• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

8260 Network courses in Cardiff delivered Online

Cross Border Electricity Trading in Asia - Renewable Energy, Digital Technologies and New Operational Flexibility Solutions

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) This 3 half-day Virtual Instructor Led Training (VILT) course highlights the impact of the introduction of renewable energy, digital technologies and new operational flexibility solutions in the electricity trading market. These advancements facilitate unique opportunities and challenges for cross border trading of electricity. Most countries in Asia, have designed their own portfolio of climate actions with an accelerated penetration of renewable energy (or by importing renewable energy into their local grids). These changes are taking place at unprecedented speed and add further complexity to the operation of electricity trading markets, while presenting new opportunities. The Asian market, can tap into its vast potential of solar, wind and geothermal energy sources. A global, unified vision is emerging to support each of countries' energy needs and decarbonization goals. This VILT course will highlight priorities of each country to achieve its energy goals. The main operational flexibilities of each type of renewable resource are discussed in detail. The course also discusses the main components of Power Purchase Agreements and advancements in digitalization and how digital technologies can influence the energy market and cross border electricity trading. Key Takeaways: New Energy Market Design Cross Border Trading PPAs Mechanisms and Examples of PPAs The Increased Penetration of Renewable Resources in the Power Systems and How It Stimulates Cross Border Trading How Digital Innovation Drives Energy Markets and Cross Border Trading Training Objectives Upon completion of this VILT course, participants will be able to: Be familiar with the global vision of One Sun, One World, One Grid Understand the major trends reshaping the energy markets Learn how innovative digital technologies change the energy markets Understand why sustainable energy markets require a tighter coordination between transmission and distribution system operators Engage with each other to design the energy market of the future Target Audience This VILT course will benefit policy makers and regulators from energy agencies, transmission companies and utilities as well as power system engineers and power system operators from control centre and ISO. Training Methods The VILT will be delivered online in 3 half-day sessions comprising 4 hours per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 3 half-day sessions, 4 hours per session (12 hours in total). Trainer Your expert course leader is a Utility Executive with extensive global experience in power system operation and planning, energy markets, enterprise risk and regulatory oversight. She consults on energy markets integrating renewable resources from planning to operation. She led complex projects in operations and conducted long term planning studies to support planning and operational reliability standards. Specializing in Smart Grids, Operational flexibilities, Renewable generation, Reliability, Financial Engineering, Energy Markets and Power System Integration, she was recently engaged by the Inter-American Development Bank/MHI in Guyana. She was the Operations Expert in the regulatory assessment in Oman. She is a registered member of the Professional Engineers of Ontario, Canada. She is also a contributing member to the IEEE Standards Association, WG Blockchain P2418.5. With over 25 years with Ontario Power Generation (Revenue $1.2 Billion CAD, I/S 16 GW), she served as Canadian representative in CIGRE, committee member in NSERC (Natural Sciences and Engineering Research Council of Canada), and Senior Member IEEE and Elsevier since the 90ties. Our key expert chaired international conferences, lectured on several continents, published a book on Reliability and Security of Nuclear Power Plants, contributed to IEEE and PMAPS and published in the Ontario Journal for Public Policy, Canada. She delivered seminars organized by the Power Engineering Society, IEEE plus seminars to power companies worldwide, including Oman, Thailand, Saudi Arabia, Malaysia, Indonesia, Portugal, South Africa, Japan, Romania, and Guyana. Our Key expert delivered over 60 specialized seminars to executives and engineers from Canada, Europe, South and North America, Middle East, South East Asia and Japan. Few examples are: Modern Power System in Digital Utilities - The Energy Commission, Malaysia and utilities in the Middle East, GCCIA, June 2020 Assessment of OETC Control Centre, Oman, December 2019 Demand Side management, Load Forecasting in a Smart Grid, Oman, 2019 Renewable Resources in a Smart Grid (Malaysia, Thailand, Indonesia, GCCIA, Saudi Arabia) The Modern Power System: Impact of the Power Electronics on the Power System The Digital Utility, AI and Blockchain Smart Grid and Reliability of Distribution Systems, Cyme, Montreal, Canada Economic Dispatch in the context of an Energy Market (TNB, Sarawak Energy, Malaysia) Energy Markets, Risk Assessment and Financial Management, PES, IEEE: Chicago, San Francisco, New York, Portugal, South Africa, Japan. Provided training at CEO and CRO level. Enterprise Risk methodology, EDP, Portugal Energy Markets: Saudi Electricity Company, Tenaga National Berhad, Malaysia Reliability Centre Maintenance (South East Asia, Saudi Electricity Company, KSA) EUSN, ENERGY & UTILITIES SECTOR NETWORK, Government of Canada, 2016 Connected+, IOT, Toronto, Canada September 2016 and 2015 Smart Grid, Smart Home HomeConnect, Toronto, Canada November 2014 Wind Power: a Cautionary Tale, Ontario Centre for Public Policy, 2010 POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Cross Border Electricity Trading in Asia - Renewable Energy, Digital Technologies and New Operational Flexibility Solutions
Delivered in Internationally or OnlineFlexible Dates
£1,699

