• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

9083 Network courses

Learn Website Hacking From Scratch

By iStudy UK

Want to know how to hack a website and fix vulnerabilities in computer systems and networks? Are you a web administrator or developer who wants to secure your website? This Learn Website Hacking From Scratch is ideal for those who have little or no knowledge of website hacking, and want an introductory guide to this topic. In this website hacking and penetration testing course for beginners, you'll start with learning the basics of how to exploit and mitigate websites and web applications, moving on to more advanced techniques, where topics covered include bypassing security, accessing databases, SQL injection and cross-site scripting (XSS). You'll also familiarise with the Linux operating system and BeEf web browser attacking framework. On course completion, you'll have the practical skills and knowledge to exploit networks like an attacker. Enrol in this Learn Website Hacking From Scratch today and start hacking systems like the experts! What you'll learn Install hacking lab & needed software (works on Windows, OS X and Linux). Discover, exploit and mitigate a number of dangerous vulnerabilities. Use advanced techniques to discover and exploit these vulnerabilities. Bypass security measurements and escalate privileges. Intercept requests using a proxy. Hack all websites on same server. Bypass filters and client-side security Adopt SQL queries to discover and exploit SQL injections in secure pages Gain full control over target server using SQL injections Discover & exploit blind SQL injections Install Kali Linux - a penetration testing operating system Install windows & vulnerable operating systems as virtual machines for testing Learn linux commands and how to interact with the terminal Learn linux basics Understand how websites & web applications work Understand how browsers communicate with websites Gather sensitive information about websites Discover servers, technologies and services used on target website Discover emails and sensitive data associated with a specific website Find all subdomains associated with a website Discover unpublished directories and files associated with a target website Find all websites hosted on the same server as the target website Discover, exploit and fix file upload vulnerabilities Exploit advanced file upload vulnerabilities & gain full control over the target website Discover, exploit and fix code execution vulnerabilities Exploit advanced code execution vulnerabilities & gain full control over the target website Discover, exploit & fix local file inclusion vulnerabilities Exploit advanced local file inclusion vulnerabilities & gain full control over the target website Exploit advanced remote file inclusion vulnerabilities & gain full control over the target website Discover, fix, and exploit SQL injection vulnerabilities Bypass login forms and login as admin using SQL injections Writing SQL queries to find databases, tables and sensitive data such as usernames ad passwords using SQL injections Bypass filtering, and login as admin without password using SQL injections Bypass filtering and security measurements Read / Write files to the server using SQL injections Patch SQL injections quickly Learn the right way to write SQL queries to prevent SQL injections Discover basic & advanced reflected XSS vulnerabilities Discover basic & advanced stored XSS vulnerabilities Discover DOM-based XSS vulnerabilities How to use BeEF framwork Hook victims to BeEF using reflected, stored and DOM based XSS vulnerabilities Steal credentials from hooked victims Run javascript code on hooked victims Create an undetectable backdoor Hack into hooked computers and gain full control over them Fix XSS vulnerabilities & protect yourself from them as a user What do we mean by brute force & wordlist attacks Create a wordlist or a dictionary Launch a wordlist attack and guess admin's password Discover all of the above vulnerabilities automatically using a web proxy Run system commands on the target webserver Access the file system (navigate between directories, read/write files) Download, upload files Bypass security measurements Access all websites on the same webserver Connect to the database and execute SQL queries or download the whole database to the local machine Requirements Basic IT Skills No Linux, programming or hacking knowledge required. Computer with a minimum of 4GB ram/memory Operating System: Windows / OS X / Linux Who this course is for: Anybody who is interested in learning website & web application hacking / penetration testing Anybody who wants to learn how hackers hack websites Anybody who wants to learn how to secure websites & web applications from hacker Web developers so they can create secure web application & secure their existing ones Web admins so they can secure their websites Course Introduction Course Introduction FREE 00:02:00 Preparation - Creating a Penetration Testing Lab Lab Overview & Needed Software 00:08:00 Installing Kali 2019 As a Virtual Machine Using a Ready Image 00:10:00 Installing Kali 2019 As a Virtual Machine 00:10:00 Installing Metasploitable As a Virtual Machine 00:04:00 Preparation - Linux Basics Basic Overview of Kali Linux 00:05:00 The Linux Terminal & Basic Linux Commands 00:11:00 Configuring Metasploitable & Lab Network Settings 00:06:00 Website Basics What is a Website? 