• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

910 Memory courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Switch To Manual Photography Workshop

By Rich Dyson

Switch to Manual is the introductory workshop for camera users who tend to leave their camera set to Automatic modes.

Switch To Manual Photography Workshop
Delivered In-Person4 hours, Jun 2nd, 08:30 + 40 more
£75

VMware vSphere: Install, Configure, Manage v8.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators System engineers Overview By the end of the course, you should be able to meet the following objectives: Install and configure ESXi hosts Deploy and configure vCenter Use the vSphere Client to create the vCenter inventory and assign roles to vCenter users Create virtual networks using vSphere standard switches and distributed switches Create and configure datastores using storage technologies supported by vSphere Use the vSphere Client to create virtual machines, templates, clones, and snapshots Create content libraries for managing templates and deploying virtual machines Manage virtual machine resource allocation Migrate virtual machines with vSphere vMotion and vSphere Storage vMotion Create and configure a vSphere cluster that is enabled with vSphere High Availability (HA) and vSphere Distributed Resource Scheduler Manage the life cycle of vSphere to keep vCenter, ESXi hosts, and virtual machines up to date This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and VMware vCenter 8. This course prepares you to administer a vSphere infrastructure for an organization of any size. This course is the foundation for most VMware technologies in the software-defined data center. COURSE INTRODUCTION * Introductions and course logistics * Course objectives VSPHERE AND VIRTUALIZATION OVERVIEW * Explain basic virtualization concepts * Describe how vSphere fits in the software-defined data center and the cloud infrastructure * Recognize the user interfaces for accessing vSphere * Explain how vSphere interacts with CPUs, memory, networks, storage, and GPUs INSTALLING AND CONFIGURING ESXI * Install an ESXi host * Recognize ESXi user account best practices * Configure the ESXi host settings using the DCUI and VMware Host Client DEPLOYING AND CONFIGURING VCENTER * Recognize ESXi hosts communication with vCenter * Deploy vCenter Server Appliance * Configure vCenter settings * Use the vSphere Client to add and manage license keys * Create and organize vCenter inventory objects * Recognize the rules for applying vCenter permissions * View vCenter logs and events CONFIGURING VSPHERE NETWORKING * Configure and view standard switch configurations * Configure and view distributed switch configurations * Recognize the difference between standard switches and distributed switches * Explain how to set networking policies on standard and distributed switches CONFIGURING VSPHERE STORAGE * Recognize vSphere storage technologies * Identify types of vSphere datastores * Describe Fibre Channel components and addressing * Describe iSCSI components and addressing * Configure iSCSI storage on ESXi * Create and manage VMFS datastores * Configure and manage NFS datastores DEPLOYING VIRTUAL MACHINES * Create and provision VMs * Explain the importance of VMware Tools * Identify the files that make up a VM * Recognize the components of a VM * Navigate the vSphere Client and examine VM settings and options * Modify VMs by dynamically increasing resources * Create VM templates and deploy VMs from them * Clone VMs * Create customization specifications for guest operating systems * Create local, published, and subscribed content libraries * Deploy VMs from content libraries * Manage multiple versions of VM templates in content libraries MANAGING VIRTUAL MACHINES * Recognize the types of VM migrations that you can perform within a vCenter instance and across vCenter instances * Migrate VMs using vSphere vMotion * Describe the role of Enhanced vMotion Compatibility in migrations * Migrate VMs using vSphere Storage vMotion * Take a snapshot of a VM * Manage, consolidate, and delete snapshots * Describe CPU and memory concepts in relation to a virtualized environment * Describe how VMs compete for resources * Define CPU and memory shares, reservations, and limits DEPLOYING AND CONFIGURING VSPHERE CLUSTERS * Create a vSphere cluster enabled for vSphere DRS and vSphere HA * View information about a vSphere cluster * Explain how vSphere DRS determines VM placement on hosts in the cluster * Recognize use cases for vSphere DRS settings * Monitor a vSphere DRS cluster * Describe how vSphere HA responds to various types of failures * Identify options for configuring network redundancy in a vSphere HA cluster * Recognize vSphere HA design considerations * Recognize the use cases for various vSphere HA settings * Configure a vSphere HA cluster * Recognize when to use vSphere Fault Tolerance MANAGING THE VSPHERE LIFECYCLE * Enable vSphere Lifecycle Manager in a vSphere cluster * Describe features of the vCenter Update Planner * Run vCenter upgrade prechecks and interoperability reports * Recognize features of vSphere Lifecycle Manager * Distinguish between managing hosts using baselines and managing hosts using images * Describe how to update hosts using baselines * Describe ESXi images * Validate ESXi host compliance against a cluster image and update ESXi hosts * Update ESXi hosts using vSphere Lifecycle Manager * Describe vSphere Lifecycle Manager automatic recommendations * Use vSphere Lifecycle Manager to upgrade VMware Tools and VM hardware

