• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1670 Courses in Cardiff

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

Climate Fresk workshop

5.0(1)

By Climate Clarity CIC

Climate Fresk workshop with Climate Clarity CIC

Climate Fresk workshop
Delivered in Internationally or OnlineFlexible Dates
£1,499 to £5,499

Build confidence & capability and engage in meaningful dialogue about race.

Let's Talk About Race (EDI)
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£670

Level 3 Award in Education and Training

4.0(1)

By Panda Education and Training Ltd

Level 3 Award in Education and Training. Become a qualified Trainer.

Level 3 Award in Education and Training
Delivered In-Person in Bridgend + more
£675

Design Thinking and Agile Management

5.0(10)

By GBA Corporate

Overview In this competitive era no matter how much hard work and solid efforts are contributed still, too many projects end up creating unneeded and unsellable products. There is a significant risk that the outcome of the project may not be relevant to the client/user requirements or become outdated when needs change. Here is where Design Thinking and Agile Management play their role. The combination of Agile and Design Thinking should be used in order to achieve impactful outcomes. Agile and design thinking together works well and gives an effective approach to product development, one that results in efficient resolutions to significant problems. In this course, you'll learn how to define and determine what's important to a user primary in the process, to frontload value, by directing your team on testable narratives about the user and generating an effectively shared perspective. For more dates and Venue, Please email sales@gbacorporate.co.uk

Design Thinking and Agile Management
Delivered in Internationally or OnlineFlexible Dates
FREE to £1,718

Emergency First Aid at Work (1-Day)

By Prima Cura Training

The Health and Safety (First Aid) Regulations 1981 Emergency First Aid at Work

Emergency First Aid at Work (1-Day)
Delivered In-PersonFlexible Dates
Price on Enquiry

Developing Your Emotional Intelligence (EI) (£1450 total for the 2-day course for up to 15 participants)

By Buon Consultancy

Emotional Intelligence Training

Developing Your Emotional Intelligence (EI) (£1450 total for the 2-day course for up to 15 participants)
Delivered In-Person in Edinburgh or UK WideFlexible Dates
£1,450

High Performing Teams (HPTs)

5.0(3)

By Lapd Solutions Ltd

High Performing Teams. Moccasin Approach, Moccasin Manager,

High Performing Teams (HPTs)
Delivered in Birmingham + 1 more or UK Wide or OnlineFlexible Dates
£1,250 to £1,500

Effecting Business Process Improvement: In-House Training

By IIL Europe Ltd

Effecting Business Process Improvement: In-House Training Business analysts facilitate the solution of business problems. The solutions are put into practice as changes to the way people perform in their organizations and the tools they use. The business analyst is a change agent who must understand the basic principles of quality management. This course covers the key role that business analysts play in organizational change management. What you will Learn You will learn how to: Define and document a business process Work with various business modeling techniques Perform an enterprise analysis in preparation for determining requirements Analyze business processes to discern problems Foundation Concepts Overview of business analysis and process improvement Defining the business process Introducing the proactive business analyst Focusing on business process improvement for business analysts Launching a Successful Business Process Improvement Project Overview of the launch phase Understanding and creating organizational strategy Selecting the target process Aligning the business process improvement project's goals and objectives with organizational strategy Defining the Current Process Overview of current process phase Documenting the business process Business modeling options: work-flow models Business modeling options: Unified Modeling Language (UML) model adaptations for business processes Analyzing the Current Process Process analysis overview Evaluation: establishing the control group Opportunity techniques: multi-discipline problem-solving Opportunity techniques: matrices Building and Sustaining a Recommended Process Overview of the recommended process and beyond Impact analysis Recommended process Transition to the business case Return to proactive state

Effecting Business Process Improvement: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495

This session is for anyone who is faced with a difficult situation at work which would benefit from having a positive and mutually beneficial resolution.

Handling Difficult Conversations
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£445