• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

9111 Network courses

Cyber Security Awareness Training

4.5(3)

By Studyhub UK

Kickstart your career & boost your employability by helping you discover your skills, talents and interests with our special Cyber Security Awareness Training Course. You'll create a pathway to your ideal job as this course is designed to uplift your career in the relevant industry. It provides professional training that employers are looking for in today's workplaces. The Cyber Security Awareness Training is one of the most prestigious training offered at Study Hub and is highly valued by employers for good reason. This Course has been designed by industry experts to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Cyber Security Awareness Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into elementary modules, allowing our students to grasp each lesson quickly. At Study Hub, we don't just offer courses; we also provide a valuable teaching process. When you buy a course from Study Hub, you get unlimited Lifetime access with 24/7 dedicated tutor support. Learning Outcomes Grasp the fundamentals of Cyber Security, empowering you to navigate the digital landscape confidently. Identify and comprehend various cyber attacks, from phishing to malware, strengthening your defense mechanisms. Explore the landscape of cybercrimes, understanding the motives and methods employed by cybercriminals. Enhance your knowledge of Cyber Security's role in mitigating data breaches, ensuring the integrity of digital information. Acquire practical skills in password management, internet browsing security, and implementing preventative measures to safeguard your digital presence. Why choose this Cyber Security Awareness Training? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Cyber Security Awareness Training for? Individuals eager to bolster their knowledge in Cyber Security for personal and professional protection. Small business owners aiming to fortify their digital infrastructure against potential cyber threats. Students pursuing careers in IT, cybersecurity, or related fields. Professionals seeking to stay ahead in the ever-evolving landscape of digital security. Parents and guardians concerned about the online safety of their families. Career path Cyber Security Analyst: £30,000 - £60,000 Information Security Officer: £35,000 - £70,000 Cyber Security Consultant: £40,000 - £80,000 Network Security Engineer: £35,000 - £65,000 Security Systems Administrator: £25,000 - £50,000 Chief Information Security Officer (CISO): £70,000 - £120,000 Prerequisites This Cyber Security Awareness Training does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Cyber Security Awareness Training was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Module 01: Introduction to Cyber Security Introduction to Cyber Security 00:22:00 Module 02: Cyber Attacks Cyber Attacks 00:15:00 Module 03: Cybercrimes Cybercrimes 00:18:00 Module 04: Cyber Security and Data Breaches Cyber Security and Data Breaches 00:20:00 Module 05: Password Management Password Management 00:25:00 Module 06: Internet Browsing Internet Browsing 00:22:00 Module 07: Office and Remote Work Security Office and Remote Work Security 00:20:00 Module 08: Device Management Device Management 00:18:00 Module 09: Preventative Measures Preventative Measures 00:20:00

Cyber Security Awareness Training
Delivered Online On Demand3 hours
£10.99

Python Certification - IT Job Ready Program with Money Back Guarantee

5.0(2)

By Academy for Health and Fitness

Become an IT professional with our Python Certification - IT Job Ready Program! Gain comprehensive skills in Python programming, data analysis, and automation. We offer a money-back guarantee if you don't secure a job within six months of completion. Enroll now and jumpstart your tech career! Ready to land your dream job in tech? Our Python Certification - IT Job Ready Program equips you with essential Python programming, data analysis, and automation skills. Plus, we offer a money-back guarantee if you don't get hired within six months of completing the course. Don't miss out – enroll today and take the first step towards a successful IT career! 💻📊 #PythonCertification #TechTraining #CareerReady #MoneyBackGuarantee

Python Certification - IT Job Ready Program with Money Back Guarantee
Delivered Online On Demand3 hours
£649

C)SLO-Certified Security Leadership Officer Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for C - Level Managers IT Managers Cyber Security Personelle Engineers Information Systems Owners ISSO's CISSP Students ISO's Overview Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam. You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture. Certified Security Leadership Officerÿ course is designed for mid and upper-level managers.ÿ If you are an engineer, this course will increase your knowledge in the leading information system security teams. Plus, the C)SLO will give you an essential understanding of current security issues, best practices, and technology. With this knowledge you will then be prepared to manage the security component of an information technology project. As a Security Leadership Officer, you will be the bridge between cybersecurity and business operations. Course Outline Security Management Risk Management Encryption Information Security Access Control Concepts Incident Handling and Evidence Operations Security Network Security Additional course details: Nexus Humans C)SLO-Certified Security Leadership Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)SLO-Certified Security Leadership Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)SLO-Certified Security Leadership Officer Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Operations Management Level 2

