Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of the Carbon Black EDR server Identify the architecture and data flows for Carbon Black EDR communication Describe the Carbon Black EDR server installation process Manage and configure the Carbon Black EDR sever based on organizational requirements Perform searches across process and binary information Implement threat intelligence feeds and create watchlists for automated notifications Describe the different response capabilities available from the Carbon Black EDR server Use investigations to correlate data between multiple processes This course teaches you how to use the VMware Carbon Black© EDR? product and leverage the capabilities to configure and maintain the system according to your organization?s security posture and policies. This course provides an in-depth, technical understanding of the Carbon Black EDR product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Planning and Installation Hardware and software requirements Architecture Data flows Server installation review Installing sensors Server Administration Configuration and settings Carbon Black EDR users and groups Process Search and Analysis Filtering options Creating searches Process analysis and events Binary Search and Banning Binaries Filtering options Creating searches Hash banning Search best practices Search operators Advanced queries Threat Intelligence Enabling alliance feeds Threat reports details Use and functionality Watchlists Creating watchlists Use and functionality Alerts / Investigations / Response Using the HUD Alerts workflow Using network isolation Using live response
Master the art of remote work with our comprehensive 'Remote Working Online Training' course. From setting up a productive home office and effective communication strategies to staying motivated, boosting productivity, and fostering virtual collaboration, this course equips you with the essential skills for success in the digital workplace. Explore modules on virtual etiquette, cybersecurity, and strategies for continuous growth as a remote professional. Elevate your remote work experience and thrive in the evolving world of flexible and digital work environments.
This course is intended for beginner-level individuals who are fascinated about quantum computing and want to learn more about it. It uses Jupyter notebook and IBM Qiskit tool to execute your learning into the actual computation.
Are you looking to enhance your Building your Own Computer Course skills? If yes, then you have come to the right place. Our comprehensive course on Building your Own Computer Course will assist you in producing the best possible outcome by mastering the Building your Own Computer Course skills. The Building your Own Computer Course course is for those who want to be successful. In the Building your Own Computer Course course, you will learn the essential knowledge needed to become well versed in Building your Own Computer Course. Our Building your Own Computer Course course starts with the basics of Building your Own Computer Course and gradually progresses towards advanced topics. Therefore, each lesson of this Building your Own Computer Course course is intuitive and easy to understand. Why would you choose the Building your Own Computer Course course from Compliance Central: Lifetime access to Building your Own Computer Course course materials Full tutor support is available from Monday to Friday with the Building your Own Computer Course course Learn Building your Own Computer Course skills at your own pace from the comfort of your home Gain a complete understanding of Building your Own Computer Course course Accessible, informative Building your Own Computer Course learning modules designed by expert instructors Get 24/7 help or advice from our email and live chat teams with the Building your Own Computer Course bundle Study Building your Own Computer Course in your own time through your computer, tablet or mobile device. A 100% learning satisfaction guarantee with your Building your Own Computer Course Course Improve your chance of gaining in demand skills and better earning potential by completing the Building your Own Computer Course Building your Own Computer Course Curriculum Breakdown of the Building your Own Computer Course Course Module 01: Introduction to Computer & Building PC Module 02: Overview of Hardware and Parts Module 03: Building the Computer Module 04: Input and Output Devices Module 05: Software Installation Module 06: Computer Networking Module 07: Building a Gaming PC Module 08: Maintenance of Computers CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Building your Own Computer Course course helps aspiring professionals who want to obtain the knowledge and familiarise themselves with the skillsets to pursue a career in Building your Own Computer Course. It is also great for professionals who are already working in Building your Own Computer Course and want to get promoted at work. Requirements To enrol in this Building your Own Computer Course course, all you need is a basic understanding of the English Language and an internet connection. Career path The Building your Own Computer Course course will enhance your knowledge and improve your confidence in exploring opportunities in various sectors related to Building your Own Computer Course. Certificates CPD Accredited PDF Certificate Digital certificate - Included CPD Accredited PDF Certificate CPD Accredited Hard Copy Certificate Hard copy certificate - £10.79 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each
Created for individuals who have no prior programming experience but wish to learn how to program in C++.
This ARM assembly programming course will help you gain a solid understanding of bare-metal firmware development for ARM-based microcontrollers. You'll learn how to navigate the microcontroller reference manual and datasheet to extract the right information to build peripheral drivers and firmware like a pro. This course does not use any libraries and only applies the ARM assembly language.
