Advanced HP switches training course description A hands on course covering advanced features of HP switches. The focus of the course is on Layer 3 switching advanced features. Delegates will benefit the most from this course if they can supply us with their own configurations before the course. These configurations can then be used by the trainer in the course. What will you learn Configure and troubleshoot HP layer 3 switching. Configure and troubleshoot OSPF Harden HP switches. Explain the majority of their own configurations (if configurations are supplied to us before the course). Advanced HP switches training course details Who will benefit: Technical staff working with HP switches. Prerequisites: HP switches for engineers. Duration 2 days Advanced HP switches training course content Introduction VLAN review. Tagged and untagged ports. MSTP, PVST, UDLD, BPDU guard. Hands on VLANs, diagnostic tools debug, LLDP, remote port mirroring. L3 switching What are L3 switches? L3 lite, IPv4 and IPv6, routing protocols, routing tables. IP address on VLAN, no ip address on VLAN, connected interfaces, RIP. Hands on Routing between VLANs. Configuring and troubleshooting RIP. VRRP Default gateways, dead router detection, resilience. Hands on Configuring and troubleshooting VRRP. Static routes Why use static routes? Configuring static routes, default routes. OSPF Link state protocols, operation. Router types, LSA types, area 0. Hands on Configuring and troubleshooting OSPF. QoS Layer 2 QoS, 802.1Q, priorities, dscp mapping, rate limiting. Access lists Filtering traffic through the switch, controlling access to the switch, enabling and disabling ACLs, standard ACLs, extended ACLs Security DHCP snooping, ARP protection, STP guards, switch hardening. Summary Walkthrough of delegate configurations.
Advanced Asterisk training course description This 2 day hands-on Asterisk training course covers advanced Asterisk configuration including fault tolerant clusters, upgrading and patching Asterisk servers, firewall and NAT transversal, using databases to store Asterisk data. Practical sessions follow each major section to reinforce the theory. What will you learn Configure advanced Asterisk features. Utilise databases from Asterisk Integrate Asterisk with SIP servers. Build High Availability Asterisk clusters. Maintain and secure Asterisk servers. Advanced Asterisk training course details Who will benefit: Technical staff working with or evaluating Asterisk. Prerequisites: Definitive Asterisk for engineers Duration 2 days Advanced Asterisk training course contents Best Practice Review of basics, Channel best practice, dial plan best practise. Call Centre Features GUI, Asterisk Manager Interface, billing, CDR, advanced IVR, ACD, Vici Dial. Hands on Install Vici-Dial Asterisk and Databases MySQL, LDAP, ODBC, dial plan from a Database, storing CDR in a Database, Hands on Dial plan in MySQL, CDR in MySQL. TDM over Ethernet What is TDMoE, Asterisk to Asterisk TDMoE, Phone Bridge. Hands on * 2 * via TDMoE. High Availability Asterisk HA Linux - Virtual Servers, Fail-over steps, setting up HA Linux, configuring Asterisk for fail-over on HA Linux, Hands on Configure Asterisk HA. Advanced Dial plans Asterisk Gateway Interface, AGI IVR applications, Multiple switches sharing Dial plans, ENUM, DUNDI. Hands on Configure DUNDI. Integration Legacy PBX, SIP Proxys, OpenSER. Hands on Configure SER to work with Asterisk. Asterisk Maintenance Asterisk upgrades, implementing patches, advanced debugging, Security Firewalls, NAT, Asterisk security issues. Hands on Configure Asterisk to work through a Firewall and NAT.
