Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices
Master Python 3.10 from the experts with this course and demonstrate programming wizardry in Python. Go from a geek to a wizard in no time with this well-structured video course and write Python code like a pro. Learn about the often-forgotten basics and special features of programming and Python in general.
Overview This comprehensive course on Essentials of Becoming a Manager and Managing Teams will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Essentials of Becoming a Manager and Managing Teams comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Essentials of Becoming a Manager and Managing Teams. It is available to all students, of all academic backgrounds. Requirements Our Essentials of Becoming a Manager and Managing Teams is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 8 sections • 144 lectures • 09:09:00 total length •What to Expect & About Me: 00:02:00 •Well Done!: 00:02:00 •It's a Different Job: 00:03:00 •You're Scared? Good!: 00:02:00 •The Manager Mindset: 00:03:00 •Set Expectations: 00:04:00 •Get Learning Leadership!: 00:03:00 •What is Culture?: 00:02:00 •Culture of Fairness: 00:08:00 •People Are Crazy: 00:02:00 •Mastering One To One Meetings: 00:05:00 •Manager to Coach: 00:07:00 •Me? A Psychologist?: 00:02:00 •Emotional Intelligence: 00:05:00 •Mastering Performance Evaluations: 00:07:00 •Welcoming New Starters: 00:07:00 •How to Hire a Diverse Workforce: 00:06:00 •Get the Basics Right Every Time: 00:02:00 •Conclusion: 00:02:00 •Introduction: 00:02:00 •The Importance of the Interview Process: 00:03:00 •What's Wrong With The Interview Process: 00:07:00 •Human Vs. Algorithm: 00:02:00 •Unconscious Interviewer Biases: 00:03:00 •Be Data Driven: 00:03:00 •Let's See You In Action: 00:02:00 •Keep it Relevant: 00:02:00 •Seriously Avoid These Topics: 00:03:00 •Benefits of a Diverse Workforce: 00:03:00 •How to Hire a Diverse Workforce: 00:06:00 •Hunger and Desire Over Skills: 00:03:00 •Culture Addition, Not Culture Fit: 00:03:00 •Compliment, Backup or Add To The Team: 00:05:00 •Hiring The Right Rank: 00:04:00 •What Are Your Location Restrictions: 00:01:00 •The Risk Of Delivering Less: 00:02:00 •The Risk Of Burnout: 00:02:00 •The Risk Of Losing The Headcount: 00:02:00 •Confirm The Job Is What They Think It Is: 00:02:00 •Sell Yourself, The Team & The Company: 00:03:00 •Don't Be A Jerk: 00:02:00 •It's Not About Making You Look Good: 00:02:00 •Managing Recruitment Agencies: 00:04:00 •Communications With The Candidate: 00:03:00 •Be Ready: 00:03:00 •Assign A Buddy: 00:02:00 •You Got It Wrong!: 00:02:00 •Conclusion: 00:03:00 •What To Expect From The Course: 00:02:00 •Why Even Bother?: 00:07:00 •What Learning Used To Be Like: 00:02:00 •Individual Learner: 00:01:00 •Everyone Says They Are A Self-Learner: 00:10:00 •Online Communities: 00:02:00 •Embedding Learning Into Daily Life: 00:03:00 •Teach It To Learn It: 00:02:00 •Learning New Vs Becoming Expert: 00:01:00 •Listen Faster: 00:01:00 •Tom's Approach: 00:02:00 •The Paid Training Course Is History: 00:03:00 •Develop The Right Mental Habits: 00:06:00 •Make It Easier On Yourself: 00:02:00 •Manager Responsibilities: 00:01:00 •Are You Really A Centre Of Excellence?: 00:02:00 •Learning As Part Of Performance Evaluation: 00:02:00 •Don't Worry If People Leave: 00:01:00 •The Benefits Of A Skilled User Base: 00:02:00 •Push It, Push It, Push It: 00:01:00 •The Golden Hour: 00:09:00 •Internal Mobility: 00:03:00 •Team Secondment: 00:02:00 •Make People Good Enough To Quit: 00:03:00 •Lunch & Learns: 00:02:00 •Personalised Learning Plans: 00:02:00 •Use It Or Lose It: 00:02:00 •Certifiably Great: 00:02:00 •Get A Learning Buddy: 00:02:00 •Senior Leaders Responsibilities: 00:01:00 •Walk It From The Top: 00:02:00 •Learning Wherever, Whenever: 00:02:00 •Show Us The Data: 00:02:00 •Create Learning Champions: 00:02:00 •Gamification: 00:02:00 •Sell, Sell, Sell: 