00:04:00 How To Hack a Website? 00:04:00 Information Gathering Gathering Information Using Whois Lookup 00:05:00 Discovering Technologies Used On The Website 00:06:00 Gathering Comprehensive DNS Information 00:10:00 Discovering Websites On The Same Server 00:04:00 Discovering Subdomains 00:05:00 Discovering Sensitive Files 00:07:00 Analysing Discovered Files 00:04:00 Maltego - Discovering Servers, Domains & Files 00:08:00 Maltego - Discovering Websites, Hosting Provider & Emails 00:05:00 File Upload Vulnerabilities What are they? And How To Discover & Exploit Basic File Upload Vulnerabilities 00:07:00 HTTP Requests - GET & POST 00:04:00 Intercepting HTTP Requests 00:07:00 Exploiting Advanced File Upload Vulnerabilities 00:05:00 Exploiting More Advanced File Upload Vulnerabilities 00:04:00 [Security] Fixing File Upload Vulnerabilities 00:06:00 Code Execution Vulnerabilities What are they? & How To Discover & Exploit Basic Code Execution Vulnerabilities 00:07:00 Exploiting Advanced Code Execution Vulnerabilities 00:06:00 [Security] - Fixing Code Execution Vulnerabilities 00:06:00 Local File Inclusion Vulnerabilities (LFI) What are they? And How To Discover & Exploit Them 00:06:00 Gaining Shell Access From LFI Vulnerabilities - Method 1 00:07:00 Gaining Shell Access From LFI Vulnerabilities - Method 2 00:11:00 Remote File Inclusion Vulnerabilities (RFI) Remote File Inclusion Vulnerabilities - Configuring PHP Settings 00:04:00 Remote File Inclusion Vulnerabilities - Discovery & Exploitation 00:06:00 Exploiting Advanced Remote File Inclusion Vulnerabilities 00:03:00 [Security] Fixing File Inclusion Vulnerabilities 00:06:00 SQL Injection Vulnerabilities What is SQL 00:06:00 Dangers of SQL Injections 00:03:00 SQL Injection Vulnerabilities - SQLi In Login Pages Discovering SQL Injections In POST 00:08:00 Bypassing Logins Using SQL Injection Vulnerability 00:05:00 Bypassing More Secure Logins Using SQL Injections 00:06:00 [Security] Preventing SQL Injections In Login Pages 00:08:00 SQL Injection Vulnerabilities - Extracting Data From The Database Discovering SQL Injections in GET 00:07:00 Reading Database Information 00:05:00 Finding Database Tables 00:04:00 Extracting Sensitive Data Such As Passwords 00:04:00 SQL Injection Vulnerabilities - Advanced Exploitation Discovering & Exploiting Blind SQL Injections 00:06:00 Discovering a More Complicated SQL Injection 00:07:00 Extracting Data (passwords) By Exploiting a More Difficult SQL Injection 00:05:00 Bypassing Filters 00:05:00 Bypassing Security & Accessing All Records 00:09:00 [Security] Quick Fix To Prevent SQL Injections 00:07:00 Reading & Writing Files On The Server Using SQL Injection Vulnerability 00:06:00 Getting A Reverse Shell Access & Gaining Full Control Over The Target Web Server 00:08:00 Discovering SQL Injections & Extracting Data Using SQLmap 00:07:00 [Security] - The Right Way To Prevent SQL Injection 00:05:00 XSS Vulnerabilities Introduction - What is XSS or Cross Site Scripting? 00:03:00 Discovering Basic Reflected XSS 00:04:00 Discovering Advanced Reflected XSS 00:05:00 Discovering An Even More Advanced Reflected XSS 00:07:00 Discovering Stored XSS 00:03:00 Discovering Advanced Stored XSS 00:04:00 XSS Vulnerabilities - Exploitation Hooking Victims To BeEF Using Reflected XSS 00:06:00 Hooking Victims To BeEF Using Stored XSS 00:04:00 BeEF - Interacting With Hooked Victims 00:04:00 BeEF - Running Basic Commands On Victims 00:04:00 BeEF - Stealing Credentials/Passwords Using A Fake Login Prompt 00:02:00 Bonus - Installing Veil 3.1 00:06:00 Bonus - Veil Overview & Payloads Basics 00:07:00 Bonus - Generating An Undetectable Backdoor Using Veil 3 00:10:00 Bonus - Listening For Incoming Connections 00:07:00 Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 00:07:00 BeEF - Gaining Full Control Over Windows Target 00:04:00 [Security] Fixing XSS Vulnerabilities 00:07:00 Insecure Session Management Logging In As Admin Without a Password By Manipulating Cookies 00:06:00 Discovering Cross Site Request Forgery Vulnerabilities (CSRF) 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link (Preview) 00:06:00 [Security] The Right Way To Prevent CSRF Vulnerabilities 00:09:00 Brute Force & Dictionary Attacks What Are Brute Force & Dictionary Attacks? 00:04:00 Creating a Wordlist 00:07:00 Launching a Wordlist Attack & Guessing Login Password Using Hydra 00:14:00 Discovering Vulnerabilities Automatically Using Owasp ZAP Scanning Target Website For Vulnerabilities 00:04:00 Analysing Scan Results 00:04:00 Post Exploitation Post Exploitation Introduction 00:04:00 Interacting With The Reverse Shell Access Obtained In Previous Lectures 00:07:00 Escalating Reverse Shell Access To Weevely Shell 00:08:00 Weevely Basics - Accessing Other Websites, Running Shell Commands ...etc 00:07:00 Bypassing Limited Privileges & Executing Shell Commands 00:05:00 Downloading Files From Target Webserver 00:05:00 Uploading Files To Target Webserver 00:08:00 Getting a Reverse Connection From Weevely 00:08:00 Accessing The Database 00:09:00 Resources Resources - Learn Website Hacking From Scratch 00:00:00

