• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

525 Courses in Nottingham

Cost reduction (In-House)

By The In House Training Company

Businesses that don't control their costs don't stay in business. How well are you doing? Is everyone in your organisation sufficiently aware of costs, managing them effectively and maximising opportunities to reduce them? If there is scope for improvement, this course will help get you back on track. It will demonstrate that cost reduction is so much more than cost control and cost cutting. True cost management is about being aware of costs, seeking to reduce them through good design and efficient operating practices whilst taking continuing action on overspending. This course will develop the participants' skills in: Being aware of costs at all times Seeking cost reduction from the start (including life-cycle costing) Appraising projects / production to identify and take out risk Understanding real budgeting Using techniques such as ZBB and ABC where appropriate Ensuring cost reports lead to action Managing a cost reduction process that delivers Benefits to the organisation will include: Identification of cost reduction and business improvement opportunities Better reporting and ownership of costs Greater awareness and control of everyday costs 1 Introduction - the cost management process The risks of poor cost control Capital and revenue costs The importance of cost awareness The importance of cost reduction Cost management - the key aspects How to build a cost management and control process checklist for your areas of responsibility 2 Cost removal - taking out costs Cost awareness Costs of poor design / poor processes Value engineering Removing redundant costs 3 The need for commercial, technical and financial appraisals Understand the problems before cash is committed and costs incurred Making the effort to identify commercial and technical risk The time value of money - DCF techniques for long term projects Cost models for production processes and projects Costing models - project appraisals The use of spreadsheets to identify sensitivity and risk How to focus on risk management 4 Budgeting - proper budgeting challenges costs The philosophy of the business - are costs an issue? The importance of having the right culture The need for detailed business objectives Budgetary control measures Designing budget reports - for action 5 Zero-based budgeting (ZBB) - the principles Much more than starting with a clean sheet of paper What ZBB can achieve The concept of decision packages - to challenge business methods and costs Only necessary costs should be incurred A review of an operating budget - demonstrating what ZBB challenges and the costs it may lead to being taken out 6 Awareness of overheads and other costs Definitions of cost - direct and indirect Dealing with overheads - what is meant by allocation, absorption or apportionment? The apparent and real problems with overheads Different ways of dealing with overheads Review of overhead allocation methods and accounting and reporting issues 7 Overheads and product costing Activity-based costing (ABC) - the principles Where and how the ABC approach may be helpful Know the 'true' cost of a product or a project Should you be in business? Will you stay in business? Identifying weaknesses in a traditional overhead allocation How ABC will help improve product or service costing Identifying which products and activities should be developed and which abandoned 8 Cost reduction culture The need for cost reports What measures can be used to identify over-spends as early as possible Cost control performance measures and ratios 9 Design of cost control reports Reports should lead to action and deliver Selecting cost control measures which can be acted upon Practice in designing action reports 10 Course summary - developing your own cost action plan Group and individual action plans will be prepared with a view to participants identifying their cost risks areas and the techniques which can be immediately applied to improve costing and reduce costs

Cost reduction (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Creating effective specifications (In-House)