By OnlineCoursesLearning.com

Activities Management Certification Level 2 Separated into 10 exhaustive and simple to-follow modules, this course covers all that a worker requires to know in regards to activities the board. Beginning with an overall prologue to tasks the board, every module gives the specialized and administrative information and abilities important, to advance in the calling. The course is intended for individuals previously filling in as a tasks supervisor, just as the individuals who have been recognized as having the capacity to work in this field. It is especially valuable for the individuals who include past experience inside tasks and wish to move into the board. Notwithstanding, the course doesn't need past information or involvement with the area. What's Covered in the Course? A prologue to activities the board, its motivation and key standards, just as an assessment of what effective tasks the executives resembles; The specialized abilities and individual credits that you need, to turn into a decent activities administrator and how to build up your profession in the field; A meaning of production network the board and explicit data identifying with the spaces of buying and stock administration; The jobs of item advancement, plan, dissemination and showcasing in production network the executives; Instructions to guarantee quality across the various periods of activities the executives - quality principles and managing legitimate guidelines; The equals between activities the executives and task the board and the utilization of new venture systems, like Six Sigma, lean creation and consistent improvement; Viable strategies for overseeing individuals - workers, workers for hire and providers - and your lawful duties towards these gatherings; The monetary part of activities the board - cost the executives and cost decrease all through the association, in addition to a functioning information on basic monetary archives, like financial plans, accounting reports and resource registers; The significance of maintainability and harmless to the ecosystem activities and how tasks the executives can uphold this territory; Instructions to draw up a strong corporate social obligation methodology for the association; Regular explanations behind questions and manners by which to keep away from and resolve struggle. What are the Benefits of the Course? The course gives information and abilities explicit to the tasks/creation climate; Colleagues can concentrate from home, on any gadget (PC, PC, tablet or advanced mobile phone) or anyplace with a web association; The capacity to learn at a speed that is agreeable for the student and the association - there is no time limit for this course, and students may finish the course, without it meddling with their work obligations.

Operations Management Level 2
Delivered Online On Demand
£50

Learn Linux in 5 Days and Level Up Your Career

By Packt

Use the in-demand Linux skills you learn in this course to get promoted or start a new career as a Linux professional.

Learn Linux in 5 Days and Level Up Your Career
Delivered Online On Demand12 hours 30 minutes
£22.99

Cisco Administering and Positioning Cisco Umbrella Operations (ADMUMB)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: Channel Partner System Engineers System Administrators Architects Security Professionals Overview Upon successful completion of this course, the student will gain the following knowledge:How to describe and position Cisco UmbrellaDiscuss Secure Internet Gateway and Ransomware ProtectionLearn about DNS & IP layer enforcement & Intelligent ProxyDescribe Command and control callback blockingDiscuss Threat IntelligenceCompare Umbrella PackagesUnderstand Roaming SecurityBasic understanding of Cisco Roaming ClientUnderstand how to use Cisco Umbrella Virtual ApplianceExplain the ease of Integrating Cisco Umbrella into Active DirectoryDiscuss Umbrella ReportingUnderstand Utilize Multi-Organization Tools Cisco Umbrella? is a cloud security platform that provides the first line of defense against threats on the Internet. Being able to understand and position how Cisco Umbrella? works and what are the features is the key focus of this 2-day Cisco© online IT class. Students who enter the course with a basic understanding of Cisco© products and IT solutions will be able to describe the Cisco Umbrella?, understand Secure Internet Gateway and Ransomware Protection, discuss Threat Intelligence, use Cisco© Roaming Client. Cisco Umbrella- Security Solution Discuss Security Internet Gateway Explain Ransomware Protection DNS & IP layer enforcement Intelligent Proxy Command & control callback blocking Threat Intelligence Umbrella Packages Implementing Cisco Umbrella Overview of Cisco Umbrella How do you Protect your network Review how to Point your DNS to Cisco Umbrella What are the custom policies? Discuss Intelligent Proxy Umbrella Policy Tester Policy Precedence Roaming Client Introduction to Umbrella Roaming Client Prerequisites Downloading and Installing Adding IP Layer Enforcement Status, States, and Functionality Virtual Appliances Internal Domains Umbrella Roaming Security AnyConnect: Cisco Umbrella Roaming Security Client Administrator Guide Cisco Umbrella Dashboard at a glance Cisco Certificate Import Virtual Appliance Setup Guide Discuss Deployment Guidelines How to Deploy the VAs Review via VMware Review via Hyper-V Understand Your VAs Local DNS Forwarding Overview of DNS Explain Sites and Internal Networks Sizing Active Directory Overview of Active Directory Discuss Up DNS Forwarding with your VAs Active Directory Environment Route DNS Traffic Communication Flow Multiple Active Directory and Umbrella Sites Reporting Overview Reporting Basics Understanding Security Categories Scheduled Reports: Overview Security Overview Report Activity Search Report Security Activity Report Destinations Report Identities Report Cloud Services Report Admin Audit Log Report Umbrella Multi-Org Overview Cisco Umbrella Multi-Org Overview Centralized Settings Centralized Reports: Service Status Centralized Reports: Cloud Services Additional course details: Nexus Humans Cisco Administering and Positioning Cisco Umbrella Operations (ADMUMB) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Administering and Positioning Cisco Umbrella Operations (ADMUMB) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Administering and Positioning Cisco Umbrella Operations (ADMUMB)
Delivered OnlineFlexible Dates
Price on Enquiry

