• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1529 Network & Security courses

AZ-030T00-A: Microsoft Azure technologies for AWS architects

By Nexus Human

Duration 3.5 Days 21 CPD hours This course is intended for This course is for AWS Cloud Architects with expertise in designing and implementing solutions running on AWS who now want to design for Microsoft Azure. Overview After completing this course, students will be able to: Secure identities with Azure Active Directory and users and groups. Implement identity solutions spanning on-premises and cloud-based capabilities Apply monitoring solutions for collecting, combining, and analyzing data from different sources. Manage subscriptions, accounts, Azure policies, and Role-Based Access Control. Administer Azure using the Resource Manager, Azure portal, Cloud Shell, and CLI. Configure intersite connectivity solutions like VNet Peering, and virtual network gateways. Administer Azure App Service, Azure Container Instances, and Kubernetes. This course teaches Solutions Architects who have previously designed for Amazon Web Services how to translate business requirements into secure, scalable, and reliable solutions for Azure. Introduction to Azure Subscriptions and accounts Resource groups and templates in Azure Resource Manager Azure global infrastructure Azure regions Azure Availability Zones Comparison with AWS Implement Azure Active Directory Introduction to Azure Active Directory Domains and custom domains Safety features Guest users in Azure Active Directory Manage multiple directories Comparison with AWS Implement and manage hybrid identities Introduction to Azure AD Connect Comparison with AWS Implement virtual networking Azure Virtual Network and VNet peering VPN and ExpressRoute connections Comparison with AWS Implement VMs for Windows and Linux Configure high availability Comparison with AWS Implement load balancing and network security Implement Azure Load Balancer Implement an Azure Application Gateway Implement Azure Firewall Implement network security groups and application security groups Comparison with AWS Implement container-based applications Configure Azure Kubernetes Service Publish a solution on an Azure Container Instance Comparison with AWS Implement an application infrastructure Create an App Service plan Create and configure Azure App Service Configure networking for an App Service Introduction to Logic Apps and Azure Functions Comparison with AWS Implement storage accounts Azure Storage core concepts Managing the Azure Blob storage lifecycle Working with Azure Blob storage Comparison with AWS Implement NoSQL databases Introduction to Azure Cosmos DB Consistency Select appropriate CosmosDB APIs Set up replicas in CosmosDB Comparison with AWS DynamoDB Implement Azure SQL databases Configure Azure SQL database settings Implement Azure SQL Database managed instances Configure high availability for an Azure SQL database Comparison with AWS Implement cloud infrastructure monitoring Monitor security Monitor cost Configure a Log Analytics workspace Comparison with AWS Implement and manage Azure governance solutions Assign RBAC roles Configure management access to Azure Implement and configure an Azure Policy Comparison with AWS Manage security for applications Implement Azure Key Vault Implement and configure Azure AD Managed Identities Register and manage applications in Azure AD Comparison with AWS Migration, backup, and disaster recovery management Migrate workloads Implement Azure Backup for VMs Implement disaster recovery Comparison with AWS

AZ-030T00-A: Microsoft Azure technologies for AWS architects
Delivered OnlineFlexible Dates
Price on Enquiry