Linux Professional Institute Certification (LPIC-2) 201

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Linux Professional Institute Certification (LPIC-2) 201 training is suitable for individuals with roles of: System administrator Network administrator Technician DevOps Overview Upon successful completion of this course, students will be able to: measure hardware resource and network bandwidth, identify and troubleshoot resource problems monitor resource usage to predict future resource needs utilise kernel components that are necessary to specific hardware, hardware drivers, system resources and requirements properly configure a kernel to include or disable specific features of the Linux kernel as necessary manage and/or query a 2.6.x, 3.x or 4.x kernel and its loadable modules query and modify the behaviour of system services at various targets / run levels properly manipulate a Linux system during both the boot process and during recovery mode properly configure and navigate the standard Linux filesystem configure automount filesystems using AutoFS configure and implement software RAID configure kernel options to support various drives create and remove logical volumes, volume groups, and physical volumes use system tools to back up important system data. This course prepares students to take the 201 exam of the LPI level 2 certification. To gain LPIC-2 certification, an individual should have an active LPIC-1 certification. Capacity Planning Measure and Troubleshoot Resource Usage Predict Future Resource Needs Linux Kernel Kernel components Compiling a Linux kernel Kernel runtime management and troubleshooting System Startup Customising system startup System recovery Alternate Bootloaders Filesystem and Devices Filesystem and Devices Maintaining a Linux filesystem Creating and configuring filesystem options Advanced Storage Device Administration Configuring RAID Adjusting Storage Device Access Logical Volume Manager Networking Configuration Basic networking configuration Advanced Network Configuration Troubleshooting network issue System Maintenance Make and install programs from source Backup operations Notify users on system-related issues

Linux Professional Institute Certification  (LPIC-2) 201
Delivered OnlineFlexible Dates
Price on Enquiry

Managing Smaller Projects

By Underscore Group

Learn how to better apply project management techniques to manage small projects as part of your normal role.

Managing Smaller Projects
Delivered OnlineFlexible Dates
£425

Building a Professional Brand Using LinkedIn Level 3

By Course Cloud

Course Overview LinkedIn is the leading social media platform for professionals. Did you know that 3 people are hired through LinkedIn every minute? The Building a Professional Brand Using LinkedIn Level 3 course will take you step-by-step through how to present yourself powerfully on LinkedIn and network like a pro. It introduces best practices and techniques for increasing your visibility, sharing content with your community, and maximising social engagement, to build an impressive business profile. What's more, you'll learn how to connect your resume, incorporate SEO techniques to optimise your profile and track your metrics to broaden your network. This complete masterclass is open to anyone looking to build their brand through Linkedin, and has no specific entry requirements. Study as a part-time or full-time student and learn up-to-date strategies from the experts. This best selling Building a Professional Brand Using LinkedIn Level 3 has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Building a Professional Brand Using LinkedIn Level 3 is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Building a Professional Brand Using LinkedIn Level 3 is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Building a Professional Brand Using LinkedIn Level 3 is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Building a Professional Brand Using LinkedIn Level 3, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Building a Professional Brand Using LinkedIn Level 3 will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Building a Professional Brand Using LinkedIn Level 3 to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Building a Professional Brand Using LinkedIn Level 3
Delivered Online On Demand
£25

Creating a Professional LinkedIn profile Level 3

By Course Cloud

Course Overview LinkedIn is the top social media platform for professionals and businesses. Did you know that 55 million companies are on LinkedIn. The Creating a Professional LinkedIn profile Level 3 course will guide you through how to present yourself powerfully on LinkedIn and network like a pro. It introduces best practices and techniques for increasing your visibility, sharing content with your community, and maximising social engagement, to build an impressive business profile. What's more, you'll learn how to connect your resume, incorporate SEO techniques to optimise your profile and track your metrics to broaden your network. This complete masterclass is open to anyone looking to build their brand through Linkedin, and has no specific entry requirements. Study as a part-time or full-time student and learn up-to-date strategies from the experts. This best selling Creating a Professional LinkedIn profile Level 3 has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Creating a Professional LinkedIn profile Level 3 is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Creating a Professional LinkedIn profile Level 3 is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Creating a Professional LinkedIn profile Level 3 is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Creating a Professional LinkedIn profile Level 3, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Creating a Professional LinkedIn profile Level 3 will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Creating a Professional LinkedIn profile Level 3 to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Creating a Professional LinkedIn profile Level 3
Delivered Online On Demand
£25

Data Protection Training

4.9(27)

By Apex Learning

Get Hard Copy + PDF Certificates + Transcript + Student ID Card worth £160 as a Gift - Enrol Now Know how to protect personal data and ensure that neither you nor your clients experience fraud or serious criminal acts. This comprehensive course delivers all the information needed to follow the UK's Data Protection Act and safeguard confidential details from exposure. The Data Protection Level 5 bundle is an invaluable overview of crucial data legislation for commercial businesses and individuals. You will be made aware of the latest threats and methods by which a computer can be illegally accessed, and vital material can be stolen. Alongside this, you will be enlightened as to the available security protocols, and the actions that you must legally take. With a single payment, you will gain access to Data Protection Level 5 including 10 premium courses, an original hardcopy certificate, transcript and a student ID card which will allow you to get discounts on things like music, food, travel and clothes etc. This Data Protection and Data Security Level 2 Bundle Consists of the following Premium courses: Course 01: GDPR Data Protection Level 5 Course 02: Data Protection and Data Security Level 2 Course 03: CompTIA Security+ (SY0-601) Course 04: Cyber Security Incident Handling and Incident Response Course 05: IT Support Technician Training Course 06: Encryption Course 07: CyberSecurity Law Online Course Course 08: Network Security Level 2 Course 09: Introduction to Data Analysis Course 10: Data Structures Complete Course Course 11: Criminal Law and Criminology Diploma Take this course anywhere and at any time. Don't let your lifestyle limit your learning or your potential. Data Protection and Data Security Level 2 will provide you with the CPD certificate that you'll need to succeed. Gain experience online and interact with experts. This can prove to be the perfect way to get noticed by a prospective employer and stand out from the crowd. Data Protection and Data Security Level 2 has been rated and reviewed highly by our learners and professionals alike. We have a passion for teaching, and it shows. All of our courses have interactive online modules that allow studying to take place where and when you want it to. The only thing you need to take Data Protection and Data Security Level 2 is Wi-Fi and a screen. You'll never be late for class again. Experienced tutors and mentors will be there for you whenever you need them, and solve all your queries through email and chat boxes. Data Protection Course Curriculum Data Protection: Course 01: GDPR Data Protection Level 5 Module 01: GDPR Basics Module 02: GDPR Explained Module 03: Lawful Basis for Preparation Module 04: Rights and Breaches Module 05: Responsibilities and Obligations Course 02: Data Protection and Data Security Level 2 GDPR Basics GDPR Explained Lawful Basis for Preparation Rights and Breaches Responsibilities and Obligations Course 03: CompTIA Security+ (SY0-601) Section 01: Introduction Section 02: Risk Management Section 03: Cryptography Section 04: Identity and Account Management Section 05: Tools of the Trade Section 06: Securing Individual Systems Section 07: The Basic LAN Course 04: Cyber Security Incident Handling and Incident Response Section 01: An Introduction to Incident Handling Section 02: Preparation for an Incident Section 03: Identification Section 04: Containment Section 05: Eradication Course 05: IT Support Technician Training Section 01: How People Use Computers Section 02: System Hardware Section 03: Device Ports and Peripherals Section 04: Data Storage and Sharing Section 05: Understanding Operating Systems Course 06: Encryption Section 01: Introduction Section 02: Basics of Common Encryption Section 03: Technical Aspects of Encryption Section 04: AES Basic Tech Demo Section 05: File and System Encryption Section 06: Conclusion Course 07: Cyber Security Law Online Course Module 01: Introduction to Cyber Law Module 02: Cyber Law, Cyber Ethics and Online Gambling Module 03: Cyber Crime, Cyber Security and Trust in Cyberspace Module 04: Threat Factors: Computer as a Target Course 08: Network Security Level 2 Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Course 09: Introduction to Data Analysis Module 01: Introduction Module 02: Agenda and Principles of Process Management Module 03: The Voice of the Process Module 04: Working as One Team for Improvement Module 05: Exercise: The Voice of the Customer Course 10: Data Structures Complete Course Unit 01: Introduction Unit 02: Arrays Unit 03: Liked List Unit 04: Stack Unit 05: Queues Course 11: Criminal Law and Criminology Diploma Module 1: Classification of Crime Module 2: UK Law & Legal System Module 3: Understanding Criminal Psychology Module 4: Dealing with Crime Module 5: Forensic Science How will I get my Certificate? After successfully completing the course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) CPD 145 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Data Protection bundle. Requirements This Data Protection course has been designed to be fully compatible with tablets and smartphones. Career path Having these various CPD certificate will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (GDPR Data Protection Level 5) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost

Data Protection Training
Delivered Online On Demand
£39

ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot

By Nexus Human

Duration 5 Days 30 CPD hours Overview SDWAN Review Advanced Template Design and Troubleshooting Advanced Security Policies on vEdge and IOS-XE Platforms Advanced Local Policies on vEdge and IOS-XE Platforms Advanced Central Policies on vEdge and IOS-XE Platforms Advanced Troubleshooting of Policies on vEdge and IOS-XE Platforms In this Advanced Lab focused SDWAN Course, Students willExplore and Troubleshoot the initials environmentLearn Advanced Techniques to Deploy Templates with the theme of reusabilityDeploy and Troubleshoot Transport BridgingDeploy and Troubleshoot Routing including OSPF, BGP, EIGRPDeploy and Troubleshoot Multicast RoutingDesign, Configure, and Troubleshoot Advanced Security PoliciesDesign, Configure, and Troubleshoot Local PoliciesDesign, Configure, and Troubleshoot Application Aware RoutingDesign, Configure, and Troubleshoot Quality of ServiceDesign, Configure, and Troubleshoot Central Policies Including Hub Spoke, Full Mesh and Custom TopologiesDesign, Configure, and Troubleshoot Central Policies Including Service ChainingDesign, Configure, and Troubleshoot Central Policies Including Traffic Rules & CFLOW Cisco SD-WAN Overview Dashboard SD-WAN Architecture SD-WAN WAN Edges SD-WAN Controllers SD-WAN Fabric SD-WAN Advanced Settings Advanced Controller Settings Overlay and vEdge Recommended Settings Forward Error Correction (FEC) Packet Duplication System IP Design LTE Operation SD-WAN High Availability Controller High Availability Controller Scalability Active vManage, Backup Inactive vManage Clustering vManages Disaster Recovery SD-WAN Templates Template Overview Future Templates Device template using Future Templates Device template using CLI Templates Designing templates for Reusability Attaching Devices to Templates Bridging Transparent Bridging Bridging Template Configuration cEdge Bridging Template Configuration vEdge Bridging Template Configuration Monitoring Bridging Routing Protocols Static Routes Dynamic Routing Protocols Multicast Multicast Terms Requirements vEdge Multicast Support cEdge Multicast Support Multicast RPs Multicast Replicators PIM IGMP Network Optimization Optimization Overview TCP Optimization vEdge Optimization Requirements vEdge Optimization Implementation cEdge (IOS-XE) Optimization Requirements cEdge (IOS-XE) Optimization Implementation AppNAV Per Tunnel QoS Direct Internet Access (DIA) Overview SD-WAN Direct Internet Access (DIA) SD-WAN DIA Requirements SD-WAN Direct Internet Access Use Cases SD-WAN Direct Internet Access Design Components SD-WAN Direct Internet Access Design Considerations SD-WAN Direct Internet Access Failover Scenarios Cisco SD-WAN Direct Internet Access Monitoring Unified Communications Voice Integration in SD-WAN Voice Feature Templates Voice Policies IOS-XE UC Device Template SD-WAN Security Policy Authentication/Encryption/Integrity Firewall IPS (Snort) URL Filtering Web Layer Security Pairwise IPsec Keys SD-WAN Local Policy Policy Configuration Overview Policy Framework-Localized Policies Local Control Policy Local Control (Route) Policy Localized Control Policy Configuration Local Data Policy Configure Localized Data Policy for IPv4 SD-WAN Central Policy Policy Creation and Management Guidelines Centralized Data Policies Application Aware Routing Service Chaining Traffic Flow Monitoring with Cflowd Policy Construction Platform Support and Scalability SDWAN Migration Sequence of Migration Migration Planning DC/Hub Site Migration Branch/Spoke Site Migration Additional course details: Nexus Humans ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot
Delivered OnlineFlexible Dates
Price on Enquiry

Neonatal & Paediatric Phlebotomy Course (GPT103)

4.6(39)

