• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2078 IT Certifications courses in Cardiff delivered Online

Linux Professional Institute Certification (LPIC-2) 201

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Linux Professional Institute Certification (LPIC-2) 201 training is suitable for individuals with roles of: System administrator Network administrator Technician DevOps Overview Upon successful completion of this course, students will be able to: measure hardware resource and network bandwidth, identify and troubleshoot resource problems monitor resource usage to predict future resource needs utilise kernel components that are necessary to specific hardware, hardware drivers, system resources and requirements properly configure a kernel to include or disable specific features of the Linux kernel as necessary manage and/or query a 2.6.x, 3.x or 4.x kernel and its loadable modules query and modify the behaviour of system services at various targets / run levels properly manipulate a Linux system during both the boot process and during recovery mode properly configure and navigate the standard Linux filesystem configure automount filesystems using AutoFS configure and implement software RAID configure kernel options to support various drives create and remove logical volumes, volume groups, and physical volumes use system tools to back up important system data. This course prepares students to take the 201 exam of the LPI level 2 certification. To gain LPIC-2 certification, an individual should have an active LPIC-1 certification. Capacity Planning Measure and Troubleshoot Resource Usage Predict Future Resource Needs Linux Kernel Kernel components Compiling a Linux kernel Kernel runtime management and troubleshooting System Startup Customising system startup System recovery Alternate Bootloaders Filesystem and Devices Filesystem and Devices Maintaining a Linux filesystem Creating and configuring filesystem options Advanced Storage Device Administration Configuring RAID Adjusting Storage Device Access Logical Volume Manager Networking Configuration Basic networking configuration Advanced Network Configuration Troubleshooting network issue System Maintenance Make and install programs from source Backup operations Notify users on system-related issues

Linux Professional Institute Certification  (LPIC-2) 201
Delivered OnlineFlexible Dates
Price on Enquiry

MS Azure - Automation and Log Anayltics

4.3(43)

By John Academy

Description Get a comprehensive overview of Automation and Log Analytics in Azure in the MS Azure - Automation and Log Anayltics course. Microsoft Azure is a cloud computing platform that offers more than 600 Azure services. The course especially focuses on two major Azure services: Automation and Log Analytics. Azure Automation gives you the ability to automate frequent, time-consuming, and error-prone cloud management tasks. On the other hand, Log Analytics helps you to collect, correlate, and visualize structured and unstructured data. Using Log Analytics, you can monitor cloud and on-premises environments to maintain availability and performance. You will also monitor and systems to maintain availability and performance. Throughout the course, you will learn how to use these two services for making your office work easy. You will explore the strategies of creating an automation account, Runbooks, and creating and viewing OMS workspace. Finally, you will be familiarized with the Azure security Centre. Assessment: This course does not involve any MCQ test. Students need to answer assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Once the answers are submitted, the instructor will check and assess the work. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? MS Azure - Automation and Log Anayltics is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our MS Azure - Automation and Log Anayltics is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Introduction Introduction FREE 00:02:00 Azure Automation Azure Automation 00:03:00 Creating Azure Automation Accounts 00:03:00 Automation Assets 00:04:00 Creating Runbooks 00:07:00 Log Analytics Log Analytics Overview 00:03:00 Creating and Viewing OMS Workspaces 00:10:00 Azure Security Center Intro to Azure Security Center 00:04:00 Detection as a Service 00:02:00 ASC Investigations 00:06:00 Conclusion Course Recap 00:03:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

MS Azure - Automation and Log Anayltics
Delivered Online On Demand47 minutes
£11.99

Microsoft SQL Server Development

4.3(43)

