• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

8420 ET courses delivered Online

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

RÉSUMÉ WRITING, NETWORKING, & INTERVIEWING WORKSHOP

5.0(4)

By Improving Communications Uk

PARTICIPANTS WILL ENGAGE IN A TRAINING SESSION TO IMPROVE AND REFINE THEIR RÉSUMÉS. OPPORTUNITIES TO ENGAGE IN ONE-ON-ONE RÉSUMÉ BUILDING & REVIEW SESSIONS CAN BE OFFERED AS WELL. It’s time to move on—or maybe you’ve been “in transition” for too long. Either way, you need some input so that you know what others see when they look at your résumé, and what they hear when they interview you. Participants will engage in a training session to improve and refine their résumés. Opportunities to engage in one-on-one Résumé Building & Review sessions can be offered as well. Part I Data Collection and Organization – assessing work/activities and IMPACT (results) Success Story Format (Situation, Action, Results) Writing With Impact – how to tie actions to results Choosing The Right Words – transferable skills and powerful words Sales 101 – How will these skills benefit the hiring person’s organization? Part II UB4I Writing (“YOU”/ “YOUR,” not “I,” “me,” “my”) Reference list Principles of networking Cover Letter and Résumé Formats – margins, font, type size, small caps, etc. Role Play – Mock Interviews Participants will be able to: Create a complete and correct résumé, a marketing device to attract attention, generate interest, describe accomplishments, and invite contact. Discover, correct, and improve self-marketing messages, leading to a systematic assessment of specific work-related skills. Examine transferable skills and increase personal alignment with prospective organizational mission and goals. Online Format—Résumé Writing, Networking, & Interviewing Workshop 4-hour interactive virtual class. Register for this class and you will be sent ONLINE login instructions prior to the class date. After a two-day seminar, our attendees remained in their seats wanting more from Dr Atkins. His direct, yet challenging approach to presenting topics seemed to mesmerize the participants. Many very lively discussions were part of our workshop’s context. Personally, I am very interested in re-booking this type of experience every year for new leaders to undergo! Michael J. Whitlock, Director of Fay Corey Union & ConferencesSUNY Cortland

RÉSUMÉ WRITING, NETWORKING, & INTERVIEWING WORKSHOP
Delivered Online + more
£316

17th January Rebeka Finch #Agent121. Looking for: MG, YA, ADULT FICTION, NON-FICTION

5.0(1)

By I Am In Print

LOOKING FOR: ADULT FICTION, NEW ADULT Rebeka Finch is a Junior Agent at the Darley Anderson Literary Agency. Alongside assisting Darley on his list of authors, Rebeka is building her own list of romance and romantasy authors, specifically for the BookTok hungry new adult/20+ markets. She is on the hunt for messy, cheesy, heartbreaking, relatable, characters and stories with romance at the very heart of the narrative. For those writing romantasy, Rebeka is looking for books that strike the perfect balance of romance, pace, action and world-building, with series potential. Importantly, she looks for strong, diverse, brave and relatable characters in these settings. People that feel like both a friend, a champion and an ally. Rebeka would like you to submit a covering letter, 1 -2 page synopsis and the first 5,000 words of your completed manuscript in a single word document. (In addition to the paid sessions, Rebeka is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Wednesday 8 January 2025

17th January Rebeka Finch #Agent121. Looking for: MG, YA, ADULT FICTION, NON-FICTION
Delivered Online + more
£72

Human Resource Management

5.0(10)

By GBA Corporate

Overview The course curriculum covers human resource planning; recruitment and selection; employee training and development; employee health and safety etc. Based on the fact that knowledge is the gateway to engagement, the 'HR Management course' is designed to build participants' awareness and knowledge of the major functions that make up a modern HR department. 

Human Resource Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Public Sector Asset Management

5.0(10)

By GBA Corporate

Overview This course is designed to support the governments, public sector, state-owned enterprises and other entities to strategically understand how to plan the asset management and worth of their physical assets like buildings, infrastructure, transportation etc. The course will also highlight how the public sector can improve asset performance, reduce costs and increase returns generated from the assets by using well-planned asset management tools and techniques.

