• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

304 IT Security courses

EC-Council Certified DevSecOps Engineer (E|CDE)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for: C|ASE-certified professionals Application security professionals DevOps engineers IT security professionals Cybersecurity engineers and analysts Software engineers and testers Anyone with prior knowledge of application security who wants to build a career in DevSecOps Overview This course empowers you with the knowledge and skills to: Understand DevOps security bottlenecks and remediation Understand the DevSecOps toolchain and implement tools Integrate Eclipse and GitHub with Jenkins to build applications Align security practices Integrate threat modeling tools Understand and implement continuous security testing Integrate runtime application self-protection tools Integrate automated security testing Perform continuous vulnerability scans Use AWS and Azure tools to secure applications. Integrate compliance-as-code tools EC-Council Certified DevSecOps Engineer (E|CDE) is a hands-on, instructor-led comprehensive DevSecOps certification program that helps professionals build the essential skills to design, develop, and maintain secure applications and infrastructure. Course Outline Module 1: Understanding DevOps Culture Module 2: Introduction to DevSecOps Module 3: DevSecOps Pipeline?Plan Stage Module 4: DevSecOps Pipeline?Code Stage Module 5: DevSecOps Pipeline?Build and Test Stage Module 6: DevSecOps Pipeline?Release and Deploy Stage Module 7: DevSecOps Pipeline?Operate and Monitor Stage Additional course details: Nexus Humans EC-Council Certified DevSecOps Engineer (E|CDE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified DevSecOps Engineer (E|CDE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified DevSecOps Engineer (E|CDE)
Delivered OnlineFlexible Dates
Price on Enquiry

Certificate in GDPR - Level 3 Course Online

4.5(3)

By Studyhub UK

In today's interconnected world, safeguarding personal data is paramount. Enter GDPR, the General Data Protection Regulation, a vital framework shaping how data is handled across the EU and beyond. But what is GDPR? At its core, GDPR stands for the General Data Protection Regulation, a comprehensive set of rules designed to empower individuals and streamline data protection laws across Europe. Understanding GDPR isn't just about compliance; it's about embracing principles prioritising privacy, transparency, and accountability. As you embark on your journey into GDPR, you'll delve into its principles and regulations through a comprehensive online course. Each module uncovers essential insights from its inception to its application in various sectors like healthcare. From deciphering lawful bases for data processing to exploring responsibilities and obligations, you'll gain a holistic understanding of GDPR's intricacies. Moreover, the course sheds light on handling electronic medical records ethically and the rights of individuals in case of breaches. By the end of this course, you'll emerge equipped with essential knowledge and skills to ensure GDPR compliance within your organisation. Through practical scenarios and real-world examples, you'll navigate the complexities of GDPR with confidence. Whether you're a healthcare professional, an IT specialist, or an aspiring data protection officer, this course offers invaluable insights to bolster your expertise and advance your career in today's data-driven landscape. Learning Outcomes: Comprehend the meaning and significance of contemporary data protection. Analyse GDPR principles and their implications in various sectors, particularly healthcare. Interpret the lawful basis for data processing under UK GDPR regulations. Assess responsibilities and obligations mandated by GDPR for organisations handling personal data. Identify rights granted to individuals and appropriate responses in case of GDPR breaches. Why buy this Certificate in GDPR - Level 3 Course Online? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Certification After studying the course materials of the Certificate in GDPR - Level 3 Course Online there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this Certificate in GDPR - Level 3 Course Online for? Healthcare professionals seeking to enhance their understanding of General Data Protection Regulation in the medical context. IT specialists aiming to deepen their knowledge of data protection laws and compliance. Aspiring data protection officers looking to build expertise in GDPR regulations. Business owners and managers strive to ensure GDPR compliance within their organisations. Legal professionals interested in specialising in data protection and privacy laws. Prerequisites This Certificate in GDPR - Level 3 Course Online does not require you to have any prior qualifications or experience. You can just enrol and start learning. This Certificate in GDPR - Level 3 Course Online was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Data Protection Officer: £30,000 - £60,000 Per Annum GDPR Compliance Manager: £35,000 - £70,000 Per Annum Healthcare Data Analyst: £25,000 - £45,000 Per Annum IT Security Consultant: £35,000 - £70,000 Per Annum Legal Advisor specialising in General Data Protection Regulation: £40,000 - £80,000 Per Annum Healthcare Administrator(General Data Protection Regulation): £20,000 - £40,000 Per Annum Course Curriculum Module 01: Introduction to GDPR Introduction to GDPR 00:26:00 Module 02: GDPR and Healthcare Setting GDPR and Healthcare Setting 00:20:00 Module 03: General Data Protection Regulations Explained General Data Protection Regulations Explained 00:16:00 Module 04: Lawful Basis for Preparation Lawful Basis for Preparation 00:30:00 Module 05: Responsibilities and Obligations Responsibilities and Obligations 00:33:00 Module 06: Electronic Medical Records Electronic Medical Records 00:19:00 Module 07: Rights and Breaches Rights and Breaches 00:13:00 Assignment Assignment - Certificate in GDPR - Level 3 Course Online 00:00:00

