• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

286 Encryption courses delivered Online

AWS IAM: The Cloud Engineer's Security Handbook

By Packt

Understand how to use AWS IAM to run AWS resources securely against cloud hacks

AWS IAM: The Cloud Engineer's Security Handbook
Delivered Online On Demand2 hours 47 minutes
£137.99

Database Administrator Courses

4.9(27)

By Apex Learning

***Limited Time Exclusive Bundle*** Get Hard Copy + PDF Certificates + Transcript + Student ID Card + e-Learning App as a Gift - Enrol Now Tired of browsing and searching for a Database Administrator course you are looking for? Can't find the complete package that fulfils all your needs? Then don't worry as you have just found the solution. Take a minute and look through this extensive bundle that has everything you need to succeed. After surveying thousands of learners just like you and considering their valuable feedback, this all-in-one Database Administrator bundle has been designed by industry experts. We prioritised what learners were looking for in a complete package and developed this in-demand Database Administrator course that will enhance your skills and prepare you for the competitive job market. Also, our experts are available for answering your queries on Database Administrator and help you along your learning journey. Advanced audio-visual learning modules of these Database Administrator courses are broken down into little chunks so that you can learn at your own pace without being overwhelmed by too much material at once. Furthermore, to help you showcase your expertise in Database Administrator, we have prepared a special gift of 1 hardcopy certificate and 1 PDF certificate for the title course completely free of cost. These certificates will enhance your credibility and encourage possible employers to pick you over the rest. This Database Administrator Bundle Consists of the following Premium courses: Course 01: Introduction to Data Analysis Course 02: Data Center Training Essentials: General Introduction Course 03: Data Analytics with Tableau Course 04: Basic Google Data Studio Course 05: Complete Google Analytics Course Course 06: Python for Data Analysis Course 07: Data Analysis in Excel Level 3 Course Course 08: Microsoft Excel: Automated Dashboard Using Advanced Formula, VBA, Power Query Course 09: GDPR Data Protection Level 5 Course 10: Level 3 Cyber Security Course 11: Encryption Course 12: Windows 10 Pro Complete Training Course 13: Functional Skills IT Course 14: Learning Computers and Internet Level 2 Benefits you'll get choosing Apex Learning: Pay once and get lifetime access to 14 CPD courses Free e-Learning App for engaging reading materials & helpful assistance Certificates, student ID for the title course included in a one-time fee Free up your time - don't waste time and money travelling for classes Accessible, informative modules designed by expert instructors Learn at your ease - anytime, from anywhere Study the course from your computer, tablet or mobile device CPD accredited course - improve the chance of gaining professional skills Gain valuable knowledge without leaving your home How will I get my Certificate? After successfully completing the course, you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (For The Title Course) Hard Copy Certificate: Free (For The Title Course) The bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your Database Administrator expertise and essential knowledge, which will assist you in reaching your goal. Curriculum of Bundle Course 01: Introduction to Data Analysis Module 01: Introduction Module 02: Agenda and Principles of Process Management Module 03: The Voice of the Process Module 04: Working as One Team for Improvement Module 05: Exercise: The Voice of the Customer Module 06: Tools for Data Analysis Module 07: The Pareto Chart Module 08: The Histogram Module 09: The Run Chart Module 10: Exercise: Presenting Performance Data Module 11: Understanding Variation Module 12: The Control Chart Module 13: Control Chart Example Module 14: Control Chart Special Cases Module 15: Interpreting the Control Chart Module 16: Control Chart Exercise Module 17: Strategies to Deal with Variation Module 18: Using Data to Drive Improvement Module 19: A Structure for Performance Measurement Module 20: Data Analysis Exercise Module 21: Course Project Module 22: Test your Understanding Course 02: Data Center Training Essentials: General Introduction Module 01: Data Center Introduction Module 02: Data Center Reliability Module 03: Data Center Equipment Module 04: Data Center White Space Module 05: Data Center Support Spaces Module 06: Data Center Security, Safety, Networks and IT Course 03: Data Analytics with Tableau Module 01: Introduction to the Course Module 02: Project 1: Discount Mart (Sales and Profit Analytics) Module 03: Project 2: Green Destinations (HR Analytics) Module 04: Project 3: Superstore (Sales Agent Tracker) Module 05: Northwind Trade (Shipping Analytics) Module 06: Project 5: Tesla (Stock Price Analytics) Module 07: Bonus: Introduction to Database Concepts Module 08: Tableau Stories Course 04: Basic Google Data Studio Module 01: Introduction to