QUALIFI Level 4 Diploma in Cyber Security

By School of Business and Technology London

Getting Started   The method of study adopted for the Cybersecurity courses program is intended to guide the learners who wish to enhance their core capacities within the cybersecurity field. The result of the Cyber Security Diploma, an accepted UK qualification, is for the aspirants to expertise in the skills needed by organisations worldwide. All the programs are designed to provide learning based on concepts and practical insights necessary for the present and future companies. Apart from this, we look forward to building up efficient team leaders, managers and leaders through the invention and delivery of learning required for the industry. The qualification will: Prepare learners for employment, and Support a range of senior IT and digital, data and security roles in the workplace.   Key Benefits   The ability to read and utilise relevant technical and security literature (including threat intelligence feeds). To apply subject knowledge & understanding to address familiar and unfamiliar problems. To appreciate the interdisciplinary nature of cyber security within business and service provision and broader operating environments and supply chains. Transferable skills and knowledge - including Project Management and Incident Response Instil a sense of respect and understanding of the global nature of the cyber threat environment. Upon completing this Level 4 diploma, learners can progress to a higher education Level 5 course in Cyber Security. Key Highlights How do you get hired to the next level of your career advancement as a unique team leader, manager or leader in Cyber Security Systems? Then, the Qualifi Level 4 Diploma in Cyber Security is the ideal starting point for your career journey. The course allows individuals to develop a more advanced career in a specific business or public organisation area by developing analytical knowledge and a deeper understanding of several core cybersecurity operational domains. It will also provide helpful generic management and leadership teaching at crucial points to help learners build essential support from within the business. Remember! The assessment for the qualification is done based on assignments only, and you do not need to worry about writing any exam. With the School of Business and Technology London, you can complete the qualification at your own pace, choosing online or blended learning from the comfort of your home. Learning and pathway materials and study guides developed by our Qualifi-approved tutors will be available around the clock in our cutting-edge learning management system. Most importantly, at the School of Business and Technology London, we will provide comprehensive tutor support through our dedicated support desk. If you choose your course with blended learning, you will also enjoy live sessions with an assigned tutor, which you can book at your convenience. Career Pathways The Qualifi Level 4 Level 4 Diploma in Cyber Security can open many career pathways including, but not limited to: Junior Cyber Security Consultant; with an estimated average salary of £44,490 per annum Junior Security Analyst; with an estimated average salary of £45,000 per annum IT Security Analyst; with an estimated average salary of £45,723 per annum Ethical Hackers; with an estimated average salary of £63,600 per annum Forensic Computer Analyst; with an estimated average salary of £44,391 per annum Penetration Tester; with an estimated average salary of £60,000 per annum Cyber Security Analyst; with an estimated average salary of £56,449 per annum Associate- Cyber Security; with an estimated average salary of £52,156 per annum About Awarding Body QUALIFI, recognised by Ofqual awarding organisation has assembled a reputation for maintaining significant skills in a wide range of job roles and industries which comprises Leadership, Hospitality & Catering, Health and Social Care, Enterprise and Management, Process Outsourcing and Public Services. They are liable for awarding organisations and thereby ensuring quality assurance in Wales and Northern Ireland. What is included?   Outstanding tutor support that gives you supportive guidance all through the course accomplishment through the SBTL Support Desk Portal. Access our cutting-edge learning management platform to access vital learning resources and communicate with the support desk team. Quality learning materials such as structured lecture notes, study guides, and practical applications, including real-world examples and case studies, will enable you to apply your knowledge. Learning materials are provided in one of the three formats: PDF, PowerPoint, or Interactive Text Content on the learning portal. The tutors will provide Formative assessment feedback to improve the learners' achievements. Assessment materials are accessible through our online learning platform. Supervision for all modules. Multiplatform accessibility through an online learning platform. This facilitates SBTL in providing learners with course materials directly through smartphones, laptops, tablets or desktops, allowing students to study at their convenience. Live Classes (for Blended Learning Students only) Assessment Time-constrained scenario-based assignments No examinations. Entry Requirements   The qualifications have been made available to all without artificial barriers denying access and progression. The primary requirement is to get through the interview, and they are expected to hold the following: Qualifications at Level 3 and; Some technical and risk management experience in a computing or security business environment and demonstrate ambition with clear career goals; A Level 4 qualification in another discipline and who want to develop their careers in cyber security   Progression   Learners completing the QUALIFI Level 4 Diploma can progress to: A Higher Education Level 5 course in Cyber Security, or Directly into employment in an associated profession. Why gain a QUALIFI Qualification?   This suite of qualifications provides enormous opportunities to learners seeking career and professional development. The highlighting factor of this qualification is that: The learners attain career path support who wish to pursue their career in their denominated sectors; It helps provide a deep understanding of the health and social care sector and managing the organisations, which will, in turn, help enhance the learner's insight into their chosen sector. The qualification provides a real combination of disciplines and skills development opportunities. The Learners attain in-depth awareness concerning the organisation's functioning, aims and processes. They can also explore how to respond positively to this challenging and complex health and social care environment. The learners will be introduced to managing the wide range of health and social care functions using theory, practice sessions and models that provide valuable knowledge. As a part of this suite of qualifications, the learners will be able to explore and attain hands-on training and experience in this field. Learners also learn to face and solve issues then and there by exposure to all the Units. The qualification will also help to Apply scientific and evaluative methods to develop those skills. Find out threats and opportunities. Develop knowledge in managerial, organisational and environmental issues. Develop and empower critical thinking and innovativeness to handle issues and difficulties. Practice judgement, own and take responsibility for decisions and actions. Develop the capacity to perceive and reflect on individual learning and improve their social and other transferable aptitudes and skills.   