• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

146 Fire courses in London

SIA Door Supervisor Course + First Aid

By London Construction College

Take The SIA Door Supervisor Course + First Aid, This Will Take You 6 Days To Complete. Enrol Now On To The Course! What Is SIA Door Supervisor Course? The SIA (Security Industry Authority) Door Supervisor Training is a comprehensive training program designed to prepare individuals for roles as door supervisors within the security industry in the United Kingdom. Door supervisors play a critical role in ensuring safety and security at licensed premises, including bars, clubs, and events. This SIA Door Supervisor Course + First Aid is 6 days, this is a compulsory course in order to attain the Door Supervisor Licence. Furthermore, this will allow you to work as a doorman, nightclub security, retail security, corporate security, construction security and many other security sectors. Enrol now or contact us for any further details.  Course Overview: 6 Days Course | 09:00 – 18:30 | Mon – Sat Every Week SIA Door Supervisor Course Road Map 1. Book Course Book your SIA Door Supervisor Training and First Aid Course in London (6 Days) 2. Attend Course Attend a 6-day course, and successfully pass all your SIA Door Supervisor exams.  3. Apply SIA Register for an account with SIA, and apply for your SIA Door Supervisor Licence. Course Information Why Choose SIA Door Supervisor Course? Expert Instructors Learn from seasoned professionals who bring real-world insights to the classroom. Our instructors are dedicated to your success, offering guidance and support throughout the training. Practical Training Gain hands-on experience in simulated security scenarios, preparing you for the challenges you’ll face in the field. Our practical sessions enhance your problem-solving skills and decision-making abilities SIA Compliance Stay ahead in the security industry by understanding and complying with SIA regulations. Our course covers the latest guidelines, ensuring you are well-versed in the legal and ethical aspects of security operations Job Placement Assistance We go beyond training by offering job placement assistance. Our network of industry connections helps you kickstart your security career with confidence. Ready To Begi Your SIA Journey? Your journey toward a rewarding and responsible career as a Door Supervisor starts here. Contact us today to enrol in our Door Supervisor Training at London Construction College, and take the first step towards an exciting and impactful career in security. Your future awaits! SIA Door Supervisor Course Content Unit 1 : Working In The Private Security Industry Legal Considerations in the Private Security Industry. Ensuring Health and Safety for Private Security Operatives . Awareness of Fire Safety. Procedures for Emergency Situations. Effective Communication Skills and Customer Care. Unit 2: Working As A Door Supervisor Adherence to Behavioral Standards. Understanding Civil and Criminal Law. Procedures for Search Operations. Protocols for Arrest Situations. Awareness of Drugs and Their Impact. Documentation of Incidents and Preservation of Crime Scenes. Compliance with Licensing Laws. Emergency Procedures. Unit 3: Conflict Management For The Private Security Industry Conflict Avoidance and Personal Risk Mitigation. De-escalation of Conflicts. Resolution and Lessons from Conflicts . Application of Communication and Conflict Management Skills for Door Supervisors. Unit 4: Physical Intervention Skills For The Private Security Industry Overview of Physical Intervention Skills. Essential Legislation Awareness . Fun Fact: The persuasive Communication and Conflict Management skills acquired in this course are applicable both professionally and personally in conflict situations. This standalone component alone holds a value exceeding the course price. SIA Door Supervisor Exam On the last day of the course, you’ll encounter four multiple-choice exams along with a practical assessment. We acknowledge that exams can be intimidating, but rest assured, there’s no cause for concern. The Door Supervisor course comprehensively covers all exam topics, and your skilled instructor will thoroughly equip you for success in these assessments. Embarking on an exciting career in the security industry as a Door Supervisor or Security Guard starts with the initial step of acquiring the right training. Throughout your Door Supervisor training, we guide you through the entire process, offering essential training and providing the necessary materials to assist you in obtaining your SIA Door Supervisor license. Document Checks Proof Of Identity You will need to provide documents that prove you are who you say you are. Address history You need to provide two proofs of address. Bank or building society statement issued within the last three months. Utility bill issued within the last three months. A credit card statement was sent to your current address within the last three months. Council Tax statement issued in the last 12 months. Mortgage statement issued in the last 12 months. Age You must be 18 or over to hold an SIA licence. Criminal record Please be aware, that even if you pass the SIA door supervisor, you will still need to pass SIA criminal record checks. If you live outside the UK, or you have spent 6 continuous months or more outside the UK in the last 5 years, you need to provide evidence of overseas criminal record checks to the SIA. SIA will only issue a licence after completing background checks.  Right to work in the UK You must have the right to work in the UK to get a front-line or non-front-line licence.  Important Things You Should Know FAQ SIA Door Supervisor Training What is the SIA Door Supervisor course, and why do I need it? The SIA Door Supervisor course is a training program designed for individuals seeking employment in the security industry, specifically in roles such as door supervision. The Security Industry Authority (SIA) requires this qualification for those working in designated roles to ensure a standard level of competence and professionalism. What does the SIA Door Supervisor Course cover? The SIA course covers a range of topics essential for door supervisors, including conflict management, physical intervention, emergency procedures, legal responsibilities, and customer service. It provides a comprehensive skill set needed to excel in the role. Can I take the course in London? Yes, the SIA Door Supervisor course is available in London.  How long does the course take to complete? The SIA Door Supervisor and First Aid is completed over 6 days of training. Is there an age requirement for taking the SIA Door Supervisor course? Yes, you must be at least 18 years old to take the SIA Door Supervisor course as it is a legal requirement for working in the security industry. What are the job prospects after completing the course? Successfully completing the SIA Door Supervisor course enhances your employability in the security industry. Door supervisors are in demand in various establishments, including nightclubs, bars, and events, and having the SIA qualification opens up job opportunities in these sectors. Do I need any prior experience in security to enrol in the course? No, prior experience in security is not a prerequisite for enrolling in the SIA Door Supervisor course. The course is designed to provide comprehensive training for individuals at various levels, including those new to the security industry. Can I take the SIA Door Supervisor course if I’m not a UK citizen? Yes, the SIA Door Supervisor course is open to individuals regardless of nationality. However, it’s essential to ensure that you meet the legal requirements for working in the UK, including visa regulations.