VMware vSphere: Install, Configure, Manage v8.0
Delivered Online6 days, Jun 3rd, 13:00 + 1 more
£4250

55337 Introduction to Programming

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone who is new to software development and wants, or needs, to gain an understanding of programming fundamentals and object-oriented programming concepts. They will typically be high school students, post-secondary school students, or career changers, with no prior programming experience. They might want to gain an understanding of the core programming fundamentals before moving on to more advanced courses such as Programming in C#. Overview Explain core programming fundamentals such as computer storage and processing. Explain computer number systems such as binary. Create and use variables and constants in programs. Explain how to create and use functions in a program. Create and use decisions structures in a computer program. Create and use repetition (loops) in a computer program. Explain pseudocode and its role in programming. Explain the basic computer data structures such as arrays, lists, stacks, and queues. Implement object-oriented programming concepts. Create and use classes in a computer program. Implement encapsulation, inheritance, and polymorphism. Describe the base class library (BCL) in the .NET Framework. Explain the application security concepts. Implement simple I/O in a computer program. Identify application errors and explain how to debug an application and handle errors. Identify the performance considerations for applications. In this 5-day course, students will learn the basics of computer programming through the use of Microsoft Visual Studio 2022 and the Visual C# and Visual Basic programming languages. The course assumes no prior programming experience and introduces the concepts needed to progress to the intermediate courses on programming, Programming in C#. The focus will be on core programming concepts such as computer storage, data types, decision structures, and repetition by using loops. The course also covers an introduction to object-oriented programming covering classes, encapsulation, inheritance, and polymorphism. Coverage is also included around exception handling, application security, performance, and memory management. 1 - INTRODUCTION TO CORE PROGRAMMING CONCEPTS * Computer Data Storage and Processing * Application Types * Application Lifecycle * Code Compilation 2 - CORE PROGRAMMING LANGUAGE CONCEPTS * Syntax * Data Types * Variables and Constants 3 - PROGRAM FLOW * Introduction to Structured Programming Concepts * Introduction to Branching * Using Functions * Using Decision Structures * Introducing Repetition 4 - ALGORITHMS AND DATA STRUCTURES * Understand How to Write Pseudocode * Algorithm Examples * Introduction to Data Structures 5 - ERROR HANDLING AND DEBUGGING * Introduction to Program Errors * Introduction to Structured Error Handling * Introduction to Debugging 6 - INTRODUCTION TO OBJECT-ORIENTED PROGRAMMING * Introduction to Complex Structures * Introduction to Structs * Introduction to Classes * Introducing Encapsulation 7 - MORE OBJECT-ORIENTED PROGRAMMING * Introduction to Inheritance * Introduction to Polymorphism * Introduction to .NET and the Base Class Library 8 - INTRODUCTION TO APPLICATION SECURITY * Authentication and Authorization * Code Permissions on Computers * Introducing Code Signing 9 - CORE I/O PROGRAMMING * Using Console I/O * Using File I/O 10 - APPLICATION PERFORMANCE AND MEMORY MANAGEMENT * Value Types vs Reference Types * Converting Types * The Garbage Collector ADDITIONAL COURSE DETAILS: Nexus Humans 55337 Introduction to Programming training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55337 Introduction to Programming course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55337 Introduction to Programming
Delivered Online6 days, Jun 3rd, 13:00 + 2 more
£2975

inGenius Memory

By inGeniusly

If you have the desire to memorise anything incredibly quickly, and retain it for as long as you need, this course is for you! In a fun, dynamic way, where we purposefully combine different teaching approaches to get you to a level of mastery in the shortest possible time, we will teach you the ins and outs of memory. You will be amazed by how powerful your own brain can be!

