• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

572 Mac courses in Newquay delivered Live Online

Vectorworks and Sketchup Help in Interior Design projects

By Real Animation Works

Vectorworks Course face to face One to one

Vectorworks and Sketchup Help in Interior Design projects
Delivered in London or OnlineFlexible Dates
£360

Adobe Illustrator Basic to Intermediate Training

By London Design Training Courses

Why Learn Adobe Illustrator Basic to Intermediate Training Course? Course Link With our Illustrator Intermediate Course take your vector graphics to the next level and bring your designs to life with advanced techniques and tools. Gain hands-on skills in creating shapes, patterns, and logos, and learn how to edit images with precision. Duration: 6 hrs. Method: 1-on-1 - Personalized attention Schedule: Schedule by pre-booking a convenient hour of your choice, available from Mon to Sat between 9 am and 7 pm. This course covers fundamental tools and features of Adobe Illustrator, aimed at beginners, to enable them to create and edit vector graphics efficiently and effectively. Adobe Illustrator is the industry-leading vector graphic software for working with vector graphics, providing a comprehensive set of tools for producing exceptional graphics for various media, including print, video, web, and mobile devices. Course Title: Adobe Illustrator  Course Outline: Mastering Advanced Drawing Techniques  In-Depth Curvature Tool Mastery Advanced Pen Tool Usage: Drawing Complex Paths Understanding Path, Anchor Points, and Handles Precision Editing with Direct Selection Tool Slicing and Dividing Paths using Scissors and Knife Tools Exploring Advanced Stroke and Path Options  Custom Width Profiles with the Width Tool Diverse Brushes Exploration in Brush Library Creating Scattered Objects with Scatter Brushes Applying Patterns along Paths with Pattern Brushes Crafting Custom Pattern Brushes Understanding Graphic Styles  Efficient Usage of Graphic Style Libraries Creating, Deleting, and Saving Graphic Styles with Graphic Style Panel Leveraging the Power of Graphic Styles Mastering Pattern Manipulation Techniques  Creating and Editing Patterns using Pattern Mode Modifying Pattern Elements with Precision Adjusting Spacing and Resizing Patterns using the Tile Tool Rectifying Background Errors with Overlap Options Saving and Exporting Custom Patterns Exploring Advanced Gradient Options  Gradient Styles Exploration Fine-Tuning Gradients with the Gradient Annotator Creating Free Transform Gradient Points and Lines Applying Single Gradient across Multiple Objects Gradient and Transparency Integration Creative Applications and Practical Projects  Applying Advanced Techniques to Real-World Projects Creative Problem-Solving Strategies Q&A Session and Feedback Gathering Note: Each section includes practical exercises and hands-on projects to reinforce learning. The course emphasizes practical application, ensuring participants leave with tangible skills and a deep understanding of advanced Adobe Illustrator concepts. Q: What will I learn in the London Design Training Course in Adobe Illustrator? A: In this course, you'll learn essential techniques for creating and editing vector graphics using Adobe Illustrator. The training covers drawing tools, shapes, layers, effects, styles, logo design, Image Trace, Live Paint, and integration into your design workflow. Q: What can I expect to achieve after completing the Illustrator training course? A: By the end of the course, you'll be proficient in Illustrator tools, create graphics for print, web, and mobile, design logos with special effects, and manipulate images. You'll receive an accredited Illustrator training certification and post-course support. Q: Is any prior knowledge of Illustrator required to attend the course? A: No, the course is designed for beginners, and no prior knowledge of Illustrator is necessary. Q: Which version of Illustrator will the training be based on? A: The training is primarily based on Illustrator 2023, but the techniques apply to recent releases. Q: Can I attend the course on either a Windows or Mac computer? A: Yes, Illustrator works identically on both Windows and Mac. Our training centers offer both platforms for your convenience.

Adobe Illustrator Basic to Intermediate Training
Delivered in London or OnlineFlexible Dates
£180

Landscape Architecture Training Course 1-2-1 Basic to Advanced level

By Real Animation Works

Landscape training face to face training customised and bespoke.