By John Academy

Course Overview The database is a must for collecting, saving, sorting and finding out data of your website or software. An effective database can make your software more engaging and interactive. learn how to use Microsoft SQL Server from this Microsoft SQL Server Development course and boost the quality of your software. This Microsoft SQL Server Development course will teach you the functions of databases and querying from scratch. You will learn about Microsoft SQL Server, relational database management systems, various functions, tables and relationships from this course. You will be able to use the database for your software development and management. This course will also teach you the best practices for database development and management. Learning Outcomes Learn how to use Microsoft SQL management studio Familiarize with basic database design Learn how you can use select statements Be able to insert delete or update data into data tables Learn about the best practices for database development Create relationships among multiple tables Learn how you can use foreign keys Be able to create Complex database objects Understand how to backup and restore database Who is this course for? This course is helpful for anyone who wants to learn about the database management system and SQL servers. You will be able to understand the function of the database, logic and usability of the database for your Microsoft SQL server development. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path Microsoft SQL Server Development is a useful qualification to possess and would be beneficial for any related profession or industry such as: Software Engineer Web Developers Data Security Officers Database Administrators Database Developers Introduction Introduction to SQL Server and Databases 00:04:00 Download and Install SQL Server Express 00:05:00 Manipulating Tables and Data Connect to Database Instance and Create a Database 00:06:00 Drop or Remove Database 00:04:00 What is a Database Table? 00:02:00 Create an SQL Database Table 00:32:00 Insert Data into the Table with SQL Script 00:15:00 Insert Data into the Table with Management Studio 00:05:00 Select Data from the Table with SQL Script 00:09:00 More Advanced Select Queries Part 1 00:18:00 Update Data in the Table 00:10:00 Update Data in the Table with Management Studio GUI 00:02:00 Delete Data from the Table with SQL Script 00:06:00 Delete Data from the Table with Management Studio GUI 00:01:00 Relationships and Foreign Keys What are Relationships, Foreign Keys and Normalization 00:11:00 Create a Relationship in SQL Server 00:19:00 Insert Records in Related Tables 00:13:00 Run Queries on Related Tables 00:19:00 Left, Right and Full Joins 00:11:00 Group By and Aggregate Functions Grouping Data using SQL GROUP BY Clause 00:12:00 SQL AVG Aggregate Function 00:11:00 SQL COUNT Aggregate Function 00:04:00 SQL MAX and MIN Aggregate Functions 00:04:00 SQL SUM Aggregate Function 00:04:00 Advanced SQL Server Objects and Concepts Create and Manage Views 00:23:00 Scalar Valued Functions 00:27:00 Inline Table Valued Functions 00:09:00 Multi Statement Table Valued Functions 00:12:00 Stored Procedures 00:28:00 Table Triggers 00:19:00 Database Scripting, Backup and Restore 00:15:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Microsoft SQL Server Development
Delivered Online On Demand6 hours
£11.99

Diploma in Microsoft Azure 2017

4.3(43)

By John Academy

Description: Microsoft Azure is a cloud computing service formerly known as Windows Azure. This cloud computing service is a big part of Microsoft's business, and it competes with similar services from Amazon and Google. With this diploma in Microsoft Azure 2017 course, get a chance to learn about the fundamentals of working in a Microsoft Azure environment to help improve your business. This course will help you get started with Microsoft Azure technologies such as virtual machines, networking, identity, storage and infrastructure. You will get to learn how Microsoft Azure can help you build and manage your business's applications and cloud services and help improve overall business productivity. So why wait? Join this course now! Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Diploma in Microsoft Azure 2017 is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Diploma in Microsoft Azure 2017 is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Microsoft Azure 2017 Hello Azure FREE 00:23:00 Subscriptions 00:16:00 Management Portals 00:33:00 App Service 00:22:00 App Settings 00:12:00 Hosting Plans 00:19:00 Deployments 00:22:00 Monitoring 00:15:00 Application Insights 00:25:00 Debugging Part 00:23:00 Function Apps 00:37:00 DevOps 101 00:12:00 Work Backlog 00:19:00 Code 00:12:00 Build 00:10:00 Release 00:12:00 Testing 00:06:00 Mock Exam Mock Exam- Diploma in Microsoft Azure 2017 00:20:00 Final Exam Final Exam- Diploma in Microsoft Azure 2017 00:20:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Diploma in Microsoft Azure 2017
Delivered Online On Demand5 hours 58 minutes
£11.99