inGenius Memory
Delivered Online & In-Person in London12 weeks, Jul 12th, 15:00
£1500

CompTIA Cloud+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for IT professionals who wish to develop cloud computing skills to enable them to move IT workloads to the cloud and integrate products and services from different providers and industries. Their focus is to ensure that cloud deployments are secure, that automation and orchestration are used effectively to bring business value from the cloud, and that costs are controlled through effective management of cloud vendors. This course is also designed for students who are preparing to take the CompTIA Cloud+ certification exam CV0-003, or who plan to use Cloud+ as the foundation for more advanced cloud certifications or career roles. Overview In this course, you will deploy, test, secure, manage, optimize, and troubleshoot a cloud solution. You will: - Prepare to deploy cloud solutions - Deploy a pilot project - Test a pilot project deployment - Design a secure network for cloud deployment - Determine CPU and memory sizing for cloud deployments - Determine storage requirements for cloud deployments - Plan Identity and Access Management for cloud deployments - Analyze workload characteristics to ensure successful migration to the cloud - Secure systems to meet access requirements - Maintain cloud systems - Implement backup, restore, and business continuity measures - Analyze cloud systems for required performance - Analyze cloud systems for anomalies and growth forecasting - Troubleshoot deployment, capacity, automation, and orchestration issues - Troubleshoot connectivity issues - Troubleshoot security issues In this course, you will learn how to implement, maintain, and deliver cloud technologies including network, storage, and virtualization technologies to create cloud solutions. 1 - PREPARING TO DEPLOY CLOUD SOLUTIONS * Describe Interaction of Cloud Components and Services * Describe Interaction of Non-cloud Components and Services * Evaluate Existing Components and Services for Cloud Deployment * Evaluate Automation and Orchestration Options * Prepare for Cloud Deployment 2 - DEPLOYING A PILOT PROJECT * Manage Change in a Pilot Project * Execute Cloud Deployment Workflow * Complete Post-Deployment Configuration 3 - TESTING PILOT PROJECT DEPLOYMENTS * Identify Cloud Service Components for Testing * Test for High Availability and Accessibility * Perform Deployment Load Testing * Analyze Test Results 4 - DESIGNING A SECURE AND COMPLIANT CLOUD INFRASTRUCTURE * Design Cloud Infrastructure for Security * Determine Organizational Compliance Needs 5 - DESIGNING AND IMPLEMENTING A SECURE CLOUD ENVIRONMENT * Design Virtual Network for Cloud Deployment * Determine Network Access Requirements * Secure Networks for Cloud Interaction * Manage Cloud Component Security * Implement Security Technologies 6 - PLANNING IDENTITY AND ACCESS MANAGEMENT FOR CLOUD DEPLOYMENTS * Determine Identity Management and Authentication Technologies * Plan Account Management Policies for the Network and Systems * Control Access to Cloud Objects * Provision Accounts 7 - DETERMINING CPU AND MEMORY SIZING FOR CLOUD DEPLOYMENTS * Determine CPU Size for Cloud Deployment * Determine Memory Size for Cloud Deployment 8 - DETERMINING STORAGE REQUIREMENTS FOR CLOUD DEPLOYMENTS * Determine Storage Technology Requirements * Select Storage Options for Deployment * Determine Storage Access and Provisioning Requirements * Determine Storage Security Options 9 - ANALYZING WORKLOAD CHARACTERISTICS TO ENSURE SUCCESSFUL MIGRATION * Determine the Type of Cloud Deployment to Perform * Manage Virtual Machine and Container Migration * Manage Network, Storage, and Data Migration 10 - MAINTAINING CLOUD SYSTEMS * Patch Cloud Systems * Design and Implement Automation and Orchestration for Maintenance 11 - IMPLEMENTING BACKUP, RESTORE, DISASTER RECOVERY, AND BUSINESS CONTINUITY MEASURES * Back Up and Restore Cloud Data * Implement Disaster Recovery Plans * Implement Business Continuity Plans 12 - ANALYZING CLOUD SYSTEMS FOR PERFORMANCE * Monitor Cloud Systems to Measure Performance * Optimize Cloud Systems to Meet Performance Criteria 13 - ANALYZING CLOUD SYSTEMS FOR ANOMALIES AND GROWTH FORECASTING * Monitor for Anomalies and Resource Needs * Plan for Capacity * Create Reports on Cloud System Metrics 14 - TROUBLESHOOTING DEPLOYMENT, CAPACITY, AUTOMATION, AND ORCHESTRATION ISSUES * Troubleshoot Deployment Issues * Troubleshoot Capacity Issues * Troubleshoot Automation and Orchestration Issues 15 - TROUBLESHOOTING CONNECTIVITY ISSUES * Identify Connectivity Issues * Troubleshoot Connectivity Issues 16 - TROUBLESHOOTING SECURITY ISSUES * Troubleshoot Identity and Access Issues * Troubleshoot Attacks * Troubleshoot Other Security Issues ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Cloud Plus Certification (Exam CV0-003) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Cloud Plus Certification (Exam CV0-003) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Cloud+
Delivered Online6 days, Jun 10th, 13:00 + 2 more
£2475

