• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

8248 Network courses delivered Online

Cisco Introduction to Cisco IOS XR v2.0 (IOSXR100)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System installersSystem integratorsSystem administratorsNetwork administratorsSolution designers Overview After taking this course, you should be able to:Describe the Cisco IOS XR software architecture, high availability components, and scalability featuresPerform basic configurations on a Cisco IOS XR routerDescribe Cisco IOS XR software operationsDescribe the configuration file systemPerform Cisco IOS XR software installationsConfigure AAA servicesConfigure NTPConfigure Simple Network Management Protocol (SNMP), telemetry, and loggingConfigure routing protocolsMonitor processesUse error messages and core dumps he Introduction to Cisco IOS XR (IOSXR100) v2.0 course introduces you to the features and functions of the Cisco© Internetwork Operating System (Cisco IOS©) XR Software operating system. You learn the fundamental concepts on which the operating system is based and Cisco IOS XR basic operations, system administration, and troubleshooting. Cisco IOS XR Software Overview Platform Overview Cisco IOS XR Architecture Cisco IOS XR High Availability Cisco IOS XR Software Configuration Basics Cisco IOS XR Configuration Operations Cisco IOS XR Initial Configuration Reviewing the Configuration Cisco IOS XR Software Operations Examining Configuration Operations Examining Configuration Rollback and Recovery Configuration File System Overview Examining the Binary Configuration Examining the Commit Database Examining the ASCII Configuration Examining the Nonvolatile Generation (NVgen) Files Verifying Cisco Fabric Services (CFS) Integrity Cisco IOS XR Software Installation Software Package Basics Installing Software Packages AAA Security AAA Fundamentals Task-Based Security Configuring a User Security Policy Authentication with Remote Servers Configuring Router to AAA Server Communication Configuring Authentication Terminal Access Controller Access-Control System Plus (TACACS+) Command Authorization Configuring Accounting AAA Troubleshooting Network Time Synchronization Network Time Protocol SNMP, Telemetry, and Logging Examining SNMP Examining Telemetry Examining Logging Basic Routing Configuration Configuring Intermediate System to Intermediate System (IS-IS) Configuring Open Shortest Path First (OSPF) Configuring Border Gateway Protocol (BGP) Configuring Routing Protocol for LLN (RPL) Policy Packet Filtering Access Control Lists Unicast Reverse Path Forwarding Management Plane Protection Monitoring Process Examining Processes and Threads Process Crashes Commands for Debugging Processes Restartability of Processes Process Monitoring Identifying Memory Problems Memory Depletion Core Dumps Core Dump Fundamentals Using Core Dump Information Additional course details: Nexus Humans Cisco Introduction to Cisco IOS XR v2.0 (IOSXR100) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Introduction to Cisco IOS XR v2.0 (IOSXR100) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Introduction to Cisco IOS XR v2.0 (IOSXR100)
Delivered OnlineFlexible Dates
Price on Enquiry

Juniper JNCIA-Junos JN0-104 with Ben Jacobson

By Packt

This course prepares you for the JN0-104 exam and gives you an introduction to Junos OS and the functionality of Juniper devices. You will not only master the basics but also learn how to configure routing policies and maintain networking devices with the help of interesting activities.

Juniper JNCIA-Junos JN0-104 with Ben Jacobson
Delivered Online On Demand10 hours 52 minutes
£41.99

SSL Complete Guide 2021: HTTP to HTTPS

By Packt

This course will teach you everything from scratch right from simple setups to complex solutions. If you want to master SSL and HTTPS in-depth, this course is for you! No prior knowledge of computer networks, encryption, or configuring web servers is required.

SSL Complete Guide 2021: HTTP to HTTPS
Delivered Online On Demand10 hours 54 minutes
£97.99

Cyber Security, CompTIA Security+, Networking & Certified Ethical Hacker (CEH)