Administering Cisco Data Center Unified Computing System with Intersight (DCUCAI)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Systems Administrators and Engineers Technical Solutions Architects Systems Integrators Channel Partners Value-Added Resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Understand the B-Series and C-Series product line similarities and differences Describe the Intersight support for C-Series standalone and UCS managed architectures Describe Cisco Intersight and how it can be used to manage UCS and Hyperflex Understand the process for upgrading B-Series and C-Series Firmware with UCSM and Intersight Administering service profiles, pools, and policies with UCSM and Intersight Understanding RBAC with Active Directory integration Administering backup and restores in UCS Manager Learn and discuss the various management tools for Cisco UCS including Intersight Perform basic troubleshooting of B-Series and C-Series in normal operations with UCSM and Intersight Describe how to get started with Intersight programmability DCUCAI, Administering Cisco Data Center Unified Computing System with Intersight is a 3-day instructor-led course. In this Cisco UCS server training course, you will become experienced with the administration and troubleshooting of Cisco Unified Computing System (UCS) B-Series and C-Series servers including using Cisco Intersight for UCS management. This custom-built Cisco UCS training class was developed by NterOne using the best lessons from all available Cisco server courses to maximize the learning experience for individuals who want to focus on day-to-day administration using Cisco UCS Manager or Intersight as the primary interface. Using real-world scenarios and examples, this Cisco training course will explore all the components of the UCS B-Series and C-Series solutions from a day-to-day administrative point of view. Learn C-Series standalone, C-Series under UCS Manager, B-Series administration, troubleshooting, and management tools used to support basic UCS and multi-cluster support with UCS Central, as well as using Cisco Intersight for UCS and Hyperflex operations and management. Module 1: UCS Infrastructure Components with Intersight Cisco UCS Product Line, Use Cases, and Components Introducing Cisco Intersight Describing Cisco UCS C-Series Servers Module 2: Administering Cisco UCS with Intersight Managing Virtual Resources Configuring Compute Node LAN Connectivity Configuring Compute Node SAN Connectivity Creating Identity and Resource Pools Creating Service Profiles Creating Service Profile Templates and Cloning Service Profiles Managing Service Profiles Troubleshooting Cisco UCS B-Series Configuration Troubleshooting Cisco UCS B-Series Operation Backing Up & Restoring the Cisco UCS Manager Database Managing and Upgrading Cisco UCS B-Series Firmware Module 3: Administering UCS Management Tools with Intersight Describing Cisco UCS User Interfaces Exploring Intersight User Interfaces Describing Cisco UCS Management Framework & Features Describing Cisco UCS Hyperflex Getting Started with Intersight Programmability Lab Outline: Labs are designed to assure learners a whole practical experience, through the following practical activities: Connecting to the Lab Environment Explore the Cisco UCS GUI and CLI Environment Explore the Cisco Intersight Dashboard and claim devices Create Users, Groups, Roles and Organizations in Intersight Provision Identity and Resource Pools in UCSM Provision Mobile Service Profiles from Updating Templates Backup and Restore Cisco UCS Manager Database Objects Configure Logging in Cisco Intersight Create LAN and SAN Network Policies in Intersight Build a Server Profile and deploy to a UCS blade from Intersight Using Intersight to upgrade Firmware Install an OS from Intersight Using Rest API to Query UCSM Objects in Intersight

Administering Cisco Data Center Unified Computing System with Intersight (DCUCAI)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco NSO Administration and DevOps v4.0 (NSO303)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for DevOps engineers Integration engineers Network and software architects Network engineers Software engineers System administrators Overview After completing this course, you should be able to: Describe network and IT convergence Describe Cisco NSO architecture Describe Linux Configure Cisco NSO Set up access control to Cisco NSO system Describe Cisco NSO Integration Options Explain version control systems and basic git concepts Describe the purpose of continuous integration and continuous delivery Implement Cisco NSO high availability Describe scalable system management Describe software development methodologies Describe service maintenance Perform NED upgrades Use Cisco NSO for managing services and their associated device configurations Describe Cisco NSO change management Explain service problem management Use Cisco NSO for service monitoring and compliance reporting Describe Cisco NSO inventory management Describe Cisco NSO use cases The Cisco Network Services Orchestrator (NSO) Administration and DevOps (NSO303) v4.0 course continues the learning journey of the NSO Essentials for Programmers and Network Architects (NSO201) v4.0 and NSO Advanced for Python Programmers (NSO300) v4.0 courses by introducing you to the system administration and DevOps focusing on NSO; the robust bridge linking network automation and orchestration tools, examining the development, operation, and administration task functions. You will learn how to set up, configure, deploy, and maintain a Cisco Network Services Orchestrator solution, and learn best practices for using DevOps. The examples shown in this course demonstrate real-world scenarios to prepare you for deployment and management of new or existing NSO instances. The course guides you through the setup of a production ready NSO instances using system installation with access control settings, the deployment of NSO in Docker containers, and introduces modern DevOps concepts and tools such as Git and Continuous Delivery/Continuous Deployment (CI/CD). You will learn how to migrate CDM devices, how to build NETCONF NEDs from the NSO CLI, how to handle NSO Alarms, and many more features that benefit you in your journey with Cisco NSO. Course Outline Introducing Network and IT Convergence Introducing Cisco NSO Architecture Introducing Linux Explaining Cisco NSO Setup Exploring Access Control Describing Integration Options Explaining Version Control System Describing Continuous Integration and Continuous Delivery Introducing Scalability and High Availability Describing Scalable System Management Describing Software Development Methodologies Introducing Service Maintenance Performing Network Element Driver (NED) Upgrades Introducing Configuration Management Describing Change Management Explaining Service Problem Management Explaining Service Monitoring and Compliance Reporting Introducing Inventory Management Describing Cisco NSO Use Cases

Cisco NSO Administration and DevOps v4.0 (NSO303)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco HyperFlex v1.3 (DCIHX)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Data center engineers Engineers (design, implementation, pre-sales, post-sales) Product managers and sales Overview After taking this course, you should be able to: Describe hyperconvergence, Cisco HyperFlex, and the components of Cisco HyperFlex Explain the Cisco Unified Computing System™ (Cisco UCS) and what makes it valuable to business Describe how Cisco HyperFlex Data Platform (HXDP) works Describe the physical components of Cisco HyperFlex Describe Cisco Intersight and introduce functionalities relevant to HyperFlex Install standard ESXi-based vSphere Cisco HyperFlex Manage your Cisco HyperFlex VMware ESXi-based cluster Describe how to maintain Cisco HyperFlex Design a Cisco HyperFlex solution Protect the data on your Cisco HyperFlex cluster using replication and data at rest encryption Describe a stretched cluster and how is it different from a standard cluster Describe an Edge cluster and how is it different from a standard cluster Perform basic troubleshooting tasks and explain Cisco Intersight The Implementing Cisco HyperFlex (DCIHX) v1.3 course shows you how to deploy and use the Cisco© HyperFlex? data platform to support multicloud workloads. You will become familiar with HyperFlex components and learn how to install, design, manage, and troubleshoot Cisco HyperFlex to support highly scalable and resilient multicloud implementations. You will also gain hands-on experience focused on installation, management, maintenance, and native replication, and you will explore cluster technologies as well as Cisco Intersight.? Introducing Hyperconvergence and Cisco HyperFlex Traditional Data Center Design What Is Hyperconvergence? Describing Cisco UCS: The Foundation of Cisco HyperFlex Cisco Server Deployment Models: Standalone Versus Managed Cisco UCS Managed Model Benefits Describing Cisco HyperFlex Software Components Virtual Machine Hypervisor Log-Structured File System Describing Cisco HyperFlex Hardware Components Introducing Cisco HyperFlex Servers Storage Technologies in Cisco HyperFlex Introducing Cisco Intersight Introducing Cisco Intersight Installing and Expanding Standard ESXi Cisco HyperFlex Installation Summary Software Prerequisites Managing Cisco HyperFlex in vSphere Environment Management Interfaces Overview Cisco HyperFlex Plugin for vCenter Maintaining Cisco HyperFlex Cisco HyperFlex Upgrade Overview Cisco HyperFlex Online Upgrade Designing Cisco HyperFlex Cluster Resiliency: VM-Level Cluster Resiliency: HXDP-Level Protecting Your Data Disaster Recovery Overview Third-Party Data Restore Solutions Introducing Cisco HyperFlex Stretched Deployment Stretched Cluster Overview Prerequisites Introducing Cisco HyperFlex EDGE Cisco HyperFlex EDGE Cluster Overview Prerequisites and Recommendations Troubleshooting Cisco HyperFlex Troubleshooting Guidelines Generating Tech Support Bundles

