• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1023 Environment courses in London

Advance Sales Management

5.0(10)

By GBA Corporate

Overview This course is designed to gain advanced sales techniques through traditional and modern selling techniques. It will help train the participants for a wide range of sale environments in diverse sectors. With the increase in neck-to-neck competition sales have become a major factor and a lot of new philosophies and modern techniques including new sales methodology has been introduced in the sales industry. As a salesperson who is directly involved in sales or even managers who are into products and services, knowing how to sell is an incredibly useful skill. The course is designed with a lot of practical exercises, and modern techniques, taking from basic to advance level which will help the delegates to attain the skills they require and start implementing what they learned.

Advance Sales Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

The Rewind Technique: Effective treatment for trauma (PTSD) and phobias

By Human Givens College

Essential skill for all mental health professionals This 2-day workshop gives you the opportunity to see demonstrated, experience, and practice the steps of this powerful technique in a small group under the careful guidance of our expert tutor… Accredited CPD Certificate : 12 hours Length 2 days (9:30am - 4:00pm) Excellent course. A brilliantly encouraging and supportive environment in which to learnHARRIET, WORKSHOP PARTICIPANT Life-changing! A great weight has been lifted off my shoulders.NURSE (PREVIOUSLY TRAUMATISED BY A CAR ACCIDENT) Why take this course We have over 20 years of experience in teaching the rewind technique to health and welfare professionals – we’ve drawn on that experience to develop a course which gives you enough time to thorough absorb and practice the technique, understand why it works and to experience it yourself, so that you leave confident in your ability to use the rewind safely and effectively. The Rewind Technique* is an effective psychological intervention for successfully treating trauma and phobias and one of the most important skills you need to master to be able to work successfully with any anxiety disorder or condition which may have developed as a result of unresolved trauma. Even the most severe phobic and post-traumatic stress (PTSD) symptoms can be successfully addressed using the the rewind technique taught on this 2-day course, which has been refined* in line with understandings from neuroscience to make it as safe and reliably effective as possible. An essential therapeutic technique to have in your therapeutic ‘toolkit’, it is important to learn and practice it under the careful guidance of our expert tutor – you will leave the course knowing how to use the rewind technique safely and effectively having watched live demonstrations, had plenty of time to practice the steps involved with fellow students, the opportunity to experience the technique yourself and more. Our workshop has limited numbers so you will have plenty of opportunities for asking questions and the tutor, who has extensive clinical experience. Using the rewind technique you can, often surprisingly quickly, detraumatise bad memories, stop flashbacks and other PTSD symptoms, cure phobias, banish nightmares and reduce anxiety so you can help the victims of abuse, rape, violence, car accidents, fire, terrorism and panic attacks, heart attacks and other life-threatening experiences. Another key benefit of this technique is non disclosure – there is no need for people to repeatedly revisit or talk about specific details of the events that have traumatised them. This helps avoid embedding the trauma further and making the situation worse – as can sometimes inadvertently happen in other therapeutic approaches to treating trauma – and helps prevent the therapist or counsellor being vicariously traumatised by what they might hear. It is also invaluable when working therapeutically with people who have suffered persistent physical or sexual abuse, and people with OCD. People suffering from other conditions, such as depression, addictions or uncontrollable anger, may have experienced a traumatic event, which needs to be successfully detraumatised in order for them to move on with their lives. As a result of our training in the rewind technique – which we have been delivering for over 20 years – our graduates have brought relief to literally thousands of people (eg. case history / PTSD Resolution). Please note This is a powerful technique, which needs to be implemented with care – we recommend you take the time to learn it in person in a small group with a skilled and highly experienced tutor who can guide you through the important steps involved, oversee you as you practise them, answer your questions and give you crucial direct feedback. The version of the rewind technique* you will learn on this course has been refined in line with understandings from neuroscience to make it as safe and reliably effective as possible. The course is taught over two days to ensure you have enough time to thoroughly absorb and practice the steps involved so that you are confident in using it and know how to do so safely and effectively with clients. You will also learn when it is NOT appropriate to use this technique and how to ensure you avoid embedding any trauma further, or making a phobia worse. Guided imagery and visualisation skills form an essential part of the rewind technique, which is why they are a requirement for attending this course. This has huge potential to change people's lives for the better. I can't wait to put what I've learnt here to good usePSYCHIATRIC SUPPORT WORKER What will you learn How to detraumatise people quickly and safely The necessary skills to treat even severe phobias Why this version of the rewind technique is so effective, and how it works Under careful guidance from the tutor, you will: revisit