00:03:00 •Don't Block The Useful Sites: 00:03:00 •Create A Varied Library Of Resources: 00:02:00 •Encourage Conferences And Seminars: 00:04:00 •The Feedback Loop: 00:02:00 •Learning Is Expensive: 00:03:00 •Learning Takes Time: 00:02:00 •Concluding Remarks: 00:04:00 •Interview Masterclass - Maximize Your Chances of Success: 00:03:00 •Get Yourself Game Ready!: 00:08:00 •Final Prep Tips! 1-2 Days Before Interview: 00:03:00 •It's Interview Day! How to ACE the interview!: 00:07:00 •Positive Personality Traits Interviewers Are Desperate For: 00:07:00 •How to Engage & Impress in Conversation: 00:05:00 •The Art of Asking Questions: 00:08:00 •How to Answer Questions Using Skill & Psychological Tricks: 00:10:00 •After Interview - Still More You Can Do: 00:05:00 •Staying Professional: 00:02:00 •That Wasn't What You Expected!!: 00:03:00 •Waiting For The Answer: 00:02:00 •Let's Review The Tips - So Much To Consider: 00:04:00 •Introduction to Overcoming Burnout: 00:03:00 •The Problem of Burnout in Modern Workplaces: 00:06:00 •Symptoms of Burnout - Do You Have It?: 00:03:00 •How Individuals Can Fight Back Against Burnout: 00:12:00 •How Leaders Can Create A Burnout Free Culture: 00:10:00 •Let's Review The Advice - What's Important?: 00:03:00 •Characteristics of Great Leaders - Introduction: 00:02:00 •Honesty, Coaching & The Mission: 00:08:00 •Empathy, Togetherness & Feedback: 00:06:00 •Change, Authenticity & Enablement: 00:05:00 •Perspective, Empowerment & Emotional Intelligence: 00:05:00 •My Favourite Tips & Bonus!: 00:05:00 •What to Expect: 00:04:00 •What & Why?: 00:03:00 •The Cost of Meetings: 00:02:00 •Red Amber & Green Meetings: 00:06:00 •Do You Need A Meeting?: 00:04:00 •Timing Considerations: 00:07:00 •Contents of the Invite: 00:03:00 •Scheduling Etiquette: 00:07:00 •Considerations for Externals: 00:05:00 •The Meeting as an Opportunity: 00:02:00 •Chairing Meetings: 00:01:00 •Your Agenda: 00:08:00 •Kicking Off: 00:06:00 •During The Meeting: 00:08:00 •After Meeting Minutes: 00:06:00 •Considerations: 00:06:00 •Concluding Remarks: 00:02:00 •What To Expect & About Me: 00:02:00 •Management Vs. Coaching: 00:07:00 •What Is Culture?: 00:02:00 •Culture of Fairness: 00:08:00 •How To Be A Great Listener: 00:05:00 •Mastering Performance Evaluations: 00:07:00 •Welcoming New Starters: 00:07:00 •Stupid Things NOT To Say To Your Team: 00:07:00 •Your Team Made A Mistake: 00:06:00 •Mastering Crucial Conversations: 00:05:00 •When to Fire Someone: 00:06:00
Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - Explore the Enterprise Desktop Examine benefits of modern management Examine the enterprise desktop life-cycle model Examine planning and purchasing Examine desktop deployment Plan an application deployment Plan for upgrades and retirement 2 - Explore Windows Editions Examine Windows client editions and capabilities Select client edition Examine hardware requirements 3 - Understand Microsoft Entra ID Examine Microsoft Entra ID Compare Microsoft Entra ID and Active Directory Domain Services Examine Microsoft Entra ID as a directory service for cloud apps Compare Microsoft Entra ID P1 and P2 plans Examine Microsoft Entra Domain Services 4 - Manage Microsoft Entra identities Examine RBAC and user roles in Microsoft Entra ID Create and manage users in Microsoft Entra ID Create and manage groups in Microsoft Entra ID Manage Microsoft Entra objects with PowerShell Synchronize objects from AD DS to Microsoft Entra ID 5 - Manage device authentication Describe Microsoft Entra join Examine Microsoft Entra join prerequisites limitations and benefits Join devices to Microsoft Entra ID Manage devices joined to Microsoft Entra ID 6 - Enroll devices using Microsoft Configuration Manager Deploy the Microsoft Configuration Manager client Monitor the Microsoft Configuration Manager client Manage the Microsoft Configuration Manager client 7 - Enroll devices using Microsoft Intune