• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1955 Fire courses in Cardiff delivered Online

Network +

5.0(3)

By Systems & Network Training

Network+ training course description This network+ course covers the TCP/IP side of the exam. For delegates to pass the exam it is important that they meet the prerequisites, self study is also required. An intensive hands on IP foundation. The course focuses on all parts of TCP/IP including layers 4 to 7 on end stations as well as layer 3 on routers. The TCP/IP protocols are also studied to enable delegates to be able to troubleshoot TCP/IP using Wireshark. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Use ping, traceroute and other tools to diagnose faults on a network. Configure IP on PCs and routers. Plan IP addresses and subnets. Analyse IP and TCP packets using an analyser. Troubleshoot TCP/IP. Network+ training course details Who will benefit: Those wishing to pass the Network+ exam. Prerequisites: Introduction to data communications & networking Duration 5 days Network+ training course contents What is TCP/IP? TCP and IP are protocols, 7 layer model, network layers, hardware/software layers, internetworking, protocols, What is IP? What is TCP? The internet, The IAB, RFCs. Ping and Wireshark Host configuration, IP addresses, subnet masks, default gateways, ping. Hands on Base configuration. Testing with ping. Analysing packets with Wireshark. Switches and Wireshark Switches versus hubs, layer 2 forwarding table, flooding, broadcasts. Hands on Building a switched based network. Configuring network devices Configuration options, console port, putty, telnet. Hands on Configuring switches, telnet. IP IP packet format, protocol field, TTL, DiffServ, fragments, ICMP. Hands on IP packet analysis. IP addressing 32 bits, dotted decimal, rules, networks, role of subnet masks, simple subnetting, prefix notation. Broadcasts, special use addresses. Hands on Planning and implementing addressing. IP and the lower layers ARP, media not supporting ARP. Hands on ARP. Routing What are routers? What routers do, default gateways, routing and addressing, routing tables, ways to update routing tables. Hands on Building a routed network, traceroute. Routing protocols IGPs and EGPs, RIP, RIPv2, Why not to use RIP, OSPF, OSPF metrics, convergence, distance vector protocols, link state protocols. Hands on OSPF, analysing routing tables, loopbacks. Network simulators Network simulators, EVE-NG, GNS3, CML. Hands on Using EVE-NG. Subnetting Subnetting to the bit level, ranges, how prefixes are used. Hands on Subnetting. VLANS and IP addressing What are VLANs, tagging, 802.1Q, Inter VLAN routing. Hands on Inter VLAN routing. TCP and UDP Layer 4, port numbers, client ports, broadcasts multicasts and layer 4, UDP header, TCP header, connections, ACK, sliding windows, options, connection states. Sockets. Hands on Analysing TCP packets. IPv4 address configuration Private addresses, NAT, NAPT, dynamic addressing, DHCP, link local addresses. Hands on DHCP, NAT. IPv6 What is IPv6, 128 bit addresses, address formats, IPv6 address allocation, header format, migration, dual stack, tunnelling, NAT64, DNS64. Hands on IPv6 setup troubleshooting. IPv6 address configuration Static addressing, EUI-64 addresses, IPv6 address order, SLAAC, DHCPv6. Hands on SLAAC. Applications Clients, servers, HTTP, Email, resource sharing, VoIP, video, terminal emulation, remote desktop. Network management and SNMP. Hands on Servers, TFTP, VoIP packet analysis. DNS Names and addresses, hosts file, how DNS works. FQDNs, DNS client configuration. Hands on Troubleshooting DNS. Security Firewalls, firewall architectures, DMZ, how firewalls work, proxy servers, filtering, ACLs, IDS, VPNs, authentication, encryption, tunnels, secure protocols. Hands on Firewalls, SSH Troubleshooting Methods, tools. Using the 7 layer model. Troubleshooting toolkits. Hands on Fixing the network.

