• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

8261 Network courses delivered Online

Unix Administration: Unix Operating System

4.5(3)

By Studyhub UK

The 'Unix Administration: Unix Operating System' course offers a comprehensive introduction to Unix, focusing on key concepts, file and directory management, essential commands, and the basics of the VI text editor. Participants will gain practical knowledge and skills in Unix administration, enabling them to navigate and manage the Unix operating system effectively. Learning Outcomes: Understand the fundamentals of Unix and its significance in modern computing. Explore directory and file management techniques, including creation, manipulation, and organization. Master essential Unix commands for tasks such as navigation, file operations, and system management. Learn the basics of the VI text editor for efficient file editing and manipulation. Acquire proficiency in using Unix shell commands to enhance system administration. Develop skills in managing user accounts, permissions, and security settings. Gain knowledge of process management and system monitoring in Unix. Understand basic networking concepts and how they apply to Unix systems. Why buy this Unix Administration: Unix Operating System? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Unix Administration: Unix Operating System there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Unix Administration: Unix Operating System does not require you to have any prior qualifications or experience. You can just enrol and start learning.  IT professionals seeking to enhance their Unix administration skills. System administrators and network administrators working with Unix-based systems. Software developers and programmers interested in Unix environments. Students and enthusiasts looking to gain hands-on experience with Unix. Individuals pursuing a career in IT infrastructure and system management. Prerequisites This Unix Administration: Unix Operating System was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Unix System Administrator - Median salary of £40,000 - £50,000 per year. Network Administrator - Median salary of £30,000 - £40,000 per year. IT Operations Manager - Median salary of £50,000 - £70,000 per year. Software Developer - Median salary of £35,000 - £45,000 per year. IT Consultant - Median salary of £40,000 - £60,000 per year. Course Curriculum Unix Administration: Unix Operating System Introduction to Unix 01:00:00 Directory and File Management (Part- I) 00:58:00 Directory and File Management (Part- II) 00:59:00 Commands in Unix 00:59:00 Basics of VI Editor 00:59:00 Assignment Assignment - Unix Administration: Unix Operating System 00:00:00

Unix Administration: Unix Operating System
Delivered Online On Demand4 hours 55 minutes
£10.99

Logistics and Supply Chain Management - Double Endorsed Certificate

By Imperial Academy

2 QLS Endorsed Course | CPD Certified | Free PDF + Hardcopy Certificates | 80 CPD Points | Lifetime Access

Logistics and Supply Chain Management - Double Endorsed Certificate
Delivered Online On Demand
£150

Logistic and Supply Chain Management - Double Endorsed Certificate

By Imperial Academy

2 QLS Endorsed Course | CPD Certified | Free PDF + Hardcopy Certificates | 80 CPD Points | Lifetime Access

Logistic and Supply Chain Management - Double Endorsed Certificate
Delivered Online On Demand
£150

CompTIA Advanced Security Practitioner (CASP) - Video Training Course

4.3(43)

By John Academy

Description This CompTIA Advanced Security Practitioner (CASP) - Video Training Course establishes knowledgeable professionals in the field of advanced security practices. At first you will learn about the enterprise security architecture, security technology and resource technology. Then you will learn security design and solutions, application security design, managing risk, security policies, security procedures and enterprise security integration. Finally, you will learn about security research and analysis, disaster recovery and business continuity, managing risk in projects, legal issues and judgment and decision-making. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers. This course will prepare you to pass the exam CompTIA Advanced Security Practitioner (CASP). So, if you are interested to get this course don't delay to join now. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our CompTIA Advanced Security Practitioner (CASP) - Video Training Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. The Enterprise Security Architecture The Basics of Enterprise Security FREE 01:00:00 The Enterprise Structure 00:21:00 Enterprise Security Requirements 00:09:00 The Enterprise Security Technology Common Network Security Components and Technologies 00:55:00 Communications and Collaboration Security 00:40:00 Cryptographic Tools and Techniques 00:56:00 Advanced Authentication 00:14:00 Enterprise Resource Technology Enterprise Storage Security Issues 01:18:00 Distributed, Shared, and Virtualized Computing 00:26:00 Cloud Computing and Security 00:10:00 Security Design and Solutions Network Security Design 02:22:00 Conduct a Security Assessment 00:55:00 Host Security 01:19:00 Managing Risk in Projects Create a Risk Management Plan 01:15:00 Identify Risks and Their Causes 00:11:00 Analyze Risks 00:19:00 Develop a Risk Response Plan 00:07:00 Integrating Advanced Authentication and Authorization Techniques Implement Authentication 00:19:00 Implement Advanced 00:07:00 Implementing Cryptographic Techniques Describe Cryptographic Concepts 00:19:00 Choose Cryptographic Techniques 00:31:00 Choose Cryptographic Implementation 00:07:00 Integrating Hosts, Storage, Networks, and Apps in a Secure Enterprise Architecture Implement Security Standards in the Enterprise 00:13:00 Select Technical Deployment Models 00:28:00 The Enterprise Structure 00:21:00 Secure Enterprise Application Integration Enablers 00:21:00 Security Research and Analysis Perform an Industry Trends and Impact Analysis 00:41:00 Perform an Enterprise Security Analysis 00:26:00 Disaster Recovery and Business Continuity BCP Fundamentals 00:21:00 BCP Implementation 00:10:00 DRP Fundamentals 00:18:00 DRP Implementation 00:03:00 Responding to and Recovering from Incidents Design Systems to Facilitate Incident Response 00:14:00 Conduct Incident and Emergency Responses 00:20:00 Legal Issues Computer Crime Laws and Regulations 00:16:00 Computer Crime Incident Response 00:17:00 Judgment and Decision-Making Develop Critical Thinking Skills 00:12:00 Determine the Root of a Problem 00:06:00 Use Judgment to Make Sound Decisions 00:18:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

CompTIA Advanced Security Practitioner (CASP) - Video Training Course
Delivered Online On Demand19 hours 5 minutes
£24

Practical Linux Command Line 2.0

By Packt

Start your journey with the Linux command line with zero knowledge. This course will start from scratch with instructions to install a Linux OS on a virtual machine and advance to higher-level concepts with no prior knowledge required.

Practical Linux Command Line 2.0
Delivered Online On Demand3 hours 37 minutes
£41.99

CIMA F3 - Financial Strategy (valid from today until 1 Dec 2022)

4.4(141)

By ExP

CIMA F3, 100% Pass Guarantee, Full Learning and Revision Components, Tests, Mock Exam, Tutor Support and CIMA Approved Materials Included, Exceptional Pass Rates

CIMA F3 - Financial Strategy (valid from today until 1 Dec 2022)
Delivered Online On Demand
£243

CIMA E3 - Strategic Management (valid from today until 1 Dec 2022)

4.4(141)

By ExP

CIMA E3, 100% Pass Guarantee, Full Learning and Revision Components, Tests, Mock Exam, Tutor Support and CIMA Approved Materials Included, Exceptional Pass Rates

CIMA E3 - Strategic Management (valid from today until 1 Dec 2022)
Delivered Online On Demand
£243

CIMA P3 - Risk Management (valid from today until 1 Dec 2022)

4.4(141)

By ExP

CIMA P3, 100% Pass Guarantee, Full Learning and Revision Components, Tests, Mock Exam, Tutor Support and CIMA Approved Materials Included, Exceptional Pass Rates

CIMA P3 - Risk Management (valid from today until 1 Dec 2022)
Delivered Online On Demand
£243

CSCS Green Labourers Card Health & Safety

By MJ Electrical Training

Discover a streamlined pathway to obtaining your CSCS Health and Safety qualification with our online course and City & Guilds exam. Designed for construction workers, our program offers test-your-knowledge exercises, 200+ practice questions, and comprehensive mock exams, ensuring effective preparation for success.

CSCS Green Labourers Card Health & Safety
Delivered Online On Demand1 hour
£174

RESILIA Foundation: In-House Training

By IIL Europe Ltd

RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995