GDS Module 02: Data Visualization Module 03: Geo-visualization Module 04: A Socio-Economic Case Study Course 05: Complete Google Analytics Course Module 01: Overview Module 02: Navigation and Admin Module 03: Creating a New Google Analytics Account Module 04: Website Account Creation Module 05: Connecting To WordPress Website Module 06: Connecting To HTML Site Module 07: Connect Custom Page and Site Builders Module 08: Setting Up Annotations Module 09: Setting Up Intelligence Events Module 10: Set Up Custom Segments Module 11: Export Data for Analysis Module 12: Set Up Custom Reports Module 13: Set Up Google Integrations Module 14: Google Analytics Templates Module 15: Real Time Reporting Module 16: Setting Up Goals Module 17: Third Party Integrations Module 18: Audience Menu Overview Module 19: Interests and Geography Module 20: Conclusion Course 06: Python for Data Analysis Welcome, Course Introduction & overview, and Environment set-up Python Essentials Python for Data Analysis using NumPy Python for Data Analysis using Pandas Python for Data Visualization using matplotlib Python for Data Visualization using Seaborn Python for Data Visualization using pandas Python for interactive & geographical plotting using Plotly and Cufflinks Capstone Project - Python for Data Analysis & Visualization Python for Machine Learning (ML) - scikit-learn - Linear Regression Model Python for Machine Learning - scikit-learn - Logistic Regression Model Python for Machine Learning - scikit-learn - K Nearest Neighbors Python for Machine Learning - scikit-learn - Decision Tree and Random Forests Python for Machine Learning - scikit-learn -Support Vector Machines (SVMs) Python for Machine Learning - scikit-learn - K Means Clustering Python for Machine Learning - scikit-learn - Principal Component Analysis (PCA) Recommender Systems with Python - (Additional Topic) Python for Natural Language Processing (NLP) - NLTK - (Additional Topic) Course 07: Data Analysis in Excel Level 3 Course Modifying a Worksheet Working with Lists Analyzing Data Visualizing Data with Charts Using PivotTables and PivotCharts Working with Multiple Worksheets and Workbooks Using Lookup Functions and Formula Auditing Automating Workbook Functionality Creating Sparklines and Mapping Data Forecasting Data Course 08: Microsoft Excel: Automated Dashboard Using Advanced Formula, VBA, Power Query Introduction Prepaid Expenses Models: Resources Download Accounting for Prepaid Expenses Excel Formulas Detailed: Introduction to three Excel Models Formula Based Prepaid Expenses Model Calculate Prepaid Expenses Amortisation from Exact Start Date Prepaid Expenses Summary with Power Query and Pivot Table Advanced VBA Prepaid Expenses Amortisation Model BONUS: Dynamic Dashboard for Divisional Profit and Loss statements: Easy Way Power Query & Pivot Tables based Dashboard without any Formulas, Fully Dynamic Thankyou Course 09: GDPR Data Protection Level 5 Module 01: GDPR Basics Module 02: GDPR Explained Module 03: Lawful Basis for Preparation Module 04: Rights and Breaches Module 05: Responsibilities and Obligations Course 10: Level 3 Cyber Security FUNDAMENTALS OF NETWORKING GETTING STARTED WITH CYBER SECURITY LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY DIVING DEEP INTO CYBER SECURITY TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES FIREWALLS AND ANTIVIRUS KEY SECURITY CONCEPTS Course 11: Encryption Section 01: Introduction Section 02: Basics of Common Encryption Section 03: Technical Aspects of Encryption Section 04: AES Basic Tech Demo Section 05: File and System Encryption Section 06: Conclusion Course 12: Windows 10 Pro Complete Training Module 01: Course Overview Module 02: Building Your Virtual Lab Environment Module 03: Upgrading Windows 7, 8, or 8.1 to Windows 10 Module 04: Building a Microsoft Server 2016 Domain Module 05: Windows Deployment Services (WDS) Module 06: Windows 10 Firewall, Windows Defender and UAC Module 07: Networking Module 08: Troubleshooting Module 09: User Preferences Module 10: Maintenance Course 13: Functional Skills IT Section 1: Introduction Section 2: Information Technology Section 3: Components of IT Section 4: Hardware Section 5: Operating System Section 6: Application/Software Section 7: Networking Section 8: Security Section 9: Traffic Flow & Enterprise Level IT Components Section 10: Storage Section 11: Database Section 12: Virtualisation & Cloud Section 13: Management & Other IT Jobs Course 14: Learning Computers and Internet Level 2 Module 01 : Computer Operating and Troubleshooting Module 02 : Internet and Computing - Key Applications Module 03 : Internet and Computing - Tools & Networking Module 04 : Windows 8 for PC Module 05 : Windows 10 - New Developments Module 06 : Cyber Security Awareness CPD 160 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Database Administrator bundle. Requirements Our Database Administrator course is fully compatible with PCs, Macs, laptops, tablets and Smartphone devices. Career path Having this Database Administrator expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included P.S. The delivery charge inside the UK is £3.99, and the international students have to pay £9.99.

