XML primer training course description This course has been designed for web and intranet developers who want to accelerate their learning of XML and its applications without the grind of book learning. Although a basic knowledge of HTML and JavaScript is assumed, it is also assumed you know very little about XML and how to use it. On completion of this course you should understand the benefits of using XML and be able to design XML solutions where applicable to your company's Internet/intranet requirements. The course will be particularly beneficial if you want to know how to communicate data to diverse applications over the Internet or company intranet. What will you learn Write XML. Debug XML. Examine existing code and determine its function. XML primer training course details Who will benefit: Anyone working with XML. Prerequisites: HTML5 development fundamentals Duration 3 days XML primer training course contents The origins of XML Markup languages, SGML, document type definitions and validity, introducing XML, IE and XML, accessing content and adding style. Basic XML XML document structure, elements and attributes, grammar, well formed documents, other XML elements and references. Document Type Definition (DTDs) Creating a DTD, basic declaration, declaring elements, content definitions, entities, entity declarations, notations, defining attributes, attribute types, forcing inclusion or exclusion of DTD sections, validation. Namespaces Declaring namespaces, scoping, removing and changing namespaces, qualified names, attribute namespaces. An introduction to schemas Constructing schemas, defining the root element and its contents,<ELEMENTTYPE>, defining root element contents, adding attributes definitions, <ATTRIBUTETYPE>, <ELEMENT>, <ATTRIBUTE>. XML & the Document Object Model (DOM) What the DOM offers, DOM and W3C. Basic DOM concepts XML documents as trees, terminology of tree elements. Key DOM Objects: The document object and its creation, base objects, IE specifics, the XML node hierarchy. Programming DOM Viewing a DOM model as XML, getting the root element of a document, iterating nodes of a DOM, basic node properties, collection objects, searching for specific values, filtering a nodelist by tagname, more filtering methods, selecting nodes from their attributes. Amending Content and Structure Creating/saving a DOM as XML, changing content/structure, dynamically building a DOM. Using ASP and other techniques ASP techniques, HTTPREQUEST object, XSL, transforming and formatting XML. Formatting Using CSS. CSS And XML. XSL Transformations - XSLT Introduction, the XSL root element, applying XSL stylesheets to XML, XSL elements and operations, instructions - creating text nodes and applying templates, a 'drill-down' approach, simple output formatting, pattern filters - patterns based on position, the Match and Select attributes and their patterns, formatting output, creating new XML in output.
CWAP training course description This WiFi analysis course consists of hands-on learning using the latest enterprise wireless LAN analysis and troubleshooting tools. The course takes an in-depth look at the functionality of WLANs, intended operation of the 802.11 protocol and Wi-Fi Alliance specifications, WLAN frame formatting and structure, troubleshooting methodology, and protocol analysis. It also includes extensive training in modern spectrum analysis with a focus on advanced RF behaviour analysis, data collection methods, interpreting spectrum plots and charts, and understanding advanced features of WLAN spectrum analysers. What will you learn Analyse WiFi frames using Wireshark. Explain 802.11 protocol operation. Troubleshoot WiFi networks using Wireshark. Troubleshoot WiFi networks using spectrum analysers. CWAP training course details Who will benefit: Technical Network Staff Anyone looking to become a CWAP Prerequisites: Certified Wireless Network Administrator Duration 4 days CWAP training course contents Principles of WLAN Communication 802.11 Working Group, OSI reference model and the 802.11 PHY and MAC, Communication sublayers and data units, WLAN architecture components, Organization of station forwarding Addressing and internetworking operation, Modern WLAN product architectures. Physical (PHY) and MAC Layer Formats and Technologies Physical layer functions, Preamble function and format, Header purpose and structure, Analysis of PHY problems, Physical PPDU formats, 802.11b, 802.11a, 802.11g, 802.11n, MAC frame components, MAC encapsulation, Fields and subfields of the MAC header, Frame Control, Frame types and subtypes and their uses, Addressing, Frame body, Data frame format, Control frame format, Management frame format, Information elements and fields. Beaconing and synchronization Scanning, Client state machine, 802.11 contention, QoS, Admission control, Band steering and airtime fairness mechanisms Fragmentation, Acknowledgments and Block acknowledgments, Protection mechanisms and backward compatibility, Power management, Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC), Security components, methods, and exchanges, Roaming procedures exchanges, Future protocol enhancements. 