Broadband access training course description ADSL is a broadband technology providing fast Internet access (amongst other applications) over existing telephone lines. This course covers an overview of the DSL family, what ADSL is through to how ADSL works. What will you learn Describe what ADSL is. Describe how ADSL works. Describe the ADSL architecture. Recognise the limitations of ADSL. List the elements required for an ADSL installation. Broadband access training course details Who will benefit: Network engineers and anyone who will be working with ADSL. Prerequisites: Intro to data communications & networking Duration 2 days Broadband access training course contents What is ADSL? Broadband definitions, OSI layer 1, ADSL services, WANS. ADSL features: always on, point to point, Asymmetric, speeds. ADSL benefits, xDSL family, standards, history, example DSL forum documents. ADSL architecture The big picture, The PSTN and telephones, Digital and analogue, PSTN and modems, ADSL vs. modem speeds, Block 1: Customer premises, Block 2: The last mile, Block 3: The exchange, Block 4: the core network. Customer premises Splitters, micro filters, splitter architectures, Splitterless ADSL, ADSL modems, USB, ADSL routers. The local loop ADSL PHY, Some basics, ADSL margins, speed implications, distances, RADSL, Line testing, whoosh tests, line coding, multiple channels, FDM, echo cancellation, Modulation: AM, FM, PM, QAM, QAM constellations, DMT, CAP, Framing, Superframes, fast data mode, interleaved mode, RADSL revisited. The exchange Local exchange ADSL items, DSLAMs, ADSL racks, Contention. The core network The role of the core network, ATM, ATM VPI/VCI, ATM cells, ATM layers, AAL5, RAS, Home gateways. ADSL and the higher layers Layer 2 choices, PPPoA, PPP, CHAP, Layer 4 and above, ADSL and ATM. Installing and configuring ADSL Choosing providers, line activation, hardware requirements, Configuring layer 1 and layer 2, Configuring IP. Summary ITU ADSL standards
TETRA training course description This 2 day training course covers the network architecture required for TETRA. It also looks at the Air Interface, TETRA Functions and Procedures. What will you learn Describe the TETRA Architecture Describe the Air Interface Explain the TETRA Functions Explain the TETRA Procedures TETRA training course details Who will benefit: Anyone working with TETRA. Prerequisites: None. Duration 2 days TETRA training course contents Introduction History of PMR, ETSI development, Tetra function, Tetra markets, Tetra standards, Tetra supplier base, Tetra Release 1, Tetra Release 2. Network Architecture Mobile network Identity, Mobile stations, Base station, Switching & Management, Addresses & Identitie. Air Interface Modulation, TDMA Format, FD, Framin, Burst format, Traffic Channel TCH, Dedicated Channel DCC, Common Control Channel CCC, Signalling Channel SCH, Logical Control mapping LCM, Protocol stack, Voice coded. TETRA Functions Trunked mode operation, User hierarchies, Individual calling, Group calling, Supplementary services, Voice and Data, Data services, Direct mode operation, Tetra WAP, Circuit mode priorities, Circuit mode data, Packet mode data, Discrete and Ambient listening. Automatic vehicle locator. TETRA Procedures MS operational modes, Mobility management, Cell selection, Security & Authentication, Decryption options, Cell setup, Channel assignment, Network management - internal, Network management -external, PSTN Gateway, ISDN Gateway, Control Room Gateway.
XSLT training course description This course has been designed as a follow on course for the XML primer course. The course looks at the use of XSLT in the transforming and styling XML documents. What will you learn Transform and style XML documents using XSLT. XSLT training course details Who will benefit: Anyone working with XSLT. Prerequisites: XML primer Duration 2 days XSLT training course contents Introduction Extensible Stylesheet Language (XSL), transforming and formatting XML. XML refresher The basic rules for building an XML document. An introduction to XSLT The basic concepts of XSLT, xsl:output, xsl:template, xsl:value-of. XML documents as trees How the original XML is transformed into a set of nodes, the general terms for manipulating node trees. Paths (XPath) Use of path matching to select required nodes for transformation. Using templates xsl:apply-templates, xsl:template match, nested templates, xsl:copy , <comment> and <element> , default templates, parameters. Control xsl:if, xsl:choose, xsl:for-each, xsl:sort. Constructing the result tree xsl:output, xsl:attribute, xsl:attribute-set, xsl:comment, xsl:processing-instruction, xsl:text, xsl:value-of, xsl:variable. Combining templates xsl:include, xsl:import, xsl:apply-imports. Transforming to text
ADO.NET training course description This ADO.net training course is designed to enable developers to use the toolset provided with.NET for data access including ADO.net objects, data controls, designers and interoperability with earlier ADO objects. The course is applicable for those using C# or VB.NET with ADO.NET What will you learn Retrieve and manipulate data using Microsoft's ADO.NET library. Work with the ADO.NET object model. Update data, including handling stored procedures, parameters, and return value. Search, sort and filter data. Leverage the power of XML. ADO.NET training course details Who will benefit: Programmers working with ADO.Net. Prerequisites: Effective programming with VB.NET or Concise introduction to C# Duration 2 days ADO.NET training course contents Introducing ADO.Net Traditional Data Access Architecture. ADO.Net Disconnected Data Access Architecture. Different components of ADO.Net. A review of basic SQL queries SQL SELECT Statement. SQL INSERT Statement. SQL UPDATE Statement. SQL DELETE Statement. Common data access tasks with ADO.Net Accessing Data using ADO.Net. Defining the connection string. Defining a Connection. Defining the command or command string. Defining the Data Adapter. Creating and filling the DataSet. A Demonstration Application The Interface. Loading the table. Filling the controls on the Form. Navigating through the records. Updating Data Steps for updating the table. Building the Application. Loading the table and displaying data in the form's controls. Initialising Commands. Adding Parameters to the commands. The ToggleControls() method of our application. Editing (or Updating) Records. Event Handler for the Save Button. Event Handler for the Cancel Button. Inserting Records. Deleting a Record. Using Stored Procedures Sample Stored Procedures. UPDATE Stored Procedure. INSERT Stored Procedure. DELETE Stored Procedure. SELECT Stored Procedure. Using Stored Procedures with ADO.Net.