Network +
Delivered in Internationally or OnlineFlexible Dates
£2,797

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

The Ultimate Guide to Python Programming with Python 3.10

By Packt

Master Python 3.10 from the experts with this course and demonstrate programming wizardry in Python. Go from a geek to a wizard in no time with this well-structured video course and write Python code like a pro. Learn about the often-forgotten basics and special features of programming and Python in general.

The Ultimate Guide to Python Programming with Python 3.10
Delivered Online On Demand14 hours 26 minutes
£82.99

Essentials of Becoming a Manager and Managing Teams

4.9(27)

By Apex Learning

Overview This comprehensive course on Essentials of Becoming a Manager and Managing Teams will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Essentials of Becoming a Manager and Managing Teams comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Essentials of Becoming a Manager and Managing Teams. It is available to all students, of all academic backgrounds. Requirements Our Essentials of Becoming a Manager and Managing Teams is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 8 sections • 144 lectures • 09:09:00 total length •What to Expect & About Me: 00:02:00 •Well Done!: 00:02:00 •It's a Different Job: 00:03:00 •You're Scared? Good!: 00:02:00 •The Manager Mindset: 00:03:00 •Set Expectations: 00:04:00 •Get Learning Leadership!: 00:03:00 •What is Culture?: 00:02:00 •Culture of Fairness: 00:08:00 •People Are Crazy: 00:02:00 •Mastering One To One Meetings: 00:05:00 •Manager to Coach: 00:07:00 •Me? A Psychologist?: 00:02:00 •Emotional Intelligence: 00:05:00 •Mastering Performance Evaluations: 00:07:00 •Welcoming New Starters: 00:07:00 •How to Hire a Diverse Workforce: 00:06:00 •Get the Basics Right Every Time: 00:02:00 •Conclusion: 00:02:00 •Introduction: 00:02:00 •The Importance of the Interview Process: 00:03:00 •What's Wrong With The Interview Process: 00:07:00 •Human Vs. Algorithm: 00:02:00 •Unconscious Interviewer Biases: 00:03:00 •Be Data Driven: 00:03:00 •Let's See You In Action: 00:02:00 •Keep it Relevant: 00:02:00 •Seriously Avoid These Topics: 00:03:00 •Benefits of a Diverse Workforce: 00:03:00 •How to Hire a Diverse Workforce: 00:06:00 •Hunger and Desire Over Skills: 00:03:00 •Culture Addition, Not Culture Fit: 00:03:00 •Compliment, Backup or Add To The Team: 00:05:00 •Hiring The Right Rank: 00:04:00 •What Are Your Location Restrictions: 00:01:00 •The Risk Of Delivering Less: 00:02:00 •The Risk Of Burnout: 00:02:00 •The Risk Of Losing The Headcount: 00:02:00 •Confirm The Job Is What They Think It Is: 00:02:00 •Sell Yourself, The Team & The Company: 00:03:00 •Don't Be A Jerk: 00:02:00 •It's Not About Making You Look Good: 00:02:00 •Managing Recruitment Agencies: 00:04:00 •Communications With The Candidate: 00:03:00 •Be Ready: 00:03:00 •Assign A Buddy: 00:02:00 •You Got It Wrong!: 00:02:00 •Conclusion: 00:03:00 •What To Expect From The Course: 00:02:00 •Why Even Bother?: 00:07:00 •What Learning Used To Be Like: 00:02:00 •Individual Learner: 00:01:00 •Everyone Says They Are A Self-Learner: 00:10:00 •Online Communities: 00:02:00 •Embedding Learning Into Daily Life: 00:03:00 •Teach It To Learn It: 00:02:00 •Learning New Vs Becoming Expert: 00:01:00 •Listen Faster: 00:01:00 •Tom's Approach: 00:02:00 •The Paid Training Course Is History: 00:03:00 •Develop The Right Mental Habits: 00:06:00 •Make It Easier On Yourself: 00:02:00 •Manager Responsibilities: 00:01:00 •Are You Really A Centre Of Excellence?: 00:02:00 •Learning As Part Of Performance Evaluation: 00:02:00 •Don't Worry If People Leave: 00:01:00 •The Benefits Of A Skilled User Base: 00:02:00 •Push It, Push It, Push It: 00:01:00 •The Golden Hour: 00:09:00 •Internal Mobility: 00:03:00 •Team Secondment: 00:02:00 •Make People Good Enough To Quit: 00:03:00 •Lunch & Learns: 00:02:00 •Personalised Learning Plans: 00:02:00 •Use It Or Lose It: 00:02:00 •Certifiably Great: 00:02:00 •Get A Learning Buddy: 00:02:00 •Senior Leaders Responsibilities: 00:01:00 •Walk It From The Top: 00:02:00 •Learning Wherever, Whenever: 00:02:00 •Show Us The Data: 00:02:00 •Create Learning Champions: 00:02:00 •Gamification: 00:02:00 •Sell, Sell, Sell: 00:03:00 •Don't Block The Useful Sites: 00:03:00 •Create A Varied Library Of Resources: 00:02:00 •Encourage Conferences And Seminars: 00:04:00 •The Feedback Loop: 00:02:00 •Learning Is Expensive: 00:03:00 •Learning Takes Time: 00:02:00 •Concluding Remarks: 00:04:00 •Interview Masterclass - Maximize Your Chances of Success: 00:03:00 •Get Yourself Game Ready!: 00:08:00 •Final Prep Tips! 1-2 Days Before Interview: 00:03:00 •It's Interview Day! How to ACE the interview!: 00:07:00 •Positive Personality Traits Interviewers Are Desperate For: 00:07:00 •How to Engage & Impress in Conversation: 00:05:00 •The Art of Asking Questions: 00:08:00 •How to Answer Questions Using Skill & Psychological Tricks: 00:10:00 •After Interview - Still More You Can Do: 00:05:00 •Staying Professional: 00:02:00 •That Wasn't What You Expected!!: 00:03:00 •Waiting For The Answer: 00:02:00 •Let's Review The Tips - So Much To Consider: 00:04:00 •Introduction to Overcoming Burnout: 00:03:00 •The Problem of Burnout in Modern Workplaces: 00:06:00 •Symptoms of Burnout - Do You Have It?: 00:03:00 •How Individuals Can Fight Back Against Burnout: 00:12:00 •How Leaders Can Create A Burnout Free Culture: 00:10:00 •Let's Review The Advice - What's Important?: 00:03:00 •Characteristics of Great Leaders - Introduction: 00:02:00 •Honesty, Coaching & The Mission: 00:08:00 •Empathy, Togetherness & Feedback: 00:06:00 •Change, Authenticity & Enablement: 00:05:00 •Perspective, Empowerment & Emotional Intelligence: 00:05:00 •My Favourite Tips & Bonus!: 00:05:00 •What to Expect: 00:04:00 •What & Why?: 00:03:00 •The Cost of Meetings: 00:02:00 •Red Amber & Green Meetings: 00:06:00 •Do You Need A Meeting?: 00:04:00 •Timing Considerations: 00:07:00 •Contents of the Invite: 00:03:00 •Scheduling Etiquette: 00:07:00 •Considerations for Externals: 00:05:00 •The Meeting as an Opportunity: 00:02:00 •Chairing Meetings: 00:01:00 •Your Agenda: 00:08:00 •Kicking Off: 00:06:00 •During The Meeting: 00:08:00 •After Meeting Minutes: 00:06:00 •Considerations: 00:06:00 •Concluding Remarks: 00:02:00 •What To Expect & About Me: 00:02:00 •Management Vs. Coaching: 00:07:00 •What Is Culture?: 00:02:00 •Culture of Fairness: 00:08:00 •How To Be A Great Listener: 00:05:00 •Mastering Performance Evaluations: 00:07:00 •Welcoming New Starters: 00:07:00 •Stupid Things NOT To Say To Your Team: 00:07:00 •Your Team Made A Mistake: 00:06:00 •Mastering Crucial Conversations: 00:05:00 •When to Fire Someone: 00:06:00