802.11n Transmit beamforming, Spatial multiplexing, Maximal Ratio Combining (MRC), Space-Time Block Coding, 40 MHz channels, Frame aggregation, HT-OFDM format, Modulation and Coding Schemes (MCS), HT frame formatting and more. Protocol Analysis Tools and Methodology Troubleshooting methodology, Protocol analyser types, Analysis NIC/adapter selection and constraints, Interpreting results based on location, Analyzer settings and features, Filtering and channel scanning, Interpreting decodes, Using advanced analysis features, Assessing WLAN health and behaviour factors, Evaluating network statistics, Troubleshooting common problems, Wired analysis to support wireless network issues. Spectrum Analysis Tools and Methodology Radio frequency behaviour review, Visualizing RF domains using spectrum measurement tools, Spectrum analyser types and operation, Analyser specifications and characteristics, Understanding spectrum data presentation, Interpreting plots and charts, Common WLAN spectrum analyser features, Identifying transmit patterns, Device classification and network impact, Recognizing transmit signatures. Hands on lab exercises Wireshark Setup, Use, and In-Depth Analysis Wireshark is fundamental to troubleshooting. Labs include: - Capabilities, configuration, and data display - Opening, collecting, saving, and modifying capture files. - Filtering traffic, and using colouring rules as analysis aides. - Live captures based on a set of desired collection criteria. - Identify and isolate network problems. - Conversation analysis. - Remote packet capture with an AP. Understanding Frame Components Familiarity with the frame structure and contents is essential in real -world troubleshooting efforts. Labs include: - Understanding the MAC header - Comparing the three major frame types and their subtypes - Analysing frame formats of individual frame types - Analysing 802.11n frame components - Additional information is reported by protocol analysers - Information not visible in protocol analysers Frame Exchanges Understanding frame exchange rules and behaviors is critical to identifying expected and unexpected. It is also necessary to understand what is normal so that aberrations can be properly troubleshot. Labs include: - Connectivity exchanges and sequences - Legacy and modern security exchanges - ERP and HT protection mechanisms - Power save behaviour - Acknowledgments, block acknowledgments, and supporting action frames - Dynamic rate switching - Band steering Troubleshooting Common Problems This lab exposes students to hands-on troubleshooting skills by setting up common problems in WLANs and allowing students to attempt to solve them. - Trouleshooting connectivity exchanges - Troubleshooting 802.1X and EAP exchanges - Troubleshooting roaming Spectrum Analyzer Setup, Use, and In-Depth Analysis Specifically, it will explore the plots and charts used to display spectrum data and how to interpret this data to define a transmitter's impact on the network. The following are covered: - Installing the analyser and using display and navigation - The 'RF perspective' provided by each plot and chart - Using built-in features and automated device identification - Characterizing the behaviours of an interference source - Assessing the impact of an interference source - Determining the impact of transmitter proximity on interference. - Identifying signatures of common transmitters - Remote spectrum analysis with an AP
Definitive Nagios training course description Nagios is an open source application designed to provide system and network monitoring. This hands on course gives a comprehensive coverage of using Nagios to provide monitoring of Linux, Windows and network devices. The course is based on Nagios core but contact us if you would like Nagios XI. What will you learn Install Nagios. Configure Nagios. Monitor Windows, Linux and Cisco (and other network equipment) using Nagios. Configure notifications Definitive Nagios training course details Who will benefit: Technical staff working with Nagios. Prerequisites: None. Duration 2 days Definitive Nagios for engineers Nagios architecture Downloading Nagios, Installing Nagios, Nagios core, plugins, frontends, addons. Nagios XI. Nagios Fusion. Hands on Installing Nagios. Getting started with Nagios Nagios files, nagios.cfg, minimal.cfg. Starting and stopping Nagios. Hands on Controlling Nagios. Using Nagios Nagios web interface. Maps, Hosts, host groups, services, service groups, problems. Reports. Configuration. Hands on Using the web interface. Monitoring Linux systems SSH, NRPE. Hands on Monitoring Linux system health. Monitoring Windows systems Installing NSClient++, Configuring NSClient++, check_nt plugin, monitoring uptime, CPU, memory, disks, services, processes. Hands on Monitoring Windows system health. Monitoring network devices SNMP architecture, MIBs. Polling. Hands on Configuring Nagios for SNMP. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Hands on Monitoring network devices. Nagios alerts and notifications SNMP traps. Email notifications, SMS alerts other messaging
