisites and Recommendations Troubleshooting Cisco HyperFlex Troubleshooting Guidelines Generating Tech Support Bundles
Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. Fundamentals of information privacy Reviewing the modern history of privacy Foundational privacy concepts Data protection roles and fair information practices Exploring the impacts of privacy and data protection regulations on information management Privacy in the IT environment Compliance requirements IT risks Stakeholder privacy expectations Differentiating between privacy and security Core privacy concepts Foundational elements for embedding privacy in IT Common privacy principles Data protection by design and default Privacy considerations in the information life cycle Privacy considerations throughout the stages of the information life cycle Privacy in systems and applications Examining the risks inherent in the IT environment and options for addressing them Identity and access management Credit card information and processing Remote access BYOD and telecommuting Data encryption Additional privacy-enhancing technologies in the enterprise environment Privacy techniques Strengths and weaknesses of authentication techniques Using identifiers Privacy by design Online privacy issues Unique challenges that come from online privacy issues Laws and regulations Online threats Social media E-commerce Tracking technologies Web security protocols Technologies with privacy considerations Privacy considerations associated with a variety of technologies Cloud computing Wireless IDs Location-based services ?Smart? technologies Video/data/audio surveillance Biometric recognition
Duration 4.375 Days 26.25 CPD hours This course is intended for CCISOs are certified in the knowledge of and experience in the following CISO Domains:Governance (Policy, Legal & Compliance)IS Management Controls and Auditing Management (Projects, Technology & Operations)Management ? Projects and OperationsInformation Security Core CompetenciesStrategic Planning & Finance Overview Please refer to Overview. The Certified CISO (C|CISO) course has certified leading information security professionals around the world and is the first of its kind training and certification program aimed at producing top-level Information Security Leaders. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by seasoned CISOs for current and aspiring CISOs. Governance Drivers that Influence Governance Corporate Governance Activities Information Security Governance Activities Governance and Ethical Decision Making Security Risk Management, Controls, and Audit Management Risk Management Audit Management Risk Treatment Risk Management Frameworks Risk Communication and Organizational Reporting Security Program Management and Operations Information Security Portfolio Management Information Security Program Management Information Security Project Management Security Operations Information Security Core Competencies Access Control Physical Security Network and Communications Security Threat and Vulnerability Management System and Application Security Encryption Concepts and Technology Strategic Planning, Financial Management, and Vendor Management Strategic Planning Financial Management Vendor Risk Management Additional course details: Nexus Humans EC-Council Certified CISO (C|CISO) w/exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified CISO (C|CISO) w/exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Overview This comprehensive course on CompTIA Network (N10-007) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Network (N10-007) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA Network (N10-007). It is available to all students, of all academic backgrounds. Requirements Our CompTIA Network (N10-007) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 22 sections • 172 lectures • 22:43:00 total length •Introduction: 00:03:00 •What is a Model?: 00:02:00 •OSI vs. TCP/IP Model: 00:07:00 •Walking Through OSI and TCP/IP: 00:12:00 •Meet the Frame: 00:06:00 •The MAC Address: 00:07:00 •Broadcast vs. Unicast: 00:04:00 •Introduction to IP Addressing: 00:08:00 •Packets and Ports: 00:05:00 •Network