How To Best Treat Minor Injuries

5.0(50)

By Pochat Training

CPD Accredited, Interactive Short Course - 1.5 hr session - Learn from the comfort of your own home or workplace - Learn how to deal with wounds, burns, sprains & strains, and other injuries COURSE CONTENTS: * What is classed as Display Screen Equipment (DSE) * Who is a DSE user * Illnesses and Injuries caused by the incorrect use of DSE * How to set up your workstation so as to avoid injuries and musculoskeletal disorders * DSE Assessment Checklist * Work routine and the importance of taking breaks * Eyes and eyesight testing * Identifying training needs * Working from home and home working assessments BENEFITS OF THIS SHORT COURSE: * In 2018/2019, nearly half a million people suffered from work-related musculoskeletal disorders, most of them having suffered from this for a while * Though 138,000 of them only started having problems this year * These conditions can significantly affect a person's life, and limit their mobility and dexterity * This leads to being forced to retire early from work, earn less and have less of a social life > I enjoyed the minor injuries webinar as it refreshed my memory in these areas > and gave me the confidence to deal with any of these now. The training was > delivered with practical demonstrations and I enjoyed the chance to use my > brain during the lockdown. > > DEBBIE GROSCH-SQUANCE

How To Best Treat Minor Injuries
Delivered Online1 hour 30 minutes, Jun 8th, 09:00 + 4 more
£20