Essentials of Becoming a Manager and Managing Teams
Delivered Online On Demand9 hours 9 minutes
£12

Chemical Engineering: 20-in-1 Premium Online Courses Bundle

By Compete High

Make your mark in the world of science, safety, and sustainability. This 20-in-1 Chemical Engineering bundle is crafted to help you stand out for roles in labs, manufacturing, energy, and environmental sectors — whether you’re just starting or boosting your technical CV. With growing demand for multidisciplinary professionals, this is your fast track to hireability. 💼 Description The chemical engineering and applied science fields require more than academic knowledge — employers now prioritise safety awareness, documentation skills, and environmental understanding. This bundle combines those essential areas into one highly efficient, career-ready course collection. Perfect for aspiring lab technicians, process engineers, water treatment specialists, and those eyeing roles in renewable energy or health & safety. It covers industry-relevant topics from fire safety to carbon literacy — all while enhancing your professional profile with documented proof of skills. Waiting could mean falling behind. Enroll now to lock in access to 20 industry-aligned courses for the price of one — while it’s still available. ❓ FAQ Q: What roles does this bundle support? A: Lab technician, chemical process assistant, environmental safety coordinator, and QA/QC roles. Q: Does this bundle help with compliance and safety credentials? A: Yes — it includes key safety-focused topics and documentation skills. Q: Do I need a science background? A: Not necessarily — it’s ideal for both technical professionals and career switchers. Q: What industries does this apply to? A: Chemicals, manufacturing, energy, pharma, water treatment, and environmental science. Q: Will I receive a certificate? A: Yes — every course includes a completion certificate. Q: Is this a limited-time deal? A: Yes — this full-access offer will not last long.

Chemical Engineering: 20-in-1 Premium Online Courses Bundle
Delivered Online On Demand4 hours
£49.99

Farming: 20-in-1 Premium Online Courses Bundle

By Compete High

The agricultural industry is evolving—fast. Employers are seeking individuals who understand not just farming, but logistics, sustainability, and safety too. This 20-in-1 Farming bundle is your competitive advantage for stepping into a smarter, greener, and more efficient future in agri-business. Description Farming today involves more than just fields and tools. This bundle supports job readiness in modern agriculture, horticulture, farm logistics, and environmental management. Whether you aim to work on-site, in supply chains, or in farm administration, this bundle equips you with a diverse portfolio of certifications. With training in procurement, fire and electrical safety, greenhouse systems, and communication, it also appeals to roles in farm retail, urban farming, local councils, or sustainable supply networks. The added leadership and management skills ensure you're prepared not just to work—but to lead. Why wait to upskill when you could earn 20 job-relevant certificates in one go? Get qualified now—before the season changes and the hiring rush begins. FAQ Q: What kinds of roles does this bundle prepare me for? A: Farm Supervisor, Horticulture Assistant, Agribusiness Coordinator, Logistics Operative, Sustainability Officer, or Procurement Clerk. Q: Is it suitable for small-scale or urban farmers? A: Yes—especially those looking to professionalise or expand into broader agri-markets. Q: Do I need a background in farming to benefit? A: No prior experience is necessary—this bundle is designed for all levels. Q: Are certificates included? A: Yes, each course includes an individual certificate to enhance your CV. Q: Is the training accessible at any time? A: Absolutely—study whenever it suits you, with lifetime access included.