SIA Door Supervisor Course + First Aid
Delivered In-PersonFlexible Dates
£250

Essentials Of Sepsis Recognition & Escalation For Care & Support Staff

By NR Medical Training

To better equip care organisations and their amazing, hardworking staff in this fight, we offer the Essentials of Sepsis Recognition & Escalation For Care & Support Staff course. This face to face training course delivered by experienced healthcare professionals arms care and support staff with the necessary knowledge, skills and confidence to identify individuals at risk of sepsis, recognise its early signs, and escalate care effectively when they suspect sepsis. With our CQC compliant course, you'll be better prepared to help those at risk. Learners will receive an NR Medical Training/UK Sepsis Trust certificate which is valid for 1 year and a summary of elements covered throughout the course.

Essentials Of Sepsis Recognition & Escalation For Care & Support Staff
Delivered In-Person in Bury St Edmunds + 1 more or UK WideFlexible Dates
£350

Commissioning of Combined Cycle Power Plants

By EnergyEdge - Training for a Sustainable Energy Future

About this Course This 5 full-day course provides a comprehensive understanding of all the commissioning procedures for combined cycle power plants. The Commissioning Management System (CMS) of combined cycle power plants is covered in detail in this course. This includes all the commissioning procedures and documents, purpose of commissioning, responsibilities, system description, organization, working parties, test teams, documentation, testing and commissioning schedules, test reports, safety, plant certification, and plant completion report. The course provides also a thorough understanding of all the commissioning requirements for gas turbines, steam turbines and auxiliaries, generator and auxiliaries, electrical equipment, switchgear equipment, switchgear and transformers. All the stages of the commissioning procedure are covered in-depth in this course. This includes preparation - planning various activities, pre-commissioning checks and tests, typical commissioning schedule, detailed tests and commissioning procedures and instructions for every component in a combined cycle power plant, instrumentation, trial run of the equipment, safety and precautions, commissioning of combined cycle power plant systems, safety rules clearance certificates, procedure for the control and handling of defects, commissioning reports, operational testing, first fire, generator synchronization, performance testing, heat rate testing, emission testing, contract testing, CO2 concentration tests, electrical full-load rejection test, duct burner testing, partial load stability test, and reliability test. This course is a MUST for anyone who is involved in the pre-commissioning or commissioning of any combined cycle power plant equipment because it provides detailed pre-commissioning checks and tests, and detailed tests and commissioning procedures and instructions for every component in a combined cycle power plant. In addition, the seminar provides an in-depth coverage of all preparation, planning activities, commissioning schedules, trial run of each combined cycle power plant equipment, safety and precautions, safety rules clearance certificates, procedures for handling defects, and commissioning reports. Training Objectives Pre-commissioning Checks and Tests, Detailed Tests and Commissioning Procedures and Instructions for Every Equipment in Combined Cycle Power Plants: Gain a thorough understanding of all pre-commissioning checks and tests, and all commissioning procedures and instructions for every equipment in combined cycle power plants Commissioning Management System (CMS) of Combined Cycle Power Plants: Discover the benefits of the CMS of combined cycle power plants including all commissioning procedures and documents, purpose of commissioning, responsibilities, system description, organization, working parties, test teams, documentation, testing and commissioning schedules, test reports, safety, plant certification, and plant completion report Commissioning Procedures and Instructions for Heat Recovery Steam Generators, Air Blow and Steam Blow of Steam and Gas Piping in Combined Cycle Power Plants: Learn about the commissioning procedures and instructions for heat recovery steam generators, chemical cleaning of heat recovery steam generators, air blow and gas blow of steam and gas piping in combined cycle power plants, safety valve setting and soot blowers Commissioning Procedures and Instructions for Gas Turbines and Steam Turbines: Gain a thorough understanding of all the commissioning procedures and instructions for gas and steam turbines and auxiliaries including acid cleaning of oil pipelines, lubrication and governing system (oil flushing and hydraulic testing), jacking oil system, governing system, regenerative system, barring gear, vacuum tightness test, first rolling of turbine and data logging