Start your career as a Network Cybersecurity Engineer and earn up to £34,000 per month. In an era where digital threats are evolving rapidly, the demand for skilled cybersecurity professionals has never been higher. You can easily earn around £100,000 if you are good at your job. Our Network Cyber Security Engineer Job Ready Program is expertly made to equip you with the knowledge, skills, and certifications required to succeed in this vital industry. We will work with you and for you until you get the job you want. This complete Network Cyber Security Engineer Job Ready program is more than just a learning experience; it's a career transformation journey that guarantees you're ready for the job market and a standout in it. Our mission is simple - to be your trusted partner every step of the way, from Training to Employment. Enrol in the Network Cyber Security Engineer Job Ready Program today and take the first step towards a secure, successful, and fulfilling career. With our comprehensive training, ongoing career support, and a money-back guarantee, your journey to becoming a cybersecurity expert is just a click away. In addition to teaching you the technical skills you need, we will also provide you with career mentoring and support. We will help you build your resume, prepare for interviews, and land your dream job. We also have partnerships with many companies that are hiring Data Analysts, so we can help you get the job you want. If you are not happy with our service, we also offer a 100% money-back guarantee. So what are you waiting for? Enrol in our Network Cyber Security Engineer Job Ready Program today and start your journey to becoming a successful Network Cyber Security Engineer! If you have any questions, you can contact us. We will be happy to provide you with all the information you need. Get Unlimited Access to Entire Library: Enjoy unlimited access to our entire course library for a year. Seize this golden opportunity to advance your skills and achieve new heights! Why this is the Perfect Package for You! Grow and Boost Your Career: Drive your career forward by receiving a regulated qualification recognised by the British Government. Upgrade Your Knowledge and Skills: Upgrade your knowledge and refine your skills for better professional success. Be More Credible and Qualified: Enhance your credibility and qualifications, making you a standout candidate in your field. Get Unlimited Access to Entire Library: Enjoy unlimited access to our entire course library for a year. Seize this golden opportunity to advance your skills and achieve new heights! Support and Consultation from Experts: Receive valuable support and expert consultation to navigate challenges and opportunities in your career. 100% Money-Back Guarantee: Be confident with a 100% money-back guarantee, ensuring your investment in self-improvement is risk-free. Courses we will provide once you enrol in the program: Course 01: Cyber Security Incident Handling and Incident Response Course 02: Cyber Security Advanced Training Course 03: Linux File System Course 04: Cyber Security Course 05: Functional Skills IT Course 06: CompTIA Security+ (SY0-601) Course 07: CompTIA A+ (220-1001) Course 08: CompTIA A+ (220-1002) Course 09: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 10: Learning Computers and Internet Course 11: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 12: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 13: CompTIA Network+ Certification (N10-007) Course 14: Diploma in CompTIA Network+ Training at QLS Level 7 Course 15: CompTIA PenTest+ (Ethical Hacking) Course 16: Cryptography Course 17: IT Support Technician Course 18: Cyber Security Law How Can We Offer Job Guarantees? HF Online provides consultancy, professional and educational services to many of the companies in the UK. During our intense exclusive training program, you will not just gain and complete the industry valuable certification but will gain industry experience as well, which is imperative to get your 1st job in the sector. The Network Cyber Security Engineer Job Ready Program - Career Support & Money Back Guarantee Job Ready Program is completed in 9 easy steps: Step 1: Enrol in the Programme Begin your exciting journey with us by enrolling in the Data and Business Intelligence Analyst Job Ready Program. Complete your registration and make a secure online payment. Remember, we offer a 14-day money-back guarantee if you're not completely satisfied. After you enrol in the Program, you will get lifetime access to 6 premium courses related to Web Development. These courses will teach you the knowledge and skills required to become a successful Data and Business Intelligence Analyst. Our customer service team will help you and keep in contact with you every step of the way. So you won't have to worry about a thing! Step 2: Initial One-On-One Counselling Session Once enrolled, you will be paired with a dedicated career mentor. Schedule your first one-on-one session to discuss your career aspirations, skills, experience, and any areas for potential growth. This conversation will shape your learning and development path. Step 3: Certification upon Course Completion After learning from the courses, you must obtain certificates for each course. There will be exams for every course, and you have to pass them to get your certificate. To pass successfully, you must get 90% marks. Once you pass the exams, you will receive hardcopy certificates. These certificates will prove that you're an expert in the subject. Step 4: CV Revamping Our team of professionals will build you a compelling CV and LinkedIn profile. We'll ensure it presents your skills and qualifications effectively and is tailored to the needs and expectations of the