Public Sector Asset Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

UI/UX Design Using Adobe XD

5.0(10)

By GBA Corporate

Overview This course will give you a whole tour of how to enhance your skills as a UI/UX Design using Adobe. It is very important to master the basics of web and visual design because that is important for UI design eg designing buttons, typography, drop shadow etc. With having a good foundation in visual and web design become an essential key to become a skilled UI/UX Designer.

UI/UX Design Using Adobe XD
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Principles and Practices of Cyber Security

5.0(10)

By GBA Corporate

Overview Cyber Security plays an important role in every business as it encompasses everything that relates to protecting sensitive data, personal information, intellectual property, data, and governmental and industry information systems from theft and damage attempted by criminals and adversaries. This course is designed to understand and gain practical skills to plan, deliver and monitor IT/cyber security to internal and external clients understanding a complete, knowledge in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking including understanding the basics of Kali Operating System and its tools and techniques. It will also cover WiFi security, Website security, human factors, cyber forensics, and cyber security team management, including all other areas in relation to Cyber Security.

Principles and Practices of Cyber Security
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Compliance and Risk Management

5.0(10)

By GBA Corporate

Overview This Compliance and Risk Management Course is designed for anyone looking for a pathway into this profession and wanting to develop their industry knowledge and skills. It covers the role of the Compliance Officer and compliance department in detail, with step-by-step training in compliance auditing and risk management. This Compliance and Risk Management Training Course will equip you with the fundamental skills needed to identify and manage regulatory risk in your organization, taking you through key topics such as how to implement an efficient Compliance Management System, ethics and compliance, risk types and classifications, and how to design a solid risk management strategy. By the end of this Compliance and Risk Management Training Course, you'll have an excellent understanding of core compliance issues, as well as how to promote a positive compliance culture for your organization, which will give you a head start when it comes to standing out in the relevant job market. 

Compliance and Risk Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Masters in IPSAS

5.0(10)

By GBA Corporate

Overview This course will help our clients to assist not only in meeting the challenges of introducing IPSAS but also to secure the benefits of improved financial management to help secure the organisational objectives and goals of each public service organisation. We have developed this course starting with an introduction and then implementation of IPSAS.  This course will help our clients to assist not only in meeting the challenges of introducing IPSAS but also to secure the benefits of improved financial management to help secure the organisational objectives and goals of each public service organisation. This enables multi-national organisations to make comparisons between projects wherever in the world they happen, irrespective of jurisdiction, culture, language and ethnicity. IPSAS is becoming and will become the World standard for Public Sector entities. We have developed this course starting with an introduction and then implementation of IPSAS. This allows clients to structure the move to IPSAS within its appropriate Framework. It is an approach that enables implementation to be done in a structured and well-managed way. In the course we will consider the main requirements of IPSAS and, by showing how they affect financial reports and published accounts, will help you to apply IPSAS. The course will assist both finance managers and general managers whose organisations and departments will be affected by IPSAS.

Masters in IPSAS
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

IPSAS

5.0(10)

By GBA Corporate

Overview This course will help our clients to assist not only in meeting the challenges of introducing IPSAS but also to secure the benefits of improved financial management to help secure the organisational objectives and goals of each public service organisation. This enables multi-national organisations to make comparisons between projects wherever in the world they happen, irrespective of jurisdiction, culture, language and ethnicity. IPSAS is becoming and will become the World standard for Public Sector entities. We have developed this course starting with an introduction and then implementation of IPSAS. This allows clients to structure the move to IPSAS within its appropriate Framework. It is an approach that enables implementation to be done in a structured and well-managed way. In the course we will consider the main requirements of IPSAS and, by showing how they affect financial reports and published accounts, will help you to apply IPSAS. The course will assist both finance managers and general managers whose organisations and departments will be affected by IPSAS. The consequences of managing the finances of public organisations will be examined, together with potential unintended consequences. How to implement IPSAS effectively and economically, is probably the most important aspect. The approach will be to understand the advantages to the organisation from IPSAS implementation and how benefits realisation can be ensured both internally and for stakeholders. The course will deal with practical issues for public sector organisations, including strategic management and the medium-term financial framework

IPSAS
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626