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. COMPUTER FORENSICS IN TODAY?S WORLD * 1.1. Understand the Fundamentals of Computer Forensics * 1.2. Understand Cybercrimes and their Investigation Procedures * 1.3. Understand Digital Evidence * 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security * Operations Center) in Computer Forensics * 1.5. Identify the Roles and Responsibilities of a Forensic Investigator * 1.6. Understand the Challenges Faced in Investigating Cybercrimes * 1.7. Understand Legal Compliance in Computer Forensics * COMPUTER FORENSICS INVESTIGATION PROCESS * 2.1. Understand the Forensic Investigation Process and its Importance * 2.2. Understand the Pre-investigation Phase * 2.3. Understand First Response * 2.4. Understand the Investigation Phase * 2.5. Understand the Post-investigation Phase * UNDERSTANDING HARD DISKS AND FILE SYSTEMS * 3.1. Describe Different Types of Disk Drives and their Characteristics * 3.2. Explain the Logical Structure of a Disk * 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems * 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems * 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools * 3.6 Understand Storage Systems * 3.7. Understand Encoding Standards and Hex Editors * 3.8. Analyze Popular File Formats Using Hex Editor * DATA ACQUISITION AND DUPLICATION * 4.1. Understand Data Acquisition Fundamentals * 4.2. Understand Data Acquisition Methodology * 4.3. Prepare an Image File for Examination * DEFEATING ANTI-FORENSICS TECHNIQUES * 5.1. Understand Anti-forensics Techniques * 5.2. Discuss Data Deletion and Recycle Bin Forensics * 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions * 5.4. Explore Password Cracking/Bypassing Techniques * 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch * 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption * 5.7. Detect Program Packers and Footprint Minimizing Techniques * 5.8. Understand Anti-forensics Countermeasures * WINDOWS FORENSICS * 6.1. Collect Volatile and Non-volatile Information * 6.2. Perform Windows Memory and Registry Analysis * 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers * 6.4. Examine Windows Files and Metadata * 6.5. Understand ShellBags, LNK Files, and Jump Lists * 6.6. Understand Text-based Logs and Windows Event Logs * LINUX AND MAC FORENSICS * 7.1. Understand Volatile and Non-volatile Data in Linux * 7.2. Analyze Filesystem Images Using The Sleuth Kit * 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec * 7.4. Understand Mac Forensics * * NETWORK FORENSICS * 8.1. Understand Network Forensics * 8.2. Explain Logging Fundamentals and Network Forensic Readiness * 8.3. Summarize Event Correlation Concepts * 8.4. Identify Indicators of Compromise (IoCs) from Network Logs * 8.5. Investigate Network Traffic * 8.6. Perform Incident Detection and Examination with SIEM Tools * 8.7. Monitor and Detect Wireless Network Attacks * INVESTIGATING WEB ATTACKS * 9.1. Understand Web Application Forensics * 9.2. Understand Internet Information Services (IIS) Logs * 9.3. Understand Apache Web Server Logs * 9.4. Understand the Functionality of Intrusion Detection System (IDS) * 9.5. Understand the Functionality of Web Application Firewall (WAF) * 9.6. Investigate Web Attacks on Windows-based Servers * 9.7. Detect and Investigate Various Attacks on Web Applications * DARK WEB FORENSICS * 10.1. Understand the Dark Web * 10.2. Determine How to Identify the Traces of Tor Browser during Investigation * 10.3. Perform Tor Browser Forensics * DATABASE FORENSICS * 11.1. Understand Database Forensics and its Importance * 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server * 11.3. Collect Evidence Files on MSSQL Server * 11.4. Perform MSSQL Forensics * 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory * 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis * 11.7. Perform MySQL Forensics on WordPress Web Application Database * CLOUD FORENSICS * 12.1. Understand the Basic Cloud Computing Concepts * 12.2. Understand Cloud Forensics * 12.3. Understand the Fundamentals of Amazon Web Services (AWS) * 12.4. Determine How to Investigate Security Incidents in AWS * 12.5. Understand the Fundamentals of Microsoft Azure * 12.6. Determine How to Investigate Security Incidents in Azure * 12.7. Understand Forensic Methodologies for Containers and Microservices * INVESTIGATING EMAIL CRIMES * 13.1. Understand Email Basics * 13.2. Understand Email Crime Investigation and its Steps * 13.3. U.S. Laws Against Email Crime * MALWARE FORENSICS * 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware * 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis * 14.3. Understand and Perform Static Analysis of Malware * 14.4. Analyze Suspicious Word and PDF Documents * 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches * 14.6. Analyze Malware Behavior on System Properties in Real-time * 14.7. Analyze Malware Behavior on Network in Real-time * 14.8. Describe Fileless Malware Attacks and How they Happen * 14.9. Perform Fileless Malware Analysis - Emotet * MOBILE FORENSICS * 15.1. Understand the Importance of Mobile Device Forensics * 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices * 15.3. Explain the Steps Involved in Mobile Forensics Process * 15.4. Investigate Cellular Network Data * 15.5. Understand SIM File System and its Data Acquisition Method * 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices * 15.7. Perform Logical Acquisition on Android and iOS Devices * 15.8. Perform Physical Acquisition on Android and iOS Devices * 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report * IOT FORENSICS * 16.1. Understand IoT and IoT Security Problems * 16.2. Recognize Different Types of IoT Threats * 16.3. Understand IoT Forensics * 16.4. Perform Forensics on IoT Devices *

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online6 days, Jun 10th, 13:00 + 2 more
£3495