finance industry. With these powerful tools in hand, you'll be fully prepared to tackle job interviews confidently. Step 5: Building Network and Submitting CV We understand the power of casting a wide net. We'll strategically submit your CV to various platforms and networks, expanding your reach and connecting you with valuable opportunities that align with your career goals. We will also make connections with many high-profile individuals and companies through your LinkedIn profile. Step 6: Interview Preparation With your CV ready, we'll move on to interview preparation. Gain exclusive access to our database of potential interview questions. Through simulated interviews with your mentor, you'll practice your responses and receive valuable feedback to further refine your skills. Step 7: Securing Job Interviews Leveraging our partnerships with leading companies, we'll secure job interviews for you. We'll ensure you get the opportunity to showcase your skills to potential employers and get the dream job you want. Step 8: Post-Interview Support Post-interview, we'll provide a debriefing session to reflect on your performance and identify areas of improvement for future interviews if necessary. Remember, our commitment extends until you land your dream job. Step 9: Celebrate Your New Job! Once you've secured your dream job in web development, it's time to celebrate! However, our support doesn't end there. We'll provide you with ongoing career advice to ensure you continue to thrive in your new role. We're excited to accompany you on this journey to success. Enrol today, and let's get started! Your path to a successful Data and Business Intelligence Analyst career begins with us. CPD 100 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Network Cyber Security Engineer Job Ready Program is perfect for: Aspiring cybersecurity professionals looking for comprehensive training and a job. Individuals looking to transition into the cybersecurity field from other IT or technical roles. Recent graduates or students who want to get a job with practical, real-world cybersecurity skills. Tech enthusiasts eager to deepen their understanding of network security, ethical hacking, and cyber law. Professionals aiming for career advancement or specialisation in cybersecurity and network engineering. Career path After completing this Network Cyber Security Engineer Job Ready Program, you can get different jobs with high-paying salaries like: Entry-Level Cybersecurity Analyst: £25,000 - £40,000 Cyber Security Specialist/Technician: £35,000 - £60,000 IT Security Consultant: £50,000 - £80,000 Cyber Security Manager: £70,000 - £100,000 Chief Information Security Officer (CISO): £90,000 - £150,000 Certificates CPD Accredited e-Certificate Digital certificate - Included CPD Accredited Framed (Hardcopy) Certificate Hard copy certificate - Included Enrolment Letter Digital certificate - Included QLS Endorsed Hard Copy Certificate Hard copy certificate - Included Student ID Card Digital certificate - Included
Network+ training course description This network+ course covers the TCP/IP side of the exam. For delegates to pass the exam it is important that they meet the prerequisites, self study is also required. An intensive hands on IP foundation. The course focuses on all parts of TCP/IP including layers 4 to 7 on end stations as well as layer 3 on routers. The TCP/IP protocols are also studied to enable delegates to be able to troubleshoot TCP/IP using Wireshark. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Use ping, traceroute and other tools to diagnose faults on a network. Configure IP on PCs and routers. Plan IP addresses and subnets. Analyse IP and TCP packets using an analyser. Troubleshoot TCP/IP. Network+ training course details Who will benefit: Those wishing to pass the Network+ exam. Prerequisites: Introduction to data communications & networking Duration 5 days Network+ training course contents What is TCP/IP? TCP and IP are protocols, 7 layer model, network layers, hardware/software layers, internetworking, protocols, What is IP? What is TCP? The internet, The IAB, RFCs. Ping and Wireshark Host configuration, IP addresses, subnet masks, default gateways, ping. Hands on Base configuration. Testing with ping. Analysing packets with Wireshark. Switches and Wireshark Switches versus hubs, layer 2 forwarding table, flooding, broadcasts. Hands on Building a switched based network. Configuring network devices Configuration options, console port, putty, telnet. Hands on Configuring switches, telnet. IP IP packet format, protocol field, TTL, DiffServ, fragments, ICMP. Hands on IP packet analysis. IP addressing 32 bits, dotted decimal, rules, networks, role of subnet masks, simple subnetting, prefix notation. Broadcasts, special use addresses. Hands on Planning and implementing addressing. IP and the lower layers ARP, media not supporting ARP. Hands on ARP. Routing What are routers? What routers do, default gateways, routing and addressing, routing tables, ways to update routing tables. Hands on Building a routed network, traceroute. Routing protocols IGPs and EGPs, RIP, RIPv2, Why not to use RIP, OSPF, OSPF metrics, convergence, distance vector protocols, link state protocols. Hands on OSPF, analysing routing tables, loopbacks. Network simulators Network simulators, EVE-NG, GNS3, CML. Hands