Database Administrator Courses
Delivered Online On Demand
£65

AWS Certified Data Analytics Specialty (2023) Hands-on

By Packt

This course covers the important topics needed to pass the AWS Certified Data Analytics-Specialty exam (AWS DAS-C01). You will learn about Kinesis, EMR, DynamoDB, and Redshift, and get ready for the exam by working through quizzes, exercises, and practice exams, along with exploring essential tips and techniques.

AWS Certified Data Analytics Specialty (2023) Hands-on
Delivered Online On Demand16 hours 33 minutes
£68.99

Data Protection Courses

By NextGen Learning

3-in-1 Exclusive Bundle Our extensive Data Protection course is developed thoroughly for you to indulge and learn all the topics with utmost clarity and thorough explanation. This Data Protection course includes not only one course but THREE courses within the bundle. So you are getting two extra courses for the price of one, no extra money! Our course aims to provide detailed insight into the Data Protection with full support from our teachers. So if you are looking for a convenient way to boost your knowledge further of the Data Protection topic but are too busy to go to a class, then enrol in this course and you are sorted! Our in-depth course has no time limit and can be accessed from anywhere in the world. You'll pick up a ton of fresh information, whether you're a novice or an advanced. The mega course's sheer size and breadth speak for itself! So, do not delay any further; we are excited and looking forward to letting you in our CPD Accredited course as much as you are! The following courses will not only fast-track your career but also make it even more rewarding: Course 01: Data Protection Course 02: Cyber Security Incident Handling and Incident Response Course 03: Encryption Learning Outcome From this interactive Data Protection course, you will be able to: Deep dive into the basics of Data Protection. Learn how to improve your skills in general. Increase your ability to reason and solve problems. Utilise the Data Protection to boost output. Gain confidence and clarity in your communication. Explore different career routes in this field. This comprehensive three-in-one Data Protection course equips you with critical guidance, methods, and strategies for increasing both employee and professional development. The Data Protection course from Next Generation's easy-to-digest and deliverable modules will provide you with the most essential and useful knowledge for growing your profession, from setting personal development goals to forming a cross-functional team. Course Curriculum: GDPR Explained Lawful Basis for Preparation Rights and Breaches Ethical and Social Issues and Data Protection Preparation for an Incident Where Does Identification Occur? Deployment and Categorisation Restoring and Improving Defenses Basics: Symmetric and Asymmetric Encryption Java program Demonstration: Plaintext to AES Encryption Text And many more ... Show off your new skills with a certificate of completion Once you complete the course, you will be eligible to request a digital certificate for free. For Printed Transcript & Hardcopy Certificate- 4.99 GBP (Inside the UK Postal Fee) 8.99 GBP (International Delivery Fee) CPD 30 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This comprehensive three-in-one bundled Data Protection course has no restrictions for people registering for it. Anyone between the age of above sixteen can apply for the course. So whether you are an eager learner to explore the deeper unknown facts of the subject or a skilled individual in this field who wishes to enhance their career prospects further can take this course. Requirements No previous knowledge is required to enrol in this training. Career path The aim of this exclusive bundle Data Protection course is to help you toward your dream career. So, complete this course and enhance your skills to explore opportunities in relevant areas.

