Course Overview Grasp the opportunity to learn Microsoft Excel from the ABCs to an advanced level within one course. The Microsoft Excel Masterclass in 2021 course will start with the basics with MS excel and gradually turn you into an expert user. The Microsoft Excel Masterclass in 2021 course will first focus on the tools and functions of excel. You will comprehend the skills to create basic formulas in excel. In this step by the step learning process, you will have the adequate knowledge and ability to make all sorts of adjustments to your worksheets. The course will teach you many strategies for cell formatting. From the easy to follow modules, you will grasp the techniques to insert shapes and images into your sheets. You will also understand how to visualize your data in charts. In the end, you will study the benefits of using excel templates. The Microsoft Excel Masterclass in 2021 course will provide you with first-hand training on excel. Enroll in the course and take your excel skills to the next level. Learning Outcomes Get an introduction to Microsoft Excel and its functions Understand the process of data validation and data visualization Learn how to adjust excel worksheets Know about the conditional functions Familiarize yourself with the process of inserting images and shapes Who is this course for? Those who want to learn Microsoft Excel. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path The Microsoft Excel Masterclass in 2021 course is a useful qualification to possess and would be beneficial for any related profession or industry such as: Business Professional Data Operator Administrative Officer Data Analyst Unit 01: Excel from A-Z Course Introduction Excel from A-Z Course Intro 00:03:00 Excel Job Opportunities 00:03:00 Excel Job Types 00:04:00 Microsoft Excel Marketplace 00:04:00 What is Microsoft Excel? 00:04:00 Who is This Course For? 00:04:00 Unit 02: Getting Started With Excel Finding & Opening Excel 00:01:00 Excel's Start Screen 00:03:00 Explaining the Excel Interface 00:03:00 Excel Interface Continued 00:01:00 Excel Workbook vs. Excel Worksheet 00:02:00 Saving an Excel Document 00:04:00 Customizing the Quick Access Toolbar 00:02:00 Customizing the Excel Ribbon 00:03:00 Excel Shortcut Keys 00:02:00 Unit 03: Values, Referencing and Formulas Creating Excel Labels 00:03:00 Entering Numeric Values in Excel 00:03:00 Formatting Date Values in Excel 00:05:00 Building Basic Formulas in Excel 00:05:00 Order of Operations 00:06:00 Relative vs. Absolute Cell References 00:07:00 Unit 04: Intro to Excel Functions Excel Functions Explained 00:03:00 The SUM() Function 00:08:00 The MIN() & MAX() Function 00:04:00 The AVERAGE() Function 00:02:00 COUNT() Functions 00:05:00 Unit 05: Adjusting Excel Worksheets Moving & Copying Data 00:07:00 Insert & Delete Rows and Columns 00:05:00 Adjusting the Width and Height of Cells 00:05:00 Hiding and Unhiding Excel Rows and Columns 00:04:00 Renaming, Moving & Deleting Excel Worksheets 00:05:00 Adding Protection to Specific Cells 00:04:00 Protecting the Structure of a Workbook 00:02:00 Adding a Workbook Password to Open File 00:02:00 Unit 06: Visually Pleasing Cell Formatting Formatting Fonts and Cell Background Color 00:05:00 Adding Cell Borders 00:05:00 Formatting Data Appropriately 00:05:00 The Magic behind Excel's Format Painter 00:04:00 Creating Styles for Formatting Efficiency 00:06:00 Merging Cells for a Cleaner Look 00:03:00 The Power of Conditional Formatting 00:06:00 Unit 07: How to Insert Images and Shapes! Grab User's Attention using Illustrations 00:09:00 Customizing Icons 00:05:00 Create Compelling Graphics with SmartArt 00:06:00 Unit 08: Visualize Data with Charts The Commonly Used Column Chart 00:03:00 Changing the Chart Design 00:02:00 Formatting Elements of a Chart 00:06:00 Modifying the Data, Type & Location of a Chart 00:06:00 Unit 09: Excel's Printing Options Print Preview Options 00:04:00 Excel's Page Layout View 00:07:00 Printing a Specific Range of Cells 00:03:00 Converting Spreadsheets to PDF Files 00:02:00 Unit 10: Benefits of Using Excel Templates Why Create an Excel Template 00:01:00 How to Create an Excel Template 00:05:00 Unit 11: Working with Excel Datasets How to Prepare Data for Analysis 00:04:00 How to Sort Data in Excel 00:03:00 Multi-Level Sorting 00:03:00 Custom Sorting Datasets in Excel 00:02:00 Applying Filters to Datasets 00:05:00 Creating Subtotals within a Dataset 00:06:00 Converting Datasets into Tables 00:06:00 Finding & Removing Duplicate Values 00:07:00 Unit 12: Excel Database Functions The SUMIF() Function 00:09:00 The DSUM() Function 00:08:00 The DSUM() Function Cont. 00:07:00 The SUBTOTAL() Function 00:06:00 Unit 13: Excel Data Validation What is Excel Data Validation? 00:02:00 Creating a Drop Down List with Data Validation 00:07:00 Different Types of Excel Data Validation 00:06:00 Adding Custom Alerts to Data Validation 00:07:00 Creating a Dynamic Drop Down List 00:03:00 Complex Validation: Dependent Drop Down List! 00:09:00 Unit 14: Excel PivotTables Creating an Excel Pivot Table 00:06:00 Modifying Excel PivotTables 00:06:00 Grouping & Filtering PivotTable Data 00:07:00 Drilling Down into PivotTable Data 00:02:00 Creating Pivot Charts & Utilizing Slicers 00:08:00 Unit 15: Excel's PowerPivot Add-In What is PowerPivot? 00:04:00 Activating the Excel PowerPivot Add-In 00:02:00 Creating Relationships between Data Tables 00:06:00 Using Data Models to Create PivotTables 00:05:00 How to Create PowerPivot KPI's 00:08:00 Unit 16: Excel's Conditional Functions Excel's IF() Function 00:05:00 IF() Function with AND() Criteria 00:05:00 IF() Function with OR() Criteria 00:05:00 Nesting Multiple IF() Functions 00:07:00 The COUNTIF() Function 00:04:00 Key Benefits of Named Ranges 00:04:00 Unit 17: Excel's Lookup Function VLOOKUP() Function 00:09:00 The Beauty of Excel's IFERROR() Function 00:04:00 HLOOKUP() Function 00:06:00 INDEX() Function 00:05:00 MATCH() Function 00:05:00 INDEX() and MATCH() Combined 00:05:00 Two-Way Lookup with INDEX() and MATCH() 00:04:00 Unit 18: Text Based Functions in Excel LEFT(), RIGHT() and MID() Function 00:07:00 Extracting Specific Text using LEN() & SEARCH() 00:13:00 Combining Text with CONCATENATE() 00:06:00 Quick Tips & Other Text Based Functions 00:06:00 Unit 19: Auditing Formulas and Views in Excel Tracing Precedents & Dependents in Formulas 00:04:00 Showing Formulas 00:02:00 Grouping Data 00:03:00 3D Referencing in Formulas 00:05:00 Utilizing the Watch Window in Excel 00:03:00 How to Freeze Panes in Excel 00:03:00 Unit 20: Excel's 'what If?' Tools Excel's Scenario Manager Tool 00:06:00 Goal Seek in Excel 00:06:00 Compare Results with Excel Data Tables 00:04:00 Solver Tool 00:11:00 Unit 21: Welcome to Excel VBA The Power Behind Excel VBA 00:03:00 A Look Inside the Visual Basic Editor (VBE) 00:04:00 Recording a Macro 00:09:00 Saving & Opening a Macro-Enabled Workbook 00:02:00 Unit 22: The VBA Language Modules and Procedures 00:07:00 Objects, Methods and Properties 00:06:00 Excel VBA Variables 00:05:00 Unit 23: Writing VBA Code Referencing a Range 00:14:00 InputBox & MsgBox 00:06:00 Using Variables in VBA Code 00:05:00 If Then Else Statement 00:10:00 Worksheet Functions inside VBA 00:08:00 Creating User Defined Functions 00:09:00 User Defined Functions within VBA Scripts 00:06:00 Unit 24: Important VBA Tools and Logic Find Last Row of Data 00:06:00 Find Last Column of Data 00:03:00 With Statement 00:05:00 Debugging & Error Handling 00:07:00 Debugging & Error Handling Cont. 00:07:00 Unit 25: Excel VBA Lopps For Next Loop 00:09:00 Do Until Loop 00:06:00 For Each Loop 00:04:00 Unit 26: Triggering Macros Assigning Macros to Shapes 00:04:00 Form Controls vs ActiveX Controls 00:08:00 Worksheet Events 00:04:00 Workbook Events 00:03:00 Fun with VBA Events! 00:07:00 Unit 27: Excel User Forms Creating an Excel UserForm 00:03:00 Adding Controls to UserForms 00:10:00 How to Show an UserForm 00:03:00 Passing TextBox Values to Desired Cells 00:07:00 Passing Option Buttons to Desired Cells 00:07:00 UserForm ComboBoxes 00:08:00 Clearing Values from UserForm Controls 00:03:00 How to Close an UserForm 00:02:00 UserForms and Protected Sheets 00:05:00 Unit 28: Starting a Career in Excel Creating an Excel Resume 00:05:00 Getting Started with Freelancing 00:06:00 How to Become an Excel Freelancer 00:05:00 Top Freelance Websites 00:05:00 How to Get Your First Client 00:08:00 Personal Branding 00:07:00 Networking Do's and Don'ts 00:04:00 Importance of Having a Website 00:04:00 Resources Resources - Microsoft Excel Masterclass in 2021 00:00:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
UMTS training course description An in-depth study of the UMTS technologies and network structure. What will you learn Explain what 3G and UMTS are. Describe the migration path to UMTS. Describe the UMTS architecture. UMTS training course details Who will benefit: Anyone who needs to know more about UMTS. Prerequisites: Total GSM Duration 3 days UMTS training course contents Introduction 3G WCDMA 2G WCDMA comparison. European and international spectrum allocations. UMTS Services UMTS QoS classes, Conversational, Streaming, Interactive and Background. UMTS bearer services. Radio Access Network (RAN) Architecture System architecture. The Radio Network Controller (RNC) and Node B functionality. Protocol model. The Iu interface for Circuit and Packet switching. The Iur interface and RNSAP. RNC node B interface and NBAP. The Physical layer Spread spectrum coding and modulation. Logical and physical channels. User data rates and transmission. Power control. Signalling, synchronisation, common control, access and indicator channels. Procedures for transmit diversity, measurement, power control and handover. Radio Resource Management Fast and outer loop power control. Transmit power and power rise. Handover algorithms. Intra frequency and inter system handovers. Load, measurement on the air interface. Admission and load control. Packet Access Packet data traffic. Packet data transport channels. Packet scheduling algorithms. Handover, load and administration control. Packet data performance. UTRA TDD Mode Time Division Duplex (TDD). UTRA TDD modulation and spreading, transport channels, physical channels and their structure. Noise and interference limited network. Interference, FDD and TDD co-existence.
REXX training course description A hands on training course covering the Restructured EXtended eXecutor (REXX) language. A large number of exercises are used to reinforce and emphasise lecture sessions. What will you learn Write REXX programs. Debug REXX programs. Examine existing code and determine its function. REXX training course details Who will benefit: Anyone wishing to learn REXX. Prerequisites: None although experience in another high level language would be useful. Duration 3 days REXX training course contents Introduction to REXX What is REXX? REXX environments, invoking a REXX exec, a sample REXX exec, REXX clause types. REXX variables and data Literal data, variable data, assignment, simple variables, compound variables, stem variables, constant data, numeric data, arithmetic operations, character manipulation, hexadecimal data. The parse instruction Parse format, Parse examples, Parse arg, Parse pull, Parse value, special templates, place holders, literal templates, numeric templates, variable templates. Control structures Relational conditions, logical operators, simple selection, looping: uncontrolled and controlled loops, infinite loops, conditional loops, controlling loops, leave, iterate, multiple selection, instructions for subroutines, exit. Sub routines and functions Internal and external subroutines, call, ARG(), ARG(n)return, exit, scope of variables, procedure, functions, built in functions, overriding built in functions. Performing I/O Command conventions, preparing to read a file, execio, limitations, execio for reading, DISKR, DISKRU, DISKW, return codes. External functions listdsi, msg, outtrap, prompt, sysdsn, sysvar, storage Tracing Immediate commands, the trace facility, signal and call statements. Built in functions Text handling functions, string handling, word handling, arithmetic, data conversion, bit manipulation, environment. The data stack Data stack structure, REXX instructions for the data stack, REXX functions for the data stack, TSO/E commands for the data stack. REXX in batch TSO/E foreground. TSO/E background.
CPRI training course description This course is designed to give the delegate a technical overview of the CPRI protocols and link setup. We will explain the industry cooperation to define the key internal interface between the radio equipment control (REC) and the radio equipment (RE). Also explained will be the SAP that the CPRI link supports for IQ Interface, frame synchronisation, link control and management and the master and slave ports. We will investigate the CPRI block diagram and together with the data formats and sample mapping solutions. The CPRI frame hierarchy and hyperframe construction will be detailed during this three day overview course. What will you learn Explain the CPRI Block diagram. Understand hyperframing capabilities. Explain the CPRI frame format. Understand how the synchronisation is compliant with 3GPP & WiMAX requirements. Understand the two electrical characteristics of CPRI standard. Understand the CPRI standards structure. Understand the CPRI system & Interface definitions. List the four standard bit rates of the CPRI specification. Understand the CPRI Protocol stacks. CPRI training course details Who will benefit: Anyone looking for a technical overview of the CPRI protocols and link set up. Prerequisites: None. Duration 3 days CPRI training course contents System Description Subsystems. Nodes. Protocol layers. Protocol data planes. User data planes. Antenna carriers. Service Access Points (SAP). Link. Passive Link. Hop. Multi-hop Connection. Logical Connection. Master Port & Slave Port. System Architecture Basic System Architecture & Common Public Radio Interface Definition. System Architecture with a link between Res. Reference configurations: Chain topology, Tree topology, Ring topology. RECs & REs in both chain & tree topology Functional description Radio Functionality. Functional Decomposition between REC and RE: For UTRA FDD, For WiMAX & E-UTRA, For GSM. CPRI Control Functionality. Interface Baseline Interface Specification. Protocol Overview. IQ Data. Synchronisation. L1 Inband Protocol. C & M Data. Protocol Extensions. Vendor Specific Information. Physical Layer Specifications Line Bit Rate. Physical Layer Modes. Electrical Interface. Optical Interface. Line Coding. Bit Error Correction/Detection. Frame Structure. Mapping Methods. Container Blocks. Hyperframes. GSM, UMTS & WiMAX Timing. Link Delay Accuracy & Cable Delay Calibration. Link Maintenance Data Link Layer (Layer 2) Specification Layer 2 Framing for Fast & Slow C & M Channels. Medium Access Control/Data Mapping. Flow Control. Start-up Sequence General. Layer 1 Start-up Timer. State Description. Transition Description. Interoperability Reserved Bandwidth. Version Numbers. Supplementary Specification Details Delay Calibration Example. Reference Test Points. List of Abbreviations & Gloss
The Master of Business Administration (MBA) is a prestigious postgraduate qualification that is highly valued by leading employers. It can boost your salary, increase your professional reputation and expand your networking opportunities. If you're a graduate with some business experience and ambitions for a high-flying career, studying for an MBA could be just what you need to make the next step. Our 24 months MBA programme equips you to think logically, laterally and independently through 2 stage intensive, immersive, and challenging programme. With the advantage of studying on the job, anytime and anywhere, you get Cost Advantage and same degree which is given to full time students at the University Campus. This 24 months MBA programme is not just an academic course. By exploring and examining real-life business problems to work on and solve, you enhance your own understanding of how a business works. We take a strategic perspective on business and management that helps you develop the skills to contribute to the major business decisions organisations have to make about their future. Program Overview: Master of Business Administration (MBA) - 24 Months Key Highlights of Master of Business Administration (MBA) - 24 Months qualification are: Fully Recognized and Globally Accepted Degree Program Duration: 24 Months (12 months / 18 months duration programme also available) Program Credits: 180 Designed for working Professionals Format: Online Student to faculty ratio of just 15:1 No Written Exam. The Assessment is done via Submission of Assignment and University Dissertation Project Same Degree which is given to Full Time students at the University Campus. Study material: Comprehensive study material and e-library support available at no additional cost. Tutor Assist available Dedicated Student Success Manager Timely Doubt Resolution Regular Networking Events with Industry Professionals Become eligible to gain direct entry into relevant Doctorate / PhD programme. LSBR Alumni Status No Cost EMI Option Top Skills You Will Learn MBA 24 months is widely seen as a passport to a successful career. It demonstrates the breadth and depth of your functional competence, strategic knowledge and problem-solving ability. Course Structure: MBA 24 MonthsThis 24 months MBA programme consists of 2 Stages.Stage 1: This stage is delivered by London School of Business and Research. The programme involves delivery through on-line Learning Management System (LMS). This stage leads to award of Level 7 Diploma in Strategic Management and Leadership. Credits earned at this stage - 120 credits (60 ECTS). Mandatory units Strategic Management (20 Credits)Strategic Leadership (20 Credits)Strategic Human Resource Management (20 Credits)Advanced Business Research Methods (20 Credits) Optional units(Choose any 2units to make 120 credits) Strategic Financial Management (20 Credits)Supply Chain and Operations Management (20 Credits)Entrepreneurship and Innovation (20 Credits)Globalisation and Corporate Governance (20 Credits)Strategic Change Management (20 Credits)Strategic Marketing (20 Credits) Successful completion of Stage 1 leads to Progression to Stage 2Stage 2: Delivered by the University / awarding body. On completion of the diploma programme you progress / Top up with Degree through a UK University for progression to the MBA degree. The stage 2 is delivered via distance learning by faculties from the University / awarding body. Credits earned at this stage - 60 credits (30 ECTS). Completion of Stage 2 leads to award of MBA Degree Dissertation Project Successful completion of Stage 2 leads to award of Degree by the university. Who is this course for? MBA in 24 Months programme is ideal for working professionals, successful managers, executives and professionals who want to take their career to a new level and Ambitious people who want to fast track their chosen career or start a new enterprise
Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices
Linux engineer certification training course description LPIC-2 is the second certification in LPI's multi level professional certification program. This course teaches the skills necessary to pass the LPI 201 exam; the first of two LPIC-2 exams. Specifically, the course covers the administration of Linux systems in small to medium sized mixed networks. What will you learn Perform advanced administration tasks. Perform advanced file system administration. Linux engineer certification training course details Who will benefit: Linux administrators. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Linux engineer certification fundamentals training course contents Part I The LPI 201 Exam Starting a System The Linux Boot Process, Firmware Startup, BIOS Startup, UEFI Startup, Linux Bootloaders, GRUB Legacy, GRUB 2, Alternative Bootloaders, Secure Bootloaders, Process Initialization, SysV Method, systemd Method, Upstart Method, System Recovery, Kernel Failures, Root Drive Failure. Maintaining the System Fluid Messaging, Static Messaging, System backups, Backup Strategies, Performing Backups, Installing Programs from Source, Obtaining and unpacking Installation Files, Compiling Programs, Resource Usage: Managing, measuring, predicting and troubleshooting. Mastering the Kernel What Is the Kernel? Kernel Features, Parts of the Kernel, Kernel Versions, Obtaining Source Code, Creating the Configuration File, Compiling and Installing the Kernel, Compiling and Installing Modules, Creating an Initial RAM Disk, Booting the New Kernel, Creating a Kernel Package, Maintaining the Kernel, Working with Module Files, Module Commands, Working with Hardware, Automatically Detecting Hardware, Troubleshooting the Kernel. Managing the Filesystem The Linux Filesystem, Filesystem Structures, Filesystem Types, Making Filesystems, Attaching Filesystems, Memory-Based Linux Filesystems, the Btrfs Filesystem, Btrfs Subvolumes, Btrfs Snapshots, Optical Filesystems, Swap Filesystems, Network-Based Filesystems, Auto-Mounting, Encrypted Filesystems, Maintaining Linux Filesystems, Adjusting a Filesystem, Checking and Repairing a Filesystem, SMART. Administering Advanced Storage Devices Configuring RAID, Implementing RAID on Linux, Managing a RAID Array, Adjusting Storage Devices, Looking at Drive Interface Concepts, Testing and Tuning Drives, Implementing iSCSI, Managing Logical Volumes, LVM, Creating Logical Volumes, Supporting Logical Volumes, Understanding the Device Mapper. Navigating Network Services Networking Basics, The Physical Layer, The Network Layer, The Transport Layer, The Application Layer, Configuring Network Features, Network Configuration Files, Graphical Tools, Command-Line Tools, Basic Network Troubleshooting, Checking the Log Files, the ARP Cache, Sending Test Packets, Testing Network Routes, Testing Client/Server Connectivity, Finding Host Information, Network Security, Advanced Network Troubleshooting, Viewing Open Network Connections, Viewing Network Statistics, Scanning the Network, Capturing Network Traffic.
This course explains how huge chunks of data can be analyzed and visualized using the power of the data analyst toolbox. You will learn Python programming, advanced pivot tables' concepts, the magic of Power BI, perform analysis with Alteryx, master Qlik Sense, R Programming using R and R Studio, and create stunning visualizations in Tableau Desktop.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities. Target students who also need to offer practical recommendations for action to properly protect information systems and their contents will derive those skills from this course. This course is also designed for individuals who are preparing to take the CompTIA PenTest+ certification exam PT0-002, or who plan to use PenTest+ as the foundation for more advanced security certifications or career roles. Individuals seeking this certification should have three to four years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management. Overview After completing this course, you will be able to plan, conduct, analyze, and report on penetration tests, including the ability to: Plan and scope penetration tests. Conduct passive reconnaissance. Perform non-technical tests to gather information. Conductive active reconnaissance. Analyze vulnerabilities. Penetrate networks. Exploit host-based vulnerabilities. Test applications. Complete post-exploit tasks. Analyze and report pen test results. Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company. 1 - Outline Lesson 1: Scoping Organization/Customer Requirements Lesson 2: Defining the Rules of Engagement Lesson 3: Footprinting and Gathering Intelligence Lesson 4: Evaluating Human and Physical Vulnerabilities Lesson 5: Preparing the Vulnerability Scan Lesson 6: Scanning Logical Vulnerabilities Lesson 7: Analyzing Scanning Results Lesson 8: Avoiding Detection and Covering Tracks Lesson 9: Exploiting the LAN and Cloud Lesson 10: Testing Wireless Networks Lesson 11: Targeting Mobile Devices Lesson 12: Attacking Specialized Systems Lesson 13: Web Application-Based Attacks Lesson 14: Performing System Hacking Lesson 15: Scripting and Software Development Lesson 16: Leveraging the Attack: Pivot and Penetrate Lesson 17: Communicating During the PenTesting Process Lesson 18: Summarizing Report Components Lesson 19: Recommending Remediation Lesson 20: Performing Post-Report Delivery Activities Additional course details: Nexus Humans CompTIA Penetration Testing Certification (PenTest Plus) - (Exam PT0-002) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Penetration Testing Certification (PenTest Plus) - (Exam PT0-002) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security. Overview Upon successful completion of this course, students will be able to: - implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices. - evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices. - evaluate information systems acquisition, development, and implementation. - evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained. - define the protection policies used to promote the confidentiality, integrity, and availability of information assets. In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives. 1 - The Process of Auditing Information Systems ISACA Information Systems Auditing Standards and Guidelines Fundamental Business Processes Develop and Implement an Information Systems Audit Strategy Plan an Audit Conduct an Audit The Evidence Life Cycle Communicate Issues, Risks, and Audit Results Support the Implementation of Risk Management and Control Practices 2 - IT Governance and Management Evaluate the Effectiveness of IT Governance Evaluate the IT Organizational Structure and HR Management Evaluate the IT Strategy and Direction Evaluate IT Policies, Standards, and Procedures Evaluate the Effectiveness of Quality Management Systems Evaluate IT Management and Monitoring of Controls IT Resource Investment, Use, and Allocation Practices Evaluate IT Contracting Strategies and Policies Evaluate Risk Management Practices Performance Monitoring and Assurance Practices Evaluate the Organizations Business Continuity Plan 3 - Information Systems Acquisition, Development, and Implementation Evaluate the Business Case for Change Evaluate Project Management Frameworks and Governance Practices Development Life Cycle Management Perform Periodic Project Reviews Evaluate Control Mechanisms for Systems Evaluate Development and Testing Processes Evaluate Implementation Readiness Evaluate a System Migration Perform a Post-Implementation System Review 4 - Information Systems Operations, Maintenance, and Support Perform Periodic System Reviews Evaluate Service Level Management Practices Evaluate Third-Party Management Practices Evaluate Operations and End User Management Practices Evaluate the Maintenance Process Evaluate Data Administration Practices Evaluate the Use of Capacity and Performance Monitoring Methods Evaluate Change, Configuration, and Release Management Practices Evaluate Problem and Incident Management Practices Evaluate the Adequacy of Backup and Restore Provisions 5 - Protection of Information Assets Information Security Design Encryption Basics Evaluate the Functionality of the IT Infrastructure Evaluate Network Infrastructure Security Evaluate the Design, Implementation, and Monitoring of Logical Access Controls Risks and Controls of Virtualization Evaluate the Design, Implementation, and Monitoring of Data Classification Process Evaluate the Design, Implementation, and Monitoring of Physical Access Controls Evaluate the Design, Implementation, and Monitoring of Environmental Controls