• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1410 Network courses delivered Live Online

Introduction to Linux Systems Administration (TTLX2220)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This is an introductory-level systems administration course geared for Systems Administrators and users who wish to learn how to how to install, configure and maintain an Enterprise Linux system in a networked environment. Overview This course is about 50% lab to lecture ratio, combining expert instructor-led discussions with practical hands-on skills that emphasize current techniques, best practices and standards. Working in this hands-on lab environment, guided by our expert practitioner, attendees will explore Installing the Linux operating system and configuring peripherals Performing and modifying startup and shutdown processes Configuring and maintaining basic networking services Creating and maintaining system users and groups Understanding and administering file permissions on directories and regular files Planning and creating disk partitions and file systems Performing maintenance on file systems Identifying and managing Linux processes Automating tasks with cron Performing backups and restoration of files Working with system log files Troubleshooting system problems Analyzing and taking measures to increase system performance Configuring file sharing with NFS Configuring Samba for file sharing with the Windows clients Setting up a basic Web server Understanding the components for setting up a LAMP server Implementing basic security measures Linux System Administration is a comprehensive hands-on course that teaches students how to install, configure and maintain an Enterprise Linux system in a networked environment. This lab-intensive class explores core administrative tasks such as: creating and managing users, creating and maintaining file systems, determining and implementing security measures and performing software installation and package management. Linux networking topics include installing and supporting SSH, NFS, Samba and the Apache Web server. Students will explore common security issues, as well as several tools, such as the PAM modules that help secure the operating system and network environment. Upon successful completion of this course, students will be prepared to maintain Linux systems in a networked business environment. Although the course includes installing and configuring a CentOS 7 / RHEL 7 Linux system, much of the course content also applies to Oracle, Ubuntu, Scientific and other current versions of mainstream Linux distributions. Labs include user and group maintenance, system backups and restoration, software management, administration tasks automation, file system creation and maintenance, managing remote access, working with cron, and configuring basic file sharing and Web services, as well as working with system logging utilities such as rsyslog and much more. System Administration Overview UNIX, Linux and Open Source Duties of the System Administrator Superusers and the Root Login Sharing Superuser Privileges with Others (su and sudo Commands) TCP/IP Networking Fundamentals Online Help Installation and Configuration Planning: Hardware and Software Considerations Site Planning Installation Methods and Types Installation Classes Partitions Logical Volume Manager - LVM File System Overview Swap Partition Considerations Other Partition Considerations The Linux Boot Loader: grub Software Package Selection Adding and Configuring Peripherals Printers Graphics Controllers Basic Networking Configuration Booting to Recovery Mode Booting and Shutting Down Linux Boot Sequence The systemd Daemon The systemctl Command Targets vs. Run Levels Modifying a Target Service Unit Scripts Changing System States Booting into Rescue Mode Shutdown Commands Managing Software and Devices Identifying Software Packages Using rpm to Manage Software Using yum to Manage Software Installing and Removing Software Identifying Devices Displaying Device and System Information (PCI, USB) Plug and Play Devices Device Configuration Tools Managing Users and Groups Setting Policies User File Management The /etc/passwd file The /etc/shadow file The /etc/group file The /etc/gshadow file Adding Users Modifying User Accounts Deleting User Accounts Working with Groups Setting User Environments Login Configuration Files The Linux File System Filesystem Types Conventional Directory Structure Mounting a File System The /etc/fstab File Special Files (Device Files) Inodes Hard File Links Soft File Links Creating New File Systems with mkfs The lost+found Directory Repairing File Systems with fsck The Journaling Attribute File and Disk Management Tools Linux File Security File Permissions Directory Permissions Octal Representation Changing Permissions Setting Default Permissions Access Control Lists (ACLs) The getfacl and setfacl commands SUID Bit SGID Bit The Sticky Bit Controlling Processes Characteristics of Processes Parent-Child Relationship Examining Running Processes Background Processes Controlling Processes Signaling Processes Killing Processes Automating Processes cron and crontab at and batch System Processes (Daemons) Working with the Linux Kernel Linux Kernel Components Types of Kernels Kernel Configuration Options Recompiling the Kernel Shell Scripting Overview Shell Script Fundamentals Bash Shell Syntax Overview Shell Script Examples System Backups Backup Concepts and Strategies User Backups with the tar Command System Backup Options The xfsdump and xfsrestore Commands Troubleshooting the System Common Problems and Symptoms Troubleshooting Steps Repairing General Boot Problems Repairing the GRUB 2 Boot Loader Hard Drive Problems Restoring Shared Libraries System Logs and rsyslogd Basic Networking Networking Services Overview NetworkManager Introduction Network Configuration Files Locations and Formats Enabling and Restarting Network Services with systemtcl Configuring Basic Networking Manually Configuring Basic Networking with NetworkManager LAMP Server Basics LAMP Overview Configuring the Apache Web Server Common Directives Apache Virtual Hosting Configuring an Open Source Database MySQL MariaDB PHP Basics Perl CGI Scripting Introduction to System Security Security Overview Maintaining System Security Server Access Physical Security Network Security Security Tools Port Probing with nmap Intrusion Detection and Prevention PAM Security Modules Scanning the System Maintaining File Integrity Using Firewalls Introduction to firewalld The Samba File Sharing Facility Configure Samba for Linux to Linux/UNIX File Sharing Configure Samba for Linux to Windows File Sharing Use the smbclient Utility to Transfer Files Mount/Connect Samba Shares to Linux and Windows Clients Networked File Systems (NFS) Using NFS to Access Remote File Systems Configuring the NFS Server Configuring the NFS Client Exporting File Systems from the NFS Server to the NFS Client

Introduction to Linux Systems Administration (TTLX2220)
Delivered OnlineFlexible Dates
Price on Enquiry

NCSP 800-53 Practitioner Certification Training

By IIL Europe Ltd

The NCSP® 800-53 Practitioner accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the NIST Cybersecurity Framework and its 800-53 controls across an enterprise and its supply chain.The course also teaches candidates how to build a Digital Value Management System (DVMS) CPD overlay model capable of enabling the quick adoption and adaption of new frameworks and models (NIST-CSF, NIST Privacy Framework, CMMC, etc.) that may be required to address internal, external (regulatory), and cyber threat landscape changes. Finally, the course teaches candidates how to ensure the organization's DVMS is designed for use within the organization and auditable by government regulators looking to verify regulatory outcomes. The NCSP Practitioner 800-53 course is designed for both the Implementer and Auditor topics and participants select the exam they want to take (or an additional exam can be ordered to be certified as both an implementer and auditor).

NCSP 800-53 Practitioner Certification Training
Delivered OnlineFlexible Dates
£2,995 to £3,995

Developing on Hyperledger Fabric 1.4

By Nexus Human

Duration 2 Days 12 CPD hours Overview Understand why Blockchain is needed and where Explore the major components of BlockchainLearn about Hyperledger Fabric and the structure of the Hyperledger ArchitectureLean the features of the Fabric model including chaincode, SDKs, Ledger, Security and Membership ServicesPerform comprehensive labs on writing chaincodeExplore the architecture of Hyperledger FabricUnderstand and perform in depth labs on Bootstrapping the NetworkPerform comprehensive labs to integrate/develop an application with Hyperledger Fabric running a smart contractBuild applications on Hyperledger FabricCourse Outline: This training course has been created to walk you through Chaincode Development, Testing, and Deployment for a Hyperledger Fabric Network catering specifically toward Golang written Chaincode (Fabric?s original Chaincode Language). Additionally as an Application Developer you will learn how to write, and prepare Client Applications using the most mature Standard Development Kit in Hyperledger Fabric, NodeJS. Blockchain Basics (Overview)Hyperledger Fabric Development EnvironmentKnowing the Difference: ComposerChaincode Use CasesChaincode BasicsGolang Shim DevelopmentDatabases for the DeveloperChaincode Dev. Deployment and InteractionsClients & SDK Development: Fabric-NetworkClients & SDK Development: Fabric-Client InteractionsLogging and Monitoring

Developing on Hyperledger Fabric 1.4
Delivered OnlineFlexible Dates
Price on Enquiry

Computing - GCSE Syllabus - Online Tuition

5.0(8)