Data Protection Courses
Delivered Online On Demand6 hours
£12

Foundations of IT Security: Protecting Digital Assets

4.5(3)

By Studyhub UK

Dive deep into the realm of cyber safety with 'Foundations of IT Security: Protecting Digital Assets'. This curriculum ensures you grasp the essentials of IT defence, from understanding the rudiments to grasping advanced techniques. Chart your journey through crucial subjects such as network safety, OS safeguarding and the profound world of cryptography. In an era where digital threats loom large, this comprehensive programme equips you with the knowledge to defend the vast expanse of digital assets effectively. Learning Outcomes Understand the core principles of IT security and its significance. Develop insights into setting up and managing robust security policies and procedures. Master the intricacies of network, operating system, and web protection. Delve into the art of cryptography and familiarise with advanced encryption methods. Stay abreast with the latest and upcoming shifts in IT security paradigms. Why buy this Foundations of IT Security: Protecting Digital Assets? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Foundations of IT Security: Protecting Digital Assets for? Individuals keen on delving into the digital protection domain. IT professionals aiming to bolster their security knowledge. Entrepreneurs wishing to safeguard their digital assets. Technical enthusiasts curious about evolving IT security trends. Organisations aspiring to upgrade their digital defence mechanisms. Career path IT Security Analyst: £40,000 - £60,000 Network Security Specialist: £45,000 - £65,000 Cryptographer: £50,000 - £70,000 Web Security Administrator: £42,000 - £58,000 Wireless Security Consultant: £47,000 - £68,000 Digital Protection Strategist: £52,000 - £75,000 Prerequisites This Foundations of IT Security: Protecting Digital Assets does not require you to have any prior qualifications or experience. You can just enrol and start learning. This course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Module 1: Introduction to IT Security Introduction to IT Security 00:16:00 Module 2: Security Policies and Procedures Security Policies and Procedures 00:16:00 Module 3: Network Security Network Security 00:13:00 Module 4: Operating System Security Operating System Security 00:14:00 Module 5: Cryptography and Encryption Cryptography and Encryption 00:15:00 Module 6: Web Security Web Security 00:14:00 Module 7: Wireless Security Wireless Security 00:13:00 Module 8: Emerging Trends in IT Security Emerging Trends in IT Security 00:15:00

Foundations of IT Security: Protecting Digital Assets
Delivered Online On Demand1 hour 56 minutes
£10.99

Total SMTP and email for engineers

5.0(3)