By Geopace Training

Specialised techniques and skills associated with neonatal and paediatric blood draws Nationally Recognised Qualification OCN Accredited - Level 3 (advanced) CPD Accredited - The CPD Certification Service Follow-on from Introduction to Phlebotomy Course Complements our Advanced Phlebotomy Course (Level 4 - FDSc level) Expand your horizons and add new skills Covers neonates, infants and child draws Legal framework and consenting Download a certificate on completion of your online course ​ FOLLOWS ON FROM INTRODUCTION TO PHLEBOTOMY COURSE BUT ALSO OPEN TO ALL APPLICANTS

Neonatal & Paediatric Phlebotomy Course (GPT103)
Delivered Online On Demand1 hour
£99

IT Administrator Diploma

4.3(43)

By John Academy

As an IT administrator, you will be responsible for maintaining the company's IT network, servers, security systems and other essential tasks. Enrolling in the IT Administrator Diploma will give you the opportunity to build a solid base from which to start, or further, your career in IT field. The knowledge acquired from the course will prepare you to begin a career in IT as it provides you with a comprehensive understanding of Information Technology. Description In this IT Administrator Diploma, you will learn to recognise computer components, including how to install software and establish network connectivity accurately. Keep in mind that it is hardly ever possible to undertake security issues without relevant knowledge and proper supervision. This course teaches you how to anticipate security risks as well as identify compatibility issues in a reachable way possible. Furthermore, you will also enhance your knowledge about preventative maintenance that will help you stand out from your competition when you are hunting for your desired job. There's plenty in this course to take advantage of, and it will provide you with a stimulating and insightful description of the ways in which you will confidently perform the maintenance, configuration, and reliable operation of computer systems. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam, you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Software: What is an Operating System FREE 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:10:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:06:00 Hardware: Hardware and Peripherals 00:07:00 Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management FREE 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:22:00 Integrate Documentation into Risk Management 00:14:00 Classify Threats and Threat Profiles 00:07:00 Perform Ongoing Threat Research 00:12:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:09:00 Assess the Impact of Reconnaissance Incidents 00:10:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:10:00 Assessing the impact of Social Engineering 00:07:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:20:00 Rogue Devices 00:04:00 Public Hotspots 00:06:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:17:00 WLAN Security Infrastructure 00:37:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:15:00 Security: Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 Common Scams 01:00:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle FREE 00:37:00 Information Security Controls 00:35:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:31:00 Malware 00:25:00 Software-Based Threats 00:21:00 Based Threats 00:38:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:56:00 Manage Device and Host Security 01:07:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:04:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:09:00 Networking: OSI Layers FREE 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:16:00 Converters and Connectors 00:26:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:06:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 00:59:00 Common Problems 00:32:00 Troubleshooting 00:27:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT FREE 00:06:00 EMR EHR Issues 00:04:00 Regulations, Standards, and Stakeholders 00:13:00 HIPAA Controls and Compliance 00:07:00 Roles and Responsibilities 00:09:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:02:00 Computing Essentials 00:05:00 Networking 00:32:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:19:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:07:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:14:00 Perform Backups and Disaster Recovery 00:18:00 Mock Exam Mock Exam- IT Administrator Diploma 00:30:00 Final Exam Final Exam- IT Administrator Diploma 00:30:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

IT Administrator Diploma
Delivered Online On Demand48 hours
£14.99

IS20SECURITYCON - IS20 Security Controls Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Information Assurance Managers/Auditors System Implementors/administrators IT Administrators Auditors/Auditees Federal Agencies/Contractors Security Vendors and Consulting Groups Overview Upon completion, the IS20 Security Controls candidate will be able to not only competently take the IS20 Controls exam but will also have an understanding of how to implement the top 20 most critical controls in the work place. IS20 controls are the Top Twenty Most Critical Security Controls in Information Technology.ÿ This 4 day training course covers proven tools and methodologies needed to execute and analyze the Top Twenty Most Critical Security Controls. Nearly all organizations that maintain sensitive information are adopting these Security Controls. These controls were chosen by leading government and private organizations who are experts on how attacks work and what can be done to prevent them from happening. The controls were selected as the best way to block known attacks as well as help search for and alleviate any damage from the attacks that are successful. This course allows the security professional to see how to implement controls in an existing network through highly effective and economical automation. For management, this training is the best way to distinguish how you will assess whether these security controls are effectively being administered. Introduction Critical Control 1 Critical Control 2 Critical Control 3 Critical Control 4 Critical Control 5 Critical Control 6 Critical Control 7 Critical Control 8 Critical Control 9 Critical Control 10 Critical Control 11 Critical Control 12 Critical Control 13 Critical Control 14 Critical Control 15 Critical Control 16 Critical Control 17 Critical Control 18 Critical Control 19 Critical Control 20

IS20SECURITYCON - IS20 Security Controls Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry