• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

9060 Network courses

BA (HONS) PRODUCTION DESIGN FOR SCREEN & FILM

By Screen and Film School

Screen and Film School invites you to get creative with this degree course, a course which has everything you will need to succeed in the fast-moving world of design within the screen and film industry. Talented individuals with these skills are in high demand, and we’ll give you the exact launchpad you’ll need to succeed upon graduating. This degree course has been developed to reflect the recent huge surge in demand for professional, technically skilled production design graduates who are equipped with vital creative, logistic and production skills, who are ready to enter into the industry. Fundamental to the delivery of this course is the teaching of production design within the broader Film School environment. This unique shared arrangement will enable you to hone specialist design skills in the classroom and test them out in live film projects. You will also gain an understanding of your place within film production and build a network of peers, alongside whom you can progress throughout your education and then on into the workplace.

BA (HONS) PRODUCTION DESIGN FOR SCREEN & FILM
Delivered In-Person in BrightonFlexible Dates
£9,250 to £15,950

JIR - Junos Intermediate Routing

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Network engineers, technical support personnel, reseller support engineers, and others responsible for implementing and/or maintaining the Juniper Networks products covered in this course. Overview Describe typical uses of static, aggregate, and generated routes. Configure and monitor static, aggregate, and generated routes. Explain the purpose of Martian routes and add new entries to the default list. This two-day course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol independent routing feature. Chapter 1: Course Introduction Course Introduction Chapter 2: Protocol-Independent Routing Static Routes Aggregated Routes Generated Routes Martian Addresses Routing Instances Chapter 3: Load Balancing and Filter-Based Forwarding Overview of Load Balancing Configuring and Monitoring Load Balancing Overview of Filter-Based Forwarding Configuring and Monitoring Filter-Based Forwarding Chapter 4: Open Shortest Path First Overview of OSPF Adjacency Formation and the Designated Router Election OSPF Scalability Configuring and Monitoring OSPF Basic OSPF Troubleshooting Chapter 5: Border Gateway Protocol Overview of BGP BGP Attributes IBGP Versus EBGP Configuring and Monitoring BGP Chapter 6: IP Tunneling Overview of IP Tunneling GRE and IP-IP Tunnels Implementing GRE and IP-IP Tunnels Chapter 7: High Availability Overview of High Availability Networks GR Graceful RE Switchover Nonstop Active Routing BFD VRRP Appendix A

JIR - Junos Intermediate Routing
Delivered OnlineFlexible Dates
Price on Enquiry

Level 7 Diploma in Ethical Hacking with Kali Linux - QLS Endorsed

By Kingston Open College

QLS Endorsed + CPD QS Accredited - Dual Certification | Instant Access | 24/7 Tutor Support | All-Inclusive Cost

Level 7 Diploma in Ethical Hacking with Kali Linux - QLS Endorsed
Delivered Online On Demand6 hours
£105

Colourlock Leather Repair - 3 day Course

5.0(2)

By Uk Detailing Academy

Offer your customers a new, in-demand service with leather repair Leather repair is one of the most highly sought-after additional services detailing customers request. With over 53% of new cars delivered with leather or faux leather interiors, each one will likely require a repair at some point in its life, and with an average charge for a minor scuff of £120 and taking as little as 25 minutes to complete, through to full interior re-colouring costing upwards of £1000, it's become a must-have skill in a detailers arsenal for customer convenience, instant up-sell of services, and a standalone service instead of far more expensive re-trimming options. The course is a three-day, one-to-one training and skills session, which will take you through all steps of leather repair, from cleaning and assessment, through to fixing common scuffs, rips and tears. In-house colour matching and blending are taught, along with repair and recolour of steering wheels, and plastic recolouring. This course will give you the skills and confidence to complete leather repairs on all types of vehicles, with ongoing technical support for as long as you need it. Once complete your business can then become part of the Colourlock Accredited leather repair network. This includes; Colourlock branding and accredited-level discount on tools, consumables and materials. Optionally available is the Colourlock LRT master kit, to give you the tools and materials to complete repairs, the colour system to custom blend paints and various practice kits. When purchased with booking this has a saving of over £450 off RRP. Colourlock is one of the world's largest leather care and repair manufacturers, supplying OEM end leather solutions from the factory to the end user, along with repair solutions for professionals. Renowned the world over for their quality and the expertise of their training programme their knowledge and support are unrivalled and Colourlock currently has a presence on every continent. UK Detailing Academy is proud to be the exclusive training provider for Colourlock's Accredited Leather Technician course in the UK for both leather repair and the Top Life 2-year leather protection coating. The course is a three-day, one-to-one training and skills session, which will take you through all steps of leather repair, from cleaning and assessment, through to fixing common scuffs, rips and tears. In-house colour matching and blending are taught, along with repair and recolour of steering wheels, and plastic recolouring. This course will give you the skills and confidence to complete leather repairs on all types of vehicles, with ongoing technical support for as long as you need it. Once complete your business can then become part of the Colourlock Accredited leather repair network. This includes; Colourlock branding and accredited-level discount on tools, consumables and materials. Split over three days, with the first looking at leather in theory and cleaning and maintenance, the second on repairs and graining, and the third day spent with us practising colour matching, looking at more unusual repairs, and being able to spend the extra time on the practical repair side - until you can complete it with little to no input from the instructor. This level of instruction will lend you the confidence to immediately start minor repairs - though we recommend a period of practice to enhance your confidence with aspects such as colour matching and repair work. Optionally available is the Colourlock LRT master kit, to give you the tools and materials to complete repairs straight away and the colour system to custom blend paints for immediate resources. When purchased with booking, this benefits you a saving of over £450 off RRP.   LRT Master Kit The Colourlock Leather Technician Master kit is available to attendees on the Colourlock Accredited LRT 1-2-1 and group courses. Containing the tools equipment and consumables used and introduced on the course, it to allows you to hit the ground running and integrate leather repair into your business model. Included in the kit are a set of tools, cleaning and care products, a full 250ml set of pigment colours and top coats, graining and patching consumables, mixing tools, filters and various other niche items you won't know you need until you need them! RRP of over £2000 - on offer for pre-ordered kits for £1624 when ordered at the same time as the course only. Course Length 3 Days (0930 - 1600) Group Size One-to-One Location UK Detailing Academy, 2 Purlieus Barn, Ewen, Cirencester, GL7 6BY Experience / Qualification Open to all Refreshments or Lunch Refreshments included