By Systems & Network Training

SMTP training course description A hands on course focusing on the workings of email systems and the standard protocols that they use. The course is not specific to any particular implementation, but some vendor specifics are noted. Linux and Microsoft machines are used in hands on sessions to reinforce the theory of major sessions. The course concentrates on troubleshooting and interworking using network sniffing and protocol inspection rather than "which buttons to push". What will you learn Describe and explain SMTP MIME POP3 IMAP PGP, GPG, S/MIME SPF, DKIM, DMARC Configure mail routing Secure email systems SMTP training course details Who will benefit: Technical staff responsible for email systems. Prerequisites: TCP/IP foundation for engineers. Duration 3 days SMTP training course contents SMTP architecture What is SMTP, email before SMTP, SMTP history, the different protocols, clients, servers. Email composition, transmission, delivering emails, storing and reading emails. MUAs, MTAs, POP3, IMAP, SMTP, DNS, webmail. Hands on Setting up MTAs and MUAs and sending a simple email using telnet. The SMTP protocol SMTP protocol stack, SMTP headers, HELO, SMTP mail, MAIL FROM, RCPT TO, DATA, SMTPUTF8, 8BITMIME, TURN, EHLO, ETRN, 3 digit replies. Hands on Analysing SMTP packets on a network. DNS and SMTP SMTP forwarding, SMTP relays, interoperation, how SMTP uses DNS, MX records. Hands on Setting up mail relays. SMTP headers IMF data, From, to, cc, bcc, sender and recipient headers, message Ids, received trails, in-reply-to, received-SPF, mail list headers. Hands on Using clients to analyse details from mail headers, including true originators and path of emails. MIME Email attachments, MIME versions, content type headers, encoding, base 64, binary data, multi part headers, troubleshooting attachments. Hands on Analysing MIME headers and attachments. POP3 What is POP3, where to use POP3, authorisation, transactions, POP3 commands: USER, PASS, STAT, LIST, RETR, DELE. Hands on Setting up a POP3 server, analysing POP3 packets on a network. IMAP and IMAPS What is IMAP, where to use IMAP, authorisation, mailbox structure, IMAP commands: LOGIN, AUTHENTICATE, LIST, CREATE, Examine (message flags), SELECT, STORE. Hands on Setting up an IMAP server and analysing IMAP packets on a network. Interoperation Mail gateways, addressing, Exchange, sendmail. Email security Basics, Transport level: STARTTLS. Content: PGP/GPG, mail signing and encryption, S/MIME, digital certificates, secure email submission. Hands on Setting up and using a PGP key, configure MTAs to use TLS. Email authentication and spam prevention Mail relays, grey listing, block list & RBL, DNSBL (Real-time Black hole List), White list, SPF, Domain Keys Identified Mail (DKIM), Author Domain Signing Practices (ADSP), Abuse Report Format (ARF), Domain-based Message Authentication, Reporting and Conformance (DMARC). Hands on Relay spamming and the blocking spamming.

Total SMTP and email for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

Certified Information Systems Auditor (CISA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security. Overview Upon successful completion of this course, students will be able to: - implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices. - evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices. - evaluate information systems acquisition, development, and implementation. - evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained. - define the protection policies used to promote the confidentiality, integrity, and availability of information assets. In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives. 1 - The Process of Auditing Information Systems ISACA Information Systems Auditing Standards and Guidelines Fundamental Business Processes Develop and Implement an Information Systems Audit Strategy Plan an Audit Conduct an Audit The Evidence Life Cycle Communicate Issues, Risks, and Audit Results Support the Implementation of Risk Management and Control Practices 2 - IT Governance and Management Evaluate the Effectiveness of IT Governance Evaluate the IT Organizational Structure and HR Management Evaluate the IT Strategy and Direction Evaluate IT Policies, Standards, and Procedures Evaluate the Effectiveness of Quality Management Systems Evaluate IT Management and Monitoring of Controls IT Resource Investment, Use, and Allocation Practices Evaluate IT Contracting Strategies and Policies Evaluate Risk Management Practices Performance Monitoring and Assurance Practices Evaluate the Organizations Business Continuity Plan 3 - Information Systems Acquisition, Development, and Implementation Evaluate the Business Case for Change Evaluate Project Management Frameworks and Governance Practices Development Life Cycle Management Perform Periodic Project Reviews Evaluate Control Mechanisms for Systems Evaluate Development and Testing Processes Evaluate Implementation Readiness Evaluate a System Migration Perform a Post-Implementation System Review 4 - Information Systems Operations, Maintenance, and Support Perform Periodic System Reviews Evaluate Service Level Management Practices Evaluate Third-Party Management Practices Evaluate Operations and End User Management Practices Evaluate the Maintenance Process Evaluate Data Administration Practices Evaluate the Use of Capacity and Performance Monitoring Methods Evaluate Change, Configuration, and Release Management Practices Evaluate Problem and Incident Management Practices Evaluate the Adequacy of Backup and Restore Provisions 5 - Protection of Information Assets Information Security Design Encryption Basics Evaluate the Functionality of the IT Infrastructure Evaluate Network Infrastructure Security Evaluate the Design, Implementation, and Monitoring of Logical Access Controls Risks and Controls of Virtualization Evaluate the Design, Implementation, and Monitoring of Data Classification Process Evaluate the Design, Implementation, and Monitoring of Physical Access Controls Evaluate the Design, Implementation, and Monitoring of Environmental Controls

