• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3456 Link courses

Adobe Dreamweaver CC - Part 2

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is most valuable for individuals who have been given responsibilities to create or maintain a website. It will also be valuable for new web designers, web developers, and graphic artists who want to extend their skills in creating complete websites. Learning how to use Dreamweaver CC will enable the practitioner to create web pages and sites in the most efficient manner. This course can also be used to help prepare students to take the Adobe Certified Associate (ACA) exam. Overview Upon successful completion of this course, you will be able to develop interactive and engaging websites that are compatible with multiple display devices. You will: ?Identify website requirements.?Create layouts.?Format web pages.?Create forms.?Integrate media files with Dreamweaver.?Manage website files. In this course, you will use Adobe Dreamweaver CC to create fluid CSS layouts, implement mobile integration techniques, and share files over a server to work in a collaborative manner. Identifying Website Requirements Examine Website Design Considerations Examine Website Performance Parameters Creating Layouts Create a Fluid Layout Manage a Layout by Using CSS Formatting Web Pages Format Content in Code View Apply Advanced CSS Tools Add Behaviors Manage Links and Files Creating Forms Add a Form Container and Elements Validate a Form Integrating Media Files with Dreamweaver Integrate Photoshop Files in Dreamweaver Insert Video, Audio, and Mobile Files Implement PhoneGap Integration Managing Website Files Preview and Test a Website Share Website Files with Other Users Synchronize Website Files Additional course details: Nexus Humans Adobe Dreamweaver CC - Part 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Adobe Dreamweaver CC - Part 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Adobe Dreamweaver CC - Part 2
Delivered OnlineFlexible Dates
Price on Enquiry

Excel for business professionals

By Nexus Human

Duration 2.25 Days 13.5 CPD hours This course is intended for The job roles best suited to the material in this course are: sales personnel, accountants, administrators, auditors, lab assistants, office job positions. Overview Work with functions. Work with lists. Analyze data. Visualize data with charts. Use PivotTables and PivotCharts. Work with multiple worksheets and workbooks. Share and protect workbooks. Automate workbook functionality. Use Lookup functions and formula auditing. Forecast data. Create sparklines and map data This course provides the knowledge to create advanced workbooks and worksheets that can deepen the understanding of organizational intelligence. The ability to analyze massive amounts of data, extract actionable information from it and present that information to decision makers. In addition this course will give you the ability to collaborate with colleagues, automate complex or repetitive tasks and use conditional logic to construct and apply elaborate formulas and functions which will allow you to work through a lot of data and generate the answers that your organisation needs. WORKING WITH FUNCTIONS Topic A: Work with Ranges Topic B: Use Specialized Functions Topic C: Work with Logical Functions Topic D: Work with Date and Time Functions Topic E: Work with Text Functions WORKING WITH LISTS Topic A: Sort Data Topic B: Filter Data Topic C: Query Data with Database Functions Topic D: Outline and Subtotal Data ANALYZING DATA Topic A: Create and Modify Tables Topic B: Apply Intermediate Conditional Formatting Topic C: Apply Advanced Conditional Formatting VISUALIZING DATA WITH CHARTS Topic A: Create Charts Topic B: Modify and Format Charts Topic C: Use Advanced Chart Features USING PIVOTTABLES AND PIVOTCHARTS Topic A: Create a PivotTable Topic B: Analyze PivotTable Data Topic C: Present Data with PivotCharts Topic D: Filter Data by Using Timelines and Slicers WORKING WITH MULTIPLE WORKSHEETS AND WORKBOOKS Topic A: Use Links and External References Topic B: Use 3-D References Topic C: Consolidate Data SHARING AND PROTECTING WORKBOOKS Topic A: Collaborate on a Workbook Topic B: Protect Worksheets and Workbooks AUTOMATING WORKBOOK FUNCTIONALITY Topic A: Apply Data Validation Topic B: Search for Invalid Data and Formulas with Errors Topic C: Work with Macros USING LOOKUP FUNCTIONS AND FORMULAS AUDITING Topic A: Use Lookup Functions Topic B: Trace Cells Topic C: Watch and Evaluate Formulas FORECASTING DATA Topic A: Determine Potential Outcomes Using Data Tables Topic B: Determine Potential Outcomes Using Scenarios Topic C: Use the Goal Seek Feature Topic D: Forecast Data Trends CREATING SPARKLINES AND MAPPING DATA Topic A: Create Sparklines Topic B: Map Data

Excel for business professionals
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Linux (TTLX2103)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This is an introductory-level course, designed for anyone wanting to learn Linux. Attendees should be comfortable working with computers and the command line, but no other specific skills are required to attend. Overview This skills-focused course is about 50% lab to lecture ratio, combining expert instructor-led discussions with practical hands-on labs that emphasize current techniques, best practices and standards. Working in a hands-on lab environment, guided by our expert practitioner, attendees will explore The Design of Linux Basic Operations File System Basics Wildcards File and Directory Permissions Working with files Executing Programs Using find Filters and other useful commands The vi editor Customizing the user environment Networking/Communications Backups and archiving This hands-on course provides you with an essentials-level foundation in core skills for using any version of Linux. This course focuses on essential skills that ordinary users might use daily when working with Linux. The Design of Linux A brief history of Linux The Linux design philosophy Linux architecture Basic Operations Logging in and out The general form of a Linux command Common commands Using man pages Essential commands File System Basics The Linux directory structure Standard directories Relative and absolute pathnames Legal file names Navigating the filesystem Wildcards Matching one character Matching many characters Shortcuts Wildcard gotchas Wildcards and ls File and Directory Permissions Viewing permissions File permissions Directory permissions Setting defaults Changing permissions Keeping data secure Working with files Viewing contents Identifying file contents Copying and moving Deleting Using symbolic links Executing Programs Redirecting STDOUT Redirecting STDERR Redirecting STDIN Creating pipelines Processes attributes Listing processes Killing processes Foreground & background processes Using find Syntax Finding by name, type, or size Combining tests Finding by size, owner, or timestamps Using xargs with find Other find options Filters and other useful commands What is a filter? cat: a generic filter head and tail grep sort wc other interesting filters The vi editor Why vi? Basic vi operations: navigating, adding, deleting Advanced operations: buffer management, search and replace, configuration options Customizing the user environment About shells Shell startup files Shell variables Search path Aliases Simple shell scripts Networking/Communications Reading and sending mail Remote login Remote file transfer Other network utilities (ping, finger, etc) Backups and archiving Checking space used or available Creating tar archives Viewing and extracting files from archives Compression utilities Working with windows

Introduction to Linux (TTLX2103)
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Configuring BIG-IP DNS - Domain Name System (formerly GTM)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of BIG-IP DNS systems. This course gives networking professionals a functional understanding of the BIG-IP DNS system as it is commonly used. The course covers configuration and ongoing management of the BIG-IP DNS system, and includes a combination of lecture, discussion, and hands-on labs. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Provision the BIG-IP System and Confirm Network Configuration Module 2: Introducing the Domain Name System (DNS) and BIG-IP DNS Understanding the Domain Name System (DNS) Reviewing the Name Resolution Process Implementing BIG-IP DNS Using DNS Resolution Diagnostic Tools Module 3: Accelerating DNS Resolution Introducing DNS Resolution with BIG-IP DNS BIG-IP DNS Resolution Decision Flow Configuring BIG-IP DNS Listeners Resolving DNS Queries in the Labs (Lab Zone Records) Load Balancing Queries to a DNS Server Pool Accelerating DNS Resolution with DNS Cache Accelerating DNS Resolution with DNS Express Introducing Wide IPs Using Other Resolution Methods with BIG-IP DNS Integrating BIG-IP DNS into Existing DNS Environments Module 4: Implementing Intelligent DNS Resolutions Introducing Intelligent DNS Resolution Identifying Physical Network Components Identifying Logical Network Components Collecting Metrics for Intelligent Resolution Configuring Data Centers Configuring a BIG-IP DNS System as a Server Configuring a BIG-IP LTM System as a Server Establishing iQuery Communication between BIG-IP Systems Configuring a Non-F5 Server Defining Links and Routers Configuring Wide IP Pools Configuring Wide IPs Managing Object Status Using the Traffic Management Shell (TMSH) Module 5: Using LDNS Probes and Metrics Introducing LDNS Probes and Metrics Types of LDNS Probes Excluding an LDNS from Probing Configuring Probe Metrics Collection Module 6: Load Balancing Intelligent DNS Resolution Introducing Load Balancing on BIG-IP DNS Using Static Load Balancing Methods Round Robin Ratio Global Availability Static Persist Other Static Load Balancing Methods Using Dynamic Load Balancing Methods Round Trip Time Completion Rate CPU Hops Least Connections Packet Rate Kilobytes per Second Other Dynamic Load Balancing Methods Virtual Server Capacity Virtual Server Score Using Quality of Service Load Balancing Persisting DNS Query Responses Configuring GSLB Load Balancing Decision Logs Using Manual Resume Using Topology Load Balancing Module 7: Monitoring Intelligent DNS Resources Exploring Monitors Configuring Monitors Assigning Monitors to Resources Monitoring Best Practices Module 8: Advanced BIG-IP DNS Topics Implementing DNSSEC Setting Limits for Resource Availability Using iRules with Wide IPs Introducing Other Wide IP Types Implementing BIG-IP DNS Sync Groups Module 9: Final Configuration Projects Final Configuration Projects

F5 Networks Configuring BIG-IP DNS - Domain Name System (formerly GTM)
Delivered OnlineFlexible Dates
Price on Enquiry

B6259 IBM Cognos Analytics - Author Reports Advanced V11.1.x

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Authors Overview Please refer to course overview This course teaches experienced authors advanced report building techniques to enhance, customize, manage, and distribute reports. Additionally, the student will learn how to create highly interactive and engaging reports that can be run offline by creating Active Reports. Create query models Build a query and connect it to a report Answer a business question by referencing data in a separate query Create reports based on query relationships Create join relationships between queries Combine data containers based on relationships from different queries Create a report comparing the percentage of change Introduction to dimensional reporting concepts Examine data sources and model types Describe the dimensional approach to queries Apply report authoring styles Introduction to dimensional data in reports Use members to create reports Identify sets and tuples in reports Use query calculations and set definitions Dimensional report context Examine dimensional report members Examine dimensional report measures Use the default measure to create a summarized column in a report Focus your dimensional data Focus your report by excluding members of a defined set Compare the use of the filter() function to a detail filter Filter dimensional data using slicers Calculations and dimensional functions Examine dimensional functions Show totals and exclude members Create a percent of base calculation Create advanced dynamic reports Use query macros Control report output using a query macro Create a dynamic growth report Create a report that displays summary data before detailed data and uses singletons to summarize information Design effective prompts Create a prompt that allows users to select conditional formatting values Create a prompt that provides users a choice between different filters Create a prompt to let users choose a column sort order Create a prompt to let users select a display type Examine the report specification Examine report specification flow Identify considerations when modifying report specifications Customize reporting objects Distribute reports Burst a report to email recipients by using a data item Burst a list report to the IBM Cognos Analytics portal by using a burst table Burst a crosstab report to the IBM Cognos Analytics portal by using a burst table and a master detail relationship Enhance user interaction with HTML Create interactive reports using HTML Include additional information with tooltips Send emails using links in a report Introduction to IBM Cognos Active Reports Examine Active Report controls and variables Create a simple Active Report using Static and Data-driven controls Change filtering and selection behavior in a report Create interaction between multiple controls and variables Active Report charts and decks Create an Active Report with a Deck Create an Active Report with 11.0 visualizations

B6259 IBM Cognos Analytics - Author Reports Advanced V11.1.x
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle 19c New Features (TTOR20019)

By Nexus Human

Duration 3 Days 18 CPD hours Overview Our engaging instructors and mentors are highly-experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working within in a hands-on learning environment, guided by our expert team, attendees will explore: New Features Overview Multitenant New Features Security Features Cloud Services Networking Globalization Big Data Support Database Installation and Configuration Database Tuning Backup and Recovery Oracle 19c New Features is a hands-on course that explores the newest features such as Big Data Enhancements, Security, Multitenant features, Oracle Cloud Services, Networking, and much more. Oracle is one of the leading databases in industry today. Learn what their latest flagship product has to offer from industry experts. Oracle 19c New Features Overview Introduction to Oracle 19c New Features Oracle 19c Multitenant New Features Refreshable PDB Switchover PDB Integration with Data Guard PDB Snapshot Carousel CDB Fleet Management Oracle 19c Security Features Profile Lockdown Create a User Defined Master Encryption Key Encrypted Passwords in Database Links and Data Pump Create Keystores for Pluggable Databases Datapump and Unified Auditing Schema Only Accounts Oracle 19c Cloud Services Oracle IaaS Oracle Saas Oracle PaaS Oracle 19c Networking Database Connection Manager Database Proxy Support Tenant Isolation Oracle 19c Globalization New globalization for Bind Variables New Database Local Support Additional Unicode Support Big Data Support New Analytic Support Data Mining Data Warehouse Additional Parallel Processing Support Inline External Tables Database Installation and Configuration Zero Downtime Upgrades Dry Run Command implementation New location for Password File Improved Bulk Operations Database Tuning SQL Tuning Advisor and Exadata New SQL Tuning Set API Concurrent SQL and Sql Performance Analyzer Database In Memory Features In Memory Support for External Tables In Memory Features for Analytics Oracle 19c Backup and Recovery Active Pluggable Cloning Pluggable and non Pluggable Database Migration Additional course details: Nexus Humans Oracle 19c New Features (TTOR20019) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 19c New Features (TTOR20019) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle 19c New Features (TTOR20019)
Delivered OnlineFlexible Dates
Price on Enquiry

Formatting Technical Documents Using Microsoft for Office 365

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for individuals who want to gain an indepth knowledge of formatting documents using Word. Overview Upon successful completion of this course, students will be able to create and modify documents by using Microsoft Office Word 2016/365/2019. In this course, students will create, edit, and enhance technical documents using Microsoft Office Word 2016/365/2019. Formatting Text and Paragraphs Apply Character Formatting Control Paragraph Layout Aligh Text Using Tabs Display Text in Bulleted or Numbered Lists Working More Efficiently Make Repetitive Edits Apply Repetitive Formatting Use Styles to Streamline Repetitive Formatting Tasks Customize the Word Environment Managing Lists Sort a List Format a List Adding Tables Insert a Table Modify a Table Format a Table Inserting Graphic Objects Insert Symbols and Special Characters Add Images to a Document Controlling Page Appearance Add Headers and Footers Control Page Layout Add a Watermark Preparing to Publish Check Spelling, Grammar, and Readability Previw and Print Documents Use Research Tools Customizing Formats Using Styles and Themes Create and Modify Text Styles Cerate Custom List or Table Styles Apply Document Themes Inserting Content Using Quick Parts Insert Building Blocks Create and Modify building Blocks Insert Fields Using Quick Parts Using Templates to Automate Document Formatting Create a Document Using a Template Create and Modify a Template Manage Templates with the Template Organizer Controlling the Flow of a Document Control Paragrpah Flow Insert Section Breaks Insert Columns Managing Long Documents Insert Blank and Cover Pages Insert an Index Insert a Table of Contents Insert an Anchillary Table Manage Outlines Create a Master Document Manipulating Images Integrate Pictures and Text Adjust Image Appearance Adding Document References and Links Add Captions Add Cross-References Add Bookmarks Add Hyperlinks Insert Footnotes and Endnotes Add Citations and a Bibilography Additional course details: Nexus Humans Formatting Technical Documents Using Microsoft for Office 365 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Formatting Technical Documents Using Microsoft for Office 365 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Formatting Technical Documents Using Microsoft for Office 365
Delivered OnlineFlexible Dates
Price on Enquiry

B6159 IBM Cognos Analytics - Author Reports Advanced (v11.0.x)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Report Authors Overview Create query models Create reports based on query relationships Introduction to dimensional data Introduction to dimensional data in reports Dimensional report context Focus your dimensional data Calculations and dimensional functions Create advanced dynamic reports This offering teaches Professional Report Authors about advanced report building techniques using relational data models, dimensional data, and ways of enhancing, customizing, managing, and distributing professional reports. The course builds on topics presented in the Fundamentals course. Activities will illustrate and reinforce key concepts during this learning activity. Create query models Build a query and connect it to a report Answer a business question by referencing data in a separate query Create reports based on query relationships Create join relationships between queries Combine data containers based on relationships from different queries Create a report comparing the percentage of change Introduction to dimensional reporting concepts Examine data sources and model types Describe the dimensional approach to queries Apply report authoring styles Introduction to dimensional data in reports Use members to create reports Identify sets and tuples in reports Use query calculations and set definitions Dimensional report context Examine dimensional report members Examine dimensional report measures Use the default measure to create a summarized column in a report Focus your dimensional data Focus your report by excluding members of a defined set Compare the use of the filter() function to a detail filter Filter dimensional data using slicers Calculations and dimensional functions Examine dimensional functions Show totals and exclude members Create a percent of base calculation Create advanced dynamic reports Use query macros Control report output using a query macro Create a dynamic growth report Create a report that displays summary data before detailed data and uses singletons to summarize information Design effective prompts Create a prompt that allows users to select conditional formatting values Create a prompt that provides users a choice between different filters Create a prompt to let users choose a column sort order Create a prompt to let users select a display type Examine the report specification Examine report specification flow Identify considerations when modifying report specifications Customize reporting objects Distribute reports Burst a report to email recipients by using a data item Burst a list report to the IBM Cognos Analytics portal by using a burst table Burst a crosstab report to the IBM Cognos Analytics portal by using a burst table and a master detail relationship Enhance user interaction with HTML Create interactive reports using HTML Include additional information with tooltips Send emails using links in a report Introduction to IBM Cognos Active Reports Examine Active Report controls and variables Create a simple Active Report using Static and Data-driven controls Change filtering and selection behavior in a report Create interaction between multiple controls and variables Active Report charts and decks Create an Active Report with a Data deck Use Master detail relationships with Decks Optimize Active Reports Create an Active Report with new visualizations

B6159 IBM Cognos Analytics - Author Reports Advanced (v11.0.x)
Delivered OnlineFlexible Dates
Price on Enquiry