CompTIA A+ Certification (Exams 220-1101 and 220-1102)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted to those seeking A+ Certification and anyone in these roles: IT Support Specialist Helpdesk Technician Field Technician Tier I Support Specialist Desktop Support Specialist Associate Network Engineer Systems Support Technician Junior Systems Administrator Overview At completion of this course, you will be able to: Install and configure end-user devices and software Address connectivity problems Perform basic cybersecurity mitigations Troubleshoot common problems to diagnose and resolve issues Demonstrate basic knowledge of scripting, the cloud, and virtualization CompTIA A+ certified professionals are proven problem solvers. They support today?s core technologies from security to networking to virtualization and more. CompTIA A+ is the industry standard for launching IT careers into today?s digital world. This course, prepares you for the CompTIA A+ Certification exams 220-1101 and 220-1102. LESSON 1: INSTALLING MOTHERBOARDS AND CONNECTORS * Topic 1A: Explain Cable Types and Connectors * Topic 1B: Install and Configure Motherboards * Topic 1C: Explain Legacy Cable Types LESSON 2: INSTALLING SYSTEM DEVICES * Topic 2A: Install and Configure Power Supplies and Cooling * Topic 2B: Select and Install Storage Devices * Topic 2C: Install and Configure System Memory * Topic 2D: Install and Configure CPUs LESSON 3: TROUBLESHOOTING PC HARDWARE * Topic 3A: Apply Troubleshooting Methodology * Topic 3B: Configure BIOS/UEFI * Topic 3C: Troubleshoot Power and Disk Issues * Topic 3D: Troubleshoot System and Display Issues LESSON 4: COMPARING LOCAL NETWORKING HARDWARE * Topic 4A: Compare Network Types * Topic 4B: Compare Networking Hardware * Topic 4C: Explain Network Cable Types * Topic 4D: Compare Wireless Networking Types LESSON 5: CONFIGURING NETWORK ADDRESSING AND INTERNET CONNECTIONS * Topic 5A: Compare Internet Connection Types * Topic 5B: Use Basic TCP/IP Concepts * Topic 5C: Compare Protocols and Ports * Topic 5D: Compare Network Configuration Concepts LESSON 6: SUPPORTING NETWORK SERVICES * Topic 6A: Summarize Services Provided by Networked Hosts * Topic 6B: Compare Internet and Embedded Appliances * Topic 6C: Troubleshoot Networks LESSON 7: SUMMARIZING VIRTUALIZATION AND CLOUD CONCEPTS * Topic 7A: Summarize Client-Side Virtualization * Topic 7B: Summarize Cloud Concepts LESSON 8: SUPPORTING MOBILE DEVICES * Topic 8A: Set Up Mobile Devices and Peripherals * Topic 8B: Configure Mobile Device Apps * Topic 8C: Install and Configure Laptop Hardware * Topic 8D: Troubleshoot Mobile Device Issues LESSON 9: SUPPORTING PRINT DEVICES * Topic 9A: Deploy Printer and Multifunction Devices * Topic 9B: Replace Print Device Consumables * Topic 9C: Troubleshoot Print Device Issues LESSON 10: CONFIGURING WINDOWS * Topic 10A: Configure Windows User Settings * Topic 10B: Configure Windows System Settings LESSON 11: MANAGING WINDOWS * Topic 11A: Use Management Consoles * Topic 11B: Use Performance and Troubleshooting Tools * Topic 11C: Use Command-line Tools LESSON 12: IDENTIFYING OS TYPES AND FEATURES * Topic 12A: Explain OS Types * Topic 12B: Compare Windows Editions LESSON 13: SUPPORTING WINDOWS * Topic 13A: Perform OS Installations and Upgrades * Topic 13B: Install and Configure Applications * Topic 13C: Troubleshoot Windows OS Problems LESSON 14: MANAGING WINDOWS NETWORKING * Topic 14A: Manage Windows Networking * Topic 14B: Troubleshoot Windows Networking * Topic 14C: Configure Windows Security Settings * Topic 14D: Manage Windows Shares LESSON 15: MANAGING LINUX AND MACOS * Topic 15A: Identify Features of Linux * Topic 15B: Identify Features of macOS LESSON 16: CONFIGURING SOHO NETWORK SECURITY * Topic 16A: Explain Attacks, Threats, and Vulnerabilities * Topic 16B: Compare Wireless Security Protocols * Topic 16C: Configure SOHO Router Security * Topic 16D: Summarize Security Measures LESSON 17: MANAGING SECURITY SETTINGS * Topic 17A: Configure Workstation Security * Topic 17B: Configure Browser Security * Topic 17C: Troubleshoot Workstation Security Issues LESSON 18: SUPPORTING MOBILE SOFTWARE * Topic 18A: Configure Mobile OS Security * Topic 18B: Troubleshoot Mobile OS and App Software * Topic 18C: Troubleshoot Mobile OS and App Security LESSON 19: USING SUPPORT AND SCRIPTING TOOLS * Topic 19A: Use Remote Access Technologies * Topic 19B: Implement Backup and Recovery * Topic 19C: Explain Data Handling Best Practices * Topic 19D: Identify Basics of Scripting LESSON 20: IMPLEMENTING OPERATIONAL PROCEDURES * Topic 20A: Implement Best Practice Documentation * Topic 20B: Use Proper Communication Techniques * Topic 20C: Use Common Safety and Environmental Procedures

CompTIA A+ Certification (Exams 220-1101 and 220-1102)
Delivered Online6 days, Jun 10th, 13:00 + 11 more
£2475

CompTIA A+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician. This course is also designed for students who are seeking the CompTIA A+ certification and who want to prepare for the CompTIA A+ Core 1 220-1101 Certification Exam and the CompTIA A+ Core 2 220-1102 Certification Exam. Overview On course completion, participants will be able to: Support operating systems. Install and configure PC system unit components and peripheral devices. Install, configure, and troubleshoot display and multimedia devices. Install, configure, and troubleshoot storage devices. Install, configure, and troubleshoot internal system components. Install, configure, and maintain operating systems. Maintain and troubleshoot Microsoft Windows. Explain network infrastructure concepts. Configure and troubleshoot network connections. Manage users, workstations, and shared resources. Implement client virtualization and cloud computing. Implement physical security. Secure workstations and data. Troubleshoot workstation security issues. Support and troubleshoot laptops. Support and troubleshoot mobile devices. Install, configure, and troubleshoot print devices. Implement operational procedures. CompTIA A+ certified professionals are proven problem solvers. They support today's core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today's digital world. It is the only industry recognized credential with performance-based items to prove pros can think on their feet to perform critical IT support tasks in the moment. It is trusted by employers around the world to identify the go-to person in end point management and technical support roles. CompTIA A+ is regularly re-invented by IT experts to ensure that it validates core skills and abilities demanded in the workplace. 1 - INSTALLING MOTHERBOARDS AND CONNECTORS * Explain Cable Types and Connectors * Install and Configure Motherboards * Explain Legacy Cable Types 2 - INSTALLING SYSTEM DEVICES * Install and Configure Power Supplies and Cooling * Select and Install Storage Devices * Install and Configure System Memory * Install and Configure CPUs 3 - TROUBLESHOOTING PC HARDWARE * Apply Troubleshooting Methodology * Configure BIOS/UEFI * Troubleshoot Power and Disk Issues * Troubleshoot System and Display Issues 4 - COMPARING LOCAL NETWORKING HARDWARE * Compare Network Types * Compare Networking Hardware * Explain Network Cable Types * Compare Wireless Networking Types 5 - CONFIGURING NETWORK ADDRESSING AND INTERNET CONNECTIONS * Compare Internet Connection Types * Use Basic TCP/IP Concepts * Compare Protocols and Ports * Compare Network Configuration Concepts 6 - SUPPORTING NETWORK SERVICES * Summarize Services Provided by Networked Hosts * Compare Internet and Embedded Appliances * Troubleshoot Networks 7 - SUMMARIZING VIRTUALIZATION AND CLOUD CONCEPTS * Summarize Client-Side Virtualization * Summarize Cloud Concepts 8 - SUPPORTING MOBILE DEVICES * Set Up Mobile Devices and Peripherals * Configure Mobile Device Apps * Install and Configure Laptop Hardware * Troubleshoot Mobile Device Issues 9 - SUPPORTING PRINT DEVICES * Deploy Printer and Multifunction Devices * Replace Print Device Consumables * Troubleshoot Print Device Issues 10 - CONFIGURING WINDOWS * Configure Windows User Settings * Configure Windows System Settings 11 - MANAGING WINDOWS * Use Management Consoles * Use Performance and Troubleshooting Tools * Use Command-line Tools 12 - IDENTIFYING OS TYPES AND FEATURES * Explain OS Types * Compare Windows Editions 13 - SUPPORTING WINDOWS * Perform OS Installations and Upgrades * Install and Configure Applications * Troubleshoot Windows OS Problems 14 - MANAGING WINDOWS NETWORKING * Manage Windows Networking * Troubleshoot Windows Networking * Configure Windows Security Settings * Manage Windows Shares 15 - MANAGING LINUX AND MACOS * Identify Features of Linux * Identify Features of macOS 16 - CONFIGURING SOHO NETWORK SECURITY * Explain Attacks, Threats, and Vulnerabilities * Compare Wireless Security Protocols * Configure SOHO Router Security * Summarize Security Measures 17 - MANAGING SECURITY SETTINGS * Configure Workstation Security * Configure Browser Security * Troubleshoot Workstation Security Issues 18 - SUPPORTING MOBILE SOFTWARE * Configure Mobile OS Security * Troubleshoot Mobile OS and App Software * Troubleshoot Mobile OS and App Security 19 - USING SUPPORT AND SCRIPTING TOOLS * Use Remote Access Technologies * Implement Backup and Recovery * Explain Data Handling Best Practices * Identify Basics of Scripting 20 - IMPLEMENTING OPERATIONAL PROCEDURES * Implement Best Practice Documentation * Use Proper Communication Techniques * Use Common Safety and Environmental Procedures

CompTIA A+
Delivered Online6 days, Jun 10th, 13:00 + 11 more
£2475

Memory Enhancement

By OnlineCoursesLearning.com

Memory Enhancement Certification A decent memory is a helpful resource at work and home, yet a considerable lot of us realize that our abilities in this space could profit by some improvement. Memory improvement is particularly significant in later life, as our cerebrums begin to recoil. In this course, you will find pragmatic way of life changes, activities, and techniques that will upgrade your memory and animate your mind. You Will Learn: What your eating routine and hydration levels mean for your memory The part of cerebrum preparing applications in improving memory Step by step instructions to join memory-boosting practices into your regular daily existence Why reflection may help your memory Why taking up another pastime or learning a subsequent language will improve your memory Advantages of Taking This Course: Improving your memory will make you more successful at work Improving your memory will help improve your trust in friendly circumstances, as you are less inclined to neglect names and other key subtleties Upgrading your memory will moderate regular age-related decay, which will improve your personal satisfaction into mature age On the off chance that you are an understudy, this course will assist you with improving your evaluations and approach your examinations with certainty

Memory Enhancement
Delivered Online On Demand
£50

Educators matching "Memory"

Show all 334
Renegade Theatre Community Interest Company

renegade theatre community interest company

London

Renegade Theatre was founded in 2018 by Natasha Langridge as an umbrella to create and produce plays for, with and about her local community in North Kensington. Renegade's first project was In Memory of Leaves written and performed by Natasha; an uncompromising monologue that explores what happens to communities when they are moved from their homes. It is personal and bracing; a love note to neighbours and a revolutionary call to the world. In Memory of Leaves was first performed as a site specific piece outdoors on The Wornington Green Estate as part of the inTRANSIT Festival before moving to the Teatro Keiros (Rome). Natasha performed the piece as part of Portobello Live in 2018 and, with Arts Council funding, took it on a three week tour of London canals across Kensington/Camden/Hackney on the Fordham Gallery Barge. Renegade Theatre's current projects include The Wornington Word: A People's History of The Wornington Green Estate W10. The project will record and archive the history of the estates residents from the 1960's up to recent times with oral histories, photos and a documentary that will eventually be archived in Kensington Central and North Kensington Libraries as well as being entered into the 2020 Portobello Film Festival. The project will ultimately facilitate the residents in coming together, for the last time, to create a documented history of their lives on the estate before it is demolished and regenerated into the new Portobello Square development. Renegade Theatre runs a free Saturday drama club for local children, led by Natasha Langridge and Hannah Hutch who has performed at The National Theatre, Shakespeare’s Globe, The Old Vic and the BBC. The classes use a mix of drama and physical theatre games with techniques to promote fun, confidence and creativity. Over time we have created three plays, a Carnival Song, three films, a series of short films - the Golden Gifts Project - funded by the Kensington and Chelsea Foundation and The Story Stall, an onsite performance about the history of Golborne Market. You can view all of our creations by checking out the Latest Videos section below. Enjoy! Currently we are working on a series of films and plays with the children about North Kensington called Golborne Gifts, funded by the Kensington and Chelsea Foundation.