Commissioning Procedures and Instructions for Generator and Auxiliaries: Discover all the commissioning procedures and instructions for generator and auxiliaries including generator, seal oil system, hydrogen gas system, stator water system, rolling and start-up of generators Commissioning Procedures and Instructions for Electrical Equipment: Learn about all the commissioning procedures and instructions for electrical equipment including switchyard equipment, switchgear, transformers and motors Operational Testing, Performance Testing, Heat Rate Testing, Emission Testing of Combine Cycle Power Plants: Gain a thorough understanding of operational testing, first fire, generator synchronization, performance testing, heat rate testing, emission testing, contract testing, CO2 concentration tests, electrical full-load rejection test, duct burner testing, partial load stability test, and reliability test of combined cycle power plants Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Training Methods The instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all the delegates gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Trainer Your specialist course leader has more than 32 years of practical engineering experience with Ontario Power Generation (OPG), one of the largest electric utility in North America. He was previously involved in research on power generation equipment with Atomic Energy of Canada Limited at their Chalk River and Whiteshell Nuclear Research Laboratories. While working at OPG, he acted as a Training Manager, Engineering Supervisor, System Responsible Engineer and Design Engineer. During the period of time, he worked as a Field Engineer and Design Engineer, he was responsible for the operation, maintenance, diagnostics, and testing of gas turbines, steam turbines, generators, motors, transformers, inverters, valves, pumps, compressors, instrumentation and control systems. Further, his responsibilities included designing, engineering, diagnosing equipment problems and recommending solutions to repair deficiencies and improve system performance, supervising engineers, setting up preventive maintenance programs, writing Operating and Design Manuals, and commissioning new equipment. Later, he worked as the manager of a section dedicated to providing training for the staff at the power stations. The training provided by him covered in detail the various equipment and systems used in power stations. In addition, he has taught courses and seminars to more than four thousand working engineers and professionals around the world, specifically Europe and North America. He has been consistently ranked as 'Excellent' or 'Very Good' by the delegates who attended his seminars and lectures. He written 5 books for working engineers from which 3 have been published by McGraw-Hill, New York. Below is a list of the books authored by him; Power Generation Handbook: Gas Turbines, Steam Power Plants, Co-generation, and Combined Cycles, second edition, (800 pages), McGraw-Hill, New York, October 2011. Electrical Equipment Handbook (600 pages), McGraw-Hill, New York, March 2003. Power Plant Equipment Operation and Maintenance Guide (800 pages), McGraw-Hill, New York, January 2012. Industrial Instrumentation and Modern Control Systems (400 pages), Custom Publishing, University of Toronto, University of Toronto Custom Publishing (1999). Industrial Equipment (600 pages), Custom Publishing, University of Toronto, University of Toronto, University of Toronto Custom Publishing (1999). Furthermore, he has received the following awards: The first 'Excellence in Teaching' award offered by PowerEdge, Singapore, in December 2016 The first 'Excellence in Teaching' award offered by the Professional Development Center at University of Toronto (May, 1996). The 'Excellence in Teaching Award' in April 2007 offered by TUV Akademie (TUV Akademie is one of the largest Professional Development centre in world, it is based in Germany and the United Arab Emirates, and provides engineering training to engineers and managers across Europe and the Middle East). Awarded graduation 'With Distinction' from Dalhousie University when completed Bachelor of Engineering degree (1983). Lastly, he was awarded his Bachelor of Engineering Degree 'with distinction' from Dalhousie University, Halifax, Nova Scotia, Canada. He also received a Master of Applied Science in Engineering (M.A.Sc.) from the University of Ottawa, Canada. He is also a member of the Association of Professional Engineers in the province of Ontario, Canada. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Commissioning of Combined Cycle Power Plants
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

This comprehensive course, developed in line with the esteemed guidelines of the Resuscitation Council (UK), Skills for Health, and the Faculty of Pre-Hospital Care (RCS Ed), is designed to enhance your abilities in delivering superior emergency care across various settings.