Delve into the dynamic world of digital exploration with our 'Introduction to Computers and Internet for Beginners' course. Tailored for newcomers, this comprehensive guide illuminates the fundamental pillars of computing, from efficient operating and troubleshooting to mastering quintessential applications. Experience a smooth transition as you acquaint yourself with varying Windows versions and fortify your knowledge base with vital cyber security protocols. By course completion, you'll confidently navigate the digital landscape, equipped with tools and understanding previously unimagined. Learning Outcomes Gain proficiency in computer operations and troubleshooting techniques. Utilise essential computer applications with adeptness. Establish a foundational understanding of tools and networking. Transition seamlessly between Windows 8 and the novel features of Windows 10. Uphold best practices for cyber security and online safety. Why choose this Introduction to Computers and Internet for Beginners course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Introduction to Computers and Internet for Beginners Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this Introduction to Computers and Internet for Beginners course for? Absolute beginners venturing into the digital domain. Adults aiming to modernise their tech skills. Students desiring a robust foundation in computing. Small business owners looking to manage digital operations. Individuals prioritising online safety and security. Career path Help Desk Support: £18,000 - £30,000 Computer Technician: £17,000 - £26,000 IT Support Specialist: £20,000 - £35,000 Network Administrator (Entry Level): £22,000 - £33,000 Application Support Analyst: £25,000 - £40,000 Cyber Security Analyst (Entry Level): £28,000 - £45,000 Prerequisites This Introduction to Computers and Internet for Beginners does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Introduction to Computers and Internet for Beginners was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Module 01 : Computer Operating and Troubleshooting What is an Operating System 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Hardware and Peripherals 00:07:00 Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Software and Concepts 00:11:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:06:00 Backup and Restore 00:03:00 Module 02 : Key Applications Application Features 01:21:00 Working with Word Processing 00:44:00 Working with Spreadsheets 00:49:00 Making a Presentation 01:08:00 Databases 00:34:00 Collaboration 00:03:00 Module 03 : Tools & Networking Course Introduction 00:02:00 Web Browsers 00:47:00 Networking Terminology 00:35:00 E-mail 00:38:00 Communicating in the Modern World 00:14:00 Protecting Yourself 00:15:00 Web Searching 00:31:00 Protecting Yourself 00:31:00 Module 04 : Windows 8 for PC Identify Components of a Personal Computer IPU 00:08:00 Sign In to Windows 8 00:07:00 Signing In to Windows 8 and Managing Tiles 00:08:00 Navigate the Start Screen 00:18:00 Using the Account ID Menu 00:02:00 Access and Identify the Charms 00:03:00 Viewing the Charms 00:02:00 Modern Apps and Common Navigation Features 00:03:00 Navigating a Modern App 00:07:00 Multitasking with Apps 00:05:00 Working with Multiple Apps 00:05:00 Navigate the Desktop IPU 00:07:00 Navigating The desktop 00:07:00 Manage Files and Folders with File Explorer IPU 00:09:00 Managing Files and Folders 00:15:00 Elements of a Desktop Window 00:12:00 Working with the Elements of a Desktop Window 00:10:00 Creating and Modifying Files with Wordpad 00:14:00 Printing a Document 00:05:00 Navigate Internet Explorer 10 00:08:00 Navigating Internet Explorer 10 00:09:00 Browse the Web 00:12:00 Using Internet Explorer and Share 00:08:00 Customize the Start Screen 00:07:00 Creating Groups on the Start Screen 00:03:00 Changing PC Setting 00:07:00 Customize the Desktop IPU 00:09:00 Personalizing the Desktop 00:11:00 Set Privacy Levels and Passwords 00:05:00 Changing Your Password 00:05:00 Use Windows Defender IPU 00:05:00 Changing Windows Defender Settings 00:06:00 Store and Share Files with SkyDrive 00:03:00 Module 05 : Windows 10 - New Developments What Makes Windows 10 Different? 00:14:00 Primary Feature Overview 00:14:00 Navigating and Using Windows 10 00:36:00 Module 06 : Cyber Security Awareness Course Overview 00:14:00 Types of Security Threats 00:29:00 Social Engineering 00:30:00 Identity Theft 00:29:00 Data Classification 00:28:00 Types of Classifications 00:18:00 Protecting Your Digital Information 00:45:00 Password Management 00:13:00 Malware 00:17:00 Software Detection 00:28:00 Security from End-to-End 00:27:00 Secure E-mail Use 00:21:00 Secure Web Browsing 00:29:00 Piracy 00:16:00 Security Policies 00:17:00 Moving Forward 00:12:00
Duration 2 Days 12 CPD hours This course is intended for This in an Introductory and beyond level course is geared for experienced Java developers seeking to be proficient in Apache Kafka. Attendees should be experienced developers who are comfortable with Java, and have reasonable experience working with databases. Overview Working in a hands-on learning environment, students will explore Overview of Streaming technologies Kafka concepts and architecture Programming using Kafka API Kafka Streams Monitoring Kafka Tuning / Troubleshooting Kafka Apache Kafka is a real-time data pipeline processor. It high-scalability, fault tolerance, execution speed, and fluid integrations are some of the key hallmarks that make it an integral part of many Enterprise Data architectures. In this lab intensive two day course, students will learn how to use Kafka to build streaming solutions. Introduction to Streaming Systems Fast data Streaming architecture Lambda architecture Message queues Streaming processors Introduction to Kafka Architecture Comparing Kafka with other queue systems (JMS / MQ) Kaka concepts : Messages, Topics, Partitions, Brokers, Producers, commit logs Kafka & Zookeeper Producing messages Consuming messages (Consumers, Consumer Groups) Message retention Scaling Kafka Programming With Kafka Configuration parameters Producer API (Sending messages to Kafka) Consumer API (consuming messages from Kafka) Commits , Offsets, Seeking Schema with Avro Kafka Streams Streams overview and architecture Streams use cases and comparison with other platforms Learning Kafka Streaming concepts (KStream, KTable, KStore) KStreaming operations (transformations, filters, joins, aggregations) Administering Kafka Hardware / Software requirements Deploying Kafka Configuration of brokers / topics / partitions / producers / consumers Security: How secure Kafka cluster, and secure client communications (SASL, Kerberos) Monitoring : monitoring tools Capacity Planning : estimating usage and demand Trouble shooting : failure scenarios and recovery Monitoring and Instrumenting Kafka Monitoring Kafka Instrumenting with Metrics library Instrument Kafka applications and monitor their performance
Duration 3 Days 18 CPD hours This course is intended for This intermediate course is for technical specialists, support/services individuals, individuals implementing LPARs for Power Systems with IBM i. This course is also appropriate for IBM Business Partners who sell and plan for consolidated systems. Overview Describe the PowerVM features Identify, describe, and locate hardware components in the Power Systems, Flex System and Power Blade models Identify virtualization options available, reliability features and single points of failure for Power Systems Implement System Planning Tool in design or update your own system Explain Simultaneous Multithreading (SMT) Describe memory allocation and affinity concepts Describe and configure a partition profile, including shared processors: Capped Uncapped Virtual processors Weighting factor Shared Processor Pools Explain virtual I/O: Serial, Ethernet and SCSI Understand and implement: IBM i installation through NFS, image virtual repository in VIOS, and assigning VSCSI disks to partitions in VIOS Understand base characteristics of IVM and how to implement IBM i on Power Blades Describe the NPIV PowerVM feature, how to configure virtual Fiber Channel adapters on the Virtual I/O Server and client partitions Discuss how to use the HMC GUI and commands to work with the World Wide Port Name (WWPN) pairs Identify commands used to examine the NPIV configuration In this course you begin with an overview of LPAR on Power Systems, followed with more detailed information on configuration planning and implementation using hands-on exercises to create and implement logical partitions. PowerVM for IBM i - Overview . Power Systems for IBM i . Introduction to System Planning Tool . Virtualization of IBM i - Processor, Memory, Processor Pools . Virtualization of IBM i - Virtual I/O . Virtualization of IBM i - Installation from NFS or VIOS repository . Implementation of IBM i on Power Blades . PowerVM for IBM i - NPIV .
Duration 5 Days 30 CPD hours This course is intended for This is an intermediate course for POWER i administrators, IBM Business Partners, and anyone else who would like practical knowledge of the features and functions supported by BRMS. Overview Describe the major features and functions of BRMS List the steps to install BRMS on a single system or in a BRMS Network environment Implement a previously defined backup and recovery strategy using BRMS Implement a previously defined archival and retrieval plan, including dynamic retrieval, using BRMS Explain how to utilize a tape drive, tape library system, virtual tape, and optical drive with BRMS Implement and use BRMS using the green screen, System i Navigator, and IBM Navigator for i This course covers the features & functions supported by Backup Recovery & Media Services (BRMS). Learn how to perform the supported functions when using a 5250 emulation session, when using System i Navigator, & when using IBM Navigator for i. Overview of BRMS . Installing BRMS . BRMS policies overview . Media devices and encryption using software and hardware . Overview and implementation of virtual tape, DVD, and optical device support . Creating a simple backup control group . BRMS log . Saving IFS data . Working with backup lists . Parallel save, user exits, and save-while-active . Performing a backup and full system backup . Other backup topics i . Storage locations . Containers . Move management . Media class . Media policies . Media topics . BRMS networking . Scheduling BRMS jobs . Daily maintenance . BRMS reports . Recovery . Tape duplication and label print . Functional usage . Archive . Retrievaltion . TSM Client and BRMS on IBM i . BRMS Enterprise . Summary .