Certified Information Systems Auditor (CISA)
Delivered OnlineFlexible Dates
£3,250

AZ-104T00 Microsoft Azure Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Administrators. The Azure Administrator implements, manages, and monitors identity, governance, storage, compute, and virtual networks in a cloud environment. The Azure Administrator will provision, size, monitor, and adjust resources as appropriate. This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution. Prerequisites Successful Azure Administrators start this role with experience in virtualization, networking, identity, and storage. Understanding of on-premises virtualization technologies, including: VMs, virtual networking, and virtual hard disks. Understanding of network configurations, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies. Understanding of Active Directory concepts, including users, groups, and role-based access control. Understanding of resilience and disaster recovery, including backup and restore operations. 1 - Configure Microsoft Entra ID Describe Microsoft Entra ID benefits and features Describe Microsoft Entra concepts Compare Active Directory Domain Services to Microsoft Entra ID Select Microsoft Entra editions Implement Microsoft Entra join Implement Microsoft Entra self-service password reset 2 - Configure user and group accounts Create user accounts Manage user accounts Create bulk user accounts Create group accounts Create administrative units 3 - Configure subscriptions Identify Azure regions Implement Azure subscriptions Obtain an Azure subscription Identify Azure subscription usage Implement Microsoft Cost Management Apply resource tagging Apply cost savings 4 - Configure Azure Policy Create management groups Implement Azure policies Create Azure policies Create policy definitions Create an initiative definition Scope the initiative definition Determine compliance 5 - Configure role-based access control Implement role-based access control Create a role definition Create a role assignment Compare Azure roles to Microsoft Entra roles Apply role-based access control Review fundamental Azure RBAC roles 6 - Configure Azure resources with tools Use the Azure portal Use Azure Cloud Shell Use Azure PowerShell Use Azure CLI 7 - Use Azure Resource Manager Review Azure Resource Manager benefits Review Azure resource terminology Create resource groups Create Azure Resource Manager locks Reorganize Azure resources Remove resources and resource groups Determine resource limits 8 - Configure resources with Azure Resource Manager templates Review Azure Resource Manager template advantages Explore the Azure Resource Manager template schema Explore the Azure Resource Manager template parameters Consider Bicep templates Review QuickStart templates 9 - Configure virtual networks Plan virtual networks Create subnets Create virtual networks Plan IP addressing Create public IP addressing Associate public IP addresses Allocate or assign private IP addresses 10 - Configure network security groups Implement network security groups Determine network security group rules Determine network security group effective rules Create network security group rules Implement application security groups 11 - Configure Azure DNS Identify domains and custom domains Verify custom domain names Create Azure DNS zones Delegate DNS domains Add DNS record sets Plan for Azure Private DNS zones Review Azure Private DNS zone scenarios 12 - Configure Azure Virtual Network peering Determine Azure Virtual Network peering uses Determine gateway transit and connectivity Create virtual network peering Extend peering with user-defined routes and service chaining 13 - Configure network routing and endpoints Review system routes Identify user-defined routes Determine service endpoint uses Determine service endpoint services Identify private link uses 14 - Configure Azure Load Balancer Determine Azure Load Balancer uses Implement a public load balancer Implement an internal load balancer Determine load balancer SKUs Create back-end pools Create health probes Create load balancer rules 15 - Configure Azure Application Gateway Implement Azure Application Gateway Determine Azure Application Gateway routing Configure Azure Application Gateway components 16 - Configure storage accounts Implement Azure Storage Explore Azure Storage services Determine storage account types Determine replication strategies Access storage Secure storage endpoints 17 - Configure Azure Blob Storage Implement Azure Blob Storage Create blob containers Assign blob access tiers Add blob lifecycle management rules Determine blob object replication Upload blobs Determine Blob Storage pricing 18 - Configure Azure Storage security Review Azure Storage security strategies Create shared access signatures Identify URI and SAS parameters Determine Azure Storage encryption Create customer-managed keys Apply Azure Storage security best practices 19 - Configure Azure Files and Azure File Sync Compare storage for file shares and blob data Manage Azure file shares Create file share snapshots Implement Azure File Sync Identify Azure File Sync components Deploy Azure File Sync 20 - Configure Azure Storage with tools Use Azure Storage Explorer Use the Azure Import/Export service Use the WAImportExport tool Use the AzCopy tool 21 - Configure virtual machines Review cloud services responsibilities Plan virtual machines Determine virtual machine sizing Determine virtual machine storage Create virtual machines in the Azure portal Connect to virtual machines 22 - Configure virtual machine availability Plan for maintenance and downtime Create availability sets Review update domains and fault domains Review availability zones Compare vertical and horizontal scaling Implement Azure Virtual Machine Scale Sets Create Virtual Machine Scale Sets Implement autoscale Configure autoscale 23 - Configure Azure App Service plans Implement Azure App Service plans Determine Azure App Service plan pricing Scale up and scale out Azure App Service Configure Azure App Service autoscale 24 - Configure Azure App Service Implement Azure App Service Create an app with App Service Explore continuous integration and deployment Create deployment slots Add deployment slots Secure your App Service app Create custom domain names Back up and restore your App Service app Use Azure Application Insights 25 - Configure Azure Container Instances Compare containers to virtual machines Review Azure Container Instances Implement container groups Review the Docker platform 26 - Configure file and folder backups Describe Azure Backup benefits Implement Backup Center for Azure Backup Configure Azure Recovery Services vault backup options Use the Microsoft Azure Recovery Services (MARS) agent Configure on-premises file and folder backups 27 - Configure virtual machine backups Explore options to protect virtual machine data Create virtual machine snapshots in Azure Backup Set up Azure Recovery Services vault backup options Back up your virtual machines Restore your virtual machines Implement System Center DPM and Azure Backup Server Compare the MARS agent and Azure Backup Server Implement soft delete for your virtual machines Implement Azure Site Recovery 28 - Configure Azure Monitor Describe Azure Monitor key capabilities Describe Azure Monitor components Define metrics and logs Identify monitoring data and tiers Describe activity log events Query the activity log 29 - Configure Azure alerts Describe Azure Monitor alerts Manage Azure Monitor alerts Create alert rules Create action groups 30 - Configure Log Analytics Determine Log Analytics uses Create a Log Analytics workspace Create Kusto (KQL) queries Structure Log Analytics queries 31 - Configure Network Watcher Describe Azure Network Watcher features Review IP flow verify diagnostics Review next hop diagnostics Visualize the network topology

AZ-104T00 Microsoft Azure Administrator
Delivered OnlineFlexible Dates
£2,380

Mikrotik with IPSEC VPN Tunnel

4.8(9)

By Skill Up

Profitably set up, manage and optimize professional retargeting campaigns and explore retargeting ads with the Retargeting Ads Guide

Mikrotik with IPSEC VPN Tunnel
Delivered Online On Demand3 hours 38 minutes
£25

Fundamentals of Secure Software

By Packt

This course is complete training for someone who wants to join the security world and get familiar with most of the practices/risks and different areas, where they can invest to become experts. It covers both the 'admin' side of how to develop the processes and program around it as well as an insight into the technical aspects.

Fundamentals of Secure Software
Delivered Online On Demand6 hours 33 minutes
£74.99
1...56789...29