FREC 4
Delivered In-Person in Bury St Edmunds + 1 more or UK WideFlexible Dates
Price on Enquiry

Combustion Engineering for Coal Fired Power Plants

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course This 5 full-day course provides detailed description of all combustion equipment and systems used in pulverized coal boilers and circulating fluidized bed (CFB) boilers including pulverized coal burning systems, coal feeder, pulverizer and classifier, pulverized coal burners, furnace and fans. This course provides also a comprehensive explanation of all boiler combustion control systems including pulverizer control system, combustion control, control of coal and air flow into the boiler, furnace pressure control, oxygen trim control, nitrogen oxides (NOx) and sulfur oxides (SOx) control, control of ammonia injection, flue gas dew point control, purge control, flame monitoring and tripping system as well as their tuning methods. All boiler control systems are covered as well in this course including drum level feedwater control, main steam and reheat steam temperature control, boiler limits and runback, sliding or variable pressure control, heat rate optimization with sliding pressure control, boiler-turbine coordinated control, etc. The course provides also detailed explanation of Boiler NFPA 85 Code (Boiler and Combustion Systems Hazards Codes) and American National Standard Institute/Instrument Society of America Code (ANSI/ISA-77-44-01-2007 Code). The burner management systems (BMS) and examples of boiler permissive starting logic and protective tripping logic will be explained thoroughly. The various methods used to calculate the boiler efficiency are covered in detail in this course including the direct and indirect methods. All the factors which affect the efficiency and emissions of pulverized coal boiler and CFB boiler will be explained thoroughly. The course covers also all the methods used to improve the efficiency of pulverized coal boilers and CFB boilers including improvement to their combustion efficiency and control systems performance. Training Objectives Boiler Combustion Equipment and Systems: Gain an in-depth understanding of all boiler combustion equipment and systems including pulverized coal burning systems, coal feeder, pulverizer and classifier, pulverized coal burners, furnace and fans Boiler Combustion Control Systems: Gain a thorough understanding of all boiler combustion control systems for pulverized coal boilers, and CFB boilers including pulverizer control system, combustion control, control of coal and air flow into the boiler, furnace pressure control, oxygen trim control, nitrogen oxides (NOx) and sulfur oxides (SOx) control, control of ammonia injection, flue gas dew point control, purge control, flame monitoring and tripping system Boiler Conventional Control Systems: Gain an in-depth understanding of all boiler conventional control systems including drum level feedwater control, main steam and reheat steam temperature control, boiler limits and runback, sliding or variable pressure control, heat rate optimization with sliding pressure control, and boiler-turbine coordinated control Boiler NFPA 85 Code (Boiler and Combustion Systems Hazards Codes) and American National Standard Institute/Instrument Society of America Code (ANSI/ISA-77-44-01-2007 Code): Learn about NFPA 85 code and ANSI/ISA-77-44-01-2007 code Burner Management System and Boiler Permissive Starting Logic and Protective Tripping Logic: Gain an in-depth understanding of burner management system and boiler permissive starting logic and protective tripping logic Boiler Efficiency Calculations: Learn how to calculate the boiler efficiency using the direct and indirect methods Factors Affecting the Efficiency and Emissions of Boilers: Understand all the factors which affect the boiler efficiency and emissions Methods Used to Improve the Efficiency of Boilers: Learn about all the methods used to improve the efficiency of pulverized coal boilers, and CFB boilers including improvement to their combustion efficiency and control systems performance Boiler Instrument and Piping Diagrams: Gain an in-depth understanding of all boiler instrument and piping diagrams CFB and Pulverized Coal Boilers Equipment and Systems: Learn about various types of equipment and systems used in CFB and pulverized coal boilers including economizers, steam drum, superheaters, air preheaters, ammonia injection systems, etc. Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Course Level Basic or Foundation Training Methods Your specialist course leader relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Each delegate will receive a copy of the following materials written by the instructor: Excerpt of the relevant chapters from the 'POWER GENERATION HANDBOOK' second edition published by McGraw-Hill in 2012 (800 pages) Excerpt of the relevant chapters from the 'POWER PLANT EQUIPMENT OPERATION AND MAINTENANCE GUIDE' published by McGraw-Hill in 2012 (800 pages) COMBUSTION ENGINEERING FOR COAL FIRED POWER PLANTS MANUAL (includes practical information about combustion engineering for coal fired power plants - 550 pages) Trainer Your specialist course leader has more than 32 years of practical engineering