Learners must request before enrolment to interchange unit(s) other than the preselected units shown in the SBTL website because we need to make sure the availability of learning materials for the requested unit(s). SBTL will reject an application if the learning materials for the requested interchange unit(s) are unavailable. Learners are not allowed to make any request to interchange unit(s) once enrolment is complete. UNIT1- Cyber Security Threat and Risk Reference No : CSEC01 Credit : 20 || TQT : 200 "The unit covers a total of 20 credits, 200 TQT,120 GLH. Cybersecurity is defined as the process of securing essential data's, programs, network from cyber-attacks including harmful viruses and unauthorised logins. A threat to security will put everyone's sensitive information at risk. The module helps to focus on the security dangers threats and vulnerabilities to the organisation and implement security protection against it. " UNIT2- network security and Data Communications Reference No : CSEC02 Credit : 20 || TQT : 200 "The unit covers a total of 20 credits, 200 TQT,120 GLH. This unit takes us to the Research in data communications, networking, and security cover both guided and wireless communications of voice, data, images and video and their impact on the organisations in which they are used. " UNIT3- Database Security and Computer Programming Reference No : CSEC03 Credit : 20 || TQT : 200 "The unit covers a total of 20 credits, 200 TQT,120 GLH. Database security is a complex and challenging endeavour that involves all aspects of information security technologies and practices. The more accessible and usable the database, the more vulnerable it is to security threats; the more secure the database is to threats, the more difficult it is to access. " UNIT4- Incident Response, Investigations and Forensics Reference No : CSEC04 Credit : 20 || TQT : 200 "The unit covers a total of 20 credits, 200 TQT,120 GLH. With the number of devices connected to the Internet exploding in recent years, the incidences of security breaches have likewise become a hot and rather disturbing topic. Within this scope, companies must know how to respond and deal with the consequences. All organisations should have an incident response plan that includes incident detection in addition to a response. From this unit, we get to know about these plans and technique and how to deal with it. " UNIT5- Security Strategy: Laws, Policies and Implementation Reference No : CSEC05 Credit : 20 || TQT : 200 "The unit covers a total of 20 credits, 200 TQT,120 GLH. The purpose of this unit is to investigate potential success factors related to the implementation of information security in organisations, with a specific focus on the role of top management in implementing information security policies in organisations. " UNIT6- Cyber Security Threats and Risk: Banking and Finance Reference No : CSEC06 Credit : 20 || TQT : 200 "The unit covers a total of 20 credits, 200 TQT,120 GLH. Cyber risk has emerged as a critical threat to financial stability, following recent attacks on financial institutions. This unit presents novel documentation of cyber risk around the world for financial institutions by analysing the different types of cyber incidents (data breaches, fraud, and business disruption) and identifying patterns using a variety of datasets. " UNIT7- Cyber Wars Reference No : CSEC07 Credit : 20 || TQT : 200 "The unit covers a total of 20 credits, 200 TQT,120 GLH. The Internet must be considered a very dangerous battlefield. Nobody is secure. It is a paradox that those countries which do not feel vulnerable may be the most threatened by cyberwar. A cyberattack may easily be ordered through the Internet. Such an attack is cheaper than an attack by conventional weapons, and at the same time, it causes more significant economic losses. This unit focuses on the techniques and tools to ensure cyber security. " Delivery Methods School of Business & Technology London provides various flexible delivery methods to its learners, including online learning and blended learning. Thus, learners can choose the mode of study as per their choice and convenience. The program is self-paced and accomplished through our cutting-edge Learning Management System. Learners can interact with tutors by messaging through the SBTL Support Desk Portal System to discuss the course materials, get guidance and assistance and request assessment feedbacks on assignments. We at SBTL offer outstanding support and infrastructure for both online and blended learning. We indeed pursue an innovative learning approach where traditional regular classroom-based learning is replaced by web-based learning and incredibly high support level. Learners enrolled at SBTL are allocated a dedicated tutor, whether online or blended learning, who provide learners with comprehensive guidance and support from start to finish. The significant difference between blended learning and online learning methods at SBTL is the Block Delivery of Online Live Sessions. Learners enrolled at SBTL on blended learning are offered a block delivery of online live sessions, which can be booked in advance on their convenience at additional cost. These live sessions are relevant to the learners' program of study and aim to enhance the student's comprehension of research, methodology and other essential study skills. We try to make these live sessions as communicating as possible by providing interactive activities and presentations. Resources and Support School of Business & Technology London is dedicated to offering excellent support on every step of your learning journey. School of Business & Technology London occupies a centralised tutor support desk portal. Our support team liaises with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receives a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and streamline all the support processes efficiently. Quality learning materials made by industry experts is a significant competitive edge of the School of Business & Technology London. Quality learning materials comprised of structured lecture notes, study guides, practical applications which includes real-world examples, and case studies that will enable you to apply your knowledge. Learning materials are provided in one of the three formats, such as PDF, PowerPoint, or Interactive Text Content on the learning portal. How does the Online Learning work at SBTL? We at SBTL follow a unique approach which differentiates us from other institutions. Indeed, we have taken distance education to a new phase where the support level is incredibly high.Now a days, convenience, flexibility and user-friendliness outweigh demands. Today, the transition from traditional classroom-based learning to online platforms is a significant result of these specifications. In this context, a crucial role played by online learning by leveraging the opportunities for convenience and easier access. It benefits the people who want to enhance their career, life and education in parallel streams. SBTL's simplified online learning facilitates an individual to progress towards the accomplishment of higher career growth without stress and dilemmas. How will you study online? With the School of Business & Technology London, you can study wherever you are. You finish your program with the utmost flexibility. You will be provided with comprehensive tutor support online through SBTL Support Desk portal. How will I get tutor support online? School of Business & Technology London occupies a centralised tutor support desk portal, through which our support team liaise with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receive a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and to streamline all the support process efficiently. Learners should expect to receive a response on queries like guidance and assistance within 1 - 2 working days. However, if the support request is for assessment feedback, learners will receive the reply with feedback as per the time frame outlined in the Assessment Feedback Policy.