Certificate in GDPR - Level 3 Course Online
Delivered Online On Demand2 hours 37 minutes
£10.99

Certified Information Systems Auditor (CISA) - Complete Video Course

4.3(43)

By John Academy

Description: This Certified Information Systems Auditor (CISA) - Complete Video Course will provide you with the knowledge and proficiency to prepare for the globally recognized CISA certification exam. The CISA certification has become very popular since it originated in 1978, and is a benchmark for IS audit, security, control, and assurance personnel to validate your skill set. This course will immerse you into the subject, with in-depth coverage of the information covering the five domains that make up the 'Body of Knowledge' for the CISA exam and will provide you the tools to build your technical skills to develop, manage, and perform IT security audits. Being CISA-certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise. So, enhance your career by earning CISA - world-renowned as the standard of achievement for those who audit, control, monitor and assess information technology and business system Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Information Systems Auditor (CISA) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Information Systems Auditor (CISA) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. The Process of Auditing Information Systems Management of the Audit Function FREE 00:20:00 ISACA IT Audit and Assurance Standards and Guidelines 01:16:00 Risk Analysis 00:21:00 Internal Controls 00:17:00 Performing An IS Audit 01:07:00 Control Self-Assessment 00:09:00 The Evolving IS Audit Process 00:12:00 Governance and Management of IT Corporate Governance 00:06:00 IT Governance 00:02:00 IT Monitoring and Assurance Practices for Board and Senior Management 00:40:00 Information Systems Strategy 00:05:00 Maturity and Process Improvement Models 00:01:00 IT Investment and Allocation Practices 00:05:00 Policies and Procedures 00:17:00 Risk Management 00:31:00 IS Management Practices 00:50:00 IS Organizational Structure and Responsibilities 00:17:00 Auditing IT Governance Structure and Implementation 00:06:00 Business Continuity Planning 00:37:00 Information Systems Acquisition, Development and Implementation Business Realization 01:21:00 Project Management Structure 00:08:00 Project Management Practices 00:18:00 Business Application Development 00:42:00 Business Application Systems 00:38:00 Alternative Forms of Software Project Organization 00:03:00 Alternative Development Methods 00:10:00 Infrastructure Development/Acquisition Practices 00:09:00 Information Systems Maintenance Practices 00:09:00 System Development Tools And Productivity Aids 00:05:00 Business Process Reengineering And Process Change Projects 00:08:00 Application Controls 00:07:00 Auditing Application Controls 00:14:00 Auditing Systems Development, Acquisition And Maintenance 00:08:00 Information Systems Operations, Maintenance and Support Information Systems Operations 00:19:00 Information Systems Hardware 00:13:00 IS Architecture and Software 00:39:00 Network Infrastructure 01:16:00 Disaster Recovery Planning 00:19:00 Protection of Information Assets Importance Of Information Security 00:43:00 Logical Access 00:37:00 Network Infrastructure Security 00:39:00 Auditing Information Security Management Framework 00:03:00 Auditing Network Infrastructure Security 00:13:00 Environmental Exposures and Controls 00:02:00 Physical Access Exposures and Controls 00:05:00 Mobile Computing 00:05:00 Mock Exam Mock Exam- Certified Information Systems Auditor (CISA) - Complete Video Course 00:20:00 Final Exam Final Exam- Certified Information Systems Auditor (CISA) - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Information Systems Auditor (CISA) - Complete Video Course
Delivered Online On Demand17 hours 32 minutes
£24

Security Management Diploma

5.0(1)

By Course Gate

From local businesses to international consulting opportunities, security management has become one of the fastest growing fields. Safety and security managers are responsible for establishing and enforcing security policies and procedures as well as managing and coordinating the activities to create a safe and secure environment for clients and employees. The Security Management Diploma course provides you with the necessary knowledge on the various aspects of security, implementing security policies, regulations, rules, and norms to counter crime. A variety of topics are covered in this course, including executive protection and recovery, trade secret protection, background investigations and analysis, incident recording, surveillance, IT security and cyber-security. By the time you complete this course, you will be able to analyse and implement effective security countermeasures and procedures to safeguard proprietary information, trade secrets, organisational human resources and leaders. Who is this Course for? Security Management Diploma is perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. CPD Certificate from Course Gate  At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. Career path This course opens a new door for you to enter the relevant job market and also gives you the opportunity to acquire extensive knowledge along with required skills to become successful. You will be able to add our qualification to your CV/resume which will help you to stand out in the competitive job industry. Course Curriculum Security Management Diploma Module 01: Introduction to Security Management 00:30:00 Module 02: Organisational Security Management 00:26:00 Module 03: Security Risk Analysis and Risk Reduction 00:23:00 Module 04: Physical and Information Security Protection 00:32:00 Module 05: Business Resilience and Crisis Management 00:17:00 Module 06: Cyber Security and Fraud Prevention 00:25:00 Module 07: Security Investigations and Threat Awareness 00:24:00 Module 08: Laws and Regulations 00:25:00 Mock Exam Mock Exam - Security Management Diploma 00:20:00 Final Exam Final Exam - Security Management Diploma 00:20:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00

Security Management Diploma
Delivered Online On Demand4 hours 2 minutes
£11.99

Certified Wireless Security Professional (CWSP)

4.8(9)

By Skill Up

Wireless security is essential for any organization, but it can be complex to implement and manage. The CWSP course will give you the skills and knowledge to secure your wireless network from various threats.

Certified Wireless Security Professional (CWSP)
Delivered Online On Demand13 hours 32 minutes
£25

Security Guard Training (Fundamentals): Part 1

By iStudy UK

Course Description Get instant knowledge from this bite-sized Security Guard Training (Fundamentals): Part 1 course. This course is very short and you can complete it within a very short time. In this Security Guard Training (Fundamentals): Part 1 course you will get fundamental ideas of the job of a security guard, the key understanding of the importance of security, security risk analysis and so on. Enrol in this course today and start your instant first step towards learning about the definition and importance of security. Learn faster for instant implementation. Learning Outcome Familiarise with response to the immediate crisis Understand the definition and importance of security Deepen your understanding of physical and information security protection Understand the security risk analysis and risk reduction Learn about the career prospect of security guard in the UK How Much Do Security Guards Earn? Senior - £31,000 (Apprx.) Average - £22,000 (Apprx.) Starting - £16,000 (Apprx.) Requirement Our Security Guard Training (Fundamentals): Part 1 is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Security Guard Training (Fundamentals): Part 1 Module 01: Definition and Importance of Security 00:16:00 Module 02: Career Prospect of Security Guard in the UK 00:11:00 Module 03: Security Risk Analysis and Risk Reduction 00:25:00 Module 04: Physical and Information Security Protection 00:36:00 Module 05: Response to Immediate Crisis 00:25:00 Assignment Assignment - Security Guard Training (Fundamentals): Part 1 00:00:00

Security Guard Training (Fundamentals): Part 1
Delivered Online On Demand1 hour 53 minutes
£25

Certified Information Privacy Technologist (CIPT)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. Fundamentals of information privacy Reviewing the modern history of privacy Foundational privacy concepts Data protection roles and fair information practices Exploring the impacts of privacy and data protection regulations on information management Privacy in the IT environment Compliance requirements IT risks Stakeholder privacy expectations Differentiating between privacy and security Core privacy concepts Foundational elements for embedding privacy in IT Common privacy principles Data protection by design and default Privacy considerations in the information life cycle Privacy considerations throughout the stages of the information life cycle Privacy in systems and applications Examining the risks inherent in the IT environment and options for addressing them Identity and access management Credit card information and processing Remote access BYOD and telecommuting Data encryption Additional privacy-enhancing technologies in the enterprise environment Privacy techniques Strengths and weaknesses of authentication techniques Using identifiers Privacy by design Online privacy issues Unique challenges that come from online privacy issues Laws and regulations Online threats Social media E-commerce Tracking technologies Web security protocols Technologies with privacy considerations Privacy considerations associated with a variety of technologies Cloud computing Wireless IDs Location-based services ?Smart? technologies Video/data/audio surveillance Biometric recognition

Certified Information Privacy Technologist (CIPT)
Delivered OnlineFlexible Dates
Price on Enquiry

CompTIA Library - CPD Accredited

5.0(10)

By Apex Learning

**Don't Spend More; Spend Smarter** Boost Your Career with Apex Learning and Get Noticed By Recruiters in this Hiring Season! Get Hard Copy + PDF Certificates + Transcript + Student ID Card worth £160 as a Gift - Enrol Now Give a compliment to your career and take it to the next level. This CompTIA Library will provide you with the essential knowledge to shine in your professional career. Whether you want to develop skills for your next job or elevate skills for your next promotion, this CompTIA Library will help you keep ahead of the pack. The CompTIA Library incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your expertise and essential knowledge, which will assist you in reaching your goal. Further, this CompTIA Library will add extra value to your resume to stand out to potential employers. Throughout the programme, it stresses how to improve your competency as a person in your chosen field while also outlining essential career insights in this job sector. Consequently, you'll sharpen your knowledge and skills; on the other hand, see a clearer picture of your career growth in future. By the end of the CompTIA Library, you can equip yourself with the essentials to keep you afloat in the competition. Along with this CompTIA Library course, you will get 10 premium courses, an originalHardcopy, 11 PDF Certificates (Main Course + Additional Courses) Student ID card as gifts. This CompTIA Library Bundle Consists of the following Premium courses: Course 01: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 02: CompTIA A+ (220-1001) Course 03: CompTIA A+ (220-1002) Course 04: CompTIA Network (N10-007) Course 05: CompTIA Security+ (SY0-401) New 2020 Course 06: CompTIA Security+ (SY0-601) Course 07: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 08: CompTIA PenTest+ (Ethical Hacking) Course 09: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 10: Cisco ASA Firewall Training Course 11: Linux for Absolute Beginners! As one of the top course providers in the UK, we're committed to providing you with the best educational experience possible. Our industry experts have designed the CompTIA Library to empower you to learn all at once with accuracy. You can take the course at your own pace - anytime, from anywhere. So, enrol now to advance your career! Benefits you'll get choosing Apex Learning for this CompTIA Library: Pay once and get lifetime access to 11 CPD courses Free e-Learning App for engaging reading materials & helpful assistance Certificates, student ID for the title course included in a one-time fee Free up your time - don't waste time and money travelling for classes Accessible, informative modules designed by expert instructors Learn at your ease - anytime, from anywhere Study the course from your computer, tablet or mobile device CPD accredited course - improve the chance of gaining professional skills Gain valuable knowledge without leaving your home How will I get my Certificate? After successfully completing the course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) Curriculum of CompTIA Library Bundle Course 01: CompTIA IT Fundamentals ITF+ (FCO-U61) How People Use Computers System Hardware Device Ports and Peripherals Data Storage and Sharing Understanding Operating Systems Setting Up and Configuring a PC Setting Up and Configuring a Mobile Device Managing Files Using and Managing Application Software Configuring Network and Internet Connectivity IT Security Threat Mitigation Computer Maintenance and Management IT Troubleshooting Understanding Databases Developing and Implementing Software Course 02: CompTIA A+ (220-1001) All about the CompTIA A+ Safety and Professionalism The Visible Computer CPUs RAM Firmware Motherboards Power Supplies Mass Storage Technologies Implementing Mass Storage Essential Peripherals Building a PC Display Technologies Essentials of Networking Local Area Networking Wireless Networking The Internet Virtualization Portable Computing Understanding Mobile Devices Care and Feeding of Mobile Devices Printers and Multifunction Devices Securing Computers Course 03: CompTIA A+ (220-1002) All About the CompTIA A+ 2019 Core 2 Exam Safety and Professionalism The Visible Computer CPUs RAM Power Supply Implementing Mass Storage Building a PC Windows under the Hood Users, Groups, and