Landscape Architecture Training Course 1-2-1 Basic to Advanced level
Delivered in London or OnlineFlexible Dates
£1,600

Comprehensive Training for Architects | Interior and Exterior Designers

By ATL Autocad Training London

Who is this course for? The Architecture and Interior Design course is ideal for individuals aiming to master both interior design and architecture. Guided by certified tutors from Autodesk and Adobe, students will gain comprehensive skills in these fields. Click here for more info: Website Duration: 40 hours.1-on-1 Training. In-Person or Live online. When can I book: 9 am - 7 pm (Choose your preferred day and time once a week). Flexible timing with advance booking Course Features: Compatibility: Our training courses are compatible with both Mac and Windows operating systems, ensuring accessibility for all users. Price Assurance: We guarantee the best value for your investment, ensuring competitive pricing for high-quality training. Personalized Training: Benefit from one-on-one training sessions tailored to your specific needs and skill level, ensuring a personalized learning experience. Flexible Scheduling: Enjoy the flexibility to choose your preferred training time and day. Sessions are available seven days a week, from Monday to Sunday, between 9 am and 8 pm, accommodating your busy schedule. Lifetime Support: Receive lifetime email and phone support, ensuring that you have access to assistance even after completing the course. Technical Assistance: Get help with configuring your computer for software installation, ensuring a smooth learning experience without technical hurdles. Referral Discounts: Earn special discounts when you refer a friend to our courses, making learning a rewarding experience for you and your network. Group Training Savings: Avail significant savings on group training courses, encouraging collaborative learning and making education more accessible for groups. When can you schedule this Training Course? Personalized training experience with our flexible 1-on-1 sessions. Design your own timetable by pre-booking a convenient hour of your choice, available from Monday to Saturday between 9 a.m. and 7 p.m. Alternatively, you can call 02077202581 to book over the phone. How long is the training? The course spans 40 hours, which you can divide over as many days as needed to fit your ideal schedule. What's the teaching method? Our sessions are 1-on-1, offered either in-person face to face or live online. You'll receive personalized attention, tailored content, a flexible learning pace, and individual support. Live online 1-on-1 sessions over Zoom are also an option. What will you learn? In this comprehensive training program, you'll gain proficiency in a thoughtfully curated selection of software tools. Option A: AutoCAD (13 hours) SketchUp (10 hours) Vray (6 hours) Photoshop (6 hours) InDesign (5 hours) Additionally, you'll receive free online portfolio design assistance, career growth guidance, and mock interviews to enhance your job market readiness. Option B: AutoCAD (10 hours) 3ds Max (17 hours) Vray (4 hours) Photoshop (5 hours) InDesign (4 hours) Certified trainers in AutoCAD, 3ds Max, SketchUp, and Adobe software will conduct this training program. It caters to beginners, intermediate, and advanced learners, focusing on core skills for creating 2D drawings, plans, sections, elevations, construction details, and 3D visualizations. Our experienced instructors will guide you through essential commands and methodologies for producing precise 2D and 3D drawings. We have developed these CAD courses, utilizing the expertise of our professionals to provide the most efficient and effective instruction. Upon completion, participants will: Master Software Tools: Excel in AutoCAD, SketchUp, Vray, Photoshop, and InDesign for digital design. Advanced Design Skills: Create intricate 2D/3D designs, plans, and visualizations. Project Management: Manage layouts, plotting, and projects efficiently. Realistic Rendering: Produce lifelike visualizations using Vray. Creative Composition: Understand design principles for impactful creations. Portfolio Development: Create a professional online portfolio. Career Readiness: Prepare for job interviews and enhance resumes. Potential Jobs: Architect Interior/Exterior Designer CAD Technician Visualization Specialist Design Consultant Project Manager These skills open doors to varied roles in architecture and design, ensuring career growth and job readiness. Course Features: Compatibility: Our training courses are compatible with both Mac and Windows operating systems, ensuring accessibility for all users. Price Assurance: We guarantee the best value for your investment, ensuring competitive pricing for high-quality training. Personalized Training: Benefit from one-on-one training sessions tailored to your specific needs and skill level, ensuring a personalized learning experience. Flexible Scheduling: Enjoy the flexibility to choose your preferred training time and day. Sessions are available seven days a week, from Monday to Sunday, between 9 am and 8 pm, accommodating your busy schedule. Lifetime Support: Receive lifetime email and phone support, ensuring that you have access to assistance even after completing the course. Technical Assistance: Get help with configuring your computer for software installation, ensuring a smooth learning experience without technical hurdles. Referral Discounts: Earn special discounts when you refer a friend to our courses, making learning a rewarding experience for you and your network. Group Training Savings: Avail significant savings on group training courses, encouraging collaborative learning and making education more accessible for groups. When can you schedule this Training Course? Personalized training experience with our flexible 1-on-1 sessions. Design your own timetable by pre-booking a convenient hour of your choice, available from Monday to Saturday between 9 a.m. and 7 p.m. Alternatively, you can call 02077202581 to book over the phone. How long is the training? The course spans 40 hours, which you can divide over as many days as needed to fit your ideal schedule. What's the teaching method? Our sessions are 1-on-1, offered either in-person face to face or live online. You'll receive personalized attention, tailored content, a flexible learning pace, and individual support. Live online 1-on-1 sessions over Zoom are also an option. What will you learn? In this comprehensive training program, you'll gain proficiency in a thoughtfully curated selection of software tools. Option A: AutoCAD (13 hours) SketchUp (10 hours) Vray (6 hours) Photoshop (6 hours) InDesign (5 hours) Additionally, you'll receive free online portfolio design assistance, career growth guidance, and mock interviews to enhance your job market readiness. Option B: AutoCAD (10 hours) 3ds Max (17 hours) Vray (4 hours) Photoshop (5 hours) InDesign (4 hours) Certified trainers in AutoCAD, 3ds Max, SketchUp, and Adobe software will conduct this training program. It caters to beginners, intermediate, and advanced learners, focusing on core skills for creating 2D drawings, plans, sections, elevations, construction details, and 3D visualizations. Our experienced instructors will guide you through essential commands and methodologies for producing precise 2D and 3D drawings. We have developed these CAD courses, utilizing the expertise of our professionals to provide the most efficient and effective instruction.