Cisco Implementing Cisco HyperFlex v1.3 (DCIHX)
Delivered OnlineFlexible Dates
Price on Enquiry

Securing an Ubuntu Linux Server against Hackers Masterclass

4.5(3)

By Studyhub UK

Discover the vital techniques to fortify your Ubuntu Linux server against potential security threats and hackers with this comprehensive masterclass. Explore a step-by-step journey through essential security measures and configurations to safeguard your server. From password management and user privileges to SSH setup, firewall installation, and time synchronization, this course equips you with the skills needed to bolster your server's defenses. Gain insights into fail2ban installation, DDOS attack prevention, and system time synchronization. By mastering these techniques, you'll be prepared to maintain a robust and secure Ubuntu Linux server environment. Learning Outcomes: Understand the importance of securing an Ubuntu Linux server against hackers. Learn to choose a server host, access the server, and manage users. Implement SSH security measures including key-based logins and port change. Set up firewall protection with UFW to mitigate potential attacks. Configure time synchronization and system time accuracy using ntp. Explore the significance of fail2ban and its role in blocking IP addresses. Discover preventive measures against DDOS attacks through UFW. Gain practical insights into server maintenance and troubleshooting. Why buy this Securing an Ubuntu Linux Server against Hackers Masterclass?  Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Securing an Ubuntu Linux Server against Hackers Masterclass you will be able to take the MCQ test that will assess your knowledge. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Securing an Ubuntu Linux Server against Hackers Masterclass course is ideal for System administrators and IT professionals responsible for server security. Linux enthusiasts seeking to enhance their Ubuntu server security skills. Individuals interested in learning practical techniques to secure their servers. Anyone aiming to improve their knowledge of Linux server security. Prerequisites This Securing an Ubuntu Linux Server against Hackers Masterclass was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Junior Linux Administrator - Average Earnings: £25,000 - £35,000 per year. Linux System Administrator - Average Earnings: £35,000 - £50,000 per year. Senior Linux Administrator - Average Earnings: £45,000 - £65,000 per year. IT Security Specialist - Average Earnings: £40,000 - £60,000 per year. DevOps Engineer - Average Earnings: £45,000 - £70,000 per year. Course Curriculum Secure an Ubuntu Linux Server against Hackers Module 01: Secure an Ubuntu Linux Server from Hackers Today 00:09:00 Module 02: Choosing a server host and setup 00:03:00 Module 03: Accessing the Ubuntu Linux server with putty 00:03:00 Module 04: How to download Putty for Windows 00:01:00 Module 05: Using a password manager like LastPass 00:03:00 Module 06: Changing the password with passwd 00:02:00 Module 07: Adding a new user with adduser 00:03:00 Module 08: Signing in with the added user 00:01:00 Module 09: Usermod to give the user sudo or root privileges 00:01:00 Module 10: Verify sudo access on user 00:01:00 Module 11: Key basic Linux commands cd pwd and ls 00:04:00 Module 12: Updating with apt get update 00:01:00 Module 13: Installing nano text editor 00:01:00 Module 14: Updating sshd config with nano to Permit Root Login no 00:09:00 Module 15: Changing the SSH port from 22 to another number 00:04:00 Module 16: Setting up RSA login by generating keys with puttygen 00:11:00 Module 17: Disabling password logins and ipv6 listening 00:02:00 Module 18: Locked out of server and have to start over! 00:02:00 Module 19: Back in with a fresh install! 00:02:00 Module 20: Installing fail2ban to block IPs from repeated failed logins 00:07:00 Module 21: Install UFW or Uniform Fire Wall to block some DDOS attacks 00:03:00 Module 22: Install and configure ntp to sync time 00:05:00 Module 23: Thank you very much for watching this complete Ubuntu Linux server 00:05:00 Module 24: Steem witness setup downloading blocks 00:03:00 Module 25: Steem witness setup finishing adding a new user 00:01:00 Module 26: Steem witness setup installing steem docker 00:04:00 Assignment Assignment - Securing an Ubuntu Linux Server against Hackers Masterclass 00:00:00

Securing an Ubuntu Linux Server against Hackers Masterclass
Delivered Online On Demand1 hour 31 minutes
£10.99

Enterprise Risk Management and ISO 31000

4.9(27)

By Apex Learning

Overview This comprehensive course on Enterprise Risk Management and ISO 31000 Income will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Enterprise Risk Management and ISO 31000 Income comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Enterprise Risk Management and ISO 31000 Income. It is available to all students, of all academic backgrounds. Requirements Our Enterprise Risk Management and ISO 31000 Income is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 5 sections • 15 lectures • 02:13:00 total length •What is Risk and Risk Management?: 00:09:00 •Why Manage Risk?: 00:09:00 •Why Manage Risk?: 00:09:00 •Overview of ISO 31000 Principles, Framework and Process: 00:05:00 •Overview of COSO ERM 2013 Framework: 00:08:00 •Communication and Consultation: 00:05:00 •Establishing the Context: 00:03:00 •Risk Identification - Process and Tools: 00:16:00 •Risk Analysis - Process and Tools: 00:20:00 •Risk Evaluation - Process and Tools: 00:08:00 •Risk Treatment - Process and Tools: 00:12:00 •Monitoring and Review - Process and Tools: 00:09:00 •Risk Management Maturity and Aware Culture: 00:12:00 •Risk Managing Supply Chain Risk: 00:08:00 •Assignment - Enterprise Risk Management and ISO 31000: 00:00:00

Enterprise Risk Management and ISO 31000
Delivered Online On Demand2 hours 13 minutes
£12

VMware NSX-T Data Center for Intrinsic Security [V3.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Implement Zero-Trust Security using VMware NSX segmentation Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware vRealize Log Insight™ for NSX™ and VMware vRealize Network Insight™ to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX Network Detection and Response This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX-T? Data Center for intrinsic security. In this course, you are introduced to all the security features in NSX-T Data Center, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© Network Detection and Response?.In addition, you are presented with common configuration issues and given a methodology to resolve them. Course Introduction Introductions and course logistics Course objectives Security Basics Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX-T Data Center aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust Architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX-T Data Center and VMware Identity Manager? Integrate NSX-T Data Center and LDAP Describe the native users and roles in NSX-T Data Center Create and assign custom user roles Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use vRealize Log Insight for NSX and vRealize Network Insight to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX Network Detection and Response Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX Network Detection and Response and its use cases Explain the architecture of NSX Network Detection and Response in NSX-T Data Center Describe the visualization capabilities of NSX Network Detection and Response

VMware NSX-T Data Center for Intrinsic Security [V3.2]
Delivered OnlineFlexible Dates
Price on Enquiry