on Using EVE-NG. Subnetting Subnetting to the bit level, ranges, how prefixes are used. Hands on Subnetting. VLANS and IP addressing What are VLANs, tagging, 802.1Q, Inter VLAN routing. Hands on Inter VLAN routing. TCP and UDP Layer 4, port numbers, client ports, broadcasts multicasts and layer 4, UDP header, TCP header, connections, ACK, sliding windows, options, connection states. Sockets. Hands on Analysing TCP packets. IPv4 address configuration Private addresses, NAT, NAPT, dynamic addressing, DHCP, link local addresses. Hands on DHCP, NAT. IPv6 What is IPv6, 128 bit addresses, address formats, IPv6 address allocation, header format, migration, dual stack, tunnelling, NAT64, DNS64. Hands on IPv6 setup troubleshooting. IPv6 address configuration Static addressing, EUI-64 addresses, IPv6 address order, SLAAC, DHCPv6. Hands on SLAAC. Applications Clients, servers, HTTP, Email, resource sharing, VoIP, video, terminal emulation, remote desktop. Network management and SNMP. Hands on Servers, TFTP, VoIP packet analysis. DNS Names and addresses, hosts file, how DNS works. FQDNs, DNS client configuration. Hands on Troubleshooting DNS. Security Firewalls, firewall architectures, DMZ, how firewalls work, proxy servers, filtering, ACLs, IDS, VPNs, authentication, encryption, tunnels, secure protocols. Hands on Firewalls, SSH Troubleshooting Methods, tools. Using the 7 layer model. Troubleshooting toolkits. Hands on Fixing the network.
CCNA training course description The Implementing and Administering Cisco Solutions (CCNA) course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. It also gives a foundation in network programmability, and software-defined networking What will you learn Install, configure, and operate a small to medium sized network Gain a foundation in the essentials of networking, security, and automation Prepare for the 200-301 CCNA exam, which earns CCNA certification CCNA training course details Who will benefit: Network support help desk technicians involved in the basic installation, operation, and verification of Cisco networks. Anyone seeking CCNA certification. Prerequisites: Introduction to Data communications & networking Duration 5 days CCNA training course content After taking this course, you should be able to: Identify the components of a computer network and describe their basic characteristics. Understand the model of host-to-host communication. Describe the Cisco IOS software. Describe LANs and the role of switches within LANs. Describe Ethernet and describe the operation of switches. Install a switch and perform the initial configuration. Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting. Describe the TCP/IP Transport and Application layers Explore functions of routing. Implement basic configuration on a Cisco router. Explain host-to-host comms across switches and routers. Identify and resolve common switched network issues and common problems associated with IPv4 addressing. Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity. Describe static routing. Describe, implement, and verify VLANs and trunks. Describe inter VLAN routing. Explain the basics of dynamic routing protocols and describe components and terms of OSPF. Explain how STP and RSTP work. Configure link aggregation using EtherChannel. Describe the purpose of Layer 3 redundancy protocols. Describe basic WAN and VPN concepts. Describe the operation of access control lists (ACLs) and their applications in the network. Configure Internet access using DHCP clients and explain and configure NAT on Cisco routers. Describe basic QoS concepts. Describe the concepts of wireless networks, which types of wireless networks can be built, and how to use Wireless LAN Controllers (WLCs). Describe network and device architectures, introduce virtualization, network programmability and SDN and describe smart network management solutions such as Cisco DNA Centerâ¢, SD-Access, and SD-WAN. Configure basic IOS system monitoring tools. Describe the management of Cisco devices. Describe the current security threat landscape. Describe threat defence technologies. Implement a basic security configuration of the device management plane. Implement basic steps to harden network devices. Detailed course outline Exploring the Functions of Networking. The Host-to-Host Communications Model. Operating Cisco IOS Software. Introducing LANs. Exploring the TCP/IP Link Layer. Starting a Switch. The TCP/IP IP layer, IPv4 Addressing, and Subnets. The TCP/IP Transport Layer and Application Layer. Exploring the Functions of Routing. Configuring a Cisco Router. Exploring the Packet Delivery Process. Troubleshooting a Simple Network. Introducing Basic IPv6. Configuring Static Routing. Implementing VLANs and Trunks. Routing Between VLANs. Introducing OSPF. Redundant Switched Topologies with EtherChannel. Explaining Basics of ACL. Enabling Internet Connectivity. Explaining the Evolution of Intelligent Networks. Introducing System Monitoring. Managing Cisco Devices. Securing Administrative Access. Implementing Device Hardening. Self-Study: Building Redundant Switched Topologies. Exploring Layer 3 Redundancy. Introducing WAN Technologies. Introducing QoS. Explaining Wireless Fundamentals. Introducing Architectures and Virtualization. Examining the Security Threat Landscape. Threat Defense Technologies.