Permissions Maintaining and Optimizing Operating Systems Working with the Command-Line Interface Troubleshooting Operating Systems Display Technologies Essentials of Networking Local Area Networking Wireless Networking The Internet Portable Computing Care and Feeding of Mobile Devices Securing Computers Operational Procedures Course 04: CompTIA Network (N10-007) Introduction Network Models Cabling and Topology Ethernet Basics Modern Ethernet Installing a Physical Network TCP/IP Basics Routing TCP/IP Applications Network Naming Securing TCP/IP Advanced Networking Devices IPv6 Remote Connectivity Wireless Networking Virtualization and Cloud Computing Mobile Networking Building a Real-World Network Managing Risk Protecting Your Network Network Monitoring Network Troubleshooting Course 05: CompTIA Security+ (SY0-401) New 2020 Security Fundamentals Identifying Security Threats and Vulnerabilities Managing Data, Application, and Host Security Implementing Network Security Implementing Access Control, Authentication, and Account Management Managing Certificates Implementing Compliance and Operational Security Risk Management Troubleshooting and Managing Security Incidents Business Continuity and Disaster Recovery Planning Course 06: CompTIA Security+ (SY0-601) Introduction Risk Management Cryptography Identity and Account Management Tools of the Trade Securing Individual Systems The Basic LAN Securing Wireless LANs Securing Public Servers Securing Dedicated Systems Physical Security Secure Protocols and Applications Testing Infrastructure Dealing with Incidents Course 07: Cloud Computing / CompTIA Cloud+ (CV0-002) What You Need to Know Introducing the Cloud System Requirements for Cloud Deployments Cloud Storage Cloud Compute Cloud Networking Cloud Security Migrating to the Cloud Maintaining Cloud Solutions Troubleshooting Cloud Solutions Course 08: CompTIA PenTest+ (Ethical Hacking) Introduction Planning and Scoping Surveying the Target Select Your Attack Vector Selecting Pen Testing Tools Reporting and Communication Course 09: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Introduction The Importance of Threat Data and Intelligence Threat Intelligence in Support of Organizational Security Vulnerability Assessment Tools Threats and Vulnerabilities Associated with Specialized Technology Threats and Vulnerabilities Associated with Specialized Technology Threats and Vulnerabilities Associated with Operating in the Cloud Mitigating Controls for Attacks and Software Vulnerabilities Security Solutions for Infrastructure Management Software Assurance Best Practices Hardware Assurance Best Practices Data Analysis in Security Monitoring Activities Implement Configuration Changes to Existing Controls to Improve Security The Importance of Proactive Threat Hunting Compare and Contrast Automation Concepts and Technologies And Much More... Course 10: Cisco ASA Firewall Training Common Network Security Terms Confidentiality, Integrity, Availability. Security Concepts & Terms Intro to Firewall Technologies About Cisco ASA Firewall Install Cisco ASAv Firewall in GNS3 Install ASA 9 Cluster, Security Context enable in GNS3. Install Cisco ASAv Firewall on EVE-NG Install Cisco ASAv Firewall on VMWare Workstation. Cisco ASA Firewall Basic Configuration Commands. Device Management Cisco ASA Console Device Management Cisco ASA Telnet Device Management Cisco ASA SSH And Much More... Course 11: Linux for Absolute Beginners! Introduction to Linux Linux Installation Linux Command Line Interface (CLI) Essentials Advanced CLI Usage Linux Development Tools Web Development Project Web Server Setup, Host Cofiguration and App Deployment Linux User Management Linux Network Administration CPD 150 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this CompTIA Library bundle. Persons with similar professions can also refresh or strengthen their skills by enrolling in this course. Students can take this course to gather professional knowledge besides their study or for the future. Requirements Our CompTIA Library is fully compatible with PC's, Mac's, laptops, tablets and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones, so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course; it can be studied in your own time at your own pace. Career path Having this various expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (CompTIA IT Fundamentals ITF+ (FCO-U61)) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

CompTIA Library - CPD Accredited
Delivered Online On Demand
£59

CCSE Check Point Certified Security Expert

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance. Articulate how utilizing multiple traffic queues can make traffic handling more efficient. Discuss Site-to-Site VPN basics, deployment and communities. Describe how to analyze and interpret VPN tunnel traffic. Explain Link Selection and ISP Redundancy options. Explain tunnel management features. Discuss Check Point Remote Access solutions and how they differ from each other. Describe how client security can be provided by Remote Access . Explain authentication methods including machine authentication. Explain Multiple Entry Point (MEP). Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. Course Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent

CCSE Check Point Certified Security Expert
Delivered OnlineFlexible Dates
Price on Enquiry

IT Support Technician Training Course

By Compliance Central

Are you looking to enhance your IT Support Technician skills? If yes, then you have come to the right place. Our comprehensive course on IT Support Technician will assist you in producing the best possible outcome by mastering the IT Support Technician skills. The IT Support Technician is for those who want to be successful. In the IT Support Technician, you will learn the essential knowledge needed to become well versed in IT Support Technician. Our IT Support Technician starts with the basics of IT Support Technician and gradually progresses towards advanced topics. Therefore, each lesson of this IT Support Technician is intuitive and easy to understand. Why would you choose the IT Support Technician from Compliance Central: Lifetime access to IT Support Technician materials Full tutor support is available from Monday to Friday with the IT Support Technician Learn IT Support Technician skills at your own pace from the comfort of your home Gain a complete understanding of IT Support Technician Accessible, informative IT Support Technician learning modules designed by expert instructors Get 24/7 help or advice from our email and live chat teams with the IT Support Technician course Study IT Support Technician in your own time through your computer, tablet or mobile device. A 100% learning satisfaction guarantee with your IT Support Technician Improve your chance of gaining in demand skills and better earning potential by completing the IT Support Technician IT Support Technician Curriculum Breakdown of the IT Support Technician Section 01: How People Use Computers The Case for Computer Literacy Features Common to Every Computing Device Common General-Purpose Computing Devices Networks of Computing Devices Remotely-Accessed Computer Systems Specialized Computer Systems Specialty I/O Devices Section 02: System Hardware CPUs Passive and Active Cooling RAM and Active Memory Motherboards Power Supplies AMA - Ask Me Anything about System Hardware Section 03: Device Ports and Peripherals Ports and Connectors General Use I/O Devices AMA - Ask Me Anything about I/O, Ports and Peripherals Section 04: Data Storage and Sharing Basics of Binary Storage Technologies Mass Storage Variation AMA - Ask Me Anything about Data Storage and Sharing Section 05: Understanding Operating Systems Operating System Functions Operating System Interfaces AMA - Ask Me Anything about Understanding OS's Section 06: Setting Up and Configuring a PC Preparing the Work Area Setting up a Desktop PC Completing PC Setup AMA - Ask Me Anything about Setting up and Configuring a PC Section 07: Setting Up and Configuring a Mobile Device Personalizing a Tablet AMA - Ask Me Anything about Mobile Devices Part 1 AMA - Ask Me Anything about Mobile Devices Part 2 Section 08: Managing Files File Management Tools File Manipulation Backups AMA - Ask Me Anything about Managing Files Section 09: Using and Managing Application Software Walking Survey of Applications Managing Applications Applications and Extensions AMA - Ask Me Anything about Working with Applications Section 10: Configuring Network and Internet Connectivity Wi-Fi Setup Going High Speed Setting Up and Sharing Printers AMA - Ask Me Anything about Networks and Internet Connectivity Part 1 AMA - Ask Me Anything about Networks and Internet Connectivity Part 2 Section 11: IT Security Threat Mitigation Physical Security Dealing with Malware Password Management Clickworthy Perils of Public Internet AMA - Ask Me Anything about IT Threat Mitigation Part 1 AMA - Ask Me Anything about IT Threat Mitigation Part 2 Section 12: Computer Maintenance and Management Power Management Cleaning and Maintaining Computers Trash it or Stash it? AMA - Ask Me Anything about Computer Maintenance and Management Section 13: IT Troubleshooting Troubleshooting 101 AMA - Ask Me Anything about Troubleshooting Computers Part 1 AMA - Ask Me Anything about Troubleshooting Computers Part 2 Section 14: Understanding Databases Introduction to Databases Database Details AMA - Ask Me Anything about Databases Section 15: Developing and Implementing Software Introduction to Programming Programming with a PBJ Sandwich AMA - Ask Me Anything about Programming CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The IT Support Technician helps aspiring professionals who want to obtain the knowledge and familiarise themselves with the skillsets to pursue a career in IT Support Technician. It is also great for professionals who are already working in IT Support Technician and want to get promoted at work. Requirements To enrol in this IT Support Technician, all you need is a basic understanding of the English Language and an internet connection. Career path The IT Support Technician will enhance your knowledge and improve your confidence in exploring opportunities in various sectors related to IT Support Technician. Certificates CPD Accredited PDF Certificate Digital certificate - Included CPD Accredited PDF Certificate CPD Accredited Hard Copy Certificate Hard copy certificate - £10.79 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99

IT Support Technician Training Course
Delivered Online On Demand5 hours
£12