• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

609 Linux courses delivered Online

Symantec Endpoint Protection 14.X - Configure And Protect

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions

Symantec Endpoint Protection 14.X - Configure And Protect
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Tutorial: AWS Solutions Architect and SysOps Administrator

By Packt

This course covers the best practices required for AWS Solutions Architect and AWS SysOps Administrator. Explore real-time 3-tier architecture addressing security, high availability, scalability, and resource optimization. Basic knowledge of Linux and a desire to adopt cloud models are all you need to get started.

AWS Tutorial: AWS Solutions Architect and SysOps Administrator
Delivered Online On Demand12 hours 46 minutes
£33.99

Kubernetes Certification Training for Absolute Beginners

By Packt

Designed for beginners, this hands-on course covers the fundamentals of Kubernetes, Docker, and containers. You'll get an insight into installing and running Docker on different platforms and Kubernetes architecture, along with an overview of Google Kubernetes Engine (GKE).

Kubernetes Certification Training for Absolute Beginners
Delivered Online On Demand4 hours 6 minutes
£29.99

Digital Forensics for Cyber Professionals

4.9(27)

By Apex Learning

Overview This comprehensive course on Digital Forensics for Cyber Professionals will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Digital Forensics for Cyber Professionals comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Digital Forensics for Cyber Professionals. It is available to all students, of all academic backgrounds. Requirements Our Digital Forensics for Cyber Professionals is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 11 sections • 35 lectures • 05:37:00 total length •Course Overview: 00:06:00 •Lab - Installing CSI Linux: 00:13:00 •Lab - Creating a Kali Live (Forensic Mode) VM Using VirtualBox: 00:06:00 •Lab - Create a Virtual Install Kali Image Using VirtualBox: 00:07:00 •Lab - Create Virtual Install of Windows 10 Using VirtualBox: 00:08:00 •Install Additional Tool Using Katoolin3: 00:10:00 •Lab - Simulate Creating a Disk Image for a Forensic Analysis: 00:11:00 •Lab - Examining a forensic Disk Image Using Autopsy: 00:12:00 •Lab -Digital Forensics Using Autopsy Part I: 00:11:00 •Lab - Digital Forensics Using Autopsy Part II: 00:07:00 •Lab - Installing the WebMap-Nmap Dashboard: 00:12:00 •Lab - Conducting OSINT Using CSI Linux Investigator: 00:08:00 •Lab - Find Social Media Accounts Using Sherlock: 00:07:00 •Attaching an External USB Device in Kali: 00:07:00 •Lab - Memory Forensics Using the Volatility Framework: 00:18:00 •Lab - Acquiring a Forensic Copy of the Windows Registry: 00:15:00 •Lab - Analyzing the Windows Registry for Evidence: 00:14:00 •Lab - Preparing CSI Investigator to Use Shodan: 00:05:00 •Lab - Using Shodan to Find Vulnerable Devices: 00:14:00 •Lab - Using Shodan to Search for Vulnerable Databases: 00:08:00 •Lab - Using the EXIFtool to Read and Write EXIF Tags: 00:11:00 •Using the EXIFtool to Read and Write EXIF Tags: 00:10:00 •Overview of Wireshark 3.2: 00:11:00 •Wireshark Capture Options: 00:07:00 •Wireshark Toolbar Icons: 00:04:00 •Lab - Capturing a 3-way TCP Handshake Using Wireshark: 00:05:00 •Lab - Installing a Wireless Adapter in Kali: 00:09:00 •Lab - Hacking a Wireless Network Using Kali Linux: 00:14:00 •Capturing Wireless Traffic Using Wireshark: 00:05:00 •Lab - CTF Lab Build for HA: Forensics: 00:11:00 •Lab - Capture flag #1: 00:12:00 •Lab - Capture flag #2: 00:10:00 •Lab - Capture flag #3: 00:20:00 •Lab - Capture flag #4: 00:09:00 •Assignment - Digital Forensics for Cyber Professionals: 00:00:00

Digital Forensics for Cyber Professionals
Delivered Online On Demand5 hours 37 minutes
£12

Cisco ASR9000 Series 64-bit Software Migration v1.0 (IOSXR211)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for System installersSystem integratorsSystem administratorsNetwork administratorsSolutions designers Overview After completing this course, you should be able to:Describe the Cisco IOS XR 64-Bit software architecture and Linux system fundamentalsDescribe the major differences between classic Cisco IOS XR software and Cisco IOS XR 64-Bit software on the ASR 9000 Series routersMigrate an ASR 9000 Series router from classic IOS XR software to Cisco IOS XR 64-Bit softwarePerform and explain Cisco IOS XR 64-Bit software installationsConfigure and describe Cisco IOS XR 64-Bit software features The Cisco ASR 9000 Series IOS XR 64-Bit Software Migration and Operational Enhancements (IOSXR211) v1.0 course covers the migration from classic 32-bit Cisco IOS© XR software to Cisco IOS XR 64-Bit software on the Cisco© ASR 9000 Series Aggregation Services Routers. This course will also examine the software architecture, boot process, and auto-provisioning of the Cisco IOS XR 64-bit software, as well as showing you how to install Cisco IOS XR and third-party software packages. In addition, it will investigate data models and show you how to implement telemetry, model-driven programmability, and application hosting services. Software Architecture and Linux Fundamentals Cisco IOS XR 64-Bit Software Fundamentals Cisco ASR 9000 Series IOS XR 64-Bit Software vs. Classic 32-Bit Software Exploring Linux Fundamentals Creating User Profiles Cisco IOS XR 64-Bit Software Installation Examining Resource Allocations and Media Mappings Migrating to Cisco IOS XR 64-Bit Software Examining the Boot Process Performing Disaster Recovery Installing Software Packages Cisco IOS XR 64-Bit Software Features Investigating Data Models Implementing Telemetry Exploring Model-Driven Programmability Employing Application Hosting

Cisco ASR9000 Series 64-bit Software Migration v1.0 (IOSXR211)
Delivered OnlineFlexible Dates
Price on Enquiry

Apache Kafka Series - Learn Apache Kafka for Beginners v3

By Packt

A beginner-level course that follows a step-by-step approach to learning the fundamentals and core concepts of Apache Kafka 3.0. You will work through interesting activities such as programming a Twitter producer and Elasticsearch consumer to understand the various concepts.

Apache Kafka Series - Learn Apache Kafka for Beginners v3
Delivered Online On Demand8 hours 14 minutes
£35.99

IT: Programming, Web Development, Networking & Security Complete Training

4.9(27)

By Apex Learning

Are you interested in becoming a well-rounded IT professional? Our "IT: Programming, Web Development, Networking & Security Complete Training" bundle is the perfect choice for you! This bundle package consists of 30 premium courses, carefully curated to provide you with a comprehensive understanding of various IT domains. From web development to networking and security, this bundle has got you covered. Get experience with essential IT skills, including Python, SQL, JavaScript, C#, and more. Our courses are designed to equip you with the knowledge and skills required to succeed in your IT career. You will also learn about data protection, ethical hacking, and cybersecurity through our specialized courses. Our bundle includes a course on GDPR, a crucial compliance regulation, and ethical hacking with Kali Linux. In addition to technical skills, we also offer career-focused courses, including career development plan fundamentals, CV writing, job searching, and interview skills. You will also learn how to create a professional LinkedIn profile to boost your job search. Invest in your career and enroll in our "IT: Programming, Web Development, Networking & Security Complete Training" bundle. With our expert-led courses and career-focused modules, you will gain a competitive edge in the IT industry. Start your journey today! This All About IT Bundle consists of the following premium courses: Course 01: IT Support Technician Course 02: Network Security and Risk Management Course 03: CompTIA Network Course 04: Information Management Course 05: Web Application Penetration Testing Course Course 06: CompTIA Cloud+ (CV0-002) Course 07: PLC Programming Diploma Course 08: Coding with Scratch Course 09: Create Your First Responsive Website Course 10: Python Course Course 11: Diploma in Front-End Web Development (HTML, CSS, & Bootstrap) Course 12: SQL For Data Analytics & Database Development Course 13: C# (C-Sharp) Course 14: Computer Operating System and Troubleshooting Course 15: MS Word Essentials - The Complete Word Course - Level 3 Course 16: Building Your Own Computer Course Course 17: ASP.Net MVC and Entity Framework Course Course 18: It: Ethical Hacking, IT Security and IT Cyber Attacking Course 19: Learn Ethical Hacking with Kali Linux Course 20: SQL Database Administrator Course 21: JavaScript Course 22: Web Design (HTML, CSS, Bootstrap) Complete Course Course 23: Data Science and Visualisation with Machine Learning Course 24: Cisco ASA Firewall Training Course Course 25: Data Protection (GDPR) Practitioner Moreover, this bundles include 5 career-focused courses: Course 01: Career Development Plan Fundamentals Course 02: CV Writing and Job Searching Course 03: Interview Skills: Ace the Interview Course 04: Video Job Interview for Job Seekers Course 05: Create a Professional LinkedIn Profile Our cutting-edge learning package offers top-notch digital aid and first-rate tutor support. You will acquire the crucial hard and soft skills needed for career advancement because this bundle has been thoroughly examined and is career-friendly. So don't overthink! Enrol today. Learning Outcomes This unique All About IT mega bundle will help you to- Quench your thirst for knowledge Be up-to-date about the latest advancements Achieve your dream career goal in this sector Know the applicable rules and regulations needed for a professional in this area Acquire some valuable knowledge related to All About IT to uplift your morale The bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your expertise and essential knowledge, which will assist you in reaching your goal. Moreover, you can learn from any place in your own time without travelling for classes. Certificate: PDF Certificate: Free for all 30 courses Hard Copy Certificate: Free (For The Title Course: Previously it was £10) CPD 300 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The All About IT bundle is designed to assist anyone with a curious mind, anyone looking to boost their CVs or individuals looking to upgrade their career to the next level can also benefit from the learning materials. Requirements The courses in this bundle has been designed to be fully compatible with tablets and smartphones. Career path This All About IT bundle will give you an edge over other competitors and will open the doors for you to a plethora of career opportunities. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (IT Support Technician) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

IT: Programming, Web Development, Networking & Security Complete Training
Delivered Online On Demand
£150

Nmap for Penetration Testing: From Beginner to Advanced [Updated for 2021]

By Packt

This course will get you started with Nmap and teach you all the techniques and tricks needed for scanning and probing computer networks, including host discovery and operating system detection by sending packets and analyzing the responses.

Nmap for Penetration Testing: From Beginner to Advanced [Updated for 2021]
Delivered Online On Demand6 hours 31 minutes
£37.99

Git and GitHub for DevOps Engineers

By Packt

Not sure where to start your DevOps journey? Or want to know what kind of activities a DevOps engineer would do on Git and GitHub in the real world? Or would you like to set up a production-ready Git environment for your developers? Then this course is for you.

Git and GitHub for DevOps Engineers
Delivered Online On Demand6 hours 16 minutes
£29.99

Oracle Database Administration from Zero to Hero

By Packt

In this comprehensive course, we will guide you through the world of Oracle Database Administration, starting from the basics and equipping you with the skills to create databases, manage storage, implement backup plans, apply patches, troubleshoot issues, and excel in the role of a professional DBA.

Oracle Database Administration from Zero to Hero
Delivered Online On Demand36 hours 1 minutes
£82.99