Manage mobile devices with Intune Enable mobile device management Explain considerations for device enrollment Manage corporate enrollment policy Enroll Windows devices in Intune Enroll Android devices in Intune Enroll iOS devices in Intune Explore device enrollment manager Monitor device enrollment Manage devices remotely 8 - Execute device profiles Explore Intune device profiles Create device profiles Create a custom device profile 9 - Oversee device profiles Monitor device profiles in Intune Manage device sync in Intune Manage devices in Intune using scripts 10 - Maintain user profiles Examine user profile Explore user profile types Examine options for minimizing user profile size Deploy and configure folder redirection Sync user state with Enterprise State Roaming Configure Enterprise State Roaming in Azure 11 - Execute mobile application management Examine mobile application management Examine considerations for mobile application management Prepare line-of-business apps for app protection policies Implement mobile application management policies in Intune Manage mobile application management policies in Intune 12 - Deploy and update applications Deploy applications with Intune Add apps to Intune Manage Win32 apps with Intune Deploy applications with Configuration Manager Deploying applications with Group Policy Assign and publish software Explore Microsoft Store for Business Implement Microsoft Store Apps Update Microsoft Store Apps with Intune Assign apps to company employees 13 - Administer endpoint applications Manage apps with Intune Manage Apps on non-enrolled devices Deploy Microsoft 365 Apps with Intune Additional Microsoft 365 Apps Deployment Tools Configure Microsoft Edge Internet Explorer mode App Inventory Review 14 - Protect identities in Microsoft Entra ID Explore Windows Hello for Business Deploy Windows Hello Manage Windows Hello for Business Explore Microsoft Entra ID Protection Manage self-service password reset in Microsoft Entra ID Implement multi-factor authentication 15 - Enable organizational access Enable access to organization resources Explore VPN types and configuration Explore Always On VPN Deploy Always On VPN 16 - Implement device compliance Protect access to resources using Intune Explore device compliance policy Deploy a device compliance policy Explore conditional access Create conditional access policies 17 - Generate inventory and compliance reports Report enrolled devices inventory in Intune Monitor and report device compliance Build custom Intune inventory reports Access Intune using Microsoft Graph API 18 - Deploy device data protection Explore Windows Information Protection Plan Windows Information Protection Implement and use Windows Information Protection Explore Encrypting File System in Windows client Explore BitLocker 19 - Manage Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Examine key capabilities of Microsoft Defender for Endpoint Explore Windows Defender Application Control and Device Guard Explore Microsoft Defender Application Guard Examine Windows Defender Exploit Guard Explore Windows Defender System Guard 20 - Manage Microsoft Defender in Windows client Explore Windows Security Center Explore Windows Defender Credential Guard Manage Microsoft Defender Antivirus Manage Windows Defender Firewall Explore Windows Defender Firewall with Advanced Security 21 - Manage Microsoft Defender for Cloud Apps Explore Microsoft Defender for Cloud Apps Planning Microsoft Defender for Cloud Apps Implement Microsoft Defender for Cloud Apps 22 - Assess deployment readiness Examine deployment guidelines Explore readiness tools Assess application compatibility Explore tools for application compatibility mitigation Prepare network and directory for deployment Plan a pilot 23 - Deploy using the Microsoft Deployment Toolkit Evaluate traditional deployment methods Set up the Microsoft Deployment Toolkit for