• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1262 Installation courses in Bradford delivered Online

CCVS Check Point Certified VSX Specialist

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Technical professionals who need to install, configure, and manage Virtual Security Extension (VSX) solutions within their network security environment. Overview Explain the benefits of virtual network security. Understand the basic functions, components, and advantages of VSX technology. Examine the VSX management infrastructure and understand how traffic flows within a VSX network. Discuss options for deploying VSX technology within various types of organizations. Understand how to install and configure VSX Gateways and Virtual Systems. Describe different routing schemes and features that are available to use within the VSX environment. Understand how to deploy additional VSX networking configurations that may be required in the environment. Understand the differences between deploying physical Security Gateway Clusters and VSX Gateway Clusters. Understand how Virtual System Load Sharing works to enhance VSX network performance. Understand how to use the VSX Provisioning Tool to add and remove virtual devices. Recall how CoreXL technology enhances Security Gateway performance and recognize how to use the technology in a VSX environment. Understand how to employ tools for optimizing resources allocated in a VSX environment. Identify various VSX command line tools commonly used to retrieve information and perform configuration changes. Understand how to use VSX utility commands to perform various maintenance tasks for the VSX environment. Understand how to troubleshoot and debug issues that may occur in a VSX environment. This course provides a comprehensive understanding of the Check Point VSX solution and describes how to deploy it within the corporate network environment. Course Topics VSX Overview Virtual System Installation and Configuration VSX Clustering Advanced VSX Features Troubleshooting VSX LAB EXERCISES Configuring the VSX Environment Deploying a Virtual System with a Physical Interface Deploying a VS with Bonded VLAN Interfaces Configuring Virtual System HA Converting VSX High Availability to Virtual System Load Sharing Maintaining the VSX Environment Using the CLI to Manage VSX Performance Tuning in VSX Troubleshooting VSX Issues Upgrading a VSX Environment Additional course details: Nexus Humans CCVS Check Point Certified VSX Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCVS Check Point Certified VSX Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCVS Check Point Certified VSX Specialist
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks : Strata Foundations

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Security Engineers Network Engineers Support staff Overview This course is intended to provide an understanding of Palo Alto Networks Next-Generation firewall technologies enable the student to perform a basic installation of Palo Alto Networks Next-Generation firewalls. Upon completion of this course, students will be able to: Explain the features and advantages of the Palo Alto Networks next-generation firewall architecture Understand the capabilities of App-ID, Content-ID, and User-ID Perform the basic configuration of the firewall including: Interfaces and virtual routers NAT Policies Security zones Objects Security policies Content security profiles View logs and basic reports This course was formerly named Palo Alto Networks Foundations of Next Generation Firewalls (EDU-150). ** Our foundation classes are just introductory trainings, NOT a full technical training. Your network has expanded beyond your organization\'s boundaries. Cloud locations and remote users (often using personal devices) have \'distributed\' the surface you need to both enable and protect.At the same time, the motivations of attackers and their sophistication have continued to evolve.Palo Alto Networks' next-generation firewalls are all based on a consistent Single-Pass Architecture, enabling security capability that is unique in the industry. This architecture is implemented in a portfolio of both physical and virtual appliances, designed to cover a range of performance and use case requirements.Features and management are consistent across the portfolio. Integration with GlobalProtect? mobile security service extends policy-based security to mobile devices (whether on-premises or remote). Integration with our threat intelligence services keeps information up to date for the firewall (e.g., URL categories, threat signatures). WildFire? cloud-based malware analysis environment integration supports a rapid \'feedback loop\' that enables the firewall to stop advanced threats throughout the attack lifecycle. Course Outline Module 0: Introduction Module 1: Platforms & Architecture Module 2: Getting Started Module 3: Basic Administration Module 4: Connectivity Module 5: Security Module 6: Logging & Reporting Additional course details: Nexus Humans Palo Alto Networks : Strata Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Strata Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks : Strata Foundations
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Cisco Networks with Open Source Snort v2.1 (SSFSNORT)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for technical professionals who need to know how to deploy open source intrusion detection systems (IDS) and intrusion prevention systems (IPS), and how to write Snort rules. Security administrators Security consultants Network administrators System engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe Snort technology and identify resources available for maintaining a Snort deployment Install Snort on a Linux-based operating system Describe the Snort operation modes and their command-line options Describe the Snort intrusion detection output options Download and deploy a new rule set to Snort Describe and configure the snort.conf file Configure Snort for inline operation and configure the inline-only features Describe the Snort basic rule syntax and usage Describe how traffic is processed by the Snort engine Describe several advanced rule options used by Snort Describe OpenAppID features and functionality Describe how to monitor Snort performance and how to tune rules The Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1 course shows you how to deploy a network intrusion detection system based on Snort. You?ll learn how to install, configure, operate, and manage a Snort system, rules writing with an overview of basic options, advanced rules writing, how to configure Pulled Pork, and how to use OpenAppID to provide protection of your network from malware. You will learn techniques of tuning and performance monitoring, traffic flow through Snort rules, and more Course outline Introduction to Snort Technology Snort Installation Snort Operation Snort Intrusion Detection Output Rule Management Snort Configuration Inline Operation and Configuration Snort Rule Syntax and Usage Traffic Flow Through Snort Rules Advanced Rule Options OpenAppID Detection Tuning Snort Additional course details: Nexus Humans Cisco Securing Cisco Networks with Open Source Snort v2.1 (SSFSNORT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Securing Cisco Networks with Open Source Snort v2.1 (SSFSNORT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Securing Cisco Networks with Open Source Snort v2.1 (SSFSNORT)
Delivered OnlineFlexible Dates
Price on Enquiry