Learn Website Hacking From Scratch
Delivered Online On Demand9 hours 17 minutes
£25

VMware NSX Advanced Load Balancer: Install, Configure, Manage [V21.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Deploy and configure the NSX Advanced Load Balancer infrastructure within private or public clouds using Write and No-Access Cloud Connectors Explain, deploy, and configure Service Engines Explain and configure local load balancing constructs such as virtual services, pools, health monitors, and related components Explain and configure advanced virtual services and related concepts such as Subject Name Indication, Enhanced Virtual Hosting, and authentication of virtual services Explain and modify application behavior through profiles, policies, and DataScripts Describe Central licensing management using VMware NSX Advanced Load Balancer Enterprise with Cloud services (formerly Avi Pulse) Explain how to configure Role-Based Access Control (RBAC) in NSX Advanced Load Balancer Configure advanced services such as global server load balancing Describe how to use NSX Advanced Load Balancer REST API interfaces and related automation capabilities Describe and configure NSX Advanced Load Balancer application and infrastructure monitoring Gather relevant information and perform basic troubleshooting of applications that use built-in NSX Advanced Load Balancer tooling Identify the key features of VMware NSX Network Detection and Response This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX Advanced Load Balancer (Avi Networks) solution. This course covers key NSX Advanced Load Balancer (Avi Networks) features and functionality offered in the NSX Advanced Load Balancer 21.x release. Features include the overall infrastructure, virtual services, application components, global server load balancing, various cloud connectors, application troubleshooting, and solution monitoring. Hands-on labs provide access to a software-defined data center environment to reinforce the skills and concepts presented in the course. Course Introduction Introduction and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Virtual Services Configuration Concepts Explain virtual service components Explain virtual service types Explain and configure basic virtual service components such as application profiles and network profiles Virtual Services Configuration Advanced Concepts Explain the virtual service advanced components such as Wildcard VIP, Server Name Identification (SNI), and Enhanced Virtual Hosting (EVH) Explain the concept of virtual service VIP Sharing Explain different authentication mechanisms used for a virtual service such as LDAP, SAML, JSON Web Token, and OAUTH Profiles and Policies Explain application profiles and types such as L4, DNS, Syslog, HTTP, and VMware Horizon VDI Explain and configure advanced application HTTP profile options Describe network profiles and types Explain and configure SSL profiles and certificates Explain and configure HTTP, network, and DNS policies Pools Configuration Concepts Explain pools configuration options Describe the available load balancing algorithms Explain multiple health monitor types Explain multiple Persistence profiles Explain and configure pool groups Modifying Application Behavior Design and apply application solutions by using application profiles Design and apply application solutions by using network, HTTP policies, and DataScripts Explain DataScript fundamentals Explain and use NSX Advanced Load Balancer analytics to understand application behavior Describe and configure client SSL certificate validation Describe and configure virtual service DDoS, Rate limiting, and Throttling capabilities Modify network profile properties such as TCP connection properties Design and apply application solutions by using Persistence profiles NSX Advanced Load Balancer Infrastructure Architecture Explain management, control, data, and consumption planes and functions Describe control plane clustering and high availability Describe controller sizing and process sharing Describe Service Engine CPU and NIC architecture Explain tenants Configure properties of Service Engine groups Explain Service Engine group high availability modes Describe and configure active-standby high availability mode Explain Service Engine placement in multiple availability zones for public clouds Describe and configure elastic HA high availability mode (Active-Active, N+M) Explain Service Engine failure detection and self-healing Describe Service Engine as a router Explain virtual service scale-out options such as Layer 2 (Native), Layer 3 (BGP), and DNS-based Describe how to upgrade NSX Advanced Load Balancer Introduction to Cloud Connector Explain cloud connectors Review cloud connector integration modes List cloud connector types Review the different Service Engine image types in different ecosystems Installing, Configuring, and Managing NSX Advanced Load Balancer in No-Orchestrator Cloud Explain No-Access cloud concepts Configure No-Access cloud integration on bare metal Explain and configure Linux Server Cloud Explain and configure VMware No Orchestrator Describe the advanced configuration options available in bare metal (Linux Server Cloud) Installing, Configuring, and Managing NSX Advanced Load Balancer in VMware Environment: Cloud Configuration Introduce VMware integration options Explain and configure VMware Write Access Cloud Connector Explain NSX Advanced Load Balancer integration options in a VMware NSX environment Explain and configure NSX Cloud Connector for Overlay and VLAN-backed segments AWS Cloud Configuration Describe NSX Advanced Load Balancer public cloud integrations Explain different AWS components Explain and demonstrate AWS public cloud integration Deploy VMware NSX Advanced Load Balancer Controller, SEs, and virtual services in AWS Cloud Review Multi-AZ Support for virtual services in AWS cloud GCP Cloud Configuration Explain different GCP components Explain and demonstrate GCP public cloud integration Deploy NSX Advanced Load Balancer Controller, SEs, and virtual services in GCP cloud Azure Cloud Configuration Describe NSX Advanced Load Balancer public cloud integrations Explain different Microsoft Azure components Explain and demonstrate Azure public cloud integration Deploy NSX Advanced Load Balancer Controller, SEs, and virtual services in Azure Cloud NSX Advanced Load Balancer Enterprise with Cloud Services (Avi Pulse) Describe NSX Advanced Load Balancer public cloud services Explain different features of NSX Advanced Load Balancer Cloud Services Register the controller with Cloud Services DNS Foundations Review, discuss, and explain DNS fundamentals Describe NSX Advanced Load Balancer DNS and IPAM providers Global Server Load Balancing (GSLB) Introduce Global Server load balancing concepts and benefits Explain and configure the NSX Advanced Load Balancer infrastructure Explain and configure the DNS Virtual Service components Explain and configure GSLB Service Engine Group Describe and configure GSLB sites Explain and configure basic GSLB services to include pools and health monitors Describe GSLB Server Load Balancing algorithms Explain and configure health monitors based on data plane and control plane Describe GSLB Health Monitor Proxy Explain GSLB Site-Cookie Persistence Explain the different GSLB replication methods Role-Based Access Control (RBAC) Introduce local authentication in NSX Advanced Load Balancer Introduce remote authentication in NSX Advanced Load Balancer Review the different types of remote authentication Explain granular RBAC using labels NSX Advanced Load Balancer: Troubleshooting Introduce infrastructure and application troubleshooting concepts Describe troubleshooting based on control plane and data plane Explain application analytics and logs Describe client logs analysis Explain headers troubleshooting and packet capture mechanism Describe how to use CLI for detailed data plane troubleshooting Explain Service Engine logs Explain health monitors troubleshooting Explain BGP session troubleshooting Describe control plane troubleshooting, clustering, and cloud connector issues Events and Alerts Describe NSX Advanced Load Balancer events Describe and configure NSX Advanced Load Balancer alerts Describe NSX Advanced Load Balancer monitoring capabilities with SNMP, Syslog, and Email Introduction to NSX Advanced Load Balancer Rest API Introduce the NSX Advanced Load Balancer REST API interface Describe REST API Object Schema Explain and interact with REST API interface with