By Compliance Central

Feeling Stuck in Your Career? The Cyber Security, CompTIA Security+, Networking & Certified Ethical Hacker (CEH)Bundle is Your Skill-Building Solution. This exceptional collection of 30 premium courses is designed to encourage growth and improve your career opportunities. Suited to meet different interests and goals, the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle provides an engaging learning experience, helping you learn skills across various disciplines. With the Cyber Security, CompTIA Security+, Networking & Certified Ethical Hacker (CEH) Bundle, you'll have a personalised journey that aligns with your career goals and interests. This comprehensive package helps you confidently tackle new challenges, whether entering a new field or enhancing your existing knowledge. The Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle is your gateway to expanding your career options, increasing job demand, and enhancing your skill set. By enrolling in this bundle, you'll receive complimentary PDF certificates for all courses, adding value to your resume at no extra cost. Develop key skills and achieve important progress in your career and personal development. Start your journey today and experience the transformative impact of the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle on your job life and career growth! This Cyber Security, CompTIA Security+, Networking & Certified Ethical Hacker (CEH) Bundle Comprises the Following CPD Accredited Courses: Course 01: Cyber Security Advanced Training Course 02: CompTIA Security+ (SY0-601) Course 03: AWS Certified Solutions Architect Associate Course 04: CEH - Certified Ethical Hacker Course 05: Security Analyst Course 06: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 07: Cyber Intelligence Officer Course 08: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 09: Cyber Security Awareness Training Course 10: Web Application Penetration Testing Course Course 11: Cyber Security Incident Handling and Incident Response Course 12: Digital Forensics for Cyber Professionals Course 13: GDPR Course 14: Cyber Law Online Course Course 15: CompTIA Network+ Certification (N10-007) Course 16: Certified Information Security Manager (CISM) Course 17: Certified Information Systems Security Professional (CISSP) Course 18: CompTIA PenTest+ (Ethical Hacking) Course 19: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 20: Information Management Course 21: Computer Networks Security from Scratch to Advanced Course 22: Data Center Training Essentials: General Introduction Course 23: IT Administration and Networking Course 24: Machine Learning Basics Course 25: SQL Database Basics for Everyone Course 26: Linux Security and Hardening Course 27: Security Management Diploma Course 28: Learn to Make a Fresh Start in Your Life Course 29: Motivation - Motivating Yourself & Others Course 30: Excel: Top 50 Microsoft Excel Formulas in 50 Minutes! What will make you stand out? Upon completion of this online Cyber Security, CompTIA Security+, Networking & Certified Ethical Hacker (CEH) Bundle, you will gain the following: CPD QS Accredited Proficiency with this Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle After successfully completing the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle, you will receive a FREE PDF Certificate from REED as evidence of your newly acquired abilities. Lifetime access to the whole collection of learning materials of this Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle The online test with immediate results You can study and complete the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle at your own pace. Study for the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle using any internet-connected device, such as a computer, tablet, or mobile device. The Cyber Security, CompTIA Security+, Networking & Certified Ethical Hacker (CEH) bundle is a premier learning resource, with each course module holding respected CPD accreditation, symbolising exceptional quality. The content is packed with knowledge and is regularly updated to ensure it remains relevant. This bundle offers not just education but a constantly improving learning experience designed to enrich both your personal and professional development. Advance the future of learning with the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle, a comprehensive, complete collection of 30 courses. Each course in the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle has been handpicked by our experts to provide a broad range of learning opportunities. Together, these modules form an important and well-rounded learning experience. Our mission is to deliver high-quality, accessible education for everyone. Whether you are starting your career, switching industries, or enhancing your professional skills, the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle offers the flexibility and convenience to learn at your own pace. Make the Cyber Security, CompTIA Security+, Networking & Ethical Hacker package your trusted partner in your lifelong learning journey. CPD 300 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Cyber Security, CompTIA Security+, Networking & Certified Ethical Hacker (CEH) bundle is perfect for: Expand your knowledge and skillset for a fulfilling career with the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle. Earn CPD certification and master in-demand skills with the Cyber Security, CompTIA Security+, Networking, and Ethical Hacker bundle, and become a more valuable professional. Discover your passion or explore new career options with the diverse learning opportunities in the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle. Learn on your schedule, in the comfort of your home - the Cyber Security, CompTIA Security+, Networking & Ethical Hacker bundle offers ultimate flexibility for busy individuals. Requirements You are warmly invited to register for this bundle. Please be aware that no formal entry requirements or qualifications are necessary. This curriculum has been crafted to be open to everyone, regardless of previous experience or educational attainment. Career path Gain a wide range of skills across various fields, improve your problem-solving capabilities, and keep current with industry trends. Perfect for those aiming for career advancement, exploring a new professional direction, or pursuing personal growth. Begin your journey with the Cyber Security, CompTIA Security+, Networking & Certified Ethical Hacker (CEH) bundle. Certificates CPD Certificates Digital certificate - Included

Cyber Security, CompTIA Security+, Networking & Certified Ethical Hacker (CEH)
Delivered Online On Demand5 days
£210

WiFi demystified

5.0(3)

By Systems & Network Training

WiFi demystified training course description A concise overview aimed at less technical staff requiring an overview of WiFi networks. The course covers the technologies at a high level allowing delegates to discuss WiFi networks with others recognising the buzzwords used. The course will also allow the delegates to recognise the issues involved in planning and installing WiFi networks as well as securing them. What will you learn Recognise the different WiFi technologies available. Describe the architecture of WiFi networks including the role of Access Points. Recognise the distance limitations of WiFi networks. Describe the buzzwords used in WiFi. Recognise the security issues of WiFi networks. WiFi demystified training course details Who will benefit: Anyone working with WiFi networks. Prerequisites: None. Duration 1 day WiFi demystified training course contents Introduction When to use wireless, when to use wired, WiFi technologies: 802.11, 802.11a, 802.11b, 802.11g, 802.11n, WiFi speeds and distances, comparison to other wireless technologies, 802.15 (Bluetooth), 802.16 (WiMax). Simple WiFi networks Network cards, Antennae, Access Points, WiFi routers. Enterprise WiFi networks SSIDs, Multiple WiFi networks, Repeaters, Wireless bridges, Controller based access points, Wireless switches, Power Over Ethernet. RF site surveys Steps and techniques, tools, analysing the feasibility of WiFi, range, performance, roaming. Security How safe are WiFi networks? Encryption, Authentication, WEP WPA WPA2. 802.1x, EAP, RADIUS.

WiFi demystified
Delivered in Internationally or OnlineFlexible Dates
£967

IJSEC - Introduction to Juniper Security

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview Identify high-level security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain the SRX Series devices and the added capabilities that next-generation firewalls provide. Explain traffic flows through the SRX Series devices. List the different security objects and how to create them. Describe interface types and perform basic interface configuration tasks. Describe the initial configuration for an SRX Series device. Explain security zones. Describe screens and their use. Explain address objects. Describe services and their use. Describe the purpose for security policies on an SRX Series device. Describe zone-based policies. Describe global policies and their use. Explain unified security policies. Configure unified security policies with the J-Web user interface. Describe IDP signatures. Configure an IDP policy using predefined templates with the J-Web user interface. Describe the use and configuration of the integrated user firewall feature. Describe the UTM security services List the available UTM services on the SRX Series device. Configure UTM filtering on a security policy with the J-Web user interface. Explain Sky ATP's use in security. Describe how Sky ATP and SRX Series devices operate together in blocking threats. Describe NAT and why it is used. Explain source NAT and when to use it. Explain destination NAT and when to use it. Explain static NAT and its uses. Describe the operation and configuration the different types of NAT. Identify various types of VPNs. Describe IPsec VPNs and their functionality. Describe how IPsec VPNs are established. Describe IPsec traffic processing. Configure IPsec VPNs with the J-Web user interface. Describe and configure proxy IDs and traffic selectors with the J-Web user interface. Monitor IPsec VPNs with the J-Web user interface. Describe the J-Web monitoring features. Explain the J-Web reporting features. Describe the Sky Enterprise service and how it can save resources. Explain the functionality of Junos Space Security Director. This course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. Module 1: COURSE INTRODUCTION COURSE INTRODUCTION Module 2: Juniper Security Concept Security Challenges Security Design Overview Juniper Connected Security Module 3: Juniper Connected Security ? SRX Series Devices Connected Security Interfaces Initial Configuration LAB 1: Initial Configuration Module 4: Security Objects Security Zone Objects Security Screen Objects Security Address Objects Security Services Objects LAB 2: Creating Security Objects with J-Web Module 5: Security Policies Security Policy Overview Zone-Based Policies Global Security Policies Application Firewall with Unified Security Policies LAB 3: Creating Security Policies with J-Web Module 6: Security Services ? IDP and User Firewall IDP Security Services Integrated User Firewall LAB 4: Adding IDP and User Firewall Security Services to Security Policies Module 7: Security Services ? UTM Content Filtering Web Filtering Antivirus Antispam LAB 5: Adding UTM Security Services to Security Policies Module 8: Juniper Connected Security ? Sky AT Sky ATP Overview Blocking Threats Lab 6: Demonstrating Sky ATP Module 9: Network Address Translation NAT Overview Source NAT Destination NAT Static NAT Lab 7: Implementing Network Address Translation Module 10: IPsec VPN Concepts VPN Types Secure VPN Requirements IPsec Tunnel Establishment IPsec Traffic Processing Module 11: Site-to-Site VPNs IPsec Configuration IPsec Site-to-Site Tunne Lab 8: Implementing Site-to-Site IPsec VPNs Module 12: Monitoring and Reporting J-Web monitoring options J-Web Reporting options Lab 9: Using Monitoring and Reporting Appendix A: SRX Series Hardware Appendix D: Sky Enterprise Services Appendix B: Virtual SRX Appendix EJunos Space Security Director Appendix CCLI Prime

IJSEC - Introduction to Juniper Security
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Internet of Things Practitioner

By Mpi Learning - Professional Learning And Development Provider

In this course, students will learn general strategies for planning, designing, developing, implementing, and maintaining an IoT system through various case studies and by assembling and configuring an IoT device to work in a sensor network.

Certified Internet of Things Practitioner
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£350

IT Support Job Ready Program with Career Support & Money Back Guarantee

4.7(26)

By Academy for Health and Fitness

Transform Your Future with Our IT Support Technician Job Ready Program. Start a Rewarding IT Career with Full Support and a Money-Back Guarantee. This IT Support Technician Job Ready Program is your gateway to becoming a skilled and in-demand IT professional. With an excellent curriculum and dedicated career support, we're not just an educational platform; we're your lifelong career partners. Our mission is simple - to be your trusted partner every step of the way, from Training to Employment. Why Choose IT Support as a Career? Ever-Growing Demand: As technology evolves, the need for skilled IT support technicians continues to grow. Diverse Career Opportunities: Skills learned in this program open doors to various roles in IT, from helpdesk support to network administration. Essential Role in Modern Business: IT support technicians play a key role in ensuring the smooth operation of technology systems in businesses. Competitive Salary: IT Support Technicians earn a good amount of money annually. In addition to teaching you the technical skills you need, we will also provide you with career mentoring and support. We will help you build your resume, prepare for interviews, and land your dream job. We also have partnerships with many companies that are hiring IT Support technicians, so we can help you get the job you want. Who Choose Us? So, what sets us apart from other programs? Let's dive into the exceptional benefits you'll experience when you join our IT Support Technician Job Ready Program: Personalised Guidance: Our experienced mentors will provide one-on-one counselling sessions tailored to your specific needs. Whether you're a beginner or have some experience, we will guide you towards honing your skills and developing a strong foundation in Business Analysis. One-On-One Consultation Sessions with Experts: Gain invaluable insights and guidance from seasoned professionals who have thrived in the IT Support field. Our consultation sessions provide you with insider tips, tricks, and advice, empowering you to navigate the industry with confidence and expertise. Extensive Job Opportunities: We have established partnerships with numerous companies actively seeking IT Support Technicians. Through our network, we'll connect you with exclusive job openings that are not easily accessible elsewhere. Our aim is to maximise your employment prospects and provide you with a range of exciting opportunities to choose from. Interview Preparation: We provide you with access to a comprehensive database of potential interview questions curated over years of industry experience. Walk into your interviews confident, well-prepared, and ready to impress. Money-Back Guarantee: Your satisfaction is our top priority. We are confident in the quality of our training and support, which is why we offer a 100% money-back guarantee. Continuous Career Support: Our commitment doesn't end when you secure a job. We'll be there for you throughout your career journey, offering continued support and guidance. Whether you need advice on career advancement, assistance with new projects, or simply a friendly ear to share your achievements, we'll be your trusted partner for long-term success. Here are the courses we will provide once you enrol in the program: Course 01: Windows 10 Pro Complete Training Course 02: Learning Computers and Internet Course 03: Encryption Course 04: Internet of Things Course 05: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 06: Secure Programming of Web Applications Course 07: Building Your Own Computer Course 08: Cloud Computing Training Course 09: Data Center Training Essentials: General Introduction Course 10: Cisco ASA Firewall Training Course 11: ICT: Information and Communication Technology Course 12: Success- The 7 Skills To Success, Confidence & Achievement Course 13: IT Helpdesk Support Essentials Course 14: Functional Skills IT How Can We Offer Job Guarantees? HF Online provides consultancy, professional and educational services to many of the companies in the UK. During our intense exclusive training program, you will not just gain and complete the industry valuable certification but will gain industry experience as well, which is imperative to get your 1st job in the sector. The IT Support Technician is completed in 9 easy steps: Step 1: Enrol in the Programme Join our ENTRY LEVEL IT Support Training for lifetime access to 14 IT Network Infrastructure courses, complete with secure registration and a 14-day money-back guarantee. Step 2: Initial One-On-One Counselling Session After enroling in the IT Support Training, connect with a career mentor in an initial session to tailor your learning path based on your career goals and skills. Step 3: Certification upon Course Completion After learning from the IT Support courses, you must obtain certificates for each course. There will be exams for every course, and you have to pass them to get your certificate. These certificates will prove that you're an expert in the subject. Step 4: CV Revamping We'll professionally enhance your CV and LinkedIn profile to effectively showcase your skills in IT Support for the IT/Web industry. Step 5: Building Network and Submitting CV We understand the power of casting a wide net. We'll strategically submit your CV to various platforms and networks, expanding your reach and connecting you with valuable opportunities that align with your IT Support career goals, including high-profile connections on LinkedIn. Step 6: Interview Preparation: Access our IT Support Training interview question database and practice with simulated interviews for feedback and improvement. Step 7: Securing Job Interviews Leveraging our partnerships with leading companies, we'll secure IT Support job interviews for you. We'll ensure you get the opportunity to showcase your skills to potential employers and get the dream job you want. Step 8 Post-Interview Support: We'll provide a debriefing session to reflect on your performance and identify areas of improvement for future IT Support interviews if necessary. Step 9 Job Celebration and Ongoing Support: Once you've secured your dream job as in IT Support Technician, it's time to celebrate! However, our support doesn't end there. We'll provide you with ongoing career advice to ensure you continue to thrive in your new role. We're excited to accompany you on this journey to success. Enrol today, and let's get started! Your path to a successful career in Python Programming begins with us. CPD 100 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This IT Support Technician Job Ready Program is perfect for: Aspiring IT Professionals Career Changers Recent Graduates Tech Enthusiasts Professionals Seeking Advancement Unemployed people looking to earn with career guidance Career path This IT Support Technician Job Ready Program will help you to get different job roles in the IT sector, such as: IT Support Specialist: $40,000 - $75,000. Network Administrator: $50,000 - $90,000. Systems Administrator: $55,000 - $95,000. Helpdesk Technician: $35,000 - $70,000. IT Security Specialist: $60,000 - $120,000. Cloud Support Engineer: $70,000 - $150,000. Certificates CPD Accredited e-Certificate Digital certificate - Included CPD Accredited Framed (Hardcopy) Certificate Hard copy certificate - Included Enrolment Letter Digital certificate - Included QLS Endorsed Hard Copy Certificate Hard copy certificate - Included Student ID Card Digital certificate - Included

IT Support Job Ready Program with Career Support & Money Back Guarantee
Delivered Online On Demand12 weeks
£699

Definitive Docker for engineers

5.0(3)

By Systems & Network Training

Docker for engineers training course description Docker is the container platform of choice. This course covers how to use Docker to package your applications with all of their dependencies and then test, deploy, scale and support your containers. Hands on sessions follow all the major sessions. What will you learn Work with Docker images, containers and command line tools. Deploy and test Docker containers. Debug Docker containers. Describe Docker networking, deployment tools, orchestration and security. Docker for engineers training course details Who will benefit: Anyone working with Docker. Prerequisites: Introduction to virtualization. Duration 2 days Docker for engineers training course contents Introduction The birth of Docker, the promise of Docker, what Docker isn't. Docker at a glance Process simplification, broad support and adoption, architecture, getting the most from Docker, the Docker workflow. Installing Docker Important terminology, Docker client, Docker server, test the setup. Working with Docker images Anatomy of a Dockerfile, building an image, running your image, custom base images, storing images. Working with Docker containers What are containers? creating a container, starting a container, auto-restarting a container, stopping a container, killing a container, pausing and unpausing a container, cleaning up containers and images, next steps. Exploring Docker Printing the Docker version, server information, downloading image updates, inspecting a container, getting inside a running container, exploring the shell, returning a result, docker logs, monitoring Docker, exploration. The path to production containers Deploying, testing containers. Debugging containers Process output, process inspection, controlling processes, network inspection, image history, inspecting a container, filesystem inspection, moving along. Docker at scale Docker swarm, centurion, amazon EC2 container service. Advanced topics Pluggable backends, containers in detail, security, networking. Designing your production container platform The twelve-factor app, the reactive manifesto. Conclusion The challenges, the Docker workflow, minimizing deployment artifacts, optimizing storage and retrieval, the payoff, the final word.

Definitive Docker for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

CISM Certification Domain 2: Information Risk Management Video Boot Camp 2019

By Packt

Get 7.5 hours of videos and downloadable lecture slides for Certified Information Security Manager (CISM) Domain 2

CISM Certification Domain 2: Information Risk Management Video Boot Camp 2019
Delivered Online On Demand7 hours 29 minutes
£137.99