• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

610 Linux courses in Bristol delivered Online

Docker Fundamentals Plus Enterprise Operations Bundle

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Software Engineers and DevOps professionals working in an Enterprise developing mission critical line of business applications. Overview By the end of this course, students will be able to: Assess the advantages of a containerized software development & deployment Use Docker engine features necessary for running containerized applications Utilize Swarm and Kubernetes orchestrators to deploy, maintain, and scale a distributed application Describe the essential patterns used in a highly distributed EE application Understand how to configure EE applications for different environments without code changes Produce and containerize scalable, accessible, and fault-tolerant EE applications Apply different debugging and testing techniques to containerized EE applications The Docker Fundamentals + Enterprise Operations Bundle includes the full Docker for Enterprise Operations course as well as the prerequisite Docker Fundamentals course run back to back in a single intensive training experience. The Docker Fundamentals training course features the foundational concepts and practices of containerization on a single Docker node. The course offers learners the opportunity to assimilate basic container orchestration and how to scale Docker across multiple nodes in a simple swarm cluster. This course provides essential foundational knowledge for subsequent Docker courses. As the follow-on to the Docker Fundamentals course, Docker for Enterprise Operations is a role-based course is designed for Docker Operations teams to accelerate their Docker journey in the enterprise. The course covers in-depth core advanced features of Docker EE and best practices to apply these features at scale with enterprise workloads. Platform Availability: Linux, Windows (Fundamentals Only). Introducing Docker Containerization Fundamentals Creating Images Docker Volumes Docker Networking Basics Introduction to Docker Compose Introduction to Swarm Mode Introduction to Kubernetes Secrets Fundamentals Signature Assignment Distributed Application Architecture Sample Application Edit and Continue Debugging Docker Compose Testing Service Discovery Defensive Programming Logging and Error Handling Health Checks Secrets Configuration Management Development Pipeline Overview Universal Control Plane Docker Trusted Registry Repository Automation Build Server

Docker Fundamentals  Plus Enterprise Operations Bundle
Delivered OnlineFlexible Dates
Price on Enquiry

AZ-104: Microsoft Azure Administrator Full Course

By Packt

This course teaches you to prepare for AZ-104 Certification. The course gives you the knowledge to make you Azure ready and become a better Azure administrator. All the changes that were made to AZ-103 by Microsoft to make it AZ-104 are incorporated in this course.

AZ-104: Microsoft Azure Administrator Full Course
Delivered Online On Demand17 hours 48 minutes
£81.99

Microsoft Azure Cloud Concepts

4.9(27)

By Apex Learning

Overview This comprehensive course on Microsoft Azure Cloud Concepts will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Microsoft Azure Cloud Concepts comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast-track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Microsoft Azure Cloud Concepts. It is available to all students, of all academic backgrounds. Requirements Our Microsoft Azure Cloud Concepts is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 1 sections • 29 lectures • 03:33:00 total length •Unit 01: What will you learn and Cloud Concepts: 00:18:00 •Unit 02: Core Azure architectural components: 00:18:00 •Unit 03: LAB Create a Windows and Linux VM Computer: 00:10:00 •Unit 04: LAB Container creation: 00:04:00 •Unit 05: Storage with Azure: 00:04:00 •Unit 06: LAB Create a storage account: 00:07:00 •Unit 07: Network concepts: 00:03:00 •Unit 08: Lab Network Peering: 00:16:00 •Unit 09: Lab scale set: 00:11:00 •Unit 10: Marketspace and Serverless: 00:07:00 •Unit 11: Event HUB and Logic APPS: 00:07:00 •Unit 12: DevOps Overview: 00:04:00 •Unit 13: Azure Databases Overview: 00:04:00 •Unit 14: Lab SQL: 00:08:00 •Unit 15: What are AI and machine learning: 00:10:00 •Unit 16: Powershell and CLI: 00:09:00 •Unit 17: Azure Advisor: 00:05:00 •Unit 18: Review Core Azure: 00:04:00 •Unit 19: Azure security compliance and trust: 00:03:00 •Unit 20: Lab DDOS and NSGs: 00:07:00 •Unit 21: Authentication and Authorisation: 00:07:00 •Unit 22: Azure security centre: 00:06:00 •Unit 23: LAB Azure key vault and AIP overview: 00:06:00 •Unit 24: Azure Advanced Threat Protection (Azure ATP): 00:06:00 •Unit 25: Azure monitoring: 00:05:00 •Unit 26: Manage Azure Governance: 00:07:00 •Unit 27: Azure privacy and compliance: 00:04:00 •Unit 28: Summary: 00:03:00 •Unit 29: Azure Pricing and support: 00:10:00

Microsoft Azure Cloud Concepts
Delivered Online On Demand3 hours 33 minutes
£12

Angular 8 Project

By Eduolc

This interactive Angular Project course will enable you to build dynamic, responsive,& interactive web applications.

Angular 8 Project
Delivered Online On Demand
£19

CompTIA Training - CPD Accredited

4.9(27)

By Apex Learning

Boost Your Career with Apex Learning and Get Noticed By Recruiters in this Hiring Season! Save Up To £4,169 and get Hard Copy + PDF Certificates + Transcript + Student ID Card worth £160 as a Gift - Enrol Now Give a compliment to your career and take it to the next level. This bundlewill provide you with the essential knowledge and skills required to shine in your professional career. Whether you want to develop skills for your next job or want to elevate skills for your next promotion, this CompTIA & Network Security will help you keep ahead of the pack. This bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can reinforce your professional skills and essential knowledge, reaching out to the level of expertise required for your position. Further, this bundle will add extra value to your resume to stand out to potential employers. Along with this course, you will get 10 other premium courses. Also, you will get an original Hardcopy and PDF certificate for the title course and a student ID card absolutely free. What other courses are included in this CompTIA & Network Security Bundle? Course 01: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 02: CompTIA A+ (220-1001) Course 03: CompTIA A+ (220-1002) Course 04: CompTIA Network (N10-007) Course 05: CompTIA Security+ (SY0-401) New 2020 Course 06: CompTIA Security+ (SY0-601) Course 07: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 08: CompTIA PenTest+ (Ethical Hacking) Course 09: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 11: Linux for Absolute Beginners! So, enrol now to advance your career in Network Security! How will I get my Certificate? After successfully completing the course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) Course Curriculum Course 01: CompTIA IT Fundamentals ITF+ (FCO-U61) How People Use Computers Introduction to IT Fundamentals The Case for Computer Literacy Features Common to Every Computing Device Common General-Purpose Computing Devices Networks of Computing Devices Remotely-Accessed Computer Systems Specialized Computer Systems Specialty I/O Devices System Hardware CPUs Passive and Active Cooling RAM and Active Memory Motherboards Power Supplies AMA - Ask Me Anything about System Hardware Device Ports and Peripherals Ports and Connectors General Use I/O Devices AMA - Ask Me Anything about I/O, Ports and Peripherals Data Storage and Sharing Basics of Binary Storage Technologies Mass Storage Variation AMA - Ask Me Anything about Data Storage and Sharing Understanding Operating Systems Operating System Functions Operating System Interfaces AMA - Ask Me Anything about Understanding OS's Setting Up and Configuring a PC Preparing the Work Area Setting up a Desktop PC Completing PC Setup AMA - Ask Me Anything about Setting up and Configuring a PC Setting Up and Configuring a Mobile Device Personalizing a Tablet AMA - Ask Me Anything about Mobile Devices Part 1 AMA - Ask Me Anything about Mobile Devices Part 2 Managing Files File Management Tools File Manipulation Backups AMA - Ask Me Anything about Managing Files Using and Managing Application Software Walking Survey of Applications Managing Applications Applications and Extensions AMA - Ask Me Anything about Working with Applications Configuring Network and Internet Connectivity Wi-Fi Setup Going High Speed Setting Up and Sharing Printers AMA - Ask Me Anything about Networks and Internet Connectivity Part 1 AMA - Ask Me Anything about Networks and Internet Connectivity Part 2 IT Security Threat Mitigation Physical Security Dealing with Malware Password Management Clickworthy Perils of Public Internet AMA - Ask Me Anything about IT Threat Mitigation Part 1 AMA - Ask Me Anything about IT Threat Mitigation Part 2 Computer Maintenance and Management Power Management Cleaning and Maintaining Computers Trash it or Stash it? AMA - Ask Me Anything about Computer Maintenance and Management IT Troubleshooting Troubleshooting 101 AMA - Ask Me Anything about Troubleshooting Computers Part 1 AMA - Ask Me Anything about Troubleshooting Computers Part 2 Understanding Databases Introduction to Databases Database Details AMA - Ask Me Anything about Databases Developing and Implementing Software Introduction to Programming Programming with a PBJ Sandwich AMA - Ask Me Anything about Programming CPD 170 CPD hours / points Accredited by CPD Quality Standards Requirements There is no time limit for completing this course, it can be studied in your own time at your own pace. Career path Having these various CPD certificate will increase the value in your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (CompTIA IT Fundamentals ITF+ (FCO-U61)) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

CompTIA Training - CPD Accredited
Delivered Online On Demand
£53

UX Design Course Online Level 2 Certificate

4.8(9)

By Skill Up

Discover the fundamentals of user experience (UX) design in this comprehensive course. Delve into the principles and methodologies that drive effective UX design, including usability, interaction design, and user research.

UX Design Course Online Level 2 Certificate
Delivered Online On Demand5 hours 2 minutes
£13.99

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

Nessus Scanner - Network Scanning from Beginner to Advanced

By Packt

Become a vulnerability assessment professional with the Nessus scanner for networks and learn to analyze and rank vulnerabilities, both manually and through automation. Explore vulnerability scanning with Metasploit and write custom professional reports. Learn to import results of Nmap in Nessus and create VA Project Worksheets to analyze vulnerability assessments.

Nessus Scanner - Network Scanning from Beginner to Advanced
Delivered Online On Demand5 hours 54 minutes
£82.99

IT Network Cyber Security Job Ready Program with Career Support & Money Back Guarantee

4.7(47)

By Academy for Health and Fitness

Flash Sale(was 2499) Job Ready Program, Personalised Job Searching Support, CV & Portfolio Building, Expert Consultation

IT Network Cyber Security Job Ready Program with Career Support & Money Back Guarantee
Delivered Online On Demand3 hours
£699

Data Engineering: Big Data & Google Cloud Architect Diploma - CPD Certified

4.8(9)

By Skill Up

CPD Certified | 17-in-1 Diploma Bundle | 170 CPD Points | Free PDF & Transcript Certificate | Lifetime Access

Data Engineering: Big Data & Google Cloud Architect Diploma - CPD Certified
Delivered Online On Demand4 days
£100