Topologies: 00:10:00 •Coaxial Cabling: 00:05:00 •Twisted Pair Cabling: 00:06:00 •Cat Ratings: 00:06:00 •Fiber Optic Cabling: 00:09:00 •Fire Ratings: 00:05:00 •Legacy Network Connections: 00:07:00 •What is Ethernet?: 00:07:00 •Ethernet Frames: 00:07:00 •Early Ethernet: 00:08:00 •The Daddy of Ethernet, 10BaseT: 00:03:00 •Terminating Twisted Pair: 00:14:00 •Hubs vs. Switches: 00:13:00 •100BaseT: 00:05:00 •Connecting Switches: 00:05:00 •Gigabit Ethernet and 10-Gigabit Ethernet: 00:05:00 •Transceivers: 00:07:00 •Connecting Ethernet Scenarios: 00:14:00 •Introduction to Structured Cabling: 00:04:00 •Terminating Structured Cabling: 00:08:00 •Equipment Room: 00:07:00 •Alternative Distribution Panels: 00:04:00 •Testing Cable: 00:09:00 •Troubleshooting Structured Cabling, Part 1: 00:05:00 •Troubleshooting Structured Cabling, Part 2: 00:05:00 •Using a Toner and Probe: 00:03:00 •Wired Connection Scenarios: 00:11:00 •Introduction to IP Addressing and Binary: 00:13:00 •Introduction to ARP: 00:04:00 •Classful Addressing: 00:10:00 •Subnet Masks: 00:12:00 •Subnetting with CIDR: 00:10:00 •More CIDR Subnetting Practice: 00:10:00 •Dynamic and Static IP Addressing: 00:18:00 •Rogue DHCP Servers: 00:07:00 •Special IP Addresses: 00:07:00 •IP Addressing Scenarios: 00:15:00 •Introducing Routers: 00:15:00 •Understanding Ports: 00:05:00 •Network Address Translation: 00:06:00 •Implementing NAT: 00:03:00 •Forwarding Ports: 00:18:00 •Tour of a SOHO Router: 00:12:00 •SOHO vs. Enterprise: 00:09:00 •Static Routes: 00:13:00 •Dynamic Routing: 00:11:00 •RIP: 00:04:00 •OSPF: 00:04:00 •BGP: 00:06:00 •TCP and UDP: 00:07:00 •ICMP and IGMP: 00:06:00 •Handy Tools: 00:07:00 •Introduction to Wireshark: 00:11:00 •Introduction to netstat: 00:09:00 •Web Servers: 00:12:00 •FTP: 00:12:00 •E-mail Servers and Clients: 00:09:00 •Securing E-mail: 00:06:00 •Telnet and SSH: 00:09:00 •Network Time Protocol: 00:02:00 •Network Service Scenarios: 00:10:00 •Understanding DNS: 00:12:00 •Applying DNS: 00:19:00 •The Hosts File: 00:04:00 •Net Command: 00:08:00 •Windows Name Resolution: 00:11:00 •Dynamic DNS: 00:05:00 •DNS Troubleshooting: 00:13:00 •Making TCP/IP Secure: 00:04:00 •Symmetric Encryption: 00:06:00 •Asymmetric Encryption: 00:03:00 •Cryptographic Hashes: 00:05:00 •Identification: 00:00:00 •Access Control: 00:04:00 •AAA: 00:05:00 •Kerberos/EAP: 00:00:00 •Single Sign-On: 00:10:00 •Certificates and Trust: 00:14:00 •Certificate Error Scenarios: 00:08:00 •Understanding IP Tunneling: 00:06:00 •Virtual Private Networks: 00:13:00 •Introduction to VLANs: 00:12:00 •InterVLAN Routing: 00:03:00 •Interfacing with Managed Switches: 00:11:00 •Switch Port Protection: 00:07:00 •Port Bonding: 00:07:00 •Port Mirroring: 00:04:00 •Quality of Service: 00:05:00 •IDS vs. IPS: 00:04:00 •Proxy Servers: 00:13:00 •Load Balancing: 00:09:00 •Device Placement Scenarios: 00:13:00 •Introduction to IPv6: 00:13:00 •IPv6 Addressing: 00:15:00 •IPv6 in Action: 00:13:00 •IPv4 and IPv6 Tunneling: 00:05:00 •Telephony Technologies: 00:09:00 •Optical Carriers: 00:03:00 •Packet Switching: 00:05:00 •Connecting with Dial-up: 00:05:00 •Digital Subscriber Line (DSL): 00:05:00 •Connecting with Cable Modems: 00:04:00 •Connecting with Satellites: 00:03:00 •ISDN and BPL: 00:04:00 •Remote Desktop Connectivity: 00:05:00 •Advanced Remote Control Systems: 00:09:00 •Introduction to 802.11: 00:12:00 •802.11 Standards: 00:12:00 •Power over Ethernet (PoE): 00:04:00 •Antennas: 00:09:00 •Wireless Security Standards: 00:16:00 •Implementing Wireless Security: 00:07:00 •Threats to Your Wireless Network: 00:07:00 •Retro Threats: 00:05:00 •Wi-Fi Protected Setup (WPS): 00:05:00 •Enterprise Wireless: 00:06:00 •Installing a Wireless Network: 00:15:00 •Wireless Scenarios: 00:07:00 •More Wireless Scenarios: 00:09:00 •Virtualization Basics: 00:07:00 •Cloud Ownership: 00:03:00 •Cloud Implementation: 00:12:00 •Your First Virtual Machine: 00:09:00 •NAS and SAN: 00:16:00 •Platform as a Service (PaaS): 00:09:00 •Software as a Service (SaaS): 00:03:00 •Infrastructure as a Service (IaaS): 00:10:00 •Cellular Technologies: 00:05:00 •Mobile Connectivity: 00:07:00 •Deploying Mobile Devices: 00:05:00 •Mobile Access Control: 00:06:00 •Network Types: 00:04:00 •Network Design: 00:10:00 •Power Management: 00:06:00 •Unified Communications: 00:11:00 •Network Documentation: 00:07:00 •Contingency Planning: 00:10:00 •Predicting Hardware Failure: 00:05:00 •Backups: 00:08:00 •What is Risk Management?: 00:06:00 •Security Policies: 00:08:00 •Change Management: 00:07:00 •User Training: 00:03:00 •Standard Business Documentation: 00:05:00 •Mitigating Network Threats: 00:05:00 •High Availability: 00:05:00 •Denial of Service: 00:09:00 •Malware: 00:10:00 •Social Engineering: 00:04:00 •Access Control: 00:08:00 •Man-in-the-Middle: 00:22:00 •Introduction to Firewalls: 00:05:00 •Firewalls: 00:10:00 •DMZ: 00:06:00 •Hardening Devices: 00:14:00 •Physical Security Controls: 00:09:00 •Testing Network Security: 00:08:00 •Network Protection Scenarios: 00:14:00 •SNMP: 00:15:00 •Documenting Logs: 00:09:00 •System Monitoring: 00:08:00 •SIEM (Security Information and Event Management): 00:07:00 •Network Troubleshooting Theory: 00:05:00
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is individuals who administer and maintain SQL Server databases. These individuals perform database administration and maintenance as their primary area of responsibility, or work in environments where databases play a key role in their primary job. The secondary audiences for this course are individuals who develop applications that deliver content from SQL Server databases. Overview After completing this course, you will be able to: Authenticate and authorize users Assign server and database roles Authorize users to access resources Use encryption and auditing features to protect data Describe recovery models and backup strategies Backup and Restore SQL Server databases Automate database management Configure security for the SQL Server agent Manage alerts and notifications Managing SQL Server using PowerShell Trace access to SQL Server Monitor a SQL Server infrastructure Troubleshoot a SQL Server infrastructure Import and export data This course will provide training in how to administer and maintain SQL Server, Azure SQL Database and other cloud-based SQL Server databases. IT professionals who work in environments where databases play a key role in their job will find this material useful. By using demonstrations and hands-on lab exercises, students will learn to carry out these important tasks. This course covers content that was in retired Microsoft Course 20764: Administering a SQL Database Infrastructure. 1 - Creating advanced functions Lesson 1: Converting a command into an advanced function Lesson 2: Creating a script module Lesson 3: Defining parameter attributes and input validation Lesson 4: Writing functions that accept pipeline input Lesson 5: Producing complex pipeline output Lesson 6: Using comment-based Help Lesson 7: Using Whatif and Confirm parameters 2 - Using Microsoft .NET Framework and REST API in Windows PowerShell Lesson 1: Using .NET Framework in PowerShell Lesson 2: Using REST API in PowerShell 3 - Writing controller scripts Lesson 1: Understanding controller scripts Lesson 2: Writing controller scripts with a user interface Lesson 3: Writing controller scripts that create reports 4 - Handling script errors Lesson 1: Understanding error handling Lesson 2: Handling errors in a script 5 - Using XML, JSON, and custom-formatted data Lesson 1: Working with XML formatted data Lesson 2: Working with JSON formatted data Lesson 3: Working with custom-formatted data 6 - Enhancing server management with Desired State Configuration and Just Enough Administration Lesson 1: Implementing Desired State Configuration Lesson 2: Implementing Just Enough Administration 7 - Analyzing and debugging scripts Lesson 1: Debugging in Windows PowerShell Lesson 2: Analyzing and debugging an existing script 8 - Understanding Windows PowerShell Workflow Lesson 1: Understanding Windows PowerShell Workflows Lesson 2: Running Windows PowerShell Workflows
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, cloud engineers, including security engineers, delivery and implementation engineers, professional services, and Cloud Center of Excellence (CCOE) Overview In this course, you will learn to: Design and implement a secure network infrastructure Design and implement compute security Design and implement a logging solution Currently, the average cost of a security breach can be upwards of $4 million. AWS Security Best Practices provides an overview of some of the industry best practices for using AWS security and control types. This course helps you understand your responsibilities while providing valuable guidelines for how to keep your workload safe and secure. You will learn how to secure your network infrastructure using sound design options. You will also learn how you can harden your compute resources and manage them securely. Finally, by understanding AWS monitoring and alerting, you can detect and alert on suspicious events to help you quickly begin the response process in the event of a potential compromise. Module 1: AWS Security Overview Shared responsibility model Customer challenges Frameworks and standards Establishing best practices Compliance in AWS Module 2: Securing the Network Flexible and secure Security inside the Amazon Virtual Private Cloud (Amazon VPC) Security services Third-party security solutions Module 3: Amazon EC2 Security Compute hardening Amazon Elastic Block Store (EBS) encryption Secure management and maintenance Detecting vulnerabilities Using AWS Marketplace Module 4: Monitoring and Alerting Logging network traffic Logging user and Application Programming Interface (API) traffic Visibility with Amazon CloudWatch Enhancing monitoring and alerting Verifying your AWS environment Additional course details: Nexus Humans AWS Security Best Practices training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Best Practices course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Discover the power of modern C++ design patterns, including adapter, façade, and composite. This course provides a comprehensive understanding of each pattern, complete with real-world examples to help you confidently implement them in your projects and build efficient, scalable software like a pro.
------------------------NEW YEAR SALE ENDS TODAY------------------------ Get Hard Copy + PDF Certificates + Transcript + Student ID Card worth £160 as a Gift - Enrol Now The CompTIA Network course provides advanced-level knowledge and experience with personal computer operating systems and networks to present fundamental skills and concepts. The content of the course is to prepare you for the job related to networking career. The course includes Network Theory including OSI layers, LANs and WANs, network types and transmissions. You will also learn about the Bounded Network Media like cables, fibre optics, and converters and connectors. You will also be introduced to Network implementations, network communication protocols, IPv4, special addresses, CIDR, IPv6, Routing, TCP/IP services, WANinfrastructure and Cloud Virtualization Technologies. The CompTIA Network also focuses on the Network Security System, Remote Networking, and Networking Management. Finally, the course will provide you with information about the Troubleshooting Network and the basics of SOHO (Small Office Home Office) Network. Develop the skills to thrive in the IT industry by enrolling today! Along with this CompTIA Network Level 4, you will get 10 additional Career development courses, an original hardcopy certificate, a transcript and a student ID card which will allow you to get discounts on things like music, food, travel and clothes etc. What other courses are included with this CompTIA Network Level 4? Course 01: CompTIA Networking - Level 4 Course 02: CompTIA Network+ Certification Course 03: Network Security Level 2 Course 04: CompTIA Security+ (SY0-601) Course 05: CompTIA Network (N10-007) Course 06: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 07: CompTIA PenTest+ (Ethical Hacking) Course 08: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 09: Encryption Course 10: Secure Programming of Web Applications Course 11: IT Support Technician Training Gain computer networking expertise and build an outstanding career in IT infrastructure by attending the highly advanced CompTIA Networking - Level 4 course. CompTIA Network Level 4 will provide you with the CPD certificate that you'll need to succeed. Gain experience online and interact with experts. This can prove to be the perfect way to get noticed by a prospective employer and stand out from the crowd. Experienced tutors and mentors will be there for you whenever you need them, and solve all your queries through email and chat boxes. Benefits you'll get choosing Apex Learning for this course: One payment, but lifetime access to 11 CPD courses Certificates, student ID for the title course included in a one-time fee Full tutor support available from Monday to Friday Free up your time - don't waste time and money travelling for classes Accessible, informative modules taught by expert instructors Learn at your ease - anytime, from anywhere Study the course from your computer, tablet or mobile device CPD accredited course - improve the chance of gaining professional skills Gain valuable knowledge without leaving your home In the comprehensive CompTIA Networking - Level 4 course, you'll be equipped with advanced computer networking knowledge and skills. You'll learn about network types, layers, bounded/unbounded media, implementation, and routing credentials. You'll learn about WAN infrastructure, network security breaches, network management and troubleshooting issues, and many more. Our expert educators will thoroughly train you on every module to give you an in-depth understanding of all topics. Curriculum: Course 01: CompTIA Networking - Level 4 Network Theory Bounded Network Media Unbounded Network Media Network Implementations TCP/IP Addressing and Data Delivery Routing TCP/IP Services WAN Infrastructure Cloud and Virtualization Technologies Network Security Basics Preventing Security Breaches Responding to Security Incidents Remote Networking Network Management Troubleshooting Network Issues Planning and Implementing a SOHO Network The detailed curriculum of the bundle is given in the resources section. How will I get my Certificate? After successfully completing the course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) If you want to get hardcopy certificates for other courses, generally you have to pay £20 for each. But this Fall, Apex Learning is offering a Flat 50% discount on hard copy certificates, and you can get each for just £10! P.S. The delivery charge inside the U.K. is £3.99 and the international students have to pay £9.99. CPD 155 CPD hours / points Accredited by CPD Quality Standards Who is this course for? There is no experience or previous qualifications required for enrolment on this course. It is available to all students, of all academic backgrounds. Requirements Our courseis fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. Career path Having this CPD certificate will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (CompTIA Networking - Level 4) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.
Description This Certified Virtualization Security Expert (Advanced VMware Security) Training covers everything you need to know becoming a Certified Virtualization Security Expert. In this course you will learn about routing and the security design of VMware, Remote DataStore security, Penetration Testing 101, information gathering, scanning and enumeration, penetration testing and the tools of the trade, DMZ virtualization and common attack vectors, hardening your ESX server, hardening your ESXi server, hardening your vCenter server, and 3rd party mitigation tools. This Advanced course provides a solid understanding of the various components that make up the VMware vSphere environment. You will have the opportunity to study and understand all aspects of the CIA triad as it pertains to the VMware vSphere infrastructure from the virtual CPU to the storage devices attached to your host and everything in and around that network, including the interconnectivity and design of all those components. So, get this course to learn more. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our Certified Virtualization Security Expert (Advanced VMware Security) Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Primer and Reaffirming Our Knowledge Primer and Reaffirming Our Knowledge FREE 00:25:00 Virtual Ports 00:21:00 Symmetric vs. Asymmetric Encryption 01:07:00 File System Structure 00:13:00 Accounts and Groups 00:35:00 Routing and the Security Design of VMware Routing and the Security Design of Vmware 00:11:00 Virtualization Layer 00:28:00 Memory Virtualization 00:28:00 Major Benefits of Using VLANs 00:13:00 Remote Data Store Security Remote DataStore Security 00:15:00 Fiber Channel Attacks - The Basics 00:22:00 Penetration Testing 101 Penetration Testing 101 00:33:00 The Evolving Threat 00:40:00 Information Gathering, Scanning and Enumeration Information Gathering, Scanning and Enumeration9 00:30:00 FireFox Fully Loaded 00:14:00 Introduction to Port Scanning 00:30:00 UDP Port Scan 00:42:00 Penetration Testing and the Tools of the Trade Penetration Testing and the Tools of the Trade 00:43:00 Windows Password Cracking 00:24:00 VASTO 00:22:00 DMZ Virtualization and Common Attack Vectors DMZ Virtualization and Common Attack Vectors9 00:21:00 Clearly Label Networks for Each Zone within the DMZ 00:22:00 Schmoo Con 2010 Virtualization Vulnerabilities Found! 00:08:00 Hardening Your ESX Server Hardening Your ESX Server 01:03:00 Configuring the ESX ESXi Host 02:19:00 Establish a Password Policy for Local User Accounts 00:21:00 Secure the SNMP Configuration 00:19:00 Hardening Your ESXi Server Hardening Your ESXi Server 00:20:00 Hardening Your vCenter Server Hardening Your vCenter Server 00:17:00 VMware Converter Enterprise 01:10:00 3rd Party Mitigation Tools 3rd Party Mitigation Tools 00:24:00 Mock Exam Mock Exam- Certified Virtualization Security Expert (Advanced VMware Security) Training 00:20:00 Final Exam Final Exam- Certified Virtualization Security Expert (Advanced VMware Security) Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Description: The series CompTIA A+ 900 Certification - Complete Video Course provides an extensive lesson about CompTIA A+ 900 Certification. A+ Certification is one of the leading certificates in the computer industry. It certifies the competency of PC Service Specialists. Sponsored by CompTIA - the Computing Technology Industry Association, and tests, the course is administered by Pearson VUE. The course includes more than 50 lessons related to the Computer industry. The course starts by describing firmware and BIOS configuration options. After that, the course will teach you about the motherboard basics including motherboard sizes, form factors, and AMD CPU socket types. The course also includes topics such as Expansion slots, RAM types and features, install and configure PC expansion cards, install and configure storage device, CPU's and cooling methods and PC connection interfaces. The course will also focus on power supplies, PC connectors, printing technologies, networking tools, etc. In short, the course provides all the necessary information about computer hardware and operating system. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our CompTIA A+ 900 Certification - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Configuring BIOS Firmware FREE 00:07:00 BIOS Configuration Options 00:25:00 Motherboards Motherboard Sizes Form Factors 00:14:00 The Motherboard 00:12:00 AMD CPU Socket Types 00:11:00 Expansion Slots Expansion Cards 00:13:00 Bus Speeds 00:28:00 RAM Types and Features Memory 00:06:00 Types of RAM 00:07:00 Install and Configure PC Expansion Cards Ports 00:11:00 SCSI Connections 00:14:00 Audio Video Connections 00:26:00 Install and Configure Storage Devices Storage Devices 00:17:00 Hard Drives 00:17:00 Media Capacity 00:21:00 CPU's and Cooling Methods CPU Types and Characteristics 00:14:00 PC Connection Interfaces Physical Connections USB 00:11:00 Physical Connections VGA 00:11:00 Wireless Connections Bluetooth 00:06:00 Power Supplies Power Supply Specifications 00:16:00 Custom Computer Specifications What is a Standard Client 00:13:00 Audio Video Editing Workstations 00:08:00 Installing Displays Display Device Types 00:20:00 Backlighting 00:12:00 PC Connectors DVI to HDMI 00:13:00 Installing Peripheral Standard Input Device Types 00:16:00 Expansion Card Types 00:11:00 Multimedia Devices 00:11:00 Installing Multifunction Devices and