experience with Ontario Power Generation (OPG), one of the largest electric utility in North America. He was previously involved in research on power generation equipment with Atomic Energy of Canada Limited at their Chalk River and Whiteshell Nuclear Research Laboratories. While working at OPG, he acted as a Training Manager, Engineering Supervisor, System Responsible Engineer and Design Engineer. During the period of time, he worked as a Field Engineer and Design Engineer, he was responsible for the operation, maintenance, diagnostics, and testing of gas turbines, steam turbines, generators, motors, transformers, inverters, valves, pumps, compressors, instrumentation and control systems. Further, his responsibilities included designing, engineering, diagnosing equipment problems and recommending solutions to repair deficiencies and improve system performance, supervising engineers, setting up preventive maintenance programs, writing Operating and Design Manuals, and commissioning new equipment. Later, he worked as the manager of a section dedicated to providing training for the staff at the power stations. The training provided by him covered in detail the various equipment and systems used in power stations. In addition, he has taught courses and seminars to more than four thousand working engineers and professionals around the world, specifically Europe and North America. He has been consistently ranked as 'Excellent' or 'Very Good' by the delegates who attended his seminars and lectures. He written 5 books for working engineers from which 3 have been published by McGraw-Hill, New York. Below is a list of the books authored by him; Power Generation Handbook: Gas Turbines, Steam Power Plants, Co-generation, and Combined Cycles, second edition, (800 pages), McGraw-Hill, New York, October 2011. Electrical Equipment Handbook (600 pages), McGraw-Hill, New York, March 2003. Power Plant Equipment Operation and Maintenance Guide (800 pages), McGraw-Hill, New York, January 2012. Industrial Instrumentation and Modern Control Systems (400 pages), Custom Publishing, University of Toronto, University of Toronto Custom Publishing (1999). Industrial Equipment (600 pages), Custom Publishing, University of Toronto, University of Toronto, University of Toronto Custom Publishing (1999). Furthermore, he has received the following awards: The first 'Excellence in Teaching' award offered by PowerEdge, Singapore, in December 2016 The first 'Excellence in Teaching' award offered by the Professional Development Center at University of Toronto (May, 1996). The 'Excellence in Teaching Award' in April 2007 offered by TUV Akademie (TUV Akademie is one of the largest Professional Development centre in world, it is based in Germany and the United Arab Emirates, and provides engineering training to engineers and managers across Europe and the Middle East). Awarded graduation 'With Distinction' from Dalhousie University when completed Bachelor of Engineering degree (1983). Lastly, he was awarded his Bachelor of Engineering Degree 'with distinction' from Dalhousie University, Halifax, Nova Scotia, Canada. He also received a Master of Applied Science in Engineering (M.A.Sc.) from the University of Ottawa, Canada. He is also a member of the Association of Professional Engineers in the province of Ontario, Canada. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Combustion Engineering for Coal Fired Power Plants
Delivered in Internationally or OnlineFlexible Dates
£3,009 to £3,499

Definitive Firewalls for engineers

5.0(3)

By Systems & Network Training

Firewalls training course description A technical hands on training course covering firewall technologies. This focuses on the whys and hows of firewall technology rather than looking at manufacturer specific issues. What will you learn Design secure firewall protected networks. Test firewalls. Evaluate firewalls Configure firewalls Firewalls training course details Who will benefit: Technical staff wanting to learn about Filrewalls including: Technical network staff. Technical security staff. Prerequisites: IP security foundation for engineers Duration 2 days Firewalls training course contents Firewall introduction Security review, what is a firewall? What do firewalls do? Firewall benefits, concepts. Hands on Configuring the network to be used in later labs, launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls, blade based firewalls, personal firewalls, which firewall should you use? Firewall products. Hands on Configuring a simple firewall. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on Stateful packet inspection firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall advantages and disadvantages. Hands on Proxy firewalls. Personal firewalls The role of personal firewalls, Windows XP, Zonealarm. Hands on Configuring a personal firewall. Firewall architectures Home based, small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Securing communications VPNs, IPsec. Firewall configuration of VPNs, integration of dedicated VPN devices and firewalls. Hands on IPSec VPN configuration. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls.

Definitive Firewalls for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697
1...678910...15