• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1413 Network & Security courses in Tipton delivered Online

Essential DWDM

5.0(3)

By Systems & Network Training

DWDM training course description A concise overview of Wave Division Multiplexing (WDM) with both Coarse Wave Division Multiplexing (CWDM) and Dense Wave Division Multiplexing (DWDM) being covered. The course starts with a review of the relevant elements of fibre transmission and multiplexing before then studying WDM components and architectures. Reliability, resilience and management are then followed by WDM services and futures. What will you learn Explain the benefits of WDM. Describe Dispersion and four way mixing. Describe the different WDM equipment components. Describe different WDM architectures. Explain How DWDM works. DWDM training course details Who will benefit: Anyone working with CWDM/DWDM. Prerequisites: Telecommunications Introduction Duration 2 days DWDM training course contents Fibre communications review Optical transmission, Fibre characteristics, Fibre component parts. Multi Mode Fibre (MMF). Single Mode Fibre (SMF). Fibre connections. Lasers. Attenuations, dispersion, optical signal noise ratios (OSNR) and their effects. Channel Spacing and Signal Direction. Limiting factors to single wavelength. WDM overview Multiplexing, TDM, WDM benefits. WDM standards. CWDM vs. DWDM. Four Wave Mixing (FWM). Impact and countermeasures to FWM on WDM. CWDM ITU G.694.2, channels, channel spacing. DWDM ITU G.694.1, channels, channel spacing. WDM Equipment Components Equipment components and building blocks. Optical Terminal Multiplexers (OTM). Optical Add/Drop Multiplexers (OADM). Adding versus dropping. Optical Amplifiers. Erbium Doped Fibre Amplifiers (EDFA). Transponders and Combiners. WDM/DWDM Hubs. Optical and Electrical Cross Connects (OXCs/DXCs). Types of Cross Connects (Transparent/Opaque). Advantages and disadvantages of various Optical cross connects. WDM Architectures WDM network sections. Point-to-Point, Optical switches, mesh, ring and star topology. Example of combined WDM and other technology network. Wavelength converting transponders, 1R, 2R, 3R. Protection for WDM Sub 50ms failover. Equipment protection. Card protection. Y cable, Splitter protection. Far end laser control. Line protection. OMSP 1+1, OMSP 1:1, OMSP 1: N. Self healing optical ring. Sub Network Connection Protection (SNCP). Automatically Switched Optical Networks (ASON). WDM Management Options In band management. Out of band management. The Optical Supervisory Channel (OSC). OSC capabilities. WDM services WDM Access. Bit rates, Transparent Networks. Modulation, DQPSK. SDH over WDM. Migrating from SDH to DWDM. Ethernet over WDM, IP over WDM. Optical Transport Networks G.709, 'digital wrapper', Optical Channel Payload Unit (OPU), Optical Channel Transport Unit ( OTU), Optical Channel Data Unit (ODU). OTU1, OTU2, OTU3, OTU4. WDM Futures All optical amplification, Raman amplification, distributed, lumped. Bit rates. Solitons. Coherent technologies.

Essential DWDM
Delivered in Internationally or OnlineFlexible Dates
£1,497

Essential Cloud Technologies

5.0(3)

By Systems & Network Training

Cloud technologies training course description This course provides an introduction to cloud technologies, including, configuration and deployment, security, maintenance, and management. It covers all aspects of cloud computing infrastructure. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. . What will you learn Contrast and compare AWS, GCP and Azure. Explain the different cloud services, models and characteristics. Explain cloud virtualization components and options. Explain cloud security options. Describe cloud automation, orchestration, monitoring and performance options. Cloud technologies training course details Who will benefit: Anyone working with or looking to work with cloud technologies. Prerequisites: None. Duration 2 days Cloud technologies training course contents What is the cloud? The Internet Cloud computing Benefits Disadvantages Cloud services IaaS, PaaS, SaaS, others. Cloud service providers AWS, GCP Microsoft Azure, others Cloud architectures Private, public, hybrid others Cloud based delivery The cloud and virtualization Virtual Machines, networks, storage, deployment. Accessing the Virtual Machine Secure cloud environments Security considerations. Data privacy considerations Automation and orchestration Monitoring and performance Performance Cost issues Cost containment

Essential Cloud Technologies
Delivered in Internationally or OnlineFlexible Dates
£1,497

Advanced Kibana

5.0(3)

By Systems & Network Training

Advanced Kibana training course description This training course is aimed at users who already have some experience with Kibana, who are looking to further their knowledge. What will you learn Lens Timelion Maps Custom Visualisations with Vega Canvas Filters and Controls Drilldown and Dashboards KQSL and ElasticQueries Scripted and RunTime Fields Alerts and Alarms Advanced Kibana training course details Who will benefit: Users who already have some experience with Kibana, who are looking to further their knowledge. Prerequisites: None Duration 1 day Advanced Kibana training course contents Topics Lens Visualisation types (tables,bars,charts) Category breakdown Adding multiple metrics Using formulas in metrics Labels Adding reference layer Limitations Visualise Library Timeseries, Metrics Different types of aggregations Maps GeoMapping Heat Maps Using ES index as data source Visualisation, tool tips Custom Visualisations with Vega Introduction to vega scripting Canvas Widgets and Texts Elasticsearch SQL Canvas Expressions Filters and Controls Dropdown filters Ad-hoc filters Searchbar filters Drilldown Dashboards Linking one dashboard to another KQSL and ElasticQueries Bool Query AND/OR Phrase Part match vs keyword search Wildcard search Scripted and RunTime Fields Creating ad-hoc calculated fields using scripts Performance issues Alerts and Alarms Query Based Formatting output Connector types(email,index,teams etc)

Advanced Kibana
Delivered in Internationally or OnlineFlexible Dates
£1,497

Linux shell scripting

5.0(3)

By Systems & Network Training

Linux shell scripting training course description A practical introduction to writing scripts using the Bourne shell under any Linux operating system. Applicable for those using the Korn shell as well. What will you learn Read shell scripts. Write shell scripts. Use different types of quotes. Recognise the role of shell scripts within the Linux system. Linux shell scripting training course details Who will benefit: Programmers developing programs under UNIX. Administrators / support personnel who wish to find out more about the workings of Linux or write simple utility programs. Prerequisites: Linux Fundamentals Duration 2 days Linux shell scripting training course contents Review of Linux fundamentals Basic shell scripts What does the shell do? How are commands executed? Different shells. what is a shell script? Comments, creating shell scripts. Variables Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. Positional parameters $0 to $9, $#, $* and others. shift parameter substitution. Control statements The test command The if statement while loops for loops The case statement. Special characters Redirection of errors, here documents, quoting. Arithmetic in shell scripts The expr command. System shell scripts Screen handling The terminfo database, The tput command. Advanced issues (optional session) Shell functions, getopts, xargs, debugging shell scripts, portability issues. Extras in the Korn shell. Optimising shell scripts The time command, performance tips.

Linux shell scripting
Delivered in Internationally or OnlineFlexible Dates
£1,497

UNIX shell programming

5.0(3)

By Systems & Network Training

UNIX shell programming training course description This course has been designed as a follow on course for the XML primer course. The course looks at the use of XSLT in the transforming and styling XML documents. What will you learn Read shell scripts. Write shell scripts. Use different types of quotes. Recognise the role of shell scripts within the UNIX system. UNIX shell programming training course details Who will benefit: Programmers developing programs under UNIX. Anyone working with XML. Administrators Support personnel who wish to find out more about the workings of UNIX or write simple utility programs. Prerequisites: UNIX fundamentals Some programming experience would be useful although not essential. Duration 2 days UNIX shell programming training course contents Review of UNIX fundamentals Basic shell scripts What does the shell do? How are commands executed? Different shells. What is a shell script? Comments, creating shell scripts. Variables Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. Positional parameters 0 to $9, $#, $* and others. shift parameter substitution. Control statements The test command, The if statement, while loops, for loops, The case statement, Special characters, Redirection of errors, here documents, quoting. Arithmetic in shell scripts The expr command. System shell scripts Screen handling The terminfo database The tput comand Avanced issues (optional session) Shell functions, getopts, xargs, debugging shell scripts, portability issues. Extras in the Korn shell. Optimising shell scripts The time command, performance tips.

UNIX shell programming
Delivered in Internationally or OnlineFlexible Dates
£1,497

Cryptocurrency

4.9(27)

By Apex Learning

Overview This comprehensive course on Cryptocurrency will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Cryptocurrency  comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast-track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Cryptocurrency. It is available to all students, of all academic backgrounds. Requirements Our Cryptocurrency is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more!   Course Curriculum 10 sections • 10 lectures • 02:19:00 total length •The Fundamentals of Cryptocurrencies: 00:14:00 •The Blockchain: 00:14:00 •Types of Cryptocurrencies: 00:12:00 •NFTs: 00:14:00 •Cryptocurrency Wallets: 00:14:00 •Cryptocurrency Security: 00:15:00 •Decentralised Finance: 00:15:00 •Investing in Cryptos: 00:14:00 •Opportunities and Future of Cryptocurrencies: 00:13:00 •Cryptocurrency Laws in the UK: 00:14:00

Cryptocurrency
Delivered Online On Demand2 hours 19 minutes
£12

PC Security: Perfectly Know the Computer Virus

By iStudy UK

How many times you had to take your computer to a local repair shop only to be stuck without it for months, and then get socked with a very high bill for the services? Stop with this craziness and learn to clean up and remove viruses, malware, spyware and a multitude of other harmful variants that slow and limit your productivity as well as your computer. As its title seems to suggest, a virus is indeed a very damaging element which is certainly capable of causing enough damage to a system to render it helpless, at least for a time. This course will acquaint you with a basic understanding of infections and the vocabulary related to viruses that are found on your personal computer. It will also walk you through the complete removal process with all advantages covered in this course. Course Highlights PC Security: Perfectly Know the Computer Virus is an award winning and the best selling course that has been given the CPD Certification & IAO accreditation. It is the most suitable course anyone looking to work in this or relevant sector. It is considered one of the perfect courses in the UK that can help students/learners to get familiar with the topic and gain necessary skills to perform well in this field. We have packed PC Security: Perfectly Know the Computer Virus into 11 modules for teaching you everything you need to become successful in this profession. To provide you ease of access, this course is designed for both part-time and full-time students. You can become accredited in just 10 hours, 15 minutes and it is also possible to study at your own pace. We have experienced tutors who will help you throughout the comprehensive syllabus of this course and answer all your queries through email. For further clarification, you will be able to recognize your qualification by checking the validity from our dedicated website. Why You Should Choose PC Security: Perfectly Know the Computer Virus Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? PC Security: Perfectly Know the Computer Virus is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our PC Security: Perfectly Know the Computer Virus is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. What Is A Computer Virus? 01:00:00 How Are Viruses Spread? 01:00:00 How Bad Can A Virus Attack Be? 01:00:00 What Is A Malware? 01:00:00 Getting The Right Anti-Virus For Pc 01:00:00 Removing The Computer Virus Automatically 01:00:00 Deleting The Computer Virus Manually 01:00:00 Enhance Security With A firewall 01:00:00 Tips For Protecting Your Computer From Viruses 01:00:00 How To Identify A Dangerous Website 01:00:00 Wrapping Up 00:15:00 Mock Exam Final Exam

PC Security: Perfectly Know the Computer  Virus
Delivered Online On Demand10 hours 15 minutes
£25

Penetration Testing with OWASP ZAP

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Penetration Testing with OWASP ZAP
Delivered Online On Demand7 hours 23 minutes
£25

Security Manager

4.7(160)

By Janets

Our Security Manager course will provide learners with a broad understanding of security theory and best practices in the workplace. After successful course completion, students will be able to utilise their theoretical knowledge and practical skills to identify issues, understand risks and how to neutralise them. This award-winning Security Manager is our most popular online course for anyone looking to start a career or challenge themselves to learn something new in security management. The Security Manager course is structured into 8 exciting units, complete with expertly designed online study materials and video lessons so you can learn everything you need to know to succeed. Why choose this course Earn a digital Certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Benefit from instant feedback through mock exams and multiple-choice assessments Get 24/7 help or advice from our email and live chat teams Full Tutor Support on Weekdays Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Mock exams Multiple-choice assessment Assignment Who is this course for? Security Manager is suitable for anyone who wants to gain extensive knowledge, potential experience and professional skills in the related field. This is a great opportunity for all students from any academic backgrounds to learn more on this subject.

Security Manager
Delivered Online On Demand4 hours 22 minutes
£9.99

Hacked Credit and Debit Card Recovery Course

4.5(3)

By Studyhub UK

Embark on a journey to uncover the labyrinthine world of digital financial security with the 'Hacked Credit and Debit Card Recovery Course'. Navigate through the depths of the web, from understanding the diverse range of websites to delving deep into the dark corridors of the internet, equipping yourself with invaluable cyber intelligence. Through this course, you'll decode various threat perceptions, familiarise yourself with card fraud intricacies, and master the art of information recovery - all tailored to ensure your digital financial transactions remain impervious to threats. Learning Outcomes Understand the fundamentals of cyber threats and their impact on digital financial transactions. Differentiate between various website types and their susceptibility to cyber-attacks. Analyse threat actors and their modus operandi in the cyber realm. Gain insights into the deep and dark web and the tools necessary for information recovery. Acquire proficiency in information handling procedures to maintain digital financial security. Why buy this Hacked Credit and Debit Card Recovery Course? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Hacked Credit and Debit Card Recovery Course there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this Hacked Credit and Debit Card Recovery Course for? Individuals keen on enhancing their understanding of digital financial security. Banking and finance professionals looking to fortify their defence mechanisms. Cybersecurity enthusiasts aiming to delve into card fraud detection and prevention. Internet users wanting to safeguard their online financial transactions. Tech-savvy individuals eager to explore deep and dark web intelligence. Prerequisites This Hacked Credit and Debit Card Recovery Course does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Hacked Credit and Debit Card Recovery Course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Cyber Security Analyst: £35,000 - £55,000 Fraud Detection Analyst: £30,000 - £50,000 Dark Web Researcher: £40,000 - £65,000 Information Security Officer: £45,000 - £70,000 Threat Intelligence Specialist: £50,000 - £75,000 Financial Security Consultant: £55,000 - £80,000 Course Curriculum Unit 01: Introduction Introduction & Objective 00:01:00 Unit 02: Types of Website Types of Website 00:01:00 Surface Web 00:01:00 Deep Web 00:01:00 Dark Web 00:03:00 2016 - 2017 Profit Comparison from 5000 00:01:00 Intelligence Agency Web 00:01:00 Quantum Computers 00:01:00 Polymeric Falcighol Derivation 00:01:00 Graphical representation 00:01:00 Unit 03: Threat Perception Threat Perception 00:01:00 Threat Actor 00:01:00 Threat Actor-Compared to a Hacker Or Attacker 00:01:00 Is the Dark Net Market gone? 00:03:00 Unit 04: Card Fraud Card Fraud 00:04:00 Card-Not-Present Fraud (CNP) 00:02:00 Unit 05: Threat Ninja Threat Ninja 00:01:00 Threat Ninja Architecture 00:03:00 Adaptive Assessment 00:01:00 Secure Coat Approach 00:01:00 Secure Coat's Value Proposition 00:02:00 Challenge 00:01:00 Unit 06: Threat Actor Analysis Threat Actor Analysis 00:00:00 Kuchinoni - ATM Theft 00:01:00 Insider Threats 00:01:00 Unit 07: Cyber Security Monitoring Cyber Security Monitoring 00:01:00 Protect Your Company via DDWM 00:01:00 Unit 08: Threat Life Cycle Threat Life Cycle 00:06:00 Unit 09: Information Leakage Points Information Leakage Points 00:04:00 Unit 10: Valuable Information Valuable Information 00:09:00 Unit 11: Area of Search Area of Search 00:01:00 Sell Cards at Social Media, Messenger, etc. Groups 00:01:00 Unit 12: Deep & Dark Web Intelligence and Information Recovery Deep & Dark Web Intelligence and Information Recovery 00:01:00 Unit 13: Banking Fraud Types Banking Fraud Types 00:01:00 Card Fraud- Nilson Report 00:01:00 U.S. Card Fraud Losses 00:01:00 Card Fraud Statistics 00:05:00 Unit 14: Threat Ninja Tool Secure Coat Threat Ninja Portal 00:01:00 Threat Ninja Demo 00:05:00 Unit 15: Information Handing Procedures Information Handling Procedures 00:01:00 Card Discard Life Cycle 00:02:00 Unit 16: Course Wrap up Congratulations and Course Summary 00:03:00 Thank you! 00:01:00 Unit 17: Bonus Rise in the price of the Crypto Coin 00:06:00 Assignment Assignment - Hacked Credit and Debit Card Recovery Course 00:00:00

Hacked Credit and Debit Card Recovery Course
Delivered Online On Demand1 hour 26 minutes
£10.99