QUALIFI Level 4 Diploma in Cyber Security
Delivered Online On Demand11 months
£843.45

CompTIA PenTest+ Ethical Hacking Course

4.8(9)

By Skill Up

Are you interested in a career in ethical hacking? If so, then the CompTIA PenTest+ Ethical Hacking Course is for you! This course will teach you everything you need to know to become a professional penetration tester.

CompTIA PenTest+ Ethical Hacking Course
Delivered Online On Demand10 hours 48 minutes
£25

Nessus Scanner - Network Scanning from Beginner to Advanced

By Packt

Become a vulnerability assessment professional with the Nessus scanner for networks and learn to analyze and rank vulnerabilities, both manually and through automation. Explore vulnerability scanning with Metasploit and write custom professional reports. Learn to import results of Nmap in Nessus and create VA Project Worksheets to analyze vulnerability assessments.

Nessus Scanner - Network Scanning from Beginner to Advanced
Delivered Online On Demand5 hours 54 minutes
£82.99

Certified Cloud Engineer Pathway with Career Guarantee

By NuYew Ltd

Accelerate Your Cloud Engineer Career: Fast-Track Program with Exams, TOTUM Card & 5-Year Support. Enrol Today! Study methodOnline Duration9 months · Self-paced Access to content5 years CertificationsCompTIA A+CompTIA Cloud+CompTIA Network+CompTIA Security+CompTIA IT Fundamentals CertificationMicrosoft Azure Data Fundamentals Certificates Official CompTIA Certification - Free Additional info Exam(s) / assessment(s) is included in price Tutor is available to students TOTUM card included in price Job guarantee programme is included in this course Overview Learn the most in-demand digital skills in the world today with the Nuyew Tech Academy If you enjoy problem solving and have good analytical skills, this could be the career for you. Cloud Network Engineers implement, maintain, support, develop and sometimes design communications networks and can work as part of an Internal Support Team or for an outsourced IT Networking Consultancy. In bigger companies, you may look after one specific area of a network or if working for smaller businesses you could be expected to troubleshoot any IT related problem. Certifications CompTIA A+ CompTIA Cloud+ CompTIA Network+ CompTIA Security+ CompTIA IT Fundamentals Certification Awarded by CompTIA Microsoft Azure Data Fundamentals Awarded by Microsoft Description With a national shortage of Cloud Network Engineers, starting salaries of up to £25,000 per annum (average UK Salary £52,500) and amazing future employed and self-employed career prospects, take the next step today with our Fast Track Cloud Network Engineer Programme. What you can expect from our Fast Track Programme: World Class Education Energetic and unlimited 24/7 Student Support Real, tangible Career Outcomes 5 Years Career Support What our programme includes: Industry Recognised Qualifications CompTIA ITF+ (IT Fundamentals) CompTIA A+ CompTIA Network+ CompTIA Security+ CompTIA Cloud+ OR CompTIA Server+ OR CompTIA Linux+ Exams Includes all Exams and Unlimited Re-Sits 5 Years Career Support Guarantee As part of our unique Support Guarantee, our Career Support Team will assist you with: CV writing Expert careers advice Interview preparation Identifying and applying for the best opportunities in your area As a student in the Nuyew Tech Academy you will also be given exclusive access to our Career Skills Academy which includes advanced courses on Employability, CV Preparation, Interview Skills and Technique and everything else you need to get ready for your new Career. Who is this course for? This course is open to anyone interested in pursuing a Career in Cloud Network Engineering. Our Foundation Level provides the flexibility for us to accommodate students with any level of previous knowledge and experience. Requirements This course is open to all and has no pre-requisites All you need is a passion for technology and a strong desire to succeed. Career path Our programme is designed to enable you to achieve an Entry Level/Helpdesk role during training (£18k-£24K) ensuring that you also have the vital work experience required to enter the Tech Industry at a higher level (Av Salary £52.5K). Our Career Support Guarantee gives you exclusive access to our dedicated Career Support Team and Advanced Career Skills Academy for 5 Years following Graduation. Certificates Official CompTIA Certification Hard copy certificate - Included We provide Official CompTIA Certificates for all courses included (ITF+, A+(2), Network+, Security+, Cloud+.

Certified Cloud Engineer Pathway with Career Guarantee
Delivered Online On Demand1 hour
£3,196

Essential Frame Relay

5.0(3)

By Systems & Network Training

Frame Relay training course description A comprehensive look at Frame Relay, particularly with reference to a IP routed environment. Note this course is run as a workshop and therefore the contents are flexible. What will you learn Recognise the issues of using Frame Relay Describe Frame Relay. Configure a Cisco router to use Frame relay. Frame Relay training course details Who will benefit: Anyone working with Frame Relay. Prerequisites: Intro to data communications & networking Duration 1 day Frame Relay training course contents Introduction Packet switched networks, PVCs, SVCs. Topologies, Full mesh, partial mesh, Hub and spoke. Basics DLCI, CIR, LMI, the local loop. Configuring routers for Frame Relay Inverse ARP, static mappings, subinterfaces More Frame Relay Burst rates, FECN, BECN, the DE bit, Traffic shaping. Voice Over Frame Relay

Essential Frame Relay
Delivered in Internationally or OnlineFlexible Dates
£1,397

AI-102T00 Designing and Implementing an Azure AI Solution

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Software engineers concerned with building, managing and deploying AI solutions that leverage Azure AI Services, Azure AI Search, and Azure OpenAI. They are familiar with C# or Python and have knowledge on using REST-based APIs to build computer vision, language analysis, knowledge mining, intelligent search, and generative AI solutions on Azure. AI-102 Designing and Implementing an Azure AI Solution is intended for software developers wanting to build AI infused applications that leverage?Azure AI Services,?Azure AI Search, and?Azure OpenAI. The course will use C# or Python as the programming language. Prerequisites Before attending this course, students must have: Knowledge of Microsoft Azure and ability to navigate the Azure portal Knowledge of either C# or Python Familiarity with JSON and REST programming semantics Recommended course prerequisites AI-900T00: Microsoft Azure AI Fundamentals course 1 - Prepare to develop AI solutions on Azure Define artificial intelligence Understand AI-related terms Understand considerations for AI Engineers Understand considerations for responsible AI Understand capabilities of Azure Machine Learning Understand capabilities of Azure AI Services Understand capabilities of the Azure Bot Service Understand capabilities of Azure Cognitive Search 2 - Create and consume Azure AI services Provision an Azure AI services resource Identify endpoints and keys Use a REST API Use an SDK 3 - Secure Azure AI services Consider authentication Implement network security 4 - Monitor Azure AI services Monitor cost Create alerts View metrics Manage diagnostic logging 5 - Deploy Azure AI services in containers Understand containers Use Azure AI services containers 6 - Analyze images Provision an Azure AI Vision resource Analyze an image Generate a smart-cropped thumbnail 7 - Classify images Provision Azure resources for Azure AI Custom Vision Understand image classification Train an image classifier 8 - Detect, analyze, and recognize faces Identify options for face detection analysis and identification Understand considerations for face analysis Detect faces with the Azure AI Vision service Understand capabilities of the face service Compare and match detected faces Implement facial recognition 9 - Read Text in images and documents with the Azure AI Vision Service Explore Azure AI Vision options for reading text Use the Read API 10 - Analyze video Understand Azure Video Indexer capabilities Extract custom insights Use Video Analyzer widgets and APIs 11 - Analyze text with Azure AI Language Provision an Azure AI Language resource Detect language Extract key phrases Analyze sentiment Extract entities Extract linked entities 12 - Build a question answering solution Understand question answering Compare question answering to Azure AI Language understanding Create a knowledge base Implement multi-turn conversation Test and publish a knowledge base Use a knowledge base Improve question answering performance 13 - Build a conversational language understanding model Understand prebuilt capabilities of the Azure AI Language service Understand resources for building a conversational language understanding model Define intents, utterances, and entities Use patterns to