Comprehensive Training for Architects | Interior and Exterior Designers
Delivered in London or OnlineFlexible Dates
£1,440

Symantec Endpoint Protection 14.X - Configure And Protect

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions

Symantec Endpoint Protection 14.X - Configure And Protect
Delivered OnlineFlexible Dates
Price on Enquiry

Unity 3d one day course 1-2-1

By Real Animation Works

Unity 3d face to face training customised and bespoke.

Unity 3d one day course 1-2-1
Delivered in London or OnlineFlexible Dates
£450

Vray for Sketchup Training

By London Design Training Courses

Why choose Vray for Sketchup Training Course? Course info Our in-person or live online sessions led by certified tutors. Learn advanced rendering techniques, practical hands-on experience, recorded lessons, lifetime email support, and an industry-recognized certification. Enroll now to elevate your Sketchup renderings. Duration: 6 hrs Method: 1-on-1, Personalized attention Schedule: Tailor your own schedule by pre-booking a convenient hour of your choice, available from Monday to Saturday between 9 am and 7 pm Experience V-Ray training, where you'll master the art of creating stunningly realistic 3D architectural and interior design scenes from your SketchUp models. V-Ray for SketchUp is a user-friendly rendering solution, offering faster rendering, enhanced lighting tools, and the ability to visualize intricate scenes effortlessly. Our SketchUp - Rendering with V-Ray course empowers you to seamlessly integrate SketchUp with V-Ray, allowing you to craft scenes with captivating features, including: Various lighting techniques (daylight, sunlight, and skylight). Reflective surfaces for added depth. Dynamic moving cameras for captivating visualizations. This hands-on course is highly practical, ensuring you gain real-world skills and expertise. You have the flexibility to arrange this course on-request, either as one-to-one training or as a 'closed course' for your group. The training can be tailored to accommodate your existing knowledge and specific project requirements. Choose from in-class sessions available at six centers or participate in live online classes. V-Ray works seamlessly on both Windows and Mac platforms, and our centers provide computers for delegates to use, ensuring a familiar environment for all. Upon successful completion, you'll receive an e-certificate to validate your V-Ray training. Following the training, you'll enjoy lifetime email support from your trainer to address any post-course queries or concerns. Prerequisites for this course include familiarity with the fundamentals of SketchUp, such as attending our Introduction to SketchUp course or possessing equivalent knowledge. Our training can accommodate any recent version of SketchUp Pro and V-Ray, ensuring compatibility with your preferred Windows or Mac platform. Experience the transformative power of V-Ray and elevate your SketchUp projects to new heights. Experience V-Ray training, where you'll master the art of creating stunningly realistic 3D architectural and interior design scenes from your SketchUp models. V-Ray for SketchUp is a user-friendly rendering solution, offering faster rendering, enhanced lighting tools, and the ability to visualize intricate scenes effortlessly. Module 1: Introduction to Vray for SketchUp Gain insights into Vray's benefits for SketchUp Install and set up Vray for SketchUp Familiarize with the Vray interface and workflow Explore Vray materials and their properties Module 2: Lighting and Environment Master effective lighting techniques in Vray Understand different Vray light types and settings Create realistic outdoor lighting with Vray sun and sky Utilize Vray dome lighting for interior scenes Introduce IES lights and their usage in Vray Module 3: Camera and Composition Learn Vray camera settings and their impact on the final image Control exposure and adjust camera settings in Vray Create depth of field effects with Vray camera Animate the Vray camera for dynamic shots Explore the Vray frame buffer and its functionalities Module 4: Vray Materials and Textures Gain an in-depth understanding of Vray materials and their properties Create realistic materials using Vray's material editor Save and organize custom Vray material libraries Apply Vray material overrides for quick changes Module 5: Rendering and Post-Production  Explore Vray rendering settings and optimization techniques Render high-quality images and animations with Vray Enhance Vray renders using post-production techniques in Photoshop Fine-tune the final output with the Vray frame buffer Compose Vray render elements in Photoshop for added control For those interested in trying Vray for SketchUp, a free trial can be accessed through the following link: https://www.chaosgroup.com/vray/sketchup/free-trial. Additionally, provided material and texture resources (https://www.vray-materials.de/ and https://textures.com/) can enhance the quality of renders by providing access to a variety of materials and textures for use in Vray.