Farming: 20-in-1 Premium Online Courses Bundle
Delivered Online On Demand4 hours
£49.99

MD-102T00 Microsoft 365 Endpoint Administrator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - Explore the Enterprise Desktop Examine benefits of modern management Examine the enterprise desktop life-cycle model Examine planning and purchasing Examine desktop deployment Plan an application deployment Plan for upgrades and retirement 2 - Explore Windows Editions Examine Windows client editions and capabilities Select client edition Examine hardware requirements 3 - Understand Microsoft Entra ID Examine Microsoft Entra ID Compare Microsoft Entra ID and Active Directory Domain Services Examine Microsoft Entra ID as a directory service for cloud apps Compare Microsoft Entra ID P1 and P2 plans Examine Microsoft Entra Domain Services 4 - Manage Microsoft Entra identities Examine RBAC and user roles in Microsoft Entra ID Create and manage users in Microsoft Entra ID Create and manage groups in Microsoft Entra ID Manage Microsoft Entra objects with PowerShell Synchronize objects from AD DS to Microsoft Entra ID 5 - Manage device authentication Describe Microsoft Entra join Examine Microsoft Entra join prerequisites limitations and benefits Join devices to Microsoft Entra ID Manage devices joined to Microsoft Entra ID 6 - Enroll devices using Microsoft Configuration Manager Deploy the Microsoft Configuration Manager client Monitor the Microsoft Configuration Manager client Manage the Microsoft Configuration Manager client 7 - Enroll devices using Microsoft Intune Manage mobile devices with Intune Enable mobile device management Explain considerations for device enrollment Manage corporate enrollment policy Enroll Windows devices in Intune Enroll Android devices in Intune Enroll iOS devices in Intune Explore device enrollment manager Monitor device enrollment Manage devices remotely 8 - Execute device profiles Explore Intune device profiles Create device profiles Create a custom device profile 9 - Oversee device profiles Monitor device profiles in Intune Manage device sync in Intune Manage devices in Intune using scripts 10 - Maintain user profiles Examine user profile Explore user profile types Examine options for minimizing user profile size Deploy and configure folder redirection Sync user state with Enterprise State Roaming Configure Enterprise State Roaming in Azure 11 - Execute mobile application management Examine mobile application management Examine considerations for mobile application management Prepare line-of-business apps for app protection policies Implement mobile application management policies in Intune Manage mobile application management policies in Intune 12 - Deploy and update applications Deploy applications with Intune Add apps to Intune Manage Win32 apps with Intune Deploy applications with Configuration Manager Deploying applications with Group Policy Assign and publish software Explore Microsoft Store for Business Implement Microsoft Store Apps Update Microsoft Store Apps with Intune Assign apps to company employees 13 - Administer endpoint applications Manage apps with Intune Manage Apps on non-enrolled devices Deploy Microsoft 365 Apps with Intune Additional Microsoft 365 Apps Deployment Tools Configure Microsoft Edge Internet Explorer mode App Inventory Review 14 - Protect identities in Microsoft Entra ID Explore Windows Hello for Business Deploy Windows Hello Manage Windows Hello for Business Explore Microsoft Entra ID Protection Manage self-service password reset in Microsoft Entra ID Implement multi-factor authentication 15 - Enable organizational access Enable access to organization resources Explore VPN types and configuration Explore Always On VPN Deploy Always On VPN 16 - Implement device compliance Protect access to resources using Intune Explore device compliance policy Deploy a device compliance policy Explore conditional access Create conditional access policies 17 - Generate inventory and compliance reports Report enrolled devices inventory in Intune Monitor and report device compliance Build custom Intune inventory reports Access Intune using Microsoft Graph API 18 - Deploy device data protection Explore Windows Information Protection Plan Windows Information Protection Implement and use Windows Information Protection Explore Encrypting File System in Windows client Explore BitLocker 19 - Manage Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Examine key capabilities of Microsoft Defender for Endpoint Explore Windows Defender Application Control and Device Guard Explore Microsoft Defender Application Guard Examine Windows Defender Exploit Guard Explore Windows Defender System Guard 20 - Manage Microsoft Defender in Windows client Explore Windows Security Center Explore Windows Defender Credential Guard Manage Microsoft Defender Antivirus Manage Windows Defender Firewall Explore Windows Defender Firewall with Advanced Security 21 - Manage Microsoft Defender for Cloud Apps Explore Microsoft Defender for Cloud Apps Planning Microsoft Defender for Cloud Apps Implement Microsoft Defender for Cloud Apps 22 - Assess deployment readiness Examine deployment guidelines Explore readiness tools Assess application compatibility Explore tools for application compatibility mitigation Prepare network and directory for deployment Plan a pilot 23 - Deploy using the Microsoft Deployment Toolkit Evaluate traditional deployment methods Set up the Microsoft Deployment Toolkit for client deployment Manage and deploy images using the Microsoft Deployment Toolkit 24 - Deploy using Microsoft Configuration Manager Explore client deployment using Configuration Manager Examine deployment components of Configuration Manager Manage client deployment using Configuration Manager Plan in-place upgrades using Configuration Manager 25 - Deploy Devices using Windows Autopilot Use Autopilot for modern deployment Examine requirements for Windows Autopilot Prepare device IDs for Autopilot Implement device registration and out-of-the-box customization Examine Autopilot scenarios Troubleshoot Windows Autopilot 26 - Implement dynamic deployment methods Examine subscription activation Deploy using provisioning packages Use Windows Configuration Designer Use Microsoft Entra join with automatic MDM enrollment 27 - Plan a transition to modern endpoint management Explore using co-management to transition to modern endpoint management Examine prerequisites for co-management Evaluate modern management considerations Evaluate upgrades and migrations in modern transitioning Migrate data when modern transitioning Migrate workloads when modern transitioning 28 - Manage Windows 365 Explore Windows 365 Configure Windows 365 Administer Windows 365 29 - Manage Azure Virtual Desktop Examine Azure Virtual Desktop Explore Azure Virtual Desktop Configure Azure Virtual Desktop Administer Azure Virtual Desktop Additional course details: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MD-102T00 Microsoft 365 Endpoint Administrator
Delivered OnlineFlexible Dates
£2,975