differentiate similar utterances Use pre-built entity components Train, test, publish, and review a conversational language understanding model 14 - Create a custom text classification solution Understand types of classification projects Understand how to build text classification projects 15 - Create a custom named entity extraction solution Understand custom named entity recognition Label your data Train and evaluate your model 16 - Translate text with Azure AI Translator service Provision an Azure AI Translator resource Specify translation options Define custom translations 17 - Create speech-enabled apps with Azure AI services Provision an Azure resource for speech Use the Azure AI Speech to Text API Use the text to speech API Configure audio format and voices Use Speech Synthesis Markup Language 18 - Translate speech with the Azure AI Speech service Provision an Azure resource for speech translation Translate speech to text Synthesize translations 19 - Create an Azure AI Search solution Manage capacity Understand search components Understand the indexing process Search an index Apply filtering and sorting Enhance the index 20 - Create a custom skill for Azure AI Search Create a custom skill Add a custom skill to a skillset 21 - Create a knowledge store with Azure AI Search Define projections Define a knowledge store 22 - Plan an Azure AI Document Intelligence solution Understand AI Document Intelligence Plan Azure AI Document Intelligence resources Choose a model type 23 - Use prebuilt Azure AI Document Intelligence models Understand prebuilt models Use the General Document, Read, and Layout models Use financial, ID, and tax models 24 - Extract data from forms with Azure Document Intelligence What is Azure Document Intelligence? Get started with Azure Document Intelligence Train custom models Use Azure Document Intelligence models Use the Azure Document Intelligence Studio 25 - Get started with Azure OpenAI Service Access Azure OpenAI Service Use Azure OpenAI Studio Explore types of generative AI models Deploy generative AI models Use prompts to get completions from models Test models in Azure OpenAI Studio's playgrounds 26 - Build natural language solutions with Azure OpenAI Service Integrate Azure OpenAI into your app Use Azure OpenAI REST API Use Azure OpenAI SDK 27 - Apply prompt engineering with Azure OpenAI Service Understand prompt engineering Write more effective prompts Provide context to improve accuracy 28 - Generate code with Azure OpenAI Service Construct code from natural language Complete code and assist the development process Fix bugs and improve your code 29 - Generate images with Azure OpenAI Service What is DALL-E? Explore DALL-E in Azure OpenAI Studio Use the Azure OpenAI REST API to consume DALL-E models 30 - Use your own data with Azure OpenAI Service Understand how to use your own data Add your own data source Chat with your model using your own data 31 - Fundamentals of Responsible Generative AI Plan a responsible generative AI solution Identify potential harms Measure potential harms Mitigate potential harms Operate a responsible generative AI solution

AI-102T00 Designing and Implementing an Azure AI Solution
Delivered OnlineFlexible Dates
£1,785

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in Internationally or OnlineFlexible Dates
£3,697

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Cisco Networking

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for entry-level network administrators, network support and help desk technicians. Overview Upon successful completion of this course, students will be able to build, connect and manage networks, and IP traffic routing. In this course the student will learn to install, operate, configure and secure basic and enterprise networks. Networking BasicsNetworking ModelsNetwork AddressingPacket DeliveryDevice ManagementNetwork Security BasicsAdvanced Network Security with ACLsSwitchesAdvanced Switching ConceptsRoutersAdvanced Routing ConceptsBasic Network ServicesCisco Device ManagementTroubleshooting and Data CollectionAdvanced Switch RedundancyOSPF ConfigurationEIGRP ConfigurationPPP WANsFrame Relay WANsSecure VPNs and Tunneling Additional course details: Nexus Humans Cisco Networking training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Networking course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Networking
Delivered OnlineFlexible Dates
Price on Enquiry