Windows server 2019 administration course description This five-day instructor-led course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing identity, networking, storage and compute by using Windows Server 2019, and who need to understand the scenarios, requirements, and options that are available and applicable to Windows Server 2019. The course teaches IT professionals the fundamental administration skills required to deploy and support Windows Server 2019 in most organizations. What will you learn Administrate Windows Server 2019. Configure file servers and storage. Manage Hyper-V virtualization and containers. Implement HA and disaster recovery solutions. Implement service monitoring and performance monitoring, and apply troubleshooting. Perform upgrades and migration related to AD DS, and storage. Windows server 2019 administration course details Who will benefit: Technical staff working with Windows server 2019. Prerequisites: TCP/IP foundation for engineers. Some Windows experience. Duration 5 days Windows server 2019 administration course contents Windows server administration overview Windows server administration principles and tools, Introducing Windows Server 2019, Windows Server Core Overview. Lab: Deploying and configuring Server Core, Implementing and using remote server administration. Identity Services in Windows server AD DS, Windows Server domain controllers, Azure AD, Group Policy, Active Directory Certificate Services. Lab: Deploying a new domain controller on Server Core, Configuring Group Policy, Deploying and using certificate services. Network Infrastructure services in Windows server DHCP, DNS services, IPAM. Lab: Deploying and configuring DHCP, Deploying and configuring DNS. File Servers and Storage management Volumes and file systems, sharing in Windows Server, Storage Spaces in Windows Server, Data Deduplication, Iscsi, Distributed File System. Lab: Implementing Data Deduplication, Configuring iSCSI storage, Configuring redundant storage spaces, Implementing Storage Spaces Direct. Hyper-V virtualization and containers Hyper-V in Windows Server, Configuring VMs, Securing virtualization in Windows Server, Containers in Windows Server, Overview of Kubernetes. Lab: Creating and configuring VMs, Installing and configuring containers. High Availability in Windows Server Planning for failover clustering implementation, Creating and configuring failover cluster, stretch clusters, High availability and disaster recovery solutions with Hyper-V VMs. Lab: Configuring iSCSI storage, Configuring a failover cluster, Deploying and configuring a highly available file server, Validating the highly available file server deployment. Disaster recovery in Windows Server Hyper-V Replica, Backup and restore infrastructure in Windows Server. Lab: Implementing Hyper-V Replica, Implementing backup and restore with Windows Server Backup. Windows Server security Credentials and privileged access protection, Hardening Windows Server, Just Enough Administration in Windows Server, Securing and analyzing SMB traffic, Windows Server update management. Lab: Configuring Windows Defender Credential Guard, Locating problematic accounts, Implementing LAPS. Remote Desktop Services in Windows Server Remote Desktop Services, session-based desktop deployment, personal and pooled virtual desktops. Lab: Implementing RDS, Configuring RemoteApp collection settings, Configuring a virtual desktop template. Remote access and web services in Windows Server Overview of RAS in Windows Server, Implementing VPNs, Implementing NPS, Implementing Always On VPN, Implementing Web Server in Windows Server. Lab: Implementing Web Application Proxy, Implementing VPN in Windows Server, Deploying and Configuring Web Server. Monitoring, performance, and troubleshooting Windows Server monitoring tools, Performance Monitor, Monitoring event logs for troubleshooting. Lab: Establishing a performance baseline, Identifying the source of a performance problem, Viewing and configuring centralized event logs, Identifying the source of a performance problem, Describe monitoring tools and performance monitoring in Windows Server, Describe event logging and perform event logging monitoring for troubleshooting purposes. Upgrade and migration in Windows Server AD DS migration, Storage Migration Service, Windows Server migration tools. Lab: Selecting a process to migrate server workloads, Planning how to migrate files by using Storage Migration Service.