Colourlock Leather Repair - 3 day Course
Delivered In-PersonFlexible Dates
£1,375

SC-900T00 Microsoft Security Compliance and Identity Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Before attending this course, students must have: General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions. Prerequisites General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. 1 - Describe security and compliance concepts Describe the shared responsibility model Describe defense in depth Describe the Zero Trust model Describe governance, risk, and compliance (GRC) concepts 2 - Describe identity concepts Define authentication and authorization Define identity as the primary security perimeter Describe the role of the identity provider Describe the concept of directory services and Active Directory Describe the concept of federation 3 - Describe the function and identity types of Microsoft Entra ID Describe Microsoft Entra ID Describe types of identities Describe hybrid identity Describe external identities 4 - Describe the authentication capabilities of Microsoft Entra ID Describe authentication methods Describe multifactor authentication Describe self-service password reset Describe password protection and management capabilities 5 - Describe access management capabilities of Microsoft Entra ID Describe Conditional Access Describe Microsoft Entra roles and role-based access control (RBAC) 6 - Describe the identity protection and governance capabilities of Azure AD Describe Microsoft Entra ID Governance Describe access reviews Describe entitlement management Describe the capabilities of Privileged identity Management Describe Microsoft Entra ID Protection Describe Microsoft Entra Permissions Management Describe Microsoft Entra Verified ID 7 - Describe core infrastructure security services in Azure Describe Azure DDoS protection Describe Azure Firewall Describe Web Application Firewall Describe network segmentation in Azure Describe Azure Network Security Groups Describe Azure Bastion Describe Azure Key Vault 8 - Describe the security management capabilities in Azure Describe Microsoft Defender for Cloud Describe how security policies and initiatives improve cloud security posture Describe Cloud security posture management Describe the enhanced security of Microsoft Defender for Cloud Describe DevOps security management 9 - Describe security capabilities of Microsoft Sentinel Describe threat detection and mitigation capabilities in Microsoft Sentinel Describe Microsoft Security Copilot 10 - Describe threat protection with Microsoft Defender XDR Describe Microsoft Defender XDR services Describe Microsoft Defender for Office 365 Describe Microsoft Defender for Endpoint Describe Microsoft Defender for Cloud Apps Describe Microsoft Defender for Identity Describe Microsoft Defender Vulnerability Management Describe Microsoft Defender Threat Intelligence Describe the Microsoft Defender portal 11 - Describe Microsoft?s Service Trust portal and privacy capabilities Describe the offerings of the Service Trust portal Describe Microsoft's privacy principles Describe Microsoft Priva 12 - Describe the compliance management capabilities in Microsoft Purview Describe the Microsoft Purview compliance portal Describe Compliance Manager Describe use and benefits of compliance score 13 - Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview Know your data, protect your data, and govern your data Describe the data classification capabilities of the compliance portal Describe sensitivity labels and policies Describe data loss prevention Describe retention policies and retention labels Describe records management Describe the Microsoft Purview unified data governance solution 14 - Describe the insider risk capabilities in Microsoft Purview Describe insider risk management Describe communication compliance 15 - Describe the eDiscovery and Audit capabilities in Microsoft Purview Describe the eDiscovery solutions in Microsoft Purview Describe the audit solutions in Microsoft Purview

SC-900T00 Microsoft Security Compliance and Identity Fundamentals
Delivered OnlineFlexible Dates
£595

Peering at LINX

5.0(3)

By Systems & Network Training

Peering at LINX training course description A one or two day induction course covering the technical procedures of LINX along with correct interaction with LINX and LINX members. This course focuses on the implementation of the technologies within the LINX network. For those already competent in BGP the one day version of this course is sufficient. What will you learn Explain the role of LINX in the Internet. Correctly connect to LINX. Recognise the correct procedures for peering at LINX. Use the current Best Current Practices. Peering at LINX training course details Who will benefit: Technical staff of new LINX members. Technical staff of companies preparing to join LINX. Non technical staff may also benefit from this course. Prerequisites: None. (For technical staff with BGP knowledge 1 day) Duration 1 to 2 days Peering at LINX training course contents Introduction and review Networks, The Internet, IP, routers, Autonomous systems, the structure of the Internet, the role of Internet Exchanges. BGP and peering. LINX, EuroIX, RIPE. What you get when you join LINX. LINX products: Connexions, Virtual PoPs, Colocation resales, LINX from anywhere. LINX infrastructure The original architecture, The growth of LINX, the current topology. LINX London locations. Dual LAN topology. LON1, LON2. Use of MPLS to connect London sites. Regional peering: LINX NoVa, LINX Manchester, LINX Wales, LINX Scotland, ManxIX, JEDIX. Connecting with LINX nnecting with LINX Locations. 1/10/100/400G. Interface specifications. Link aggregation. The racks and space provided, access to the racks, connecting WAN circuits into LINX. The connection form, How to link your ISP with LINX, switch assignments, limits on traffic, average measured traffic, getting statistics from LINX, Using looking glass. Allowed traffic. Port security Configuration hints LINX IP details, IPv4, IPv6, PTR records, Cisco base configuration, Juniper base configuration. Peering with other LINX members Preparing for peering, the peering template, setting up the peering, RFC 2142, the RIPE database, contacts, peeringdb.net, solving downed BGP sessions, escalation procedures. Peering configuration hints Cisco BGP configuration, Juniper BGP configuration. LINX additional services Private interconnect, LINX time service. NTP, Strata. The LINX route server Bi lateral peering, Multi lateral peering. How the LINX route server is configured. Use of communities on the route server, template for peering with the route server. Summary Getting further information, the LINX website, the LINX mailing lists.

Peering at LINX
Delivered in Internationally or OnlineFlexible Dates
£867

Communication Skills 1 Day Training in Carlisle

5.0(1)

By Mangates

Communication Skills 1 Day Training in Carlisle

Communication Skills 1 Day Training in Carlisle
Delivered In-Person + more
£595 to £795

Communication Skills 1 Day Training in Dundee

5.0(1)

By Mangates

Communication Skills 1 Day Training in Dundee

Communication Skills 1 Day Training in Dundee
Delivered In-Person + more
£595 to £795

Communication Skills 1 Day Training in Arbroath

5.0(1)

By Mangates

Communication Skills 1 Day Training in Arbroath

Communication Skills 1 Day Training in Arbroath
Delivered In-Person + more
£595 to £795

C)TIA - Certified Threat Intelligence Analyst Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Threat Intelligence Analyst students will be able to proactively collect threat data and implement strategies to limit exposure to those threats. Additionally, they will be prepared to take the C)TIA exam Everywhere you turn today, you hear about the need for threat intelligence analysis! However, in some cases, it is just a buzzword, while in other cases, threat intelligence is being touted as the remedy toward advanced persistent threats. The real question is, how do we leverage threat intelligence to reduce network vulnerabilities without wasting time and money? The answer is simple, Mile2?s Certified Threat Intelligence Analyst course. Mile2?s CTIA course will help security professionals learn how to make good use of the many sources of threat intelligence. It will aid an individual to understand what threat sources are helpful, which specific threats are targeted and which ones may need minor adjustments to monitor within your organization. Mile2?s CTIA course focuses heavily on hands-on labs, concentrating on discerning and interpreting threats and responding to them.ÿ The CTIA course focuses overall on current significant threats, threat actors, and identification procedures so that cyber-security professionals can implement the best policies and procures for their organizational security posture. Once complete, the student will be competent toward improving a company?s existing security infrastructure. Policies and methodologies learned in the CTIA will allow the student to use threat intelligence concepts to decrease overall company risk. Course Outline Threat Intelligence Basics Cyber Threats Threat Actors Case Studies Threat Identification Proactive Approach

C)TIA - Certified Threat Intelligence Analyst Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry