• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1888 Fire courses in Cardiff delivered Online

Integrating UNIX and Microsoft

5.0(3)

By Systems & Network Training

Integrating UNIX and Microsoft course description This course is designed for the enterprise-level UNIX professional and represents the highest level of professional, distribution-neutral UNIX certification within the industry. It covers administering UNIX enterprise-wide with an emphasis on mixed environments. What will you learn Configure and troubleshoot OpenLDAP. Use OpenLDAP as an authentication backend. Manage software packages. Use Samba - Share configuration - User and group management - Domain integration - Name services - with Linux and Windows clients Integrating UNIX and Microsoft course details Who will benefit: Enterprise-level UNIX professionals. Prerequisites: UNIX network administration. Duration 5 days Integrating UNIX and Microsoft course contents OPENLDAP CONFIGURATION OpenLDAP replication Replication concepts, OpenLDAP replication, replication log files, replica hubs, LDAP referrals, LDAP sync replication. Securing the Directory Securing the directory with SSL and TLS, Firewall considerations, Unauthenticated access methods, User/password authentication methods, Maintanence of SASL user DB, certificates. OpenLDAP Server Performance Tuning Measure OpenLDAP performance, Tune software configuration to increase performance, indexes. OPENLDAP AS AN AUTHENTICATION BACKEND LDAP Integration with PAM and NSS Configure PAM to use LDAP for authentication, NSS to retrieve information from LDAP and PAM modules in UNIX. Integrating LDAP with Active Directory and Kerberos Kerberos integration with LDAP, Cross platform authentication, Single sign-on concepts, Integration and compatibility limitations between OpenLDAP and Active Directory. SAMBA BASICS Samba Concepts and Architecture Samba daemons and components, key issues regarding heterogeneous network, Identify key TCP/UDP ports used with SMB/CIFS, Knowledge of Samba3 and Samba4 differences. Configure Samba Samba server configuration file structure, variables and configuration parameters, Troubleshoot and debug configuration problems. Regular Samba Maintenance Monitor and interact with running Samba daemons, Perform regular backups of Samba configuration and state data. Troubleshooting Samba Samba logging, Backup TDB files, Restore TDB files, Identify TDB file corruption, Edit / list TDB file content. Internationalization Internationalization character codes and code pages, differences in the name space between Windows and Linux/Unix with respect to share, names, user/group/computer naming in a non-English environment. SAMBA SHARE CONFIGURATION Linux File System and Share/Service Permissions File / directory permission control, Samba interaction with Linux file system permissions and ACLs, Use Samba VFS to store Windows ACLs. Print Services Printer sharing, integration between Samba and CUPS, Manage Windows print drivers and configure downloading of print drivers, security concerns with printer sharing. SAMBA USER AND GROUP MANAGEMENT Managing User Accounts and Groups User and group accounts, mappings, user account management tools, smbpasswd, file/directory ownership of objects. Authentication, Authorization and Winbind Local password database, password synchronization, passdb backends, Convert between passdb backends, Integrate Samba with LDAP, Winbind service, PAM and NSS. SAMBA DOMAIN INTEGRATION Samba as a PDC and BDC Domain membership and trust relationships, Create and maintain a PDC and BDC with Samba3/4, Add computers to an existing domain, logon scripts, roaming profiles, system policies. Samba4 as an AD compatible Domain Samba 4 as an AD DC, smbclient, how Samba integrates with AD services: DNS, Kerberos, NTP, LDAP. Configure Samba as a Domain Member Server Joining Samba to NT4 and AD domains, obtain a TGT from a KDC. SAMBA NAME SERVICES NetBIOS and WINS WINS concepts, NetBIOS concepts, local master browser, domain master browser, Samba as a WINS server, name resolution, WINS replication, NetBIOS browsing and browser elections, NETBIOS name types. Active Directory Name Resolution DNS for Samba4 as an AD Domain Controller, DNS forwarding with the internal DNS server of Samba4. WORKING WITH LINUX AND WINDOWS CLIENTS CIFS Integration SMB/CIFS concepts, remote CIFS shares from a Linux client, securely storing CIFS credentials, features and benefits of CIFS, permissions and file ownership of remote CIFS shares. Working with Windows Clients browse lists and SMB clients from Windows, Share file/print resources from Windows, the smbclient program, the Windows net utility.

Integrating UNIX and Microsoft
Delivered in Internationally or OnlineFlexible Dates
£3,697

Integrating Linux and Microsoft

5.0(3)

By Systems & Network Training

Integrating Linux and Microsoft course description This course is designed for the enterprise-level Linux professional and represents the highest level of professional, distribution-neutral Linux certification within the industry. LPIC-3 300 covers administering Linux enterprise-wide with an emphasis on mixed environments. What will you learn Configure and troubleshoot OpenLDAP. Use OpenLDAP as an authentication backend. Manage software packages. Use Samba - Share configuration - User and group management - Domain integration - Name services - with Linux and Windows clients Integrating Linux and Microsoft course details Who will benefit: Enterprise-level Linux professionals. Prerequisites: Delegates must have an active LPIC-2 certification to receive LPIC-3 certification, but the LPIC-2 and LPIC-3 exams may be taken in any order. Duration 5 days Integrating UNIX and Microsoft course contents OPENLDAP CONFIGURATION OpenLDAP replication Replication concepts, OpenLDAP replication, replication log files, replica hubs, LDAP referrals, LDAP sync replication. Securing the Directory Securing the directory with SSL and TLS, Firewall considerations, Unauthenticated access methods, User/password authentication methods, Maintanence of SASL user DB, certificates. OpenLDAP Server Performance Tuning Measure OpenLDAP performance, Tune software configuration to increase performance, indexes. OPENLDAP AS AN AUTHENTICATION BACKEND LDAP Integration with PAM and NSS Configure PAM to use LDAP for authentication, NSS to retrieve information from LDAP and PAM modules in UNIX. Integrating LDAP with Active Directory and Kerberos Kerberos integration with LDAP, Cross platform authentication, Single sign-on concepts, Integration and compatibility limitations between OpenLDAP and Active Directory. SAMBA BASICS Samba Concepts and Architecture Samba daemons and components, key issues regarding heterogeneous network, Identify key TCP/UDP ports used with SMB/CIFS, Knowledge of Samba3 and Samba4 differences. Configure Samba Samba server configuration file structure, variables and configuration parameters, Troubleshoot and debug configuration problems. Regular Samba Maintenance Monitor and interact with running Samba daemons, Perform regular backups of Samba configuration and state data. Troubleshooting Samba Samba logging, Backup TDB files, Restore TDB files, Identify TDB file corruption, Edit / list TDB file content. Internationalization Internationalization character codes and code pages, differences in the name space between Windows and Linux/Unix with respect to share, names, user/group/computer naming in a non-English environment. SAMBA SHARE CONFIGURATION Linux File System and Share/Service Permissions File / directory permission control, Samba interaction with Linux file system permissions and ACLs, Use Samba VFS to store Windows ACLs. Print Services Printer sharing, integration between Samba and CUPS, Manage Windows print drivers and configure downloading of print drivers, security concerns with printer sharing. SAMBA USER AND GROUP MANAGEMENT Managing User Accounts and Groups User and group accounts, mappings, user account management tools, smbpasswd, file/directory ownership of objects. Authentication, Authorization and Winbind Local password database, password synchronization, passdb backends, Convert between passdb backends, Integrate Samba with LDAP, Winbind service, PAM and NSS. SAMBA DOMAIN INTEGRATION Samba as a PDC and BDC Domain membership and trust relationships, Create and maintain a PDC and BDC with Samba3/4, Add computers to an existing domain, logon scripts, roaming profiles, system policies. Samba4 as an AD compatible Domain Samba 4 as an AD DC, smbclient, how Samba integrates with AD services: DNS, Kerberos, NTP, LDAP. Configure Samba as a Domain Member Server Joining Samba to NT4 and AD domains, obtain a TGT from a KDC. SAMBA NAME SERVICES NetBIOS and WINS WINS concepts, NetBIOS concepts, local master browser, domain master browser, Samba as a WINS server, name resolution, WINS replication, NetBIOS browsing and browser elections, NETBIOS name types. Active Directory Name Resolution DNS for Samba4 as an AD Domain Controller, DNS forwarding with the internal DNS server of Samba4. WORKING WITH LINUX AND WINDOWS CLIENTS CIFS Integration SMB/CIFS concepts, remote CIFS shares from a Linux client, securely storing CIFS credentials, features and benefits of CIFS, permissions and file ownership of remote CIFS shares. Working with Windows Clients browse lists and SMB clients from Windows, Share file/print resources from Windows, the smbclient program, the Windows net utility.

Integrating Linux and Microsoft
Delivered in Internationally or OnlineFlexible Dates
£3,697

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

A Vision of The New Earth - Enjoy the New Quantum Possibilities (On-Demand)

By Katarina Heuser

Discover your special powers, receive insights and deep healing together with an abundance of light codes taking your life to the next level!

A Vision of The New Earth - Enjoy the New Quantum Possibilities (On-Demand)
Delivered Online On Demand3 hours
£70

CND - EC Council Official Certified Network Defender

5.0(12)

By Nemstar Ltd

This is the perfect launch pad for a technical career in Cyber Security and fully prepares every delegate for the prestigious Certified Ethical Hacking (CEH) Course that comes next on the Cyber & Hacking Learning Pathways by Nemstar.

CND - EC Council Official Certified Network Defender
Delivered OnlineFlexible Dates
£3,294

Securing Microsoft systems

5.0(3)

By Systems & Network Training

Microsoft security training course description A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment. What will you learn Use Microsoft security tools. Secure Microsoft servers. Secure Microsoft desktops. Secure Microsoft networks. Microsoft security training course details Who will benefit: Technical server support staff. Technical desktop support staff. Technical network staff. Technical security staff. Prerequisites: Supporting Windows server 2016 Networking Microsoft systems. Duration 3 days Microsoft security training course contents Introduction Security threats, Microsoft defaults, admin accounts, security patches, patch management, patch tools. Hands on: Studying Microsoft defaults, applying security patches. Microsoft security tools Microsoft updates, WSUS, Inventory tool, baseline security analyser, URLscan, EventCombMT, Cipher security tool, Port reporter, PortQry. Tools hackers use. Hands on: Using Microsoft security tools. Server security Checklists, core server security, AD, Member server security, Domain controller security, Specific roles. Hands on Hardening Microsoft servers, security templates. Active Directory Admin authority in AD, group policy, trust and authentication. Desktop security Checklists, core client security, anti virus software, anti spyware software, firewalls, securing clients with AD, securing clients with group policy, software restriction policies. Hands on Securing Microsoft desktops. Network security Checklist, IP security, VPNs, PKI, certificate authorities, RAS, RRAS, IAS. Hands on: VPN configuration, IAS configuration. Monitoring Auditing, authorisation and logons, tracking, system monitoring, detecting attacks. Hands on: Monitoring Microsoft systems. Summary Microsoft security response centre, security advisories.

Securing Microsoft systems
Delivered in Internationally or OnlineFlexible Dates
£3,497

Definitive network forensics for engineers

5.0(3)

By Systems & Network Training

Network forensics training course description This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. What will you learn Recognise network forensic data sources. Perform network forensics using: Wireshark NetFlow Log analysis Describe issues such as encryption. Network forensics training course details Who will benefit: Technical network and/or security staff. Prerequisites: TCP/IP foundation for engineers. Duration 3 days Network forensics training course contents What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.

Definitive network forensics for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,497

CompTIA Network (N10-007)

4.9(27)

By Apex Learning

Overview This comprehensive course on CompTIA Network (N10-007) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Network (N10-007) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA Network (N10-007). It is available to all students, of all academic backgrounds. Requirements Our CompTIA Network (N10-007) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 22 sections • 172 lectures • 22:43:00 total length •Introduction: 00:03:00 •What is a Model?: 00:02:00 •OSI vs. TCP/IP Model: 00:07:00 •Walking Through OSI and TCP/IP: 00:12:00 •Meet the Frame: 00:06:00 •The MAC Address: 00:07:00 •Broadcast vs. Unicast: 00:04:00 •Introduction to IP Addressing: 00:08:00 •Packets and Ports: 00:05:00 •Network Topologies: 00:10:00 •Coaxial Cabling: 00:05:00 •Twisted Pair Cabling: 00:06:00 •Cat Ratings: 00:06:00 •Fiber Optic Cabling: 00:09:00 •Fire Ratings: 00:05:00 •Legacy Network Connections: 00:07:00 •What is Ethernet?: 00:07:00 •Ethernet Frames: 00:07:00 •Early Ethernet: 00:08:00 •The Daddy of Ethernet, 10BaseT: 00:03:00 •Terminating Twisted Pair: 00:14:00 •Hubs vs. Switches: 00:13:00 •100BaseT: 00:05:00 •Connecting Switches: 00:05:00 •Gigabit Ethernet and 10-Gigabit Ethernet: 00:05:00 •Transceivers: 00:07:00 •Connecting Ethernet Scenarios: 00:14:00 •Introduction to Structured Cabling: 00:04:00 •Terminating Structured Cabling: 00:08:00 •Equipment Room: 00:07:00 •Alternative Distribution Panels: 00:04:00 •Testing Cable: 00:09:00 •Troubleshooting Structured Cabling, Part 1: 00:05:00 •Troubleshooting Structured Cabling, Part 2: 00:05:00 •Using a Toner and Probe: 00:03:00 •Wired Connection Scenarios: 00:11:00 •Introduction to IP Addressing and Binary: 00:13:00 •Introduction to ARP: 00:04:00 •Classful Addressing: 00:10:00 •Subnet Masks: 00:12:00 •Subnetting with CIDR: 00:10:00 •More CIDR Subnetting Practice: 00:10:00 •Dynamic and Static IP Addressing: 00:18:00 •Rogue DHCP Servers: 00:07:00 •Special IP Addresses: 00:07:00 •IP Addressing Scenarios: 00:15:00 •Introducing Routers: 00:15:00 •Understanding Ports: 00:05:00 •Network Address Translation: 00:06:00 •Implementing NAT: 00:03:00 •Forwarding Ports: 00:18:00 •Tour of a SOHO Router: 00:12:00 •SOHO vs. Enterprise: 00:09:00 •Static Routes: 00:13:00 •Dynamic Routing: 00:11:00 •RIP: 00:04:00 •OSPF: 00:04:00 •BGP: 00:06:00 •TCP and UDP: 00:07:00 •ICMP and IGMP: 00:06:00 •Handy Tools: 00:07:00 •Introduction to Wireshark: 00:11:00 •Introduction to netstat: 00:09:00 •Web Servers: 00:12:00 •FTP: 00:12:00 •E-mail Servers and Clients: 00:09:00 •Securing E-mail: 00:06:00 •Telnet and SSH: 00:09:00 •Network Time Protocol: 00:02:00 •Network Service Scenarios: 00:10:00 •Understanding DNS: 00:12:00 •Applying DNS: 00:19:00 •The Hosts File: 00:04:00 •Net Command: 00:08:00 •Windows Name Resolution: 00:11:00 •Dynamic DNS: 00:05:00 •DNS Troubleshooting: 00:13:00 •Making TCP/IP Secure: 00:04:00 •Symmetric Encryption: 00:06:00 •Asymmetric Encryption: 00:03:00 •Cryptographic Hashes: 00:05:00 •Identification: 00:00:00 •Access Control: 00:04:00 •AAA: 00:05:00 •Kerberos/EAP: 00:00:00 •Single Sign-On: 00:10:00 •Certificates and Trust: 00:14:00 •Certificate Error Scenarios: 00:08:00 •Understanding IP Tunneling: 00:06:00 •Virtual Private Networks: 00:13:00 •Introduction to VLANs: 00:12:00 •InterVLAN Routing: 00:03:00 •Interfacing with Managed Switches: 00:11:00 •Switch Port Protection: 00:07:00 •Port Bonding: 00:07:00 •Port Mirroring: 00:04:00 •Quality of Service: 00:05:00 •IDS vs. IPS: 00:04:00 •Proxy Servers: 00:13:00 •Load Balancing: 00:09:00 •Device Placement Scenarios: 00:13:00 •Introduction to IPv6: 00:13:00 •IPv6 Addressing: 00:15:00 •IPv6 in Action: 00:13:00 •IPv4 and IPv6 Tunneling: 00:05:00 •Telephony Technologies: 00:09:00 •Optical Carriers: 00:03:00 •Packet Switching: 00:05:00 •Connecting with Dial-up: 00:05:00 •Digital Subscriber Line (DSL): 00:05:00 •Connecting with Cable Modems: 00:04:00 •Connecting with Satellites: 00:03:00 •ISDN and BPL: 00:04:00 •Remote Desktop Connectivity: 00:05:00 •Advanced Remote Control Systems: 00:09:00 •Introduction to 802.11: 00:12:00 •802.11 Standards: 00:12:00 •Power over Ethernet (PoE): 00:04:00 •Antennas: 00:09:00 •Wireless Security Standards: 00:16:00 •Implementing Wireless Security: 00:07:00 •Threats to Your Wireless Network: 00:07:00 •Retro Threats: 00:05:00 •Wi-Fi Protected Setup (WPS): 00:05:00 •Enterprise Wireless: 00:06:00 •Installing a Wireless Network: 00:15:00 •Wireless Scenarios: 00:07:00 •More Wireless Scenarios: 00:09:00 •Virtualization Basics: 00:07:00 •Cloud Ownership: 00:03:00 •Cloud Implementation: 00:12:00 •Your First Virtual Machine: 00:09:00 •NAS and SAN: 00:16:00 •Platform as a Service (PaaS): 00:09:00 •Software as a Service (SaaS): 00:03:00 •Infrastructure as a Service (IaaS): 00:10:00 •Cellular Technologies: 00:05:00 •Mobile Connectivity: 00:07:00 •Deploying Mobile Devices: 00:05:00 •Mobile Access Control: 00:06:00 •Network Types: 00:04:00 •Network Design: 00:10:00 •Power Management: 00:06:00 •Unified Communications: 00:11:00 •Network Documentation: 00:07:00 •Contingency Planning: 00:10:00 •Predicting Hardware Failure: 00:05:00 •Backups: 00:08:00 •What is Risk Management?: 00:06:00 •Security Policies: 00:08:00 •Change Management: 00:07:00 •User Training: 00:03:00 •Standard Business Documentation: 00:05:00 •Mitigating Network Threats: 00:05:00 •High Availability: 00:05:00 •Denial of Service: 00:09:00 •Malware: 00:10:00 •Social Engineering: 00:04:00 •Access Control: 00:08:00 •Man-in-the-Middle: 00:22:00 •Introduction to Firewalls: 00:05:00 •Firewalls: 00:10:00 •DMZ: 00:06:00 •Hardening Devices: 00:14:00 •Physical Security Controls: 00:09:00 •Testing Network Security: 00:08:00 •Network Protection Scenarios: 00:14:00 •SNMP: 00:15:00 •Documenting Logs: 00:09:00 •System Monitoring: 00:08:00 •SIEM (Security Information and Event Management): 00:07:00 •Network Troubleshooting Theory: 00:05:00

CompTIA Network (N10-007)
Delivered Online On Demand22 hours 43 minutes
£12

Medical Receptionist Skills

By Training Tale

A medical secretary is responsible for ensuring that a doctor's office runs smoothly so that patients receive the best possible care. A medical secretary must understand office organisation and standard procedures to provide this secretarial support. They should also be able to use medical terminologies fluently. This Medical Receptionist Skills will teach you about the medical secretarial profession and the skills needed to do the job successfully. This Course will teach you about the roles and responsibilities of a medical secretary. You will also learn various medical secretary skills, including an effective filing system, medical transcription, medical writing, maintaining medical records, an appointment system, and more. Furthermore, this comprehensive Medical Receptionist Skills will teach you the critical concepts of patient confidentiality and other legal aspects of the healthcare industry. Learning Outcomes After completing this course, learner will be able to: Understand the fundamentals of the National Health Service. Understand the roles and responsibilities of a medical secretary. Know how to organise schedules and manage appointment systems. Gain a clear understanding of the Law, Ethics and Medicine. Gain a thorough understanding of the effective filing system in medical offices. Familiarise yourself with the concept of patient confidentiality and its dos and don'ts. Become skilled at controlling and ordering stocks and supplies. Gain in-depth knowledge of Medical Terminology and Clinical Aspects. Know the importance of health and safety in the healthcare sector. Have a solid understanding of Complementary Medicine Why Choose Diploma in Medical Receptionist and Secretary from Us Self-paced course, access available from anywhere. Easy to understand, high-quality study materials. This Course developed by industry experts. MCQ quiz after each module to assess your learning. Automated and instant assessment results. 24/7 support via live chat, phone call or email. Free PDF certificate as soon as completing this Course. **Courses are included in this Medical Receptionist Skills Bundle Course Course 01: Medical Receptionist Skills Course 02: Dealing With Difficult People Course 03: Communication Skills Course Course 04: Level 4 Time Management Course Course 05: Level 5 Negotiation Skills Course Course 06: Level 5 Report Writing Course Course 07: Level 5 Proofreading & Copy Editing ***Others Included of Medical Receptionist Skills Bundle Course Free 7 PDF Certificate Access to Content - Lifetime Exam Fee - Totally Free Free Retake Exam [ Note: Free PDF certificate as soon as completing the course ] Detailed course curriculum of the Medical Receptionist Skills: Module 1: The National Health Service History Structure of the NHS The NHS Plan Resource Allocation Delivering Care Mental Health Services Public Health The NHS, the Regions and Devolution Module 2: Patient (Customer) Care The Medical Receptionist Putting Patient First Complaints Within the Health Service The Complaints Procedure Patient and Public Involvement Patient's Rights Access to Health Care Total Quality in Medical Practice Customer Care: Involving Patients and the Public Module 3: Communication Report Writing Electronic Mail & Mobile Phones: Text Messages Telephone Skills People Skills - Face to Face Meeting Performance Review & Counselling The Practice Leaflet & Hospital Information Leaflets Networking Module 4: Law, Ethics and Medicine Medical Ethics and Etiquette Doctor's Duties Patient's Right The Regulatory Bodies and Their Role Legal Aspects Certification Health and Safety at Work Module 5: Health & Safety in a Clinical Environment First Aid at Work Hazardous Substances The NHS National Patient Safety Agency (NPSA) Hepatitis & AIDS Fire Precautions Clinical Risk Management Coping With Aggression & Violence Module 6: Practical Reception Skills in General Practice Record Keeping and General Administration Information Technology Module 7: The Hospital Service The Patient's Route Through the Hospital Outpatient Appointments Admissions from the Waiting List Accident and Emergency Admissions Home From Hospital Support Day Cases and Ward Attendees Hospital Team Clinical Audit Star Ratings What is a Medical Record? Cases Notes Master Index Filing Room or Records Library Medical Records Procedure for Departments Retention of Records Destruction of Medical Records The Role of the Secretary in the Hospital Module 8: Private Medicine Private Clinic or Hospital The Secretary In Private Practice Module 9: Forms, Fees and Finances in General Practises Contracting Finance Practice Income Scotland Wales Northern Ireland Module 10: Using Information Technology Computers in General Practice Electronic Medicine Computers in Hospitals Maintaining Security Module 11: Medical Terminology and Clinical Aspects Pathology and X-ray Examinations Prescribing and Drugs Nurse Prescribing New Developments in Pharmacy Module 12: Audit, Health Economics and Ensuring Quality for the Medical Receptionist and Secretary Audit Health Economics and Cost-effective Medicine Private Finance Initiative Clinical Governance National Institute for Clinical Excellence (NICE) National Clinical Assessment Service (NCAS) National Service Framework (NSF) Patient Surveys Module 13: Complementary Medicine Acupuncture Alexander Technique Aromatherapy Chiropractic Homoeopathy Hydrotherapy Hypnotherapy Osteopathy Reflexology ------------------- ***Communication Skills Course*** Module 01: Introduction to Communication Module 02: The Communication Skills Module 03: Different Types of Communication Module 04: Different Methods of Communication Module 05: Styles of Communication Module 06: Barriers to Communication Module 07: Assessing Communication Competence: Relevant Criteria Module 08: Seven Actions for Effective Communication Module 09: Do's and Don'ts of Effective Communication ------------------- ***Level 4 Time Management Course*** Module 1: Basics of Time Management Module 2: Prioritise Your Time Module 3: Organise Your Time Module 4: Using Your Time Efficiently Module 5: Time Management in the Workplace Module 6: Time Management For Students Module 7: Time Management Software Module 8: Create a Value-Based Time Management Plan ------------------- ***Level 5 Proofreading & Copy Editing*** Module 01: An Overview of Proofreading Module 02: Use of the Style Guide Module 03: Spelling and Grammar Module 04: Paper-based Proofreading Module 05: On the Screen Proofreading Module 06: Basics of Copy Editing Module 07: Copy Editing - the Use of Language Module 08: Copy Editing - Checking Accuracy and Facts Module 09: Copy Editing - Legal Checks Module 10: Career Development ------------------- ***Dealing With Difficult People*** Module 01: Difficult People and Their Difficult Behaviour Module 02: Communicating With Difficult People Module 03: Standing Up to Difficult People Module 04: A Quick Guide to the Seven Classically Difficult Types Module 05: Dealing with Bosses Who Drive You Barmy Module 06: Colleagues to Throttle Module 07: Dealing With Impossible People Module 08: The Temper Tantrum Type ------------------- ***Level 5 Negotiation Skills Course*** Module 01: An Overview of Negotiation Module 02: How to Prepare For Negotiations Module 03: The Process of Negotiation Module 04: Ways of Developing Persuasion & Influencing Skills Module 05: Ways of Developing Communication Skills Module 06: How to Develop Active Listening Skills Module 07: Comprehending Body Language Module 08: Assertiveness and Self Confidence Module 09: Managing Anger Module 10: Managing Stress Module 11: Negotiation Tactics to Closing a Better Deal Module 12: Ways of Overcoming Sales Objections ------------------- ***Level 5 Report Writing Course*** Module 01: Introduction to Report Writing Module 02: The Basics of Business Report Writing Module 03: The Practical Side of Report Writing (Part-1): Preparation & Planning Module 04: The Practical Side of Report Writing (Part-2): Collecting and Handling Information Module 05: The Practical Side of Report Writing (Part-3): Writing and Revising Report Module 06: The Creative Side of Report Writing (Part -1): A Style Guide to Good Report Writing Module 07: The Creative Side of Report Writing (Part -2): Improving the Presentation of Your Report Module 08: Developing Research Skills Module 09: Developing Creativity & Innovation Module 10: Develop Critical Thinking Skills Module 11: Interpersonal Skill Development Assessment Method After completing each module of the Medical Receptionist Skills, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Once you complete all the modules in this manner, you will be qualified to request your certification. Certification After completing the MCQ/Assignment assessment for this course, you will be entitled to a Certificate of Completion from Training Tale. It will act as proof of your extensive professional development. The certificate is in PDF format, which is completely free to download. A printed version is also available upon request. It will also be sent to you through a courier for £13.99. Who is this course for? This Medical Receptionist Skills is ideal for Health Care Professionals who work and will be working in healthcare settings such as hospitals, clinics, and healthcare facilities. Requirements There are no specific requirements for this Medical Receptionist Skills because it does not require any advanced knowledge or skills. Career path After completing this Medical Receptionist Skills, you will have developed a set of skills necessary for career advancement and will be able to pursue a variety of job opportunities, including - Medical Receptionist Medical Secretary Healthcare Administrator GP Receptionist Patient Coordinator Certificates Certificate of completion Digital certificate - Included

Medical Receptionist Skills
Delivered Online On Demand44 hours
£12

Medical Secretary - Essential Skills

By Training Tale

A medical secretary is responsible for ensuring that a doctor's office runs smoothly so that patients receive the best possible care. A medical secretary must understand office organisation and standard procedures to provide this secretarial support. They should also be able to use medical terminologies fluently. This course will teach you about the medical secretarial profession and the skills needed to do the job successfully. This course will teach you about the roles and responsibilities of a medical secretary. You will also learn various medical secretary skills, including an effective filing system, medical transcription, medical writing, maintaining medical records, an appointment system, and more. Furthermore, this comprehensive Medical Secretary - Essential Skills will teach you the critical concepts of patient confidentiality and other legal aspects of the healthcare industry. Learning Outcomes After completing this course, learner will be able to: Understand the fundamentals of the National Health Service. Understand the roles and responsibilities of a medical secretary. Know how to organise schedules and manage appointment systems. Gain a clear understanding of the Law, Ethics and Medicine. Gain a thorough understanding of the effective filing system in medical offices. Familiarise yourself with the concept of patient confidentiality and its dos and don'ts. Become skilled at controlling and ordering stocks and supplies. Gain in-depth knowledge of Medical Terminology and Clinical Aspects. Know the importance of health and safety in the healthcare sector. Have a solid understanding of Complementary Medicine Why Choose Diploma in Medical Receptionist and Secretary from Us Self-paced course, access available from anywhere. Easy to understand, high-quality study materials. Medical Secretary - Essential Skills Course developed by industry experts. MCQ quiz after each module to assess your learning. Automated and instant assessment results. 24/7 support via live chat, phone call or email. Free PDF certificate as soon as completing this Course. **Courses are included in this Medical Secretary - Essential Skills Bundle Course Course 01: Medical Secretary - Essential Skills Course 02: Communication Skills Course Course 03: Level 4 Time Management Course Course 04: Level 5 Proofreading & Copy Editing Course 05: Level 2 Customer Service Course 06: Level 5 Report Writing Course Course 07: Level 5 Negotiation Skills Course ***Others Included of Medical Secretary - Essential Skills Bundle Course Free 7 PDF Certificate Access to Content - Lifetime Exam Fee - Totally Free Free Retake Exam [ Note: Free PDF certificate as soon as completing the course ] Detailed course curriculum of the Medical Secretary - Essential Skills: Module 1: The National Health Service History Structure of the NHS The NHS Plan Resource Allocation Delivering Care Mental Health Services Public Health The NHS, the Regions and Devolution Module 2: Patient (Customer) Care The Medical Receptionist Putting Patient First Complaints Within the Health Service The Complaints Procedure Patient and Public Involvement Patient's Rights Access to Health Care Total Quality in Medical Practice Customer Care: Involving Patients and the Public Module 3: Communication Report Writing Electronic Mail & Mobile Phones: Text Messages Telephone Skills People Skills - Face to Face Meeting Performance Review & Counselling The Practice Leaflet & Hospital Information Leaflets Networking Module 4: Law, Ethics and Medicine Medical Ethics and Etiquette Doctor's Duties Patient's Right The Regulatory Bodies and Their Role Legal Aspects Certification Health and Safety at Work Module 5: Health & Safety in a Clinical Environment First Aid at Work Hazardous Substances The NHS National Patient Safety Agency (NPSA) Hepatitis & AIDS Fire Precautions Clinical Risk Management Coping With Aggression & Violence Module 6: Practical Reception Skills in General Practice Record Keeping and General Administration Information Technology Module 7: The Hospital Service The Patient's Route Through the Hospital Outpatient Appointments Admissions from the Waiting List Accident and Emergency Admissions Home From Hospital Support Day Cases and Ward Attendees Hospital Team Clinical Audit Star Ratings What is a Medical Record? Cases Notes Master Index Filing Room or Records Library Medical Records Procedure for Departments Retention of Records Destruction of Medical Records The Role of the Secretary in the Hospital Module 8: Private Medicine Private Clinic or Hospital The Secretary In Private Practice Module 9: Forms, Fees and Finances in General Practises Contracting Finance Practice Income Scotland Wales Northern Ireland Module 10: Using Information Technology Computers in General Practice Electronic Medicine Computers in Hospitals Maintaining Security Module 11: Medical Terminology and Clinical Aspects Pathology and X-ray Examinations Prescribing and Drugs Nurse Prescribing New Developments in Pharmacy Module 12: Audit, Health Economics and Ensuring Quality for the Medical Receptionist and Secretary Audit Health Economics and Cost-effective Medicine Private Finance Initiative Clinical Governance National Institute for Clinical Excellence (NICE) National Clinical Assessment Service (NCAS) National Service Framework (NSF) Patient Surveys Module 13: Complementary Medicine Acupuncture Alexander Technique Aromatherapy Chiropractic Homoeopathy Hydrotherapy Hypnotherapy Osteopathy Reflexology ------------------- ***Communication Skills Course*** Module 01: Introduction to Communication Module 02: The Communication Skills Module 03: Different Types of Communication Module 04: Different Methods of Communication Module 05: Styles of Communication Module 06: Barriers to Communication Module 07: Assessing Communication Competence: Relevant Criteria Module 08: Seven Actions for Effective Communication Module 09: Do's and Don'ts of Effective Communication ------------------- ***Level 4 Time Management Course*** Module 1: Basics of Time Management Module 2: Prioritise Your Time Module 3: Organise Your Time Module 4: Using Your Time Efficiently Module 5: Time Management in the Workplace Module 6: Time Management For Students Module 7: Time Management Software Module 8: Create a Value-Based Time Management Plan ------------------- ***Level 5 Proofreading & Copy Editing*** Module 01: An Overview of Proofreading Module 02: Use of the Style Guide Module 03: Spelling and Grammar Module 04: Paper-based Proofreading Module 05: On the Screen Proofreading Module 06: Basics of Copy Editing Module 07: Copy Editing - the Use of Language Module 08: Copy Editing - Checking Accuracy and Facts Module 09: Copy Editing - Legal Checks Module 10: Career Development ------------------- ***Level 2 Customer Service*** Module 1: Introduction to Customer Service Module 2: Understanding the Organisation Module 3: Prepare to Deliver Excellent Customer Service Module 4: Communication in the Customer Service Role Module 5: Understand Customers ------------------- ***Level 5 Report Writing Course*** Module 01: Introduction to Report Writing Module 02: The Basics of Business Report Writing Module 03: The Practical Side of Report Writing (Part-1): Preparation & Planning Module 04: The Practical Side of Report Writing (Part-2): Collecting and Handling Information Module 05: The Practical Side of Report Writing (Part-3): Writing and Revising Report Module 06: The Creative Side of Report Writing (Part -1): A Style Guide to Good Report Writing Module 07: The Creative Side of Report Writing (Part -2): Improving the Presentation of Your Report Module 08: Developing Research Skills Module 09: Developing Creativity & Innovation Module 10: Develop Critical Thinking Skills Module 11: Interpersonal Skill Development ------------------- ***Level 5 Negotiation Skills Course*** Module 01: An Overview of Negotiation Module 02: How to Prepare For Negotiations Module 03: The Process of Negotiation Module 04: Ways of Developing Persuasion & Influencing Skills Module 05: Ways of Developing Communication Skills Module 06: How to Develop Active Listening Skills Module 07: Comprehending Body Language Module 08: Assertiveness and Self Confidence Module 09: Managing Anger Module 10: Managing Stress Module 11: Negotiation Tactics to Closing a Better Deal Module 12: Ways of Overcoming Sales Objections Assessment Method After completing each module of the Medical Secretary - Essential Skills, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Once you complete all the modules in this manner, you will be qualified to request your certification. Certification After completing the MCQ/Assignment assessment for this Medical Secretary - Essential Skills, you will be entitled to a Certificate of Completion from Training Tale. It will act as proof of your extensive professional development. The certificate is in PDF format, which is completely free to download. A printed version is also available upon request. It will also be sent to you through a courier for £13.99. Who is this course for? This Medical Secretary - Essential Skills is ideal for Health Care Professionals who work and will be working in healthcare settings such as hospitals, clinics, and healthcare facilities. Requirements Students who intend to enrol in this course must meet the following requirements: Good command of the English language Must be vivacious and self-driven Basic computer knowledge A minimum of 16 years of age is required Career path After completing this course, you will have developed a set of skills necessary for career advancement and will be able to pursue a variety of job opportunities, including - Medical Receptionist Medical Secretary Healthcare Administrator GP Receptionist Patient Coordinator Certificates Certificate of completion Digital certificate - Included

Medical Secretary - Essential Skills
Delivered Online On Demand42 hours
£12