client deployment Manage and deploy images using the Microsoft Deployment Toolkit 24 - Deploy using Microsoft Configuration Manager Explore client deployment using Configuration Manager Examine deployment components of Configuration Manager Manage client deployment using Configuration Manager Plan in-place upgrades using Configuration Manager 25 - Deploy Devices using Windows Autopilot Use Autopilot for modern deployment Examine requirements for Windows Autopilot Prepare device IDs for Autopilot Implement device registration and out-of-the-box customization Examine Autopilot scenarios Troubleshoot Windows Autopilot 26 - Implement dynamic deployment methods Examine subscription activation Deploy using provisioning packages Use Windows Configuration Designer Use Microsoft Entra join with automatic MDM enrollment 27 - Plan a transition to modern endpoint management Explore using co-management to transition to modern endpoint management Examine prerequisites for co-management Evaluate modern management considerations Evaluate upgrades and migrations in modern transitioning Migrate data when modern transitioning Migrate workloads when modern transitioning 28 - Manage Windows 365 Explore Windows 365 Configure Windows 365 Administer Windows 365 29 - Manage Azure Virtual Desktop Examine Azure Virtual Desktop Explore Azure Virtual Desktop Configure Azure Virtual Desktop Administer Azure Virtual Desktop Additional course details: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
CompTIA A+ bootcamp training course description This course includes A+ Certification: Systems Hardware and Networking Support Skills and A+ Certification: Operating Systems and Security Support Skills. The course will provide IT "super users" or new support professionals with the fastest route to A+ Certification. Full practical sessions will prepare students for the two A+ Certification exams. Note: Some self-study each evening will be required. What will you learn Install, configure, and troubleshoot peripheral devices, system components, print devices, wired and wireless LAN links and internet access devices. Install, configure, and troubleshoot the Microsoft Windows, Linux, and Mac OS PC operating systems plus iOS, Android, and Windows mobile devices. Perform basic PC maintenance. Configure access control measures. Perform basic PC maintenance. CompTIA A+ bootcamp training course details Who will benefit: Students wishing to take both CompTIA A+ exams. Prerequisites: PC fundamentals Duration 5 days Networking Microsoft Systems course contents Peripherals and Adapters Motherboard Components, Connection Interfaces, Display Devices, Audio and Multimedia Devices, Removable Storage Devices. System Components Mass Storage Devices, System Memory, Processors, BIOS and UEFI, Power Supplies. Troubleshooting and Mobile Devices Troubleshooting System Components, Laptops, Mobile Devices, Troubleshooting Mobile Devices. Printer and Network Hardware Printers, Configuring Printers, Troubleshooting Printers, Network Architectures, Ethernet Networks. Networks Wireless Networks, Internet Connections, Internet Protocol, Routers and Firewalls, Troubleshooting Networks. Supporting Windows (1) Windows Operating System, Administration Tools, Managing Storage, Managing Files, Managing Applications. Supporting Windows (2) Managing Devices, Managing Performance, Troubleshooting Windows, Installing Windows. Supporting Windows Troubleshooting Boot Problems, Maintenance and Backup, Threats and Vulnerabilities, Viruses and Malware, Securing Workstations, Securing Data. Supporting Windows Networks Configuring Network Connections, Securing Network Connections, Configuring Shared Resources, Virtualization and Services. Linux, OS X, and Mobile OS Linux Operating System, OS X, Mobile Operating Systems, Mobile OS Security and Troubleshooting, Safety and Environmental Procedures, Professionalism and Communication.