key skills for relaxing clients in order to successfully work using the technique walk and talk through a step-by-step breakdown of the rewind technique see a live demonstration of working with a phobia or trauma practice each stage of the rewind technique in pairs practice the entire process, with other course participants, under supervision You will also gain: Vital tools for psycho-education – both adding to your own understanding and to pass on to clients A clear understanding of the fear response and how PTSD and phobias develop The detrimental impact traumas and phobias can have on a person’s life The crucial role of the pattern-matching processes in the brain in triggering phobic responses and post traumatic stress symptoms How the main treatment techniques for treating post traumatic stress disorder (PTSD), sub-threshold trauma and phobias (including EMDR, EFT and CBT) work – their advantages and disadvantages Why the rewind technique draws on the innate ability we all have to recover from trauma Pre-disposing factors for suffering a problematic post-traumatic response (or developing a phobia) Why critical incident debriefing increases the incidence of PTSD How this version of the rewind technique has been modified to make it safer and more reliable Trauma-focused rewinding: the psycho-biological reason why this refined rewind technique works so consistently well A step-by-step breakdown of the essential stages of the rewind technique The chance to see a live demonstration of working with a phobia or trauma You will leave with: The confidence to begin using the technique ethically and safely A clear understanding of the advantages of using a non-intrusive psychological technique to treat trauma, PTSD and phobias (where the client does not have to go into details about or repeatedly ‘revisit’ what has traumatised them) What to do if a client as an abreaction Important information about when not to use this technique – and what can be done instead An understanding of how the rewind technique can be used to work with Complex Trauma and cases involving ‘freeze’, shutdown or dissociative responses How you can carefully apply this technique to relieve a huge range of anxiety disorders Greater confidence in dealing with anxiety disorders and distress caused by trauma, phobias and flashbacks An understanding of how rapidly transformative this technique can be; on the last afternoon we view a filmed therapy session (and follow up) in which Joe Griffin uses the rewind technique to relieve a young man of his severe shark phobia There is also plenty of opportunity for you to ask questions and to experience and practice, under careful guidance, the various stages of the rewind technique yourself. Who is this course suitable for? Anyone working with distressed, phobic or traumatised people, who has already taken our Guided Imagery and Visualisation workshop (and ideally the Therapeutic Power of Language workshop too) as these skills are essential components of the rewind technique. If you help traumatised people (including children) or people suffering from any form of phobia or anxiety disorder – this includes: psychotherapists, counsellors, mental health nurses, OTs, health visitors, social workers, psychiatrists, GPs, clinical psychologists, midwives, welfare officers, youth workers, hypnotherapists and those working with traumatised members of public services, such as: firefighters, police, paramedics and military personnel – you will find the rewind technique and associated skills hugely helpful. Course requirements Guided imagery, relaxation and visualisation are an integral component of the Rewind Technique – if you don’t already have experience in using these skills therapeutically with others you must complete our Guided Imagery and Visualisation for Therapeutic Change workshop before attending this course (this is always run the day before our rewind technique training). This is to ensure you get the most out of this 2-day course and also have the necessary skills for practising the rewind technique safely and effectively. You would also find it useful to attend the Therapeutic Power of Language workshop beforehand if you can. All 3 workshops count towards Part 1 of the HG Diploma. Ros Townsend’s live online training Trauma: Patterns of the past is also useful for anyone working with or supporting someone suffering from unresolved trauma, or who would like to understand their own experiences of trauma better. She also runs a workshop on working with Complex Trauma. *About the Rewind Technique The Rewind Technique originated from one developed by Richard Bandler, one of the founders of NLP, when it was called the Visual/Kinaesthetic Dissociation protocol. A variant of this was developed by Dr David Muss, who called it the Rewind Technique. The version of the Rewind Technique you will learn on this 2-day course was refined by Joe Griffin and Ivan Tyrrell, co-founders of the human givens approach, to make it as reliably effective and safe as is possible by aligning the method with their insights into how trauma and phobias are processed in the brain. HG Therapists now follow a specific Rewind Protocol which follows the essential steps of the process that Griffin and Tyrrell set out. Course format This intense 2-day training proceeds through a blend of talks, live demonstrations, skill-developing exercises, practice sessions (under careful guidance) and deconstruction of filmed examples of the technique being used, including one with a severely traumatised young woman. There is also plenty of opportunity for networking and discussion during the breaks. The course was previously entitled: The fast phobia and trauma (PTSD) cure – a 2-day workshop in the rewind technique This course has been independently accredited by the internationally recognised CPD Standards Office for 12 hours of CPD training. On completion of this training you’ll receive CPD certificates from the College and the CPD Standards Office.