Are you looking to elevate your professional skills to new heights? Introducing our Diploma in Computer Networks Security at QLS Level 5, a QLS-endorsed course bundle that sets a new standard in online education. This prestigious endorsement by the Quality Licence Scheme (QLS) is a testament to the exceptional quality and rigour of our course content. The bundle comprises 11 CPD-accredited courses, each meticulously designed to meet the highest standards of learning. This endorsement not only highlights the excellence of our courses but also assures that your learning journey is recognised and valued in the professional world. The purpose of Diploma in Computer Networks Security at QLS Level 5 is to provide learners with a comprehensive, skill-enriching experience that caters to a variety of professional needs. Each course within the bundle is crafted to not only impart essential knowledge but also to enhance practical skills, ensuring that learners are well-equipped to excel in their respective fields. From gaining cutting-edge industry insights to mastering critical thinking and problem-solving techniques, this bundle is an amalgamation of learning experiences that are both enriching and empowering. Moreover, Diploma in Computer Networks Security at QLS Level 5 goes beyond just online learning. Upon completion of the bundle, learners will receive a free QLS Endorsed Hardcopy Certificate & 11 CPD Accredited PDF Certificate, a tangible acknowledgement of their dedication and hard work. This certificate serves as a powerful tool in showcasing your newly acquired skills and knowledge to potential employers. So, why wait? Embark on this transformative learning journey today and unlock your potential with Diploma in Computer Networks Security at QLS Level 5! QLS Endorsed Course: Course 01: Diploma in Computer Networks Security at QLS Level 5 CPD QS Accredited Courses: Course 02: IT Administration and Networking Course 03: Secure Programming of Web Applications Course 04: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 05: CompTIA A+ (220-1001) Course 06: Building Your Own Computer Course 07: Advance Windows 10 Troubleshooting for IT HelpDesk Course 08: Cyber Security Awareness Training Course 09: Learn Ethical Hacking From A-Z: Beginner To Expert Course 10: Bash Scripting, Linux and Shell Programming Course 11: GDPR UK Training Course 12: Encryption Learning Outcomes Upon completion of the bundle, you will be able to: Acquire industry-relevant skills and up-to-date knowledge. Enhance critical thinking and problem-solving abilities. Gain a competitive edge in the job market with QLS-endorsed certification. Develop a comprehensive understanding of Computer Networks Security. Master practical application of theoretical concepts. Improve career prospects with CPD-accredited courses. The Diploma in Computer Networks Security at QLS Level 5 offers an unparalleled learning experience endorsed by the Quality Licence Scheme (QLS). This endorsement underlines the quality and depth of the courses, ensuring that your learning is recognised globally. The bundle includes 11 CPD-accredited courses, each meticulously designed to cater to your professional development needs. Whether you're looking to gain new skills, enhance existing ones, or pursue a complete career change, this bundle provides the tools and knowledge necessary to achieve your goals. The Quality Licence Scheme (QLS) endorsement further elevates your professional credibility, signalling to potential employers your commitment to excellence and continuous learning. The benefits of this course are manifold - from enhancing your resume with a QLS-endorsed certification to developing skills directly applicable to your job, positioning you for promotions, higher salary brackets, and a broader range of career opportunities. Embark on a journey of professional transformation with Diploma in Computer Networks Security at QLS Level 5 today and seize the opportunity to stand out in your career. Enrol in Computer Networks Security now and take the first step towards unlocking a world of potential and possibilities. Don't miss out on this chance to redefine your professional trajectory! Certificate of Achievement: QLS-endorsed courses are designed to provide learners with the skills and knowledge they need to succeed in their chosen field. The Quality Licence Scheme is a distinguished and respected accreditation in the UK, denoting exceptional quality and excellence. It carries significant weight among industry professionals and recruiters. Upon completion, learners will receive a free Premium QLS Endorsed hard copy certificate & 11 free CPD Accredited PDF Certificate, titled 'Diploma in Computer Networks Security at QLS Level 5'. These certificates validate their course completion, the level of the course they have completed, and the QLS endorsement. Please Note: NextGen Learning is a Compliance Central approved resale partner for Quality Licence Scheme Endorsed courses. CPD 150 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Diploma in Computer Networks Security at QLS Level 5 bundle is ideal for: Professionals seeking to enhance their skills and knowledge. Individuals aiming for career advancement or transition. Those seeking CPD-accredited certification for professional growth. Learners desiring a QLS-endorsed comprehensive learning experience. Requirements You are cordially invited to enroll in this bundle; please note that there are no formal prerequisites or qualifications required. We've designed this curriculum to be accessible to all, irrespective of prior experience or educational background. Career path Upon completing the Diploma in Computer Networks Security at QLS Level 5 course bundle, each offering promising prospects and competitive salary ranges. Whether you aspire to climb the corporate ladder in a managerial role, delve into the dynamic world of marketing, explore the intricacies of finance, or excel in the ever-evolving field of technology. Certificates CPD Quality Standard Certificate Digital certificate - Included Free 11 CPD Accredited PDF Certificates. QLS Endorsed Certificate Hard copy certificate - Included
Course Overview Cyber Security Awareness Training is designed to equip learners with the essential knowledge to identify, manage, and reduce cyber risks in both personal and professional environments. This course provides a comprehensive understanding of the ever-evolving landscape of cyber threats and the proactive steps necessary to mitigate them. Through clear, accessible content, learners will explore key areas such as cyber attacks, password management, data breaches, and safe internet practices. By the end of the programme, participants will be able to recognise potential cyber threats, protect sensitive information, and contribute to creating a more secure digital environment. Whether for personal confidence or professional enhancement, this course offers crucial insights to stay safe in today’s technology-driven world. It is suitable for individuals at all levels, ensuring a solid foundation for developing cyber security awareness and resilience against emerging digital risks. Course Description This Cyber Security Awareness Training course delves deeper into the principles of protecting information and systems from cyber threats. Learners will explore common cyber attacks, cybercrimes, and the consequences of data breaches, alongside strategies for strengthening password security and practising safe internet browsing. The training also covers essential topics such as securing remote work environments, managing devices securely, and applying preventative measures to mitigate risks. Throughout the course, participants will engage with structured, easy-to-understand materials designed to build their confidence and competence in cyber security awareness. Learners will gain the ability to assess potential vulnerabilities, adopt safer digital habits, and contribute to wider organisational security initiatives. Delivered in a flexible, accessible format, the course is structured to support learners in developing critical thinking around cyber security issues while enhancing their ability to respond effectively to real-world digital threats. Course Modules Module 01: Introduction to Cyber Security Module 02: Cyber Attacks Module 03: Cybercrimes Module 04: Cyber Security and Data Breaches Module 05: Password Management Module 06: Internet Browsing Module 07: Office and Remote Work Security Module 08: Device Management Module 09: Preventative Measures (See full curriculum) Who is this course for? Individuals seeking to enhance their understanding of cyber threats and secure their digital presence. Professionals aiming to strengthen workplace cyber security practices. Beginners with an interest in cyber security, information security, or technology sectors. Employees required to complete cyber security awareness as part of corporate compliance programmes. Small business owners wishing to protect their business operations and client data. Career Path Cyber Security Assistant IT Support Analyst Security Awareness Coordinator Risk and Compliance Assistant Data Protection Officer Network Security Administrator Information Security Officer Technical Support Specialist Digital Operations Executive
Description: Hacking becomes very common nowadays. If it comes about the company information, it is one of the most dangerous problems. An ethical hacker helps an organisation to protect their data and increases the security of a computer system. Therefore, the demand for a certified ethical hacker is increasing day by day. The Certified Ethical Hacking - Complete Video Training course will help to meet your need if you want to build a stable career in ethical hacking. The course is taught in two parts. One part deals with the basic knowledge of ethical hacking and helps you to be an ethical hacker while the second section prepares you for the Certified Professional Ethical Hacker (CPEH). The bundle video course teaches the fundamental concepts of ethical hacking including access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, reconnaissance, covering tracks, malware, buffer overflows, and password cracking, etc. You will also learn to implement the counter-response to protecting your information. In short, the Certified Ethical Hacking - Complete Video Training provides a complete guide to ethical hacking. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Ethical Hacking - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Ethical Hacking - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Overview Overview FREE 00:35:00 Reconnaissance Reconnaissance 00:25:00 Protocols Protocols 01:25:00 Windows Hacking Windows Hacking 01:19:00 Attacking Web Technologies Attacking Web Technologies 00:56:00 Pen Testing Wireless Networks Pen Testing Wireless Networks 01:34:00 Security Fundamentals Security Fundamentals FREE 00:51:00 Access Controls Access Controls 00:33:00 Protocols Protocols 00:36:00 Cryptography Cryptography 00:52:00 Why Vulnerability Assessments? Why Vulnerability Assessments? 00:36:00 Vulnerability Tools of the Trade Vulnerability Tools of the Trade 00:10:00 Output Analysis and Reports Output Analysis and Reports 00:13:00 Reconnaisance, Enumeration and Scanning Reconnaisance, Enumeration and Scanning 00:51:00 Gaining Access Gaining Access 00:31:00 Maintaining Access Maintaining Access 00:17:00 Covering Tracks Covering Tracks 00:18:00 Malware Malware 00:28:00 Buffer Overflows Buffer Overflows 00:22:00 Password Cracking Password Cracking 00:33:00 Mock Exam Mock Exam - Certified Ethical Hacking - Complete Video Training 00:20:00 Final Exam Final Exam - Certified Ethical Hacking - Complete Video Training 00:20:00 Order Your Certificates and TranscriptsOrder Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00
Overview This comprehensive course on Digital Forensics for Cyber Professionals will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Digital Forensics for Cyber Professionals comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Digital Forensics for Cyber Professionals. It is available to all students, of all academic backgrounds. Requirements Our Digital Forensics for Cyber Professionals is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 11 sections • 35 lectures • 05:37:00 total length •Course Overview: 00:06:00 •Lab - Installing CSI Linux: 00:13:00 •Lab - Creating a Kali Live (Forensic Mode) VM Using VirtualBox: 00:06:00 •Lab - Create a Virtual Install Kali Image Using VirtualBox: 00:07:00 •Lab - Create Virtual Install of Windows 10 Using VirtualBox: 00:08:00 •Install Additional Tool Using Katoolin3: 00:10:00 •Lab - Simulate Creating a Disk Image for a Forensic Analysis: 00:11:00 •Lab - Examining a forensic Disk Image Using Autopsy: 00:12:00 •Lab -Digital Forensics Using Autopsy Part I: 00:11:00 •Lab - Digital Forensics Using Autopsy Part II: 00:07:00 •Lab - Installing the WebMap-Nmap Dashboard: 00:12:00 •Lab - Conducting OSINT Using CSI Linux Investigator: 00:08:00 •Lab - Find Social Media Accounts Using Sherlock: 00:07:00 •Attaching an External USB Device in Kali: 00:07:00 •Lab - Memory Forensics Using the Volatility Framework: 00:18:00 •Lab - Acquiring a Forensic Copy of the Windows Registry: 00:15:00 •Lab - Analyzing the Windows Registry for Evidence: 00:14:00 •Lab - Preparing CSI Investigator to Use Shodan: 00:05:00 •Lab - Using Shodan to Find Vulnerable Devices: 00:14:00 •Lab - Using Shodan to Search for Vulnerable Databases: 00:08:00 •Lab - Using the EXIFtool to Read and Write EXIF Tags: 00:11:00 •Using the EXIFtool to Read and Write EXIF Tags: 00:10:00 •Overview of Wireshark 3.2: 00:11:00 •Wireshark Capture Options: 00:07:00 •Wireshark Toolbar Icons: 00:04:00 •Lab - Capturing a 3-way TCP Handshake Using Wireshark: 00:05:00 •Lab - Installing a Wireless Adapter in Kali: 00:09:00 •Lab - Hacking a Wireless Network Using Kali Linux: 00:14:00 •Capturing Wireless Traffic Using Wireshark: 00:05:00 •Lab - CTF Lab Build for HA: Forensics: 00:11:00 •Lab - Capture flag #1: 00:12:00 •Lab - Capture flag #2: 00:10:00 •Lab - Capture flag #3: 00:20:00 •Lab - Capture flag #4: 00:09:00 •Assignment - Digital Forensics for Cyber Professionals: 00:00:00