SOHO Networks SOHO Networks 00:17:00 WPS 00:16:00 Encryption 00:14:00 Printer Technologies Printers 00:02:00 Printer Technologies Topic B Inkjet Printers 00:13:00 Printer Maintenance Technical Printer Components 00:09:00 Local and Network-Based Printers 00:22:00 Networking Network Interface Card Characteristics 00:20:00 Fiber Optic Cables 00:14:00 Properties and Characteristics of TCP/IP TCP IP 00:14:00 IP Address Classes 00:14:00 Addressing Schemes 00:17:00 TCP vs. UDP Ports 00:09:00 LDAP 00:04:00 Wi-Fi Networking Standards and Encryption Types Standards 00:03:00 Install and Configure SOHO Wireless/Wired Router Setting up your Router 00:10:00 Define Appropriate NAT Policies 00:16:00 Architecture and Internet Connection Types LANs 00:08:00 Network Topologies 00:11:00 ISPs 00:06:00 Networking Tools Cable Testers 00:13:00 Laptop Hardware Components Laptops 00:09:00 Laptop Expansion Options 00:10:00 Auto-Switching and Fixed Input Power Supplies 00:09:00 Mobile Devices What is Mobile Technology 00:09:00 Mobile Device Features 00:09:00 Bluetooth Configuration Method 00:08:00 Mobile Device Ports and Accessories Mobile Device Connection Types 00:10:00 Troubleshooting Mobile Devices 00:11:00 Troubleshooting Theory Troubleshooting Theory 00:16:00 Boot to Incorrect Device 00:16:00 PC Indicator Lights 00:10:00 Repair vs. Replace 00:10:00 Troubleshooting RAID Arrays and Hard Drives Drive and Array Troubleshooting Tools 00:06:00 Common RAID Array Issues 00:17:00 Troubleshooting Video Common Video and Display Issues 00:01:00 Troubleshooting Network Issues Common Network Issues 00:12:00 Troubleshooting Printers Common Printer Troubleshooting Tools 00:14:00 Windows Operating Systems Microsoft Windows 00:12:00 Microsoft Windows Features 00:17:00 Other Operating Systems 00:15:00 Installation Types 00:14:00 Customizing System Options 00:19:00 Command Line Tools The Command Prompt 00:12:00 Microsoft Operating System Features and Tools Administrative Tools 00:41:00 Task Manager 00:28:00 Memory Diagnostic Tool 00:46:00 Control Panel Utilities The Control Panel 00:11:00 Internet Options 00:10:00 Types of User Accounts 00:11:00 Computer My Computer 00:13:00 Permissions 00:31:00 System 00:10:00 Windows Networking on Client Desktops Workgroups 00:20:00 Network Connection Types 00:18:00 Preventative Maintenance Data Backup and Restoration 00:11:00 Scheduling Tasks 00:26:00 Features and Functionality of the Mac OS and Linux Operating Systems Patch Management in Mac OS X and Linux 00:09:00 Screen Sharing 00:06:00 Mac OS Multitouch Gestures - Touchscreen 00:09:00 Client Side Virtualization What is Virtualization 00:08:00 Virtual Desktop Infrastructure 00:12:00 Cloud-based Concepts SaaS (Software as Service) 00:09:00 Network Host Properties Server Roles 00:12:00 Mobile Operating Systems Open Source Software 00:03:00 Mobile Device Network and E-mail Mobile Device Hotspot 00:10:00 Security Malware 00:09:00 Social Engineering 00:13:00 Prevention Methods Physical Security 00:14:00 Hard Drive Sanitation 00:14:00 User Education 00:26:00 Windows Security Settings Users and Groups 00:11:00 Security Best Practices Password Best Practices 00:04:00 Securing Mobile Devices Locks 00:07:00 Troubleshooting Common PC Tools Operating System Troubleshooting Tools 00:12:00 Application Errors 00:16:00 Common Network Issues 00:12:00 Common Security Issues 00:10:00 Common PC Security Issues Browser Issues 00:06:00 Common Mobile Operating Systems Troubleshooting Dim Display 00:09:00 No Sound from Speakers 00:07:00 Common Safety Practices Static Electricity 00:14:00 Electrical Hazards 00:12:00 General Power Issues 00:10:00 Hazardous Material Disposal Procedures 00:07:00 Maintenance Tools and Techniques Professional Conduct 00:11:00 Types of Hardware Toolkits 00:11:00 Hard Drive Self-Tests 00:05:00 Computer Component Maintenance Techniques 00:10:00 Privacy and Licensing Concepts Incident Response 00:08:00 Proper Communication and Professionalism 00:07:00 Set Expectations 00:06:00 Mock Exam Mock Exam- CompTIA A+ 900 Certification - Complete Video Course 00:20:00 Final Exam Final Exam- CompTIA A+ 900 Certification - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00