The Rewind Technique: Effective treatment for trauma (PTSD) and phobias
Delivered In-PersonFlexible Dates
£396

Confined Space Risk Management and Permits

By Vp ESS Training

Confined Space Risk Management and Permits - This course includes a basic level of confined space knowledge with the opportunity to use confined space equipment in a simulated environment and a team exercise of creating and reviewing a safe system of work. Note: A pre-requisite qualification is required to complete this course. Day 1 is a CS1 course and the Confined Space Risk Management (CSRM) can be completed as a 1 Day add-on. Any of following courses can be completed as a pre-requisite within 12 weeks of the CSRM; CS1, CS2, 6160-09. Book via our website @ https://www.vp-ess.com/training/confined-spaces/confined-space-risk-management-and-permits/ or via email at: esstrainingsales@vpplc.com or phone on: 0800 000 346

Confined Space Risk Management and Permits
Delivered In-Person in Aberdeen + 9 more or UK WideFlexible Dates
FREE

Ansible for engineers

5.0(3)

By Systems & Network Training

Ansible for engineers training course description An introduction to automation using ansible. Ansible is a general purpose IT automation platform that can be use for a number of purposes. The course covers configuration management, cloud provisioning and application deployment with ansible. Hands on sessions follow all major sections. What will you learn Install ansible. Automate tasks with ansible. Write ansible playbooks. Ansible for engineers training course details Who will benefit: Administrators and developers automating tasks. Prerequisites: Linux administration skills Duration 3 days Ansible for engineers training course contents What is ansible? The language, the engine, the framework. Uses of ansible, orchestration. Hands on Installing ansible. Ansible architecture ible architecture Controlling machines, nodes, Agentless, SSH, modules, JSON protocol. Configuration management, inventories, playbooks, modules, roles. Hands on Getting started, running ad hoc commands. Ansible and Vagrant Prototyping and testing. Hands on Using ansible with Vagrant. Ad hoc commands Parallelism, shell commands, managing files and directories, file transfer, package management, manage user and groups, deploying applications, service management, background jobs, checking log files, managing cron jobs. Hands on Using ansible with Vagrant. Playbooks ansible-playbook, users, sudo, YAML, plays, tasks, handlers, modules. Hands on Running playbooks. More playbooks Handlers, variables, environmental variables, playbook variables, inventory variables, variable scope and precedence, accessing variables, facts, ansible vault. Conditionals, wait_for. Hands on Using variables and conditions in playbooks. Roles and includes Dynamic includes, Handler includes, playbook includes. Roles, role parts: handlers, files, templates, cross platform roles, ansible galaxy. Hands on includes example, building roles. Inventories /etc/ansible/hosts, inventory variables, static inventories, dynamic inventories. Hands on Inventories and variables. Miscellanea Individual server cookbooks, Main playbook for configuring all servers. Hands onPlaybooks.

Ansible for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,497

CentOS system administration

5.0(3)

By Systems & Network Training

CentOS training course description This three day hands on course provides a comprehensive coverage of core Linux administration tasks on CentOS Linux. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. CentOS training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals Duration 3 days CentOS training course contents Managing software Package Concepts, RPM, rpm Commands, Yum, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and editing files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Administering the system Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring basic networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Securing your systems Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures.

CentOS system administration
Delivered in Internationally or OnlineFlexible Dates
£3,497

Ubuntu system administration

5.0(3)

By Systems & Network Training

Ubuntu training course description This three day hands on course provides a comprehensive coverage of core Linux administration tasks on Ubuntu Linux. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. Ubuntu training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals Duration 3 days Ubuntu training course contents Managing software Package Concepts, RPM, rpm Commands, Yum, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and editing files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Administering the system Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring basic networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Securing your systems Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures.

Ubuntu system administration
Delivered in Internationally or OnlineFlexible Dates
£3,497

Debian system administration

5.0(3)

By Systems & Network Training

Debian training course description This three day hands on course provides a comprehensive coverage of core Linux administration tasks on Debian Linux. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. Debian training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals Duration 3 days Debian training course contents Managing software Package Concepts, RPM, rpm Commands, Yum, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and editing files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Administering the system Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring basic networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Securing your systems Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures.

Debian system administration
Delivered in Internationally or OnlineFlexible Dates
£3,497

Suse system administration

5.0(3)

By Systems & Network Training

Suse training course description This three day hands on course provides a comprehensive coverage of core Linux administration tasks on Suse Linux. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. Suse training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals Duration 3 days Suse training course contents Managing software Package Concepts, RPM, rpm Commands, Yum, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and editing files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Administering the system Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring basic networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Securing your systems Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures.

Suse system administration
Delivered in Internationally or OnlineFlexible Dates
£3,497

Advance Accounting Techniques

5.0(10)

By GBA Corporate

Overview Accounting is the methodical approach of updating and keeping track of all the required information related to financial transactions. This course is designed to gain knowledge of how to interpret and analyse financial statements effectively. This course will emphasize in-depth knowledge of financial reporting elements used in Advance Accounting highlighting transactions recognizing, differentiating and efficiently recording information.  Advanced Accounting Techniques course covers difficult complex accounting topics like forecasting, hedging, data aggregation, interval accounting, segment reporting and many more including deeply understanding the financial statement Advanced accounting techniques were developed to provide information appropriate for decision-making in changing internal and external environments. 

Advance Accounting Techniques
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Red Hat system administration

5.0(3)

By Systems & Network Training

Red Hat training course description This three day hands on course provides a comprehensive coverage of core Linux administration tasks on Red Hat Linux. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. Red Hat training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals Duration 3 days Red Hat training course contents Managing software Package Concepts, RPM, rpm Commands, Yum, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and editing files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Administering the system Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring basic networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Securing your systems Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

Red Hat system administration
Delivered in Internationally or OnlineFlexible Dates
£3,497