CompTIA A+ bootcamp training course description This course includes A+ Certification: Systems Hardware and Networking Support Skills and A+ Certification: Operating Systems and Security Support Skills. The course will provide IT "super users" or new support professionals with the fastest route to A+ Certification. Full practical sessions will prepare students for the two A+ Certification exams. Note: Some self-study each evening will be required. What will you learn Install, configure, and troubleshoot peripheral devices, system components, print devices, wired and wireless LAN links and internet access devices. Install, configure, and troubleshoot the Microsoft Windows, Linux, and Mac OS PC operating systems plus iOS, Android, and Windows mobile devices. Perform basic PC maintenance. Configure access control measures. Perform basic PC maintenance. CompTIA A+ bootcamp training course details Who will benefit: Students wishing to take both CompTIA A+ exams. Prerequisites: PC fundamentals Duration 5 days Networking Microsoft Systems course contents Peripherals and Adapters Motherboard Components, Connection Interfaces, Display Devices, Audio and Multimedia Devices, Removable Storage Devices. System Components Mass Storage Devices, System Memory, Processors, BIOS and UEFI, Power Supplies. Troubleshooting and Mobile Devices Troubleshooting System Components, Laptops, Mobile Devices, Troubleshooting Mobile Devices. Printer and Network Hardware Printers, Configuring Printers, Troubleshooting Printers, Network Architectures, Ethernet Networks. Networks Wireless Networks, Internet Connections, Internet Protocol, Routers and Firewalls, Troubleshooting Networks. Supporting Windows (1) Windows Operating System, Administration Tools, Managing Storage, Managing Files, Managing Applications. Supporting Windows (2) Managing Devices, Managing Performance, Troubleshooting Windows, Installing Windows. Supporting Windows Troubleshooting Boot Problems, Maintenance and Backup, Threats and Vulnerabilities, Viruses and Malware, Securing Workstations, Securing Data. Supporting Windows Networks Configuring Network Connections, Securing Network Connections, Configuring Shared Resources, Virtualization and Services. Linux, OS X, and Mobile OS Linux Operating System, OS X, Mobile Operating Systems, Mobile OS Security and Troubleshooting, Safety and Environmental Procedures, Professionalism and Communication.
Linux engineer certification training course description LPIC-2 is the second certification in LPI's multi level professional certification program. This course teaches the skills necessary to pass the LPI 201 exam; the first of two LPIC-2 exams. Specifically, the course covers the administration of Linux systems in small to medium sized mixed networks. What will you learn Perform advanced administration tasks. Perform advanced file system administration. Linux engineer certification training course details Who will benefit: Linux administrators. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Linux engineer certification fundamentals training course contents Part I The LPI 201 Exam Starting a System The Linux Boot Process, Firmware Startup, BIOS Startup, UEFI Startup, Linux Bootloaders, GRUB Legacy, GRUB 2, Alternative Bootloaders, Secure Bootloaders, Process Initialization, SysV Method, systemd Method, Upstart Method, System Recovery, Kernel Failures, Root Drive Failure. Maintaining the System Fluid Messaging, Static Messaging, System backups, Backup Strategies, Performing Backups, Installing Programs from Source, Obtaining and unpacking Installation Files, Compiling Programs, Resource Usage: Managing, measuring, predicting and troubleshooting. Mastering the Kernel What Is the Kernel? Kernel Features, Parts of the Kernel, Kernel Versions, Obtaining Source Code, Creating the Configuration File, Compiling and Installing the Kernel, Compiling and Installing Modules, Creating an Initial RAM Disk, Booting the New Kernel, Creating a Kernel Package, Maintaining the Kernel, Working with Module Files, Module Commands, Working with Hardware, Automatically Detecting Hardware, Troubleshooting the Kernel. Managing the Filesystem The Linux Filesystem, Filesystem Structures, Filesystem Types, Making Filesystems, Attaching Filesystems, Memory-Based Linux Filesystems, the Btrfs Filesystem, Btrfs Subvolumes, Btrfs Snapshots, Optical Filesystems, Swap Filesystems, Network-Based Filesystems, Auto-Mounting, Encrypted