Vray for Sketchup Training
Delivered in London or OnlineFlexible Dates
£216

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Introduction to Adobe Illustrator Online

By Platform Training

Adobe Authorised Training. Live online course with study materials and certificate of completion included Our beginners Adobe Illustrator course provides effective training in the use of Illustrator's tools to create stunning illustrations and type effects. From our London studios you will learn to design logos and printable documents, work with colours, gradients, layers, fonts, and photos to create eye-catching illustrations and text effects. Resources Introduction to Adobe Illustrator Course Information Description Completing this course will enable you to do the following and more: Understand the concepts of non-destructive image editing Understand differences between image file types Re-size, crop and export images Create special effects using filters Confidently work with multiple Photoshop layers Perform substantial image corrections and enhancements Format and optimise images for web & social media use Add text to your images Produce banner ads for web advertising For the full course content please download the course information pdf listed above. Who is this course for? This workshop is suitable for anyone looking to learn Illustrator from scratch or wanting to improve their existing knowledge of the program. Career path Attendees should have basic PC or Mac skills. You will need a broadband internet connection to participate in this live online course. Certificates Certificate of completion Digital certificate - Included

Introduction to Adobe Illustrator Online
Delivered OnlineFlexible Dates
£192

Symantec Endpoint Protection 12.X - Install, Configure, And Deploy

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants who are charged with the installation, configuration, and day-to-day management of Symantec Endpoint Protection in a variety of network environments, and who are responsible for troubleshooting and tuning the performance of this product in the enterprise environment. Overview At the completion of the course, you will be able to: Describe Symantec Endpoint Protection products, components, dependencies, and system hierarchy. Install and configure Symantec Endpoint Protection management and client components. Deploy Symantec Endpoint Protection Windows, Windows Embedded, Mac and Linux clients. Manage the client user interface. Manage content updates for Windows, Mac, and Linux. Perform server and database management. Configure replication and load balancing. Design a Symantec Endpoint Protection environment. This course is designed for the network, IT security, and systems administration professional tasked with architecting and implementing Symantec Endpoint Protection. Introduction Course overview The classroom lab environment Symantec Endpoint Protection Product Solution Why use Symantec Endpoint Protection? Symantec Endpoint Protection technologies Symantec Endpoint Protection services Symantec Endpoint Protection components Symantec Endpoint Protection policies and concepts Extending Symantec Endpoint Protection Installing the Symantec Endpoint Protection Manager Identifying system requirements Preparing servers for installation Installing and configuring the Symantec Endpoint Protection Manager Describing Symantec Endpoint Protection upgrades and version compatibility Configuring the Symantec Endpoint Protection Environment Starting and navigating the SEPM Describing policy types and components Console authentication Licensing the SEP environment Deploying Windows and Windows Embedded Clients Planning the client deployment Configuring client deployment package Deploying packages to clients Maintaining the client environment Upgrading Symantec Endpoint Protection clients Deploying Mac and Linux Clients Linux prerequisites Linux deployment Mac prerequisites Mac deployment Client and Policy Management Describing SEPM and client communications Administering clients Configuring groups Configuring locations Active Directory integration with SEP 12.1 Client configuration modes Configuring domains General client settings and Tamper Protection Configuring Content Updates for Windows Clients Introducing LiveUpdate Configuring the SEPM for LiveUpdate Configuring the LiveUpdate Settings and Content policies Configuring multiple group update providers (GUPs) Manually updating virus definitions Configuring Content Updates for Mac and Linux Clients Describing content update methods Configuring the LiveUpdate policy Configuring the SEPM as a reverse proxy Monitoring updates Performing Server and Database Management Managing SEPM servers Maintaining server security Communicating with other servers Managing administrators Managing the database Disaster recovery techniques Configuring Replication and Failover and Load Balancing About sites and replication How replication works Symantec Endpoint Protection replication scenarios Configuring replication Failover and load balancing Designing a Symantec Endpoint Environment Architecture components Architecture constraints Component placement Content delivery Determining client to SEPM ratios SEPM and database sizing best practices

Symantec Endpoint Protection 12.X - Install, Configure, And Deploy
Delivered OnlineFlexible Dates
Price on Enquiry
1...678910...58