VMware NSX Advanced Load Balancer: Install, Configure, Manage [V21.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Becoming a Beacon of Hope: Restored Beacon Webinar

By Restored

Find out more about how your Church can partner with Restored to stand against violence against women and support survivors of domestic abuse.

Becoming a Beacon of Hope: Restored Beacon Webinar
Delivered OnlineJoin Waitlist
FREE

IT Skills for IT / Non - IT Professionals

4.5(3)

By Studyhub UK

In today's digital age, the realm of Information Technology (IT) has become an integral part of every industry. Whether you're an IT enthusiast or someone from a non-IT background, understanding the core concepts of IT can be a game-changer for your career. Our course, 'IT Skills for IT / Non - IT Professionals', is meticulously designed to bridge the knowledge gap, offering a comprehensive insight into the world of IT. From the basics of hardware and software to the intricacies of networking and security, this course ensures you're well-equipped to navigate the digital landscape. Dive deep into the realms of databases, virtualisation, and cloud technologies, and discover the myriad opportunities that the IT sector has to offer. Learning Outcomes: Understand the foundational concepts and components of Information Technology. Gain knowledge about the intricacies of hardware, operating systems, and applications. Acquire insights into the principles of networking, security, and traffic flow in IT. Familiarise with storage solutions, database management, and cloud technologies. Recognise the various management roles and job opportunities within the IT sector. Why buy this IT Skills for IT / Non - IT Professionals course? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the IT Skills for IT / Non - IT Professionals there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this IT Skills for IT / Non - IT Professionals course for? Individuals looking to transition into the IT sector from non-IT backgrounds. Professionals keen on updating their IT knowledge to stay relevant in their current roles. Entrepreneurs aiming to integrate IT solutions into their business operations. Students aspiring to build a foundational understanding of IT before specialising. Job