Cybersecurity Essentials

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Cybersecurity Essentials provides foundational knowledge in cybersecurity and is recommended for all non-technical professionals who wish to develop an understanding of cyber safety. Overview After completing this course, students will be able to: Identify and reduce human errors that put organizations at risk for a cyber-attacks. Define Ransomware, Phishing, and Data Breaches to understand the differences. Identify the motives of hackers. Assess how data breaches occur. Develop a plan on how to protect accounts and privacy. Create a strong and secure password. Work in a secure manner while using remote Wi-Fi access. Safely use Virtual Private Networks (VPN). Identify vulnerabilities in home networks to keep them secure. Identity different social engineering techniques e.g. phishing, vishing. Detect social engineering attempts and prevent potential breaches. Prevent hackers from accessing a Mobile phone. Cybersecurity Essentials was developed using unparalleled learning methodology that prepares cadets for the Israeli Cyber and Intelligence Unit. It is designed to tackle human error by helping develop an advanced understanding and skills to protect individuals and organizations against the most common cyber threats. INTRODUCTION TO CYBERSECURITY Introduction to the world of cybersecurity; basic terminology, and why cybersecurity is so important. Review of famous cyber-attacks. ACCOUNTS & CREDENTIALS SECURITY One of the most common elements linking cyber-attacks is compromised or weak credentials. Learn different ways hackers can acquire passwords, and what to do when accounts have been compromised. How to prevent such attacks including best protection methods and password management and introduction to tools for testing and creating strong passwords. REMOTE SECURITY: WI-FI & VPN Evaluate main risks that arise when using public and non-protected Wi-Fi networks. Differentiate between private and public Wi-Fi networks, define what a VPN is and how to use it, and how to browse safely in remote environments. SOCIAL ENGINEERING How hackers take advantage of ?human-based vulnerabilities?. Define social engineering and the different types of attacks that can leverage social engineering, such as phishing or vishing. Learn how to detect social engineering attempts and prevent future breaches. MOBILE SECURITY Minimize the risk of an attack on mobile device and understand basic security principles for mobile applications. Learn how to protect photos, browsing history, text messages, and confidential business information such as emails, documents, access permission and more. Additional course details: Nexus Humans Cybersecurity Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cybersecurity Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cybersecurity Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Kubernetes Security Specialist (CKS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security Professionals working with Kubernetes Clusters Container Orchestration Engineers DevOps Professionals Overview In this course, students will learn and practice essential Kubernetes concepts and tasks in the following sections: Cloud Security Fundamentals Cluster Hardening System Hardening Minimize Microservice Vulnerabilities Supply Chain Security Disaster Recovery Secure Back-up and Restore This class prepares students for the Certified Kubernetes Security Specialist (CKS) exam. Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stabilitywhile maximizing resource utilization for applications and services. By the conclusion of this hands-on, vendor agnostic training you will be equipped with a thorough understanding ofcloud security fundamentals, along with the knowledge, skills and abilities to secure a Kubernetes cluster, detect threats, and properly resolve a security catastrophe. This courseincludes hands-on instruction which develops skills and knowledge for securing container-based applications and Kubernetes platforms, during build, deployment, and runtime. We prioritizecovering all objectives and concepts necessary for passing the Certified Kubernetes Security Specialist (CKS) exam. You will be provided the components necessary to assemble your ownhigh availability Kubernetes environment and harden it for your security needs. Learning Your Environment Underlying Infrastructure Using Vim Tmux Cloud Security Primer Basic Principles Threat Analysis Approach CIS Benchmarks Securing your Kubernetes Cluster Kubernetes Architecture Pods and the Control Plane Kubernetes Security Concepts Install Kubernetes using kubeadm Configure Network Plugin Requirements Kubeadm Basic Cluster Installing Kubeadm Join Node to Cluster Kubeadm Token Manage Kubeadm Tokens Kubeadm Cluster Upgrade Securing the kube-apiserver Configuring the kube-apiserver Enable Audit Logging Falco Deploy Falco to Monitor System Calls Enable Pod Security Policies Encrypt Data at Rest Encryption Configuration Benchmark Cluster with Kube-Bench Kube-Bench Securing ETCD ETCD Isolation ETCD Disaster Recovery ETCD Snapshot and Restore Purge Kubernetes Purge Kubeadm 3Purge Kubeadm Image Scanning Container Essentials Secure Containers Creating a Docker Image Scanning with Trivy Trivy Snyk Security Manually Installing Kubernetes Kubernetes the Alta3 Way Deploy Kubernetes the Alta3 Way Validate your Kubernetes Installation Sonobuoy K8s Validation Test Kubectl (Optional) Kubectl get and sorting kubectl get kubectl describe Labels (Optional) Labels Labels and Selectors Annotations Insert an Annotation Securing your Application Scan a Running Container Tracee Security Contexts for Pods Understanding Security Contexts AppArmor Profiles AppArmor Isolate Container Kernels gVisor Pod Security Pod Security Policies Deploy a PSP Pod Security Standards Enable PSS Open Policy Agent (OPA) Admission Controller Create a LimitRange Open Policy Agent Policy as Code Deploy Gatekeeper User Administration Contexts Contexts Authentication and Authorization Role Based Access Control Role Based Access Control RBAC Distributing Access Service Accounts Limit Pod Service Accounts Securing Secrets Secrets Create and Consume Secrets Hashicorp Vault Deploy Vault Securing the Network Networking Plugins NetworkPolicy Deploy a NetworkPolicy mTLS Linkerd mTLS with istio istio Threat Detection Active Threat Analysis Host Intrusion Detection Deploy OSSEC Network Intrusion Detection Deploy Suricata Physical Intrusion Detection Disaster Recovery Harsh Reality of Security Deploy a Response Plan Kasten K10 Backups Deploy K10

Certified Kubernetes Security Specialist (CKS)
Delivered OnlineFlexible Dates
Price on Enquiry