ES15 IBM z/OS Facilities

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This class is designed for persons who are new to the z/OS platforms but have a technical background in information technology. It is intended for those who require an in-depth understanding of z/OS. Overview Describe the system initialization process of the z/OS operating systemsState the differences between an address space, data space, and hyperspaceDescribe the process of translating a virtual address to a real addressExplain the difference between paging and swappingDefine a z/OS taskDescribe dispatching, interrupt processing, supervisor calls, cross memory services, and serializationDescribe the purpose of the Job Entry Subsystem (JES)Illustrate the flow of a job through the z/OS environmentDescribe the allocation process for data sets in the z/OS environmentsIllustrate how an I/O request is processed in a z/OS environmentDescribe how workload management is accomplished in a z/OS environmentExplain the z/OS recovery processes and list available Problem Determination ToolsDescribe z/OS storage management conceptsDescribe the UNIX System Services functions provided in the z/OS environmentsExplain the network topologies and protocol support provided in z/OSDescribe system security and network security for a z/OS environmentCreate a high-level plan for the installation and configuration of a z/OS environment This classroom course introduces the base elements, optional features, and servers that are provided in z/OS. It focuses on the system service facilities that are provided by the z/OS Base Control Program (BCP). Day 1 Unit 1: z/OS overview Including welcome and course overview Unit 2: Storage management Day 2 Unit 3: Managing work Unit 4: Input/output processing Day 3 Unit 4: Input/output processing (continued) Unit 5: Data management Unit 6: Job management Day 4 Unit 7: IPL and system initialization Unit 8: Termination and recovery analysis Unit 9: Installing and configuring Day 5 Unit 10: Communicating Unit 11: Security in z/OS Including end-of-course summary Additional course details: Nexus Humans ES15 IBM z/OS Facilities training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ES15 IBM z/OS Facilities course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ES15 IBM z/OS Facilities
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks : Cortex XDR 3.2: Prevention and Deployment (EDU-260)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Cybersecurity analysts and engineers and security operations specialists, as well as administrators and product deployers. Overview Successful completion of this instructor-led course with hands-on lab activities should enable you to: Describe the architecture and components of the Cortex XDR family Use the Cortex XDR management console, including reporting Create Cortex XDR agent installation packages, endpoint groups, and policies Deploy Cortex XDR agents on endpoints Create and manage Exploit and Malware Prevention profiles Investigate alerts and prioritize them using starring and exclusion policies Tune Security profiles using Cortex XDR exceptions Perform and track response actions in the Action Center Perform basic troubleshooting related to Cortex XDR agents Deploy a Broker VM and activate the Local Agents Settings applet Understand Cortex XDR deployment concepts and activation requirements Work with the Customer Support Portal and Cortex XDR Gateway for authentication and authorization This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create Security profiles and policies. The training enables you to perform and track response actions, tune profiles, and work with Cortex XDR alerts. The training concludes with discussions about basic troubleshooting of the agent, the on-premises Broker VM component, and Cortex XDR deployment. Course Outline Module 1 - Cortex XDR Overview Module 2 - Cortex XDR Main Components Module 3 - Cortex XDR Management Console Module 4 - Profiles and Policy Rules Module 5 - Malware Protection Module 6 - Exploit Protection Module 7 - Cortex XDR Alerts Module 8 - Tuning Policies Using Exceptions Module 9 - Response Actions Module 10 - Basic Agent Troubleshooting Module 11 - Broker VM Overview Module 12 - Deployment Considerations Additional course details: Nexus Humans Palo Alto Networks : Cortex XDR 3.2: Prevention and Deployment (EDU-260) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Cortex XDR 3.2: Prevention and Deployment (EDU-260) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks : Cortex XDR 3.2: Prevention and Deployment (EDU-260)
Delivered OnlineFlexible Dates
Price on Enquiry

Carpentry

4.8(9)

By Skill Up

Master Woodwork with our course. Learn tools, materials, and construction techniques. Enhance your Woodwork skills and build your future in Woodwork.

Carpentry
Delivered Online On Demand2 hours 54 minutes
£15.99

Ethical RFID Hacking Course

4.7(160)

By Janets

Description Register on the Ethical RFID Hacking Course today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a certificate as proof of your course completion. The Ethical RFID Hacking Course course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablets, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With This Course Receive a digital certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Certificate of Achievement After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for 9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for 15.99, which will reach your doorsteps by post. Method of Assessment You need to attend an assessment right after the completion of this course to evaluate your progression. For passing the assessment, you need to score at least 60%. After submitting your assessment, you will get feedback from our experts immediately. Who Is This Course For The course is ideal for those who already work in this sector or are aspiring professionals. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Course Content Introduction What is RFID? 00:02:00 Preparation What's Proxmark 3 RDV4? 00:01:00 Implementation of Proxmark3 (PM3) 00:01:00 Installation of Proxmark3 (PM3) 00:02:00 Low Frequency Basic Knowledge 00:01:00 How to clone a HID Proximity card? 00:03:00 How to clone a Viking card? 00:03:00 How to clone a IoProx card? 00:04:00 How to clone a GProx card? 00:04:00 How to clone a AWID card? 00:03:00 High Frequency Basic knowledge 00:01:00 How to clone a Mifare classic card? 00:04:00 How to crack a Mifare Classic Card Encryption Key? (Nested Attack) 00:07:00 How to crack a Mifare Classic Card Encryption Key? (AutoPWN) 00:02:00 Andriod Application and Bluetooth Add On RRG RFID Tool 00:05:00 Data Analysis 00:05:00 Introduction of ChameleonMini/Tiny Rev G? What's ChameleonMini/Tiny? 00:01:00 Remote Attack using Chameleon 00:01:00 Assignment Assignment - Ethical RFID Hacking Course 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Ethical RFID Hacking Course
Delivered Online On Demand50 minutes
£25

Learn Linux in 5 Days and Level Up Your Career

4.8(9)

By Skill Up

Fast-track your career with our comprehensive 5-day Linux course. Master Linux in just a few days, boosting your expertise and job prospects.

Learn Linux in 5 Days and Level Up Your Career
Delivered Online On Demand5 hours 57 minutes
£25

Maximizing Interaction on Facebook Live

By Compete High

🌟 Maximizing Interaction on Facebook Live: Unlock the Secrets to Engagement Excellence! 🌟   Are you ready to transform your Facebook Live sessions from passive viewership to an interactive powerhouse? Welcome to our groundbreaking online course - Maximizing Interaction on Facebook Live! Elevate your live content, captivate your audience, and turn every broadcast into a dynamic, engaging experience.   🚀 Why Choose This Course?   In a sea of live videos, standing out requires more than just hitting the 'Go Live' button. Our course is your guide to becoming a Facebook Live maestro, teaching you the strategies and techniques to not just broadcast, but to captivate and connect.   🔥 What You'll Master:   ✅ Crafting Irresistible Content: Learn the art of creating compelling content that keeps your audience hooked from the first second to the last. ✅ Audience Interaction Techniques: Uncover the secrets to fostering real-time engagement, encouraging comments, reactions, and shares that amplify your reach. ✅ Technical Mastery: From camera setup to lighting, audio, and on-screen graphics - we'll guide you through the technical aspects to ensure your broadcasts look and sound professional. ✅ Monetizing Your Live Streams: Turn your passion into profit by discovering proven strategies to monetize your Facebook Live sessions without compromising authenticity.   🌐 Who Is This Course For?   Whether you're a content creator, business owner, or aspiring influencer, if you're ready to take your Facebook Live game to the next level, this course is your ticket to success.   🎓 Enroll Now and Transform Your Facebook Lives into Unforgettable Experiences! 🚀 Course Curriculum Basic Overview 00:00 Mobile Equipment Needed 00:00 Mobile Equipment Not Needed But Useful 00:00 Desktop Equipment Needed 00:00 Desktop Equipment Not Needed But Helpful 00:00 Sharing Your Screen on Facebook Live 00:00 Sharing Your Cam On Facebook Live 00:00 Going Live on Your Personal Profile 00:00 Going Live Into a Group 00:00 Going Live on Your Page 00:00 Go Live From Your Mobile Device 00:00 Downloading Your Video 00:00 Using the Facebook Creator Studio 00:00 FB Creator Content Studio Library 00:00 FB Creator Studio Insights 00:00 FB Live Monetization 00:00 FB Creator Launchpad 00:00 FB Creator - Rights Manager 00:00 FB Creator Sudio Preferences 00:00 Conclusion - Go Live On Pages and In Groups Simultaneously 00:00 Advanced Overview 00:00 Why Use OBS And Not the Camera View 00:00 Acquire and Download OBS Studio 00:00 Installing OBS Studio 00:00 Basic Settings 00:00 Scenes Then Sources 00:00 Capturing A Camera 00:00 Capturing the Audio 00:00 Capturing a Monitor 00:00 Layering Sources 00:00 Connecting To Facebook 00:00 Troubleshooting Grey Screen in OBS 00:00 Streamlabs OBS Download 00:00 Streamlabs OBS Installation 00:00 Streamlabs OBS Scenes and Sources 00:00 Streamlabs OBS - Screens and Monitors 00:00 Streamlabs OBS - Capturing Audio and Video 00:00 Streamlabs OBS - Working In Studio Mode 00:00 Streamlabs OBS - Connecting To Facebook 00:00 Conclusion - Streamlabs OBS or OBS Studio 00:00

Maximizing Interaction on Facebook Live
Delivered Online On Demand1 hour 6 minutes
£4.99

Professional Diploma in IT Communications

By iStudy UK

When it comes to understanding the fundamentals of computer networking the individual should have the appropriate knowledge of how to connect several different elements to create ideal computing networking. This course will teach how to function in a wide range of areas within the ICT industry and in ICT support roles in other industries. You will learn about local and wide area networks, voice network and wireless data network installation and maintenance. This course will also teach you the key operational and technical aspects of computer communication systems and relevant security issues, enabling you to appreciate emerging technologies. If you are a non-techie interested in learning about computer networks or aspiring IT professional who wishes to better understand how networks work, then get all the information you need here. This course has been designed to equip students with a wide range of software, technical and ICT skills required by industry at the diploma level. By the end of this program, the students will have the ability to develop an IT solution to a practical business problem using a technological approach. Course Highlights Professional Diploma in IT Communications is an award-winning and the best selling course that has been given the CPD Qualification Standards & IAO accreditation. It is the most suitable course anyone looking to work in this or relevant sector. It is considered one of the perfect courses in the UK that can help students/learners to get familiar with the topic and gain necessary skills to perform well in this field. We have packed Professional Diploma in IT Communications into 30 modules for teaching you everything you need to become successful in this profession. To provide you ease of access, this course is designed for both part-time and full-time students. You can become accredited in just 21 hours, 15 minutes hours and it is also possible to study at your own pace. We have experienced tutors who will help you throughout the comprehensive syllabus of this course and answer all your queries through email. For further clarification, you will be able to recognize your qualification by checking the validity from our dedicated website. Why You Should Choose Professional Diploma in IT Communications Lifetime access to the course No hidden fees or exam charges CPD Qualification Standards certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? Professional Diploma in IT Communications is CPD Qualification Standards and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our Professional Diploma in IT Communications is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD Qualification Standards and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. Module 01: Basics of Data Communications Basics of the Information Technology FREE 01:00:00 INTRODUCTION FREE 00:15:00 OBJECTIVES 00:15:00 DATA-COMMUNICATION 00:30:00 COMMUNICATION-MEDIA 00:15:00 TYPES OF COMMUNICATION SERVICES 00:30:00 MODEM 00:15:00 COMPUTER NETWORK 00:30:00 BENEFITS OF NETWORK 00:15:00 TYPES OF NETWORK 00:30:00 IMPORTANT TERMS USED IN NETWORKING 00:30:00 TELECONFERENCING 00:30:00 Module 02: Computer Networking Basics Introduction to Computer Networking FREE 00:30:00 Types of Computer Networks FREE 01:00:00 Types of Network Equipment 00:30:00 Ethernet 00:30:00 Wireless Local Area Networking 01:00:00 Internet Service 01:00:00 TCP/IP and Other Internet Protocols 01:00:00 Network Routing, Switching and Bridging 01:00:00 IPv4 & IPv6 01:00:00 Module 03: Networking Basics of computer networking 00:30:00 Computer networking design and solutions 00:30:00 Getting the right computer network hardware. 01:00:00 Setting up your Computer Network 00:30:00 Wireless vs wired 01:00:00 Cable management for wired computer network 01:00:00 Managing your network with network monitoring tools 01:00:00 Computer network maintenance and repair 01:00:00 Troubleshooting Computer Network Wrapping Up 01:00:00 Mock Exam Mock Exam- Professional Diploma in IT Communications 00:30:00 Final Exam Final Exam- Professional Diploma in IT Communications 00:30:00

Professional Diploma in IT Communications
Delivered Online On Demand21 hours 15 minutes
£25