CompTIA A+ bootcamp essentials and electives

5.0(3)

By Systems & Network Training

CompTIA A+ bootcamp training course description This course includes A+ Certification: Systems Hardware and Networking Support Skills and A+ Certification: Operating Systems and Security Support Skills. The course will provide IT "super users" or new support professionals with the fastest route to A+ Certification. Full practical sessions will prepare students for the two A+ Certification exams. Note: Some self-study each evening will be required. What will you learn Install, configure, and troubleshoot peripheral devices, system components, print devices, wired and wireless LAN links and internet access devices. Install, configure, and troubleshoot the Microsoft Windows, Linux, and Mac OS PC operating systems plus iOS, Android, and Windows mobile devices. Perform basic PC maintenance. Configure access control measures. Perform basic PC maintenance. CompTIA A+ bootcamp training course details Who will benefit: Students wishing to take both CompTIA A+ exams. Prerequisites: PC fundamentals Duration 5 days Networking Microsoft Systems course contents Peripherals and Adapters Motherboard Components, Connection Interfaces, Display Devices, Audio and Multimedia Devices, Removable Storage Devices. System Components Mass Storage Devices, System Memory, Processors, BIOS and UEFI, Power Supplies. Troubleshooting and Mobile Devices Troubleshooting System Components, Laptops, Mobile Devices, Troubleshooting Mobile Devices. Printer and Network Hardware Printers, Configuring Printers, Troubleshooting Printers, Network Architectures, Ethernet Networks. Networks Wireless Networks, Internet Connections, Internet Protocol, Routers and Firewalls, Troubleshooting Networks. Supporting Windows (1) Windows Operating System, Administration Tools, Managing Storage, Managing Files, Managing Applications. Supporting Windows (2) Managing Devices, Managing Performance, Troubleshooting Windows, Installing Windows. Supporting Windows Troubleshooting Boot Problems, Maintenance and Backup, Threats and Vulnerabilities, Viruses and Malware, Securing Workstations, Securing Data. Supporting Windows Networks Configuring Network Connections, Securing Network Connections, Configuring Shared Resources, Virtualization and Services. Linux, OS X, and Mobile OS Linux Operating System, OS X, Mobile Operating Systems, Mobile OS Security and Troubleshooting, Safety and Environmental Procedures, Professionalism and Communication.