Diploma in Cyber Security Awareness Training - Level 4 (QLS Endorsed)

By Kingston Open College

QLS Endorsed + CPD QS Accredited - Dual Certification | Instant Access | 24/7 Tutor Support

Diploma in Cyber Security Awareness Training - Level 4 (QLS Endorsed)
Delivered Online On Demand3 hours
£15

Transition Strategies

By Inclusive Solutions

One of the most frequent telephone queries we receive at Inclusive Solutions is from parents whose disabled son or daughter is about to make the transition from Primary to Secondary School. Typically there is a tale to be told of LA planning procedures that are too little and too late, and a severe lack of confidence from all parties that the transition will be successful. Little wonder that transfers from mainstream to special schools continue to peak at Year 7! Course Category Peer Support Strategic Work Visioning and Problem Solving Person Centred Planning Description One of the most frequent telephone queries we receive at Inclusive Solutions is from parents whose disabled son or daughter is about to make the transition from Primary to Secondary School. Typically there is a tale to be told of LA planning procedures that are too little and too late, and a severe lack of confidence from all parties that the transition will be successful. Little wonder that transfers from mainstream to special schools continue to peak at Year 7! Because of this we have put together a different kind of support plan that aims to maximise the chances of Primary/Secondary transitions being successful. In essence our approach brings together a person centred planning tool called ‘MAPS’ and a ‘Circle of Friends’ recruited from within the Year 7 tutor group. The Circle of Friends forms the core of the MAPS session and are central in developing (with parents and staff) a Plan for embedding the focus child in the new school setting. Community Circles bring together disabled and non disabled pupils in a network of mutual support. Peer support is an approach to impacting on inclusion and transition in primary and secondary schools by actively involving other pupils. Enjoy participating in a multi media workshop that will challenge, entertain and reach for your emotions. Watch young people doing their stuff! Testimonials ‘It had a huge impact on all levels’ ‘Very user friendly’ Learning Objectives To be able to understand the values and wider context of peer support To be able to set up and run a peer counselling scheme to reduce bullying To understand and be able to maximise the power of the peer group in supporting relationships, achievement and behaviour change Who Is It For ? Primary and secondary teachers Heads and Deputies SENCOs Learning Support and Guidance staff Advanced Skills Teachers Parents Local Authority Support Services Community Development workers Early Years and School based Practitioners Course Content The course explores the questions : How can we improve our transition arrangements? Practically how do we go about involving pupils in this process? Do you have any fresh ideas on transition processes? Take a tour through this range of strategies for bringing about smooth transitions, meeting challenging emotional needs and to develop inclusion. Circles of friends: peer support and inclusion. Pupils work to problem solve with and actively support the inclusion and behaviour change of one of their peers Community Circles of Exchange and Mutual Support set up between disabled and non disabled group Peer support, counselling and mediation: reduce bullying and address emotional needs as older pupils offer active listening support and interventions Cross Age Mentoring: older pupils offer supportive mentoring to younger pupils in the same school or in feeder primary schools MAPS and PATH as person centred planning for transitions

Transition Strategies
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

IT Support Technician Essentials Course

5.0(2)

By Training Express

The IT Support Technician Essentials Course offers a solid foundation for anyone interested in the thriving world of IT support. Designed with clarity and focus, this course provides you with the essential knowledge needed to tackle the core challenges of IT support roles. From troubleshooting common technical issues to understanding the software and hardware systems that keep organisations running smoothly, this course covers it all. Whether you’re just starting or looking to enhance your current skill set, this course is tailored to provide a clear and accessible approach to IT support. By the end of this course, you’ll feel confident navigating the complexities of IT systems, diagnosing and resolving issues, and offering solutions to common problems that arise in everyday business environments. It’s a comprehensive way to build your understanding of IT infrastructure and customer support, all through an engaging and structured learning experience. With the increasing reliance on technology across all industries, the role of an IT support technician continues to grow. This course gives you the tools to enter or advance in the ever-evolving IT industry, where opportunities are plentiful. Key Features CPD Accredited FREE PDF + Hardcopy certificate Fully online, interactive course Self-paced learning and laptop, tablet and smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases Course Curriculum Module 01: Introduction to IT Support Technician Module 02: Computer Hardware and Software Module 03: Networking Fundamentals Module 04: System Administration Module 05: Cybersecurity Basics Module 06: Professional Development and Career Skills Module 07: Troubleshooting Software and Hardware Issues Module 08: Storage and Cloud Computing Learning Outcomes Identify and analyse computer hardware components for efficient troubleshooting. Apply networking fundamentals to establish and maintain robust connections. Execute system administration tasks for seamless IT infrastructure management. Implement cybersecurity basics to safeguard digital assets effectively. Demonstrate proficiency in troubleshooting software and hardware issues. Navigate storage and cloud computing, leveraging them for enhanced data management. Accreditation This course is CPD Quality Standards (CPD QS) accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Certificate After completing this course, you will get a FREE Digital Certificate from Training Express. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals aspiring to enter the IT support field. IT professionals seeking to broaden their skill set. Students pursuing a career in information technology. Career changers exploring opportunities in IT. Those looking to enhance their cybersecurity knowledge. Professionals wanting to deepen their understanding of system administration. Tech enthusiasts eager to master computer hardware and software. Anyone keen on advancing their career in IT support. Career path IT Support Technician Help Desk Analyst Network Support Specialist System Administrator Cybersecurity Analyst Cloud Support Engineer Certificates Digital certificate Digital certificate - Included Once you've successfully completed your course, you will immediately be sent a FREE digital certificate. Hard copy certificate Hard copy certificate - Included Also, you can have your FREE printed certificate delivered by post (shipping cost £3.99 in the UK). For all international addresses outside of the United Kingdom, the delivery fee for a hardcopy certificate will be only £10. Our certifications have no expiry dates, although we do recommend that you renew them every 12 months.

IT Support Technician Essentials Course
Delivered Online On Demand1 hour
£12

Red Hat Services Management and Automation (RH358)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Linux system administrators, site reliability engineers, and other IT professionals with some Ansible experience who are interested in learning how to manage and automate the deployment, configuration, and operation of key network services included with Red Hat Enterprise Linux 8. Overview Provide key network services using software included with Red Hat Enterprise Linux 8, including DNS with Unbound and BIND9, DHCP and DHCPv6, client e-mail transmission, printing service, NFS and SMB protocol file sharing, SQL database service with MariaDB, and web services using Apache HTTPD, nginx, Varnish, and HAProxy. Configure advanced networking for server use cases, including device teaming. Use Red Hat Ansible Engine to automate the manual deployment and configuration tasks covered in this course. Learn how to configure, manage, and scale key services used in the data center Red Hat Services Management and Automation (RH358) is designed for IT professionals with some experience managing Linux© systems and want to learn more about how to manage and deploy network services included with Red Hat© Enterprise Linux which are particularly important in the modern IT data center. You will learn how to install, configure, and manage basic configurations of these services manually, and then use Red Hat Ansible© Engine to automate your work in a scalable, repeatable manner. This course is based on Red Hat Ansible Engine 2.9 and Red Hat Enterprise Linux 8.1. 1 - Manage network services Discuss and review key tools and skills needed to manage network services. 2 - Configure link aggregation Improve the redundancy or throughput of network connections of servers by configuring Linux network teaming between multiple network interfaces. 3 - Manage DNS and DNS servers Explain the operation of DNS service, troubleshoot DNS issues, and configure servers to act as a DNS caching nameserver or as an authoritative name server. 4 - Manage DHCP and IP address assignment Explain and configure services used for IPv4 and IPv6 address assignment including DHCP, DHCPv6, and SLAAC. 5 - Manage printers and printing files Configure systems to print to a network printer that supports IPP Everywhere, as well as manage existing printer queues. 6 - Configure email transmission Discuss how mail servers operate, then configure a server to use system tools and Postfix to send email messages through an outbound mail relay. 7 - Configure MariaDB SQL databases Discuss the basic operation of SQL-based relational databases, perform basic SQL queries for troubleshooting, and be able to set up a simple MariaDB database service. 8 - Configure web servers Provide web content from Apache HTTPD or Nginx web servers, then configure them with virtual hosts and TLS-based encryption. 9 - Optimize web server traffic Improve performance of your web servers by using Varnish to cache static content being served and HAProxy to terminate TLS connections and balance load between servers. 10 - Provide file-based network storage Deliver simple file-based network shares to clients using the NFS and SMB protocols. 11 - Access block-based network storage Configure iSCSI initiators on your servers to access block-based storage devices provided by network storage arrays or Ceph storage clusters.

Red Hat Services Management and Automation (RH358)
Delivered OnlineFlexible Dates
Price on Enquiry