Filesystems, Maintaining Linux Filesystems, Adjusting a Filesystem, Checking and Repairing a Filesystem, SMART. Administering Advanced Storage Devices Configuring RAID, Implementing RAID on Linux, Managing a RAID Array, Adjusting Storage Devices, Looking at Drive Interface Concepts, Testing and Tuning Drives, Implementing iSCSI, Managing Logical Volumes, LVM, Creating Logical Volumes, Supporting Logical Volumes, Understanding the Device Mapper. Navigating Network Services Networking Basics, The Physical Layer, The Network Layer, The Transport Layer, The Application Layer, Configuring Network Features, Network Configuration Files, Graphical Tools, Command-Line Tools, Basic Network Troubleshooting, Checking the Log Files, the ARP Cache, Sending Test Packets, Testing Network Routes, Testing Client/Server Connectivity, Finding Host Information, Network Security, Advanced Network Troubleshooting, Viewing Open Network Connections, Viewing Network Statistics, Scanning the Network, Capturing Network Traffic.
CWISA training course description This CWISA course covers wireless technologies with reference to IoT. It examines from an IoT perspective how wireless works, and is an excellent introduction to IoT for the wireless engineer. Topics range from wireless technologies, RF, to mobile networks, IoT, and security. What will you learn Describe wireless networking and IoT technologies. Explain basic RF communications. Plan wireless solutions. Describe how to implement wireless solutions. Use best practices in implementing wireless solutions. CWISA training course details Who will benefit: Anyone working with IoT technologies. Prerequisites: RF fundamentals. Duration 4 days CWISA training course contents Introduction to wireless technologies History of wireless, radio waves and frequencies, wireless technologies and related components, common components of wireless solutions, LAN networking requirements, Network security, Implementing wireless solutions, staging, documentation, security updates, Industry organizations, IEEE, compatibility and certification groups. Wireless network use cases Wireless BANs, Wireless PANs, Wireless LANs, Wireless MANs, Wireless WANs, Wireless sensor networks, New network driver-Internet of Things, IoT for industry (IIoT), IoT for connected vehicles, Residential environments, Retail, Education (K12), Higher education, Agriculture, Smart cities / Public access, Health care, Office buildings, Hospitality, Industry, Stadiums, arenas, and large public venues. Planning wireless solutions Identifying use cases and applications, common wireless requirements and constraints, performing a wireless system design, selecting and evaluating design parameters. RF communications RF wave characteristics, RF propagation behaviours, RF signal metrics, fundamentals of wireless modulation. other wireless carriers, common frequency bands. Radio frequency hardware Hardware levels, basic RF hardware components (circuit board level), RF link types (use category). RF device types. Mobile communications networks Mobile networks, LTE, 5G, Use cases. Short-range, low-rate, and low-power networks RF and speed, RF and range, RF and power, 802.11, 802.15.4, Bluetooth, LoRa (Long range) / LoRaWAN, ZigBee, 6LoWPAN, NB-IoT and LTE-M. Wireless sensor networks What is a Wireless Sensor Network (WSN)? WSN applications, Sensors and actuators, WSN architectures, Planning a WSN. Internet of Things (IoT) Internet of Things (IoT) defined, IoT history and its definition revisited, one more comment on the definition of IoT, IoT verticals, Oil & Gas, IoT structure/ architecture basics, IoT connected objects. Securing wireless networks Confidentiality, integrity and availability, Privacy, non-repudiation, authenticity & safety, Importance of authentication in wireless networks, Key cryptographic technologies & concepts, Authentication methods, Authorisation, OAuth 2.0 authorisation framework, monitoring. Troubleshooting wireless solutions Proper solutions design, designing and implementing wireless solutions, basic installation procedures, general configuration considerations, troubleshooting and remediation, troubleshoot common problems in wireless solutions. Programming, scripting and automation What is an API? categories of APIs, common API communication methods, choosing a language, why are we integrating systems? Application & integration architectures. Data structures & types, XML, YAML, API types.