By GLA Tutors Home or Online

Computer Science GCSE Syllabus The GCSE Computer Science Tutor Syllabus is designed to provide tutors in England with a comprehensive framework for teaching the GCSE Computer Science curriculum effectively. This syllabus aims to equip tutors with the necessary knowledge and skills to support students in their understanding and application of core computer science concepts.  Module 1: Introduction to Computer Science - Overview of computer science and its relevance in today's world - Understanding the components of a computer system - Introduction to algorithms and problem-solving techniques - Exploration of programming languages and their uses Module 2: Computer Hardware - Understanding the main components of a computer system, including CPU, memory, and storage devices - Exploring input and output devices and their functionalities - Understanding the role of operating systems and software in computer systems Module 3: Software Development - Introduction to programming concepts and languages (e.g., Python or Java) - Understanding variables, data types, and operators - Building algorithms and logical reasoning skills - Introduction to flowcharts and pseudocode - Implementation of simple programs and debugging techniques Module 4: Data Representation - Understanding binary, hexadecimal, and denary number systems - Representation of text, images, and sound using binary - Introduction to data compression and encryption techniques Module 5: Computer Networks - Understanding the basics of computer networks, including LAN, WAN, and the Internet - Introduction to network topologies, protocols, and security - Exploring the impact of digital communication on society Module 6: Cybersecurity and Ethical Issues - Understanding the importance of cybersecurity and data protection - Introduction to common threats and vulnerabilities - Exploring ethical issues related to computer science, such as privacy and intellectual property rights Module 7: Algorithms and Programming Techniques - Advanced programming concepts, including conditionals, loops, and functions - Introduction to sorting and searching algorithms - Exploring data structures, such as arrays and lists Module 8: System Architecture - Understanding the structure and function of a CPU - Introduction to memory hierarchy and cache - Exploring the Von Neumann architecture and its limitations Module 9: Computational Thinking and Problem Solving - Advanced problem-solving techniques using computational thinking - Introduction to algorithms for complex problems - Exploring algorithmic efficiency and optimization techniques Module 10: Exam Preparation and Revision - Reviewing key concepts covered throughout the syllabus - Practicing past exam questions and providing guidance on exam techniques - Supporting students with exam preparation strategies Please note that the duration and depth of each module can vary depending on the level of expertise required and the specific needs of the learners. Additionally, it's important to adapt the curriculum to the learners' proficiency levels, whether they are A Level/GCSE students or adult learners with different experience levels.

Computing - GCSE Syllabus - Online Tuition
Delivered OnlineFlexible Dates
£40

CRISC Certified in Risk and Information Systems Control

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - a. Organizational Governance Organizational Strategy, Goals, and Objectives Organizational Structure, Roles, and Responsibilities Organizational Culture Policies and Standards Business Processes Organizational Assets GOVERNANCE - b. Risk Governance Enterprise Risk Management and Risk Management Framework Three Lines of Defense Risk Profile Risk Appetite and Risk Tolerance Legal, Regulatory, and Contractual Requirements Professional Ethics of Risk Management IT RISK ASSESSMENT - a. IT Risk Identification Risk Events (e.g., contributing conditions, loss result) Threat Modelling and Threat Landscape Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) Risk Scenario Development IT RISK ASSESSMENT - b. IT Risk Analysis and Evaluation Risk Assessment Concepts, Standards, and Frameworks Risk Register Risk Analysis Methodologies Business Impact Analysis Inherent and Residual Risk RISK RESPONSE AND REPORTING - a. Risk Response Risk Treatment / Risk Response Options Risk and Control Ownership Third-Party Risk Management Issue, Finding, and Exception Management Management of Emerging Risk RISK RESPONSE AND REPORTING - b. Control Design and Implementation Control Types, Standards, and Frameworks Control Design, Selection, and Analysis Control Implementation Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - c. Risk Monitoring and Reporting Risk Treatment Plans Data Collection, Aggregation, Analysis, and Validation Risk and Control Monitoring Techniques Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) Key Performance Indicators Key Risk Indicators (KRIs) Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - a. Information Technology Principles Enterprise Architecture IT Operations Management (e.g., change management, IT assets, problems, incidents) Project Management Disaster Recovery Management (DRM) Data Lifecycle Management System Development Life Cycle (SDLC) Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - b. Information Security Principles Information Security Concepts, Frameworks, and Standards Information Security Awareness Training Business Continuity Management Data Privacy and Data Protection Principles

CRISC Certified in Risk and Information Systems Control
Delivered OnlineFlexible Dates
£2,037

SAP System Security Fundamentals

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for System Security Administrator Security Architect Technology Consultant Overview This course will prepare you to Understand SAP Security fundamentals Get an overview of the main SAP concepts for security Be prepared to learn more in detail about each SAP concept for security This course will prepare you to Understand SAP Security fundamentals. Get an overview of the main SAP concepts for security. Be prepared to learn more in detail about each SAP concept for security. SAP Access Governance and Control Overview of Security Fundamentals Introduction to SAP Access Governance SAP NetWeaver Application Security Overview Describe SAP User Experience Explain Basic User Administration for AS ABAP Explain Basic Role Administration for AS ABAP Describe SAP Fiori Catalog and Group Administration Concept Describe AS JAVA Security Discuss Custom Development and Security SAP Access Governance and Compliance Describe SAP Access Governance Explain SAP GRC Access Control Describe SAP Identity Management Describe SAP Cloud Identity Access Governance Infrastructure Security Explaining Network Topology Enabling Secure Network Communication (SNC) Enabling Secure Sockets Layer (SSL) Implementing Single Sign-On (SSO) in SAP Systems Security Monitoring with SAP Solution Manager Monitoring Security with SAP Solution Manager SAP Data Privacy Governance and Cybersecurity Introduce EU General Data Privacy Regulation (GDPR) Discuss SAP Support for GDPR Compliance Additional course details: Nexus Humans SAP System Security Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SAP System Security Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SAP System Security Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX Advanced Load Balancer: Troubleshooting and Operations [V20.x]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators or network administrators Network professionals who have experience working with VMware NSX Advanced Load Balancer (Avi) and are responsible for troubleshooting and operating Application Delivery Controllers solutions Overview By the end of the course, you should be able to meet the following objectives: Become familiar with NSX Advanced Load Balancer (Avi) troubleshooting tools and steps to solve the problems. Establish and apply a structured troubleshooting approach and methodology Understand built-in mechanisms available for NSX Advanced Load Balancer (Avi) monitoring Identify, analyze, and troubleshoot problems related to the NSX Advanced Load Balancer infrastructure, including control and data plane components Identify, analyze, and troubleshoot problems related to application components such as Virtual Services, Pools, and related components This 3-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competence in operating and troubleshooting the VMware NSX© Advanced Load Balancer? (Avi) solutions. In this course, you are introduced to several operational, management, and troubleshooting tools. You will be presented with various types of technical problems, which you will identify, analyze, and solve through a systematic process. Course Introduction Introductions and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and functions Events and Alerts Describe NSX Advanced Load Balancer Events Describe and configure NSX Advanced Load Balancer Alerts Describe NSX Advanced Load Balancer monitoring capabilities leveraging SNMP, Syslog, and email Introduction to NSX Advanced Load Balancer Troubleshooting Explain NSX Advanced Load Balancer troubleshooting concepts Describe and leverage Virtual Service Traffic Logs Describe and leverage Virtual Service Security Insights Understand and utilize Health Score concepts Explain and leverage application metrics and analytics Explain and leverage packet capture and CLI utilities for application troubleshooting Leverage UI, CLI, and useful log files to perform control plane troubleshooting Infrastructure Troubleshooting Describe and perform general VMware Cloud Connector troubleshooting Describe and analyze VMware Cloud Connector state Leverage case studies to troubleshoot VMware Cloud Connector Describe and troubleshoot NSX-T Cloud Connector integration Leverage case studies to troubleshoot NSX-T Cloud Connector Describe and troubleshoot Linux Server Cloud Connector integration Describe and troubleshoot OpenStack Cloud Connector integration Leverage case studies to troubleshoot OpenStack Cloud Connector Describe and troubleshoot AWS and Azure Cloud Connector integrations Troubleshooting NSX Advanced Load Balancer Service Engines and Advanced Troubleshooting Explain general Service Engine infrastructure Explain and leverage analytics, health score, and metrics for Service Engine troubleshooting Explain and leverage Events and Alerts for Service Engine troubleshooting Leverage CLI for accessing Service Engine Analyze Service Engine logs offline with Tech Support utility and collecting core dumps Leverage CLI and useful log files for Service Engine Data Plane troubleshooting Leverage CLI to capture packets for advanced datapath analysis Monitoring NSX Advanced Load Balancer Explain and configure SNMP-based monitoring Explain and configure REST API-based monitoring Describe and leverage 3rd-party integration with monitoring tools like Splunk Leverage 3rd-party REST API monitoring extensions like Prometheus Describe and leverage VMware integrations like VMware vRealize© Network Insight? for monitoring Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Troubleshooting and Operations [V20.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Troubleshooting and Operations [V20.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX Advanced Load Balancer: Troubleshooting and Operations [V20.x]
Delivered OnlineFlexible Dates
Price on Enquiry

What is good support for trans people with a learning disability and/or autistic people?

By Supported Loving

Lorne Power from the Trans Social Work Practitioner Network shares some practical advice for trans-inclusive practice with people with a learning disability and/or autistic people based on their work developing the Brighton and Hove Autism Strategy, their emerging PhD research and their lived experience as a trans social worker in a specialist learning disability team.  Come and join us :)

What is good support for trans people with a learning disability and/or autistic people?
Delivered OnlineJoin Waitlist
FREE

ECS Card Health & Safety Course Dover

By MJ Electrical Training

ECS Health & Safety Course with MJ Electrical Training. Available every week, use this course to complete the application process when applying for an ECS Labourers Card.

ECS Card Health & Safety Course Dover
Delivered OnlineFlexible Dates
£174

ECS Card Health & Safety Course Bromley

By MJ Electrical Training

ECS Health & Safety Course with MJ Electrical Training. Available every week, use this course to complete the application process when applying for an ECS Labourers Card.

ECS Card Health & Safety Course Bromley
Delivered OnlineFlexible Dates
£174