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.
In today’s workplace, Health and Safety is not just a requirement; it’s a responsibility. The Health and Safety Level 2 course is designed to give you the core knowledge needed to understand workplace safety protocols and practices. Covering topics such as risk assessments, the importance of hazard control, and fire safety, this course ensures you are well-prepared to create safer working environments. Whether you’re new to the field or seeking to reinforce your understanding, this course provides a solid foundation in health and safety essentials. This course is ideal for those looking to gain an in-depth understanding of workplace safety standards, especially in environments where the well-being of staff and visitors is a priority. The content is engaging and accessible, designed for learners of all levels. By completing this course, you’ll gain essential insights into managing workplace hazards, handling health-related incidents, and ensuring safety protocols are followed, all without needing to attend physical sessions. It’s your go-to guide for mastering workplace safety at your own pace, offering you flexibility and the knowledge to make informed safety decisions. Health and Safety QLS Bundle Includes the following Courses Course 01: Certificate in Health and Safety at QLS Level 2 Course 02: Public Health and Safety Course 03: Safe Handling of Medicines Course 04: Infection Prevention, Infection Control, Infection Awareness and Infection Spread Reduction Course 05: First Aid Hacks at Workplace Key Features of Health and Safety Eligibility for QLS endorsed certificate upon successful completion of the Health and Safety course Free CPD Accredited Course Fully online, interactive Health and Safety course with audio voiceover Self-paced learning and laptop, tablet, smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases To become successful in your profession, you must have a specific set of skills to succeed in today's competitive world. In this in-depth Health and Safetytraining course, you will develop the most in-demand skills to kickstart your career, as well as upgrade your existing knowledge & skills. Assessment At the end of the Health and Safety course, we will provide assignment and quizzes. For each test, the pass mark will be set to 60%. Accreditation This Health and Safety course is QLS - Quality Licence Scheme Endorsed and CPD Certified, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Certification CPD Certified: Once you've successfully completed your Health and Safety course, you will immediately be sent a digital certificate. Also, you can have your printed certificate delivered by post (shipping cost £3.99). QLS Endorsed:After successfully completing the Health and Safety course, learners will be able to order an endorsed certificate, titled: [Certificate in Health and Safety at QLS Level 2], as proof of their achievement. This certificate of achievement endorsed by the Quality Licence Scheme. CPD 55 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This course is ideal for all employees or anyone who genuinely wishes to learn more about Health and Safety basics. Requirements No prior degree or experience is required to enrol in this Health and Safety course. Career path This Health and Safety Course will help you to explore avariety of career paths in the related industry. Certificates Digital certificate Digital certificate - Included Hardcopy Certificate Hard copy certificate - Included Hardcopy Certificate (UK Delivery): For those who wish to have a physical token of their achievement, we offer a high-quality, printed certificate. This hardcopy certificate is also provided free of charge. However, please note that delivery fees apply. If your shipping address is within the United Kingdom, the delivery fee will be only £3.99. Hardcopy Certificate (International Delivery): For all international addresses outside of the United Kingdom, the delivery fee for a hardcopy certificate will be only £10.
Course Overview This comprehensive Workplace Safety – Asbestos & COSHH Training course is designed to equip learners with essential knowledge of hazardous substances, safety regulations, and risk assessment procedures. It covers critical subjects such as asbestos awareness, COSHH regulations, fire safety, and chemical spill response, empowering individuals to uphold safety standards in any professional environment. Whether you're new to workplace safety or looking to reinforce your compliance knowledge, this course ensures you understand how to identify, report, and manage potential hazards in line with UK health and safety legislation. By completing this training, learners will gain the confidence to support a safer workplace, meet employer and legal requirements, and contribute to a healthier work culture across sectors such as construction, manufacturing, education, and care. This course is also valuable for those pursuing roles with responsibility for safety assessments or compliance monitoring within their organisation. Course Description The Workplace Safety – Asbestos & COSHH Training course offers in-depth guidance on handling hazardous materials and navigating high-risk scenarios. Topics include the dangers and regulations surrounding asbestos, COSHH assessments, confined space awareness, chemical spill response, and essential workplace first aid. Additionally, learners will study broader workplace health and safety practices, ensuring a well-rounded understanding of legislative duties, hazard control, and preventative measures. Throughout the course, learners will develop the ability to interpret health and safety protocols, implement best practices, and support regulatory compliance. The training is aligned with UK industry requirements, offering insights into effective safety planning and emergency procedures. This course suits both those with responsibilities in health and safety and those looking to improve their knowledge to support safe operational standards in various workplace settings. Course Modules: Module 01: Asbestos Awareness & Safety Module 02: COSHH Training for Assessors Module 03: Working in Confined Spaces Module 04: Chemical Spill Module 05: Spill Management Training Module 06: Fire Safety Module 07: Workplace Health and Safety Diploma Module 08: First Aid at Work (See full curriculum) Who is this course for? Individuals seeking to understand health and safety obligations in the workplace. Professionals aiming to improve compliance knowledge and safety awareness. Beginners with an interest in occupational health and safety practices. Supervisors, HR personnel, and compliance officers responsible for workplace risk. Career Path Health and Safety Officer Compliance Coordinator Site Supervisor Risk Assessor Facilities Manager Warehouse or Construction Safety Personnel HR and Operations Manager
What are the long-term effects of having been sent to boarding school? The challenges for adult ex-boarders, the trauma of being sent away, the impact on one's past and current relationships. Why is it so difficult for the ex-boarder to talk about their childhoods. How are they treated if they do? Do people really say "They LOVED it" and actually mean or is this simply a defence mechanism?
Advanced Asterisk training course description This 2 day hands-on Asterisk training course covers advanced Asterisk configuration including fault tolerant clusters, upgrading and patching Asterisk servers, firewall and NAT transversal, using databases to store Asterisk data. Practical sessions follow each major section to reinforce the theory. What will you learn Configure advanced Asterisk features. Utilise databases from Asterisk Integrate Asterisk with SIP servers. Build High Availability Asterisk clusters. Maintain and secure Asterisk servers. Advanced Asterisk training course details Who will benefit: Technical staff working with or evaluating Asterisk. Prerequisites: Definitive Asterisk for engineers Duration 2 days Advanced Asterisk training course contents Best Practice Review of basics, Channel best practice, dial plan best practise. Call Centre Features GUI, Asterisk Manager Interface, billing, CDR, advanced IVR, ACD, Vici Dial. Hands on Install Vici-Dial Asterisk and Databases MySQL, LDAP, ODBC, dial plan from a Database, storing CDR in a Database, Hands on Dial plan in MySQL, CDR in MySQL. TDM over Ethernet What is TDMoE, Asterisk to Asterisk TDMoE, Phone Bridge. Hands on * 2 * via TDMoE. High Availability Asterisk HA Linux - Virtual Servers, Fail-over steps, setting up HA Linux, configuring Asterisk for fail-over on HA Linux, Hands on Configure Asterisk HA. Advanced Dial plans Asterisk Gateway Interface, AGI IVR applications, Multiple switches sharing Dial plans, ENUM, DUNDI. Hands on Configure DUNDI. Integration Legacy PBX, SIP Proxys, OpenSER. Hands on Configure SER to work with Asterisk. Asterisk Maintenance Asterisk upgrades, implementing patches, advanced debugging, Security Firewalls, NAT, Asterisk security issues. Hands on Configure Asterisk to work through a Firewall and NAT.