By The In House Training Company

High quality specifications are of paramount importance in achieving the right technical performance and value for money. This long-established training programme has been developed to help those involved in producing specifications to create high quality documents in an organised and effective way. It provides a sound foundation for those new to the topic whilst at the same time offering new insights to those with more experience. The programme emphasises the need for a clear definition of requirements combined with the ability to communicate those requirements effectively to third parties. A structured method of preparing specifications is provided, and a range of practical techniques is presented, to enable participants to put the principles into practice. The commercial and contractual role of specifications is also addressed. The objectives of the workshop are to: Provide a clear understanding of the role and purpose of specifications Present a framework for organising and producing specifications Define the key steps involved in creating effective specifications Demonstrate methods for assisting in defining requirements Provide tools and techniques for scoping and structuring specifications Show the role of specifications in managing variations and changes to scope Present methods to assist the writing and editing of specifications Review how specifications should be issued and controlled DAY ONE 1 Introduction Review of course objectives Review of participants' needs and objectives 2 Creating effective specifications The role of specifications in communicating requirements The costs, benefits and qualities of effective specifications Understanding the differences between verbal and written communication The five key steps of 'POWER' writing: prepare-organise-write-edit-release Exercise: qualities of an effective specification 3 Step 1: Preparing to write - defining readership and purpose; the specification and the contract Designing the specifications required; applying BS 7373 Defining the purpose, readership and title of each document Effective procedures for writing, issuing and controlling specifications The roles and responsibilities of the key players Understanding contracts; the contractual role of the specification Integrating and balancing the technical and commercial requirements Writing specifications to achieve the appropriate contract risk strategy Deciding how to specify: when to use functional and technical specifications The role of specifications in managing variations and changes to scope 4 Case study 1 Teams review a typical project scenario and identify the implications for the specification Feedback and discussion 5 Step 2: Organising the specification content Defining the need and establishing user requirements Deciding what issues the specification should cover Scoping techniques: scope maps, check lists, structured brainstorming Clarifying priorities: separating needs and desires Dealing with requirements that are difficult to quantify Useful techniques: cost benefit analysis, QFD, Pareto analysis 6 Case study 2 Teams apply the scoping techniques to develop the outline contents for a specification Feedback and discussion DAY TWO 7 Step 2: Organising the specification content (cont) Deciding what goes where; typical contents and layout for a specification The three main segments: introductory, key and supporting Creating and using model forms: the sections and sub-sections Detailed contents of each sub-section Tools and techniques for outlining and structuring specifications 8 Case study 3 Teams develop the detailed specification contents using a model form Feedback and discussion 9 Step 3: Writing the specification The challenges of written communication Identifying and understanding the readers needs Choosing and using the right words; dealing with jargon Problem words; will, shall, must, etc; building a glossary Using sentence structure and punctuation to best effect Understanding the impact of style, format and appearance Avoiding common causes of ambiguity Being concise and ensuring clarity Choosing and using graphics to best effect Exercises and examples 10 Step 4: Editing the specification Why editing is difficult; how to develop a personal editing strategy Key areas to review: structure, content, accuracy, clarity, style and grammar Editing tools and techniques 11 Step 5: Releasing and controlling the specification Key requirements for document issue and control Final formatting and publication issues; document approval Requirements management: managing revisions and changes 12 Course review and action planning What actions should be implemented to improve specifications? Conclusion

Creating effective specifications (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Media Training

5.0(1)

By Cocomms - Coherent Communications

In a world focused on digital media, 24-hour news channels and social channels, it’s really important to communicate with your audience – there are lots of opportunities to do this if you are interviewed by journalists. There’s the chance to deliver expert comments or take part in in-depth features or give a quote about your business or organisation. The media wants to stay relevant and engaged with its audience and you can play a part in that and talk to your audience. In our Broadcast Media Training Courses, we will teach you the best ways to share your story, how to answer those difficult questions and present yourself with confidence and style. This means you will capitalise on every opportunity. Our broadcast media and media interview training courses include: Exploiting the opportunity The world of digital media means there are lots of opportunities to appear online, on radio or on TV, as an expert or commentator and gain invaluable exposure for your business and organisation. You may meet journalists at industry events or be contacted for a comment on an issue. You may also need media training because you have to protect your business’ reputation by reacting proactively if you become involved in a news story. Media training will help you handle interviews with journalists, content creators and other media professionals. You need to communicate positively and effectively and make sure your message reaches the audience. It means speaking consistently, and with style and confidence. You’ll also need to know how to handle challenging questions and make sure you positively manage your reputation. Contemporary Media Training Our media training is interactive, engaging and importantly, carried out by experienced journalist trainers. Our team has worked at the highest levels of journalism and broadcasting and will give you an invaluable insight into how to maximise the opportunity of a media appearance. We will take you through the background of what journalists want and need, and give you a clear understanding of how to prepare and deliver your messages and ideas. We will then carry out a number of media style interviews which our technical team will record and playback so you can see and hear yourself. We will then support you with practical, inclusive and useful feedback for you to put into practice for the next interview. We provide copies of all your recordings and useful notes after the training. Locations that suit you We deliver training at our facilities in Birmingham or London or at your location, bringing our technical equipment and cameras with us. You can have a half day training session for up to 4 people or a full day training for a larger group. We also deliver training online for small groups which can be useful when teams are spread around the country. Expert Journalist Trainers We pride ourselves on two things at Coherent Comms – delivering contemporary media training and our supportive inclusive feedback. We know there are lots of media training companies out there but our clients tell us they work with us because we listen. We don’t tell you what training you need or hark back to the old days. We take on board your communication needs and deliver bespoke training. Our associates are working in digital communications, carrying out interviews for news online sites and our contacts are producing digital content for a 21st century audience. We’ll talk to you about TV and radio but we understand the wider media landscape and how to navigate it. And we’re really proud of our feedback – we want to take you from good to great and believe confidence building with tips and ideas that will work for you is the best way to develop your skills. We will help you design the course you want All our media training is bespoke and designed to exactly suit your needs. We have lots of ideas of how it might work but we want to hear from you and what you want! So get in touch with our friendly team by phone on 0754 533 4269 or fill in our contact form and we will get back to you. We’d love to hear how you hope to improve your media and communication skills.

Media Training
Delivered in Birmingham or UK Wide or OnlineFlexible Dates
Price on Enquiry

NVQ DIPLOMA IN OCCUPATIONAL WORK SUPERVISION (CONSTRUCTION)

By Oscar Onsite

REFERENCE CODE 603/5204/8 COURSE LEVEL NVQ Level 3 THIS COURSE IS AVAILABLE IN Course Overview Who is this Qualification for? This qualification is aimed those who carry out supervisory activities in a specific trade in the Construction Industry. The qualification certificate will carry an endorsement to show what trades the candidate was supervising during completion of this qualification. The qualification has a core group of 5 mandatory units that cover areas including Health and Safety, confirming work requirements and coordinating work operations. The qualification also has a group of optional units to allow flexibility to suit individual needs and responsibilities and completion of mandatory units and a minimum of 2 units from the optional group will give access to the relevant CSCS card. This qualification replaces version 1 of the GQA Level 3 NVQ Diploma in Occupational Work Supervision (Construction) QAN 601/3469/0 for anyone starting the qualification from 01/11/2019. What is required from candidates? This qualification consists of 5 mandatory units, which have a total of 57 credits and a group of optional units. Candidates must complete all 5 mandatory units and a minimum of 2 units from the optional group. GQA qualifications are made up of units that have a credit value or credits. These credits must be achieved in the correct combination of mandatory and optional units. Qualifications are now required to indicate the total qualification time (TQT), this is to show the typical time it will take someone to attain the required skills and knowledge to meet the qualification criteria. The units of assessment set out learning outcomes which describe what learners need to be able to do and understand. The learning outcomes are defined by assessment criteria which are used to assess competence, expressed as skills achieved and learned knowledge and understanding, to achieve the units. Achievement of the mandatory units and chosen optional units will mean the qualification has been completed and will be subject to approval of a claim for certification. GQA Qualifications will issue a certificate complete with the learner’s name, the qualification and unit titles and the credits achieved. Mandatory units Level Credit Confirming Work Activities and Resources for an Occupational Work Area in the Workplace Developing and Maintaining Good Occupational Working Relationships in the Workplace Confirming the Occupational Method of Work in the Workplace Implementing and maintaining health, safety and welfare in the workplace Coordinating and organising work operations in the workplace Optional Units – Minimum of 2 units (19 credits must be achieved) Allocating and monitoring the use of plant, machinery, equipment or vehicles in the workplace Monitoring progress of work against schedules in the workplace Confirming work meets contractual, industry and manufacturers’ standards in the workplace Implementing procedures to support the team performance in the workplace 3 13 Co-ordinating and confirming the dimensional control requirements of the work in the workplace Entry requirements There are no formal entry requirements for learners undertaking this qualification. However, centres must ensure that learners have the potential and opportunity to gain the qualification successfully. Qualification support This qualification has been designed and developed by CITB and GQA Qualifications have authorised Oscar Onsite Academy to deliver this qualification in the Construction Sector. Please Note that photocopied or downloaded documents such as manufacturers or industry guidance, H&S policies, Risk Assessments etc, are not normally acceptable evidence for Oscar Onsite Qualifications unless accompanied by a record of a professional discussion or Assessor statement confirming candidate knowledge of the subject. If you are in any doubt about the validity of evidence, please contact Oscar Onsite Academy

NVQ DIPLOMA IN OCCUPATIONAL WORK SUPERVISION (CONSTRUCTION)
Delivered In-Person in Manchester or UK WideFlexible Dates
Price on Enquiry

City & Guilds Level 3 Award in Supervising Teams Undertaking Work in Confined Spaces - 6160-05

