Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. Course Curriculum Light Current Systems Light Current Fire Alarm System Part 1 00:17:00 Light Current Fire Alarm System Part 2 00:15:00 Light Current Fire Alarm System Part 3 00:18:00 Light Current Fire Alarm System Part 4 00:17:00 Light Current Fire Alarm System Part 5 00:17:00 Light Current Fire Alarm System Part 6 00:17:00 Light Current MATV System Part 1 00:14:00 Light Current MATV System Part 2 00:17:00 Light Current Telephone System 00:19:00 Light Current Data System Part 1 00:15:00 Light Current Data System Part 2 00:20:00 Light Current CCTV System Part 1 00:14:00 Light Current CCTV System Part 2 00:23:00 Light Current Sound System Part 1 00:18:00 Light Current Sound System Part 2 00:16:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00
This course is about developing core skills that will stay with you for a lifetime. It is designed such that you can watch the material and follow along step-by-step. It focuses on the implementation of YOLOv4 to get you up and running. You'll be an object detecting ninja in no time and be able to graduate to more advanced content.
Develop your technical report writing and presentation skills with EnergyEdge's course designed for oil & gas professionals. Sign up now!
Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) Lesson 1: Assessing Cybersecurity Risk Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management Lesson 2: Analyzing the Threat Landscape Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering Lesson 4: Analyzing Attacks on Computing and Network Environments Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques Lesson 6: Assessing the Organization's Security Posture Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing Lesson 7: Collecting Cybersecurity Intelligence Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources Lesson 8: Analyzing Log Data Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis Lesson 9: Performing Active Asset and Network Analysis Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise Lesson 10: Responding to Cybersecurity Incidents Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation Lesson 11: Investigating Cybersecurity Incidents Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation Additional course details: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
About this Training Course Process Hazard Assessment using the HAZOP Technique is an intensely participative course that will both explain the key facets of the HAZOP technique as well as provide ample opportunities for participants to practice and become familiar with the technique using generic and real-life examples. HAZOP Team Leader Training is an intensely participative course that will develop participants already familiar with the HAZOP technique, the skills, knowledge and attributes of a HAZOP Team Leader. An in-depth syndicate exercise will provide the opportunity to lead a HAZOP team (consisting of other participants) and to be observed performing the role for constructive feedback. This 5 full-day course has been reviewed and approved by the Institution of Chemical Engineers (IChemE). IChemE is the global professional membership organisation for chemical, biochemical and process engineers and other professionals involved in the chemical, process and bioprocess industries. Their knowledge of professional standards, close involvement with industry, education and regulators, and their expertise as a leading global training provider, means they are uniquely positioned to independently assess and approve training courses and professional development programmes across the world. Training Objectives Process Hazard Assessment using the HAZOP Technique By the end of this course, participants will be able to: Understand the basic HAZOP Technique Fulfill roles as competent HAZOP Team Members Understand the role of HAZOP in risk management Understand how Hazard Identification can predict accidents and incidents Understand how HAZOP complements other hazard identification tool HAZOP Team Leader Training By the end of this course, participants will be able to: Understand the role of the HAZOP Team Leader Practise the role in a classroom environment Provide feedback to participants on their performance as HAZOP Team Leaders Appreciate the leadership skills required as HAZOP Team Leader Plan, organise, manage and successfully undertake a Hazard and Operability study Target Audience This course will benefit: All key persons in the organisation, who by their discipline and/or position, are likely to be called on to initiate, participate or review a HAZOP study. All who have responsibility for the management and supervision of process & safety including but not limited to Senior Management, Plant Managers, Process and Maintenance Engineers (all disciplines), Line Supervisors, Team Leaders, Safety Specialists, and Process Training Instructors. Course Level Basic or Foundation Trainer Your expert course leader has 50 years' experience in chemical and process safety engineering. His early career included 20 years in design and project engineering with various fine chemical and pharmaceutical companies where he designed chemical processes, specified plant equipment and selected materials for highly corrosive and toxic processes, often where textbook data was not available. This was followed by 10 years in offshore oil and gas design projects where he was responsible for setting up a Technical Safety group to change design safety practices in the aftermath of the 1988 Piper Alpha disaster. In recent years, he has been called upon to conduct various offshore and onshore incident investigations. His career has given him experience in project engineering, project management, process design and operations, safety engineering and risk management. He is a Fellow of the UK Institution of Chemical Engineers. He served on the Scottish Branch committee, and was elected chairman for a two-year term in 1991. He has also been chairman of the Safety and Reliability Society - North of Scotland Branch. He has delivered training courses in Process Hazard Analysis (HAZOP and HAZID), Process Safety Management, Hazard Awareness, Risk Assessment, Root Cause Analysis, Failure Modes & Effect Analysis and has lectured on Reliability Analysis to the M.Sc. course in Process Safety and Loss Prevention at Sheffield University. In addition to delivering training courses, he currently facilitates HAZOP / HAZID / LOPA studies and undertakes expert witness roles advising lawyers engaged in contractual disputes, usually involving the design or construction of chemical plants or Oil & Gas production facilities, or criminal prosecutions. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
This course will help you to get started with Linux server administration. From covering the basic concepts needed for an entry-level Linux admin to advanced topics, such as Linux special permissions and commands, you will learn it all with the help of interesting activities.
Samba training course description Samba enables UNIX/Linux machines to act as Microsoft File and Print servers. This two day hands on training course progresses from the basics of installing samba and simple configurations through to authentication issues and troubleshooting. What will you learn Install and configure Samba. Administrate file and printer sharing. Secure Samba servers. Troubleshoot Samba Samba training course details Who will benefit: Technical staff working with Samba. Prerequisites: Intro to UNIX Systems Administration TCP/IP Foundation. Duration 2 days Samba training course contents What is Samba? File and print servers, Samba server roles, Windows networking, NetBIOS, SMB. Hands on Microsoft File and Print shares, analysing the network traffic. Installing Samba Source, binaries, where to find samba, building and compiling Samba. Hands on Download and install Samba. Controlling Samba Samba daemons, starting and stopping Samba, smbcontrol, Samba net command, smb.conf. Viewing Samba status, smbclient. Hands on Starting and stopping Samba, testing the server. Samba configuration Simple shares, smb.conf variables, configuration from a web browser, swat, enabling access to swat. Hands on Configuring samba servers and clients. File sharing Basic shares, [homes], locking options, UNIX file permissions, controlling user access, Windows ACLs, virtual samba servers, browsing. Hands on File sharing and browsing. Print sharing Sharing printers, UNIX printing, CUPS, printer drivers, [printers], PRINT$. Hands on Samba print server. Authentication Workgroups, domains, users and passwords, Samba domain security, Samba password backends: smbpasswd, tdbsam, nisplus, mysql, Active Directory. Hands on Securing samba shares. Troubleshooting Logging options, controlling logs, Samba utilities, network protocols, .SMB/CIFS. Performance tuning. Hands on Troubleshooting Samba
Video coding training course description This course investigates the characteristics of video coding with an emphasis on compression and the standards used in IP networks. What will you learn Explain how video coding works. Describe the main video coding standards. Evaluate and compare the major video coding standards. Video coding training course details Who will benefit: Anyone working with MPEG. Prerequisites: None. Duration 2 days Video coding training course contents Introduction Video coding systems, encoding, transmission, decoding. Digital video formats: Old formats (CIFâ¦), PC formats (VGAâ¦), SD, HD, UHD. Video codecs What is a CODEC, pictures and audio, digitisation, sampling, quantisation, encoding, compressing. Codec types Lossy, lossless, uncompressed. Quality, bandwidth. Video Fps, bitstreams, pictures, frames, fields. Aspect ratios. Colour Colour perception, RGB, YUV, YCbCr sampling, 4:00, 4:2:0, 4:2:2, 4:4:4. Hybrid video coding scheme Picture partitioning, intra prediction, inter prediction, motion estimation, residual coding, in loop filtering, entropy coding. Containers Relationship with codecs, audio, video. Audio Video Interleave (.avi), .asf, QuickTime, AVCHD, Flash, .mp4, 3gp. MPEG-TS. MPEG Analysing MPEG frames. Video coding standards H.264/AVC: Profiles MPEG, bit rates, resolution. I, B, P frames, GOP. MPEG 2, MPEG 4, H.264, H.265, VP9, AV1. Hands onand levels, how it works. H.265/HEVC: Profiles and levels, Quadtrees, slices, how it works. Open video coding: VP8, VP9, AV1.
RADIUS training course description A fast paced hands-on introduction to RADIUS. Moves from installation and configuration through to packet analysis and accounting. Practical exercises are spread throughout the course to maintain student interest. What will you learn Configure PPP and PAP/CHAP. Install and configure RADIUS servers. Describe how RADIUS works. Setup RADIUS accounting. Analyse RADIUS packets. Troubleshoot RADIUS installations. RADIUS training course details Who will benefit: Network Administrators. Support personnel. Anyone who will be working with RADIUS. Prerequisites: Knowledge of the TCP/IP protocols would be advantageous. Duration 2 days RADIUS training course contents What is RADIUS? AAA services, Authentication, Authorisation, Accounting, local AAA services, remote AAA services, What is RADIUS? RADIUS as a protocol, RADIUS as an architecture, RADIUS as a standard. Installing RADIUS RADIUS platforms, RADIUS servers, client server communications, services, daemons. Hands on Installing RADIUS and testing with NTRadPing. Server configuration Configuring clients on the server, shared secrets, usernames and passwords. IP address pools. Hands on Configuring a server and testing with NTRadPing. Client configuration Example clients, client configuration steps, enabling RADIUS, pointing clients to the server, shared secrets, example Cisco authentication, example Cisco authorization. Hands on Configuring clients for RADIUS. How RADIUS works RADIUS architecture, RADIUS and authentication, PPP, PAP, CHAP, RADIUS SUCCESS, RADIUS FAILURE, the RADIUS protocol stack, the RADIUS protocol, the RADIUS header, RADIUS codes, RADIUS attributes, ACCESS-REQUEST example, ACCESS-ACCECPT example, CHAP example, proprietary attributes, using unassigned type codes, RADIUS attribute 26, Cisco specific attributes. Hands on Analysing RADIUS packets, configuring PPP CHAP to work with RADIUS. RADIUS accounting Simplified operation, Accounting codes, Accounting attributes, client and server configuration for accounting. Hands on Configuring RADIUS accounting. RADIUS architectures Traditional architecture, multiple RADIUS servers for resilience, Proxy RADIUS servers, Realms, RADIUS in VPNs, RADIUS with 802.1x. Hands on Using multiple RADIUS servers, Proxies. Troubleshooting RADIUS General problem solving, basic tools, RADIUS troubleshooting, Common configuration errors, log files, RADIUS design and performance. Hands on Fixing RADIUS problems.
MPEG training course description This course studies the MPEG standards for video and audio compression. A major focus is on MPEG-4 and MPEG-TS. Hands on includes decoding and analysing MPEG streams. What will you learn Recognise the main MPEG standards. Describe the techniques used in MPEG video and audio compression. Compare MPEG2m MPEG4 and MPEG-H. Describe the MPEG-TS. Analyse MPEG streams. MPEG training course details Who will benefit: Anyone working with MPEG. Prerequisites: None. Duration 2 days MPEG training course contents Introduction What is MPEG? MPEG and VCEG, MPEG 1, MPEG 2, MPEG-3, MPEG-4, MPEG-H, others, codecs and containers, licensing and patents, parts and layers (System, Video, Audio, others). MPEG2 DVD, DVB, characteristics, MPEG2 Part2, audio MPEG2 Part 7 (AAC). MPEG tools Wireshark, vlc, analysers, decoders, ffmpeg, wowzer. MPEG2 Video compression Sampling, bit rates, resolution. Inter and Intra frame coding, I, B, P frames, GOP, slices, blocks, macroblocks. Motion estimation. Hands on Analysing MPEG frames. MPEG4 Profiles and levels, Enhancements, Parts 1,2,3, Part 10 and AVC, Part 14 and mp4. Performance versus MPEG2. MPEG audio Coding, frequencies, bit rates. MPEG-TS PES, Transport Streams, TS elements, packets, PID, Programs, PSI, PAT, PMT, synchronisation, PCR, PTS. MPEG-H Part 2 HEVC, benefits, improvements. Video codecs What is a CODEC, pictures and audio, digitisation, sampling, quantisation, encoding, compressing.