CompTIA A+ bootcamp essentials and electives
Delivered in Internationally or OnlineFlexible Dates
£2,797

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

Health and Safety Level 2 - QLS Endorsed Course

5.0(2)

By Training Express

In today’s workplace, Health and Safety is not just a requirement; it’s a responsibility. The Health and Safety Level 2 course is designed to give you the core knowledge needed to understand workplace safety protocols and practices. Covering topics such as risk assessments, the importance of hazard control, and fire safety, this course ensures you are well-prepared to create safer working environments. Whether you’re new to the field or seeking to reinforce your understanding, this course provides a solid foundation in health and safety essentials. This course is ideal for those looking to gain an in-depth understanding of workplace safety standards, especially in environments where the well-being of staff and visitors is a priority. The content is engaging and accessible, designed for learners of all levels. By completing this course, you’ll gain essential insights into managing workplace hazards, handling health-related incidents, and ensuring safety protocols are followed, all without needing to attend physical sessions. It’s your go-to guide for mastering workplace safety at your own pace, offering you flexibility and the knowledge to make informed safety decisions. Health and Safety QLS Bundle Includes the following Courses Course 01: Certificate in Health and Safety at QLS Level 2 Course 02: Public Health and Safety Course 03: Safe Handling of Medicines Course 04: Infection Prevention, Infection Control, Infection Awareness and Infection Spread Reduction Course 05: First Aid Hacks at Workplace Key Features of Health and Safety Eligibility for QLS endorsed certificate upon successful completion of the Health and Safety course Free CPD Accredited Course Fully online, interactive Health and Safety course with audio voiceover Self-paced learning and laptop, tablet, smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases To become successful in your profession, you must have a specific set of skills to succeed in today's competitive world. In this in-depth Health and Safetytraining course, you will develop the most in-demand skills to kickstart your career, as well as upgrade your existing knowledge & skills. Assessment At the end of the Health and Safety course, we will provide assignment and quizzes. For each test, the pass mark will be set to 60%. Accreditation This Health and Safety course is QLS - Quality Licence Scheme Endorsed and CPD Certified, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Certification CPD Certified: Once you've successfully completed your Health and Safety course, you will immediately be sent a digital certificate. Also, you can have your printed certificate delivered by post (shipping cost £3.99). QLS Endorsed:After successfully completing the Health and Safety course, learners will be able to order an endorsed certificate, titled: [Certificate in Health and Safety at QLS Level 2], as proof of their achievement. This certificate of achievement endorsed by the Quality Licence Scheme. CPD 55 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This course is ideal for all employees or anyone who genuinely wishes to learn more about Health and Safety basics. Requirements No prior degree or experience is required to enrol in this Health and Safety course. Career path This Health and Safety Course will help you to explore avariety of career paths in the related industry. Certificates Digital certificate Digital certificate - Included Hardcopy Certificate Hard copy certificate - Included Hardcopy Certificate (UK Delivery): For those who wish to have a physical token of their achievement, we offer a high-quality, printed certificate. This hardcopy certificate is also provided free of charge. However, please note that delivery fees apply. If your shipping address is within the United Kingdom, the delivery fee will be only £3.99. Hardcopy Certificate (International Delivery): For all international addresses outside of the United Kingdom, the delivery fee for a hardcopy certificate will be only £10.

Health and Safety Level 2 - QLS Endorsed Course
Delivered Online On Demand1 hour
£150