By Vp ESS Training

City & Guilds Level 3 Award in Supervising Teams Undertaking Work in Confined Spaces - 6160-05 - This course is designed to provide delegates with enough understanding of Safe Systems of Work to be able to authorise works and issue permits. It identifies the employer’s responsibilities within their own policies to allocate duties to competent employees. To achieve this qualification the delegate must hold the level 2 qualification relevant to their own work environment including the use confined space equipment. Book via our website @ https://www.vp-ess.com/training/confined-spaces/6160-05-city-guilds-level-3-award-in-supervising-teams-undertaking-work-in-confined-spaces/ or via email at: esstrainingsales@vpplc.com or phone on: 0800 000 346

City & Guilds Level 3 Award in Supervising Teams Undertaking Work in Confined Spaces - 6160-05
Delivered In-Person in Aberdeen + 9 more or UK WideFlexible Dates
Price on Enquiry

Advanced RF

5.0(3)

By Systems & Network Training

Advanced RF training course description This course provides a follow on to our popular RF fundamentals course for those that need to know more. What will you learn Explain RF propagation Describe the importance of transmission lines in RF systems. Recognise the issues in RF systems. Describe transmission measurements. Advanced RF training course details Who will benefit: Those working with RF systems. Prerequisites: RF fundamentals. Duration 3 days Advanced RF training course contents RF propagation The Electromagnetic Spectrum, Electromagnetic Radiation, Spherical Wave Front, The Space Wave, Receive Antenna below the Horizon, Bending the Space Wave , Surface Wave Path, Tilting of Surface Wave, Conductivity, Layers of the Atmosphere, Variations of the Ionosphere, Variations caused by Solar Activity, Multi Hop Transmission, Classification of Radio Waves, Fading, Fading Reduction, Free Space Path Loss, Shadowing of Radio Wave, Signal Levels after Shadowing, Radio Waves as Wavelets, Fresnel Zone. Transmission Lines Transmission Line Construction, Primary Line Constants, 'T' Networks, Input Impedence, Lossless Unbalanced Line, Standing Waves, Open Circuit / Short Circuit Termination, Short Circuit Standing Waves, Open Circuit Standing Waves, Voltage Standing Wave Pattern, Short Circuit Termination, Open Circuit Termination, The Directional Coupler, Effect of E and M Coupling, Practical Reflectometer. Antenna Theory The Open Circuit Line, Dipole V/I Distribution, Polar Diagram, Power Pattern ½ Wave Dipole, Half Wave Dipole, Vehicle Mount, Centre Fed Whip Antenna, Antenna Beamwidth, The Yagi Array, Uda Yagi array, Antenna Characteristics, 6 Element Yagi Polar Diagram, Log Periodic Antenna, Helical Antenna. Microwave Dish Array, Typical Microwave Dish Antenna. Transmission Measurements Transmission Measurements, Effective Isotropic Radiated Power, Fade Margin. Noise Noise in Communications, Noise Voltage Equivalent Circuit. Satellite Communications Satellite Communications, Large Earth Station, The Satellite Payload, Geo Stationary Orbit, Basic Orbits, VSAT Terminal, Iridium Phone, The Space Segment, Satellite Footprint, Typical System Hardware. Mobile Communications Mobile Evolution, The Path to UMTS, Technologies Bit Rate and Mobility, Systems and Specifications, Wireless Networks, Diffraction, Multi Path Propagation, Loss Models, GSM Architecture, OSI Model - GSM, OSI Reference Model, OSI Layers.

Advanced RF
Delivered in Internationally or OnlineFlexible Dates
£4,997

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

M.D.D DATING ADVICE FOR WOMEN WITH VERY LOW CONFIDENCE PACKAGE (DATING ADVICE FOR WOMEN)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Introspective test Emotional regulation and emotional intelligence training Help in addressing pain points areas Full Makeover and beauty treatments 10 V.I.P confidence building sessions Personality test Addressing trauma issues Personal life coach available daily Behavioural pattern training Relationships analysation Happiness test Dating advice for low confidence and insecurity triggers Eradication of negative patterns Cognitive behavioural therapy https://relationshipsmdd.com/product/dating-advice-for-women-with-very-low-confidence-package/

M.D.D DATING ADVICE FOR WOMEN WITH VERY LOW CONFIDENCE PACKAGE (DATING ADVICE FOR WOMEN)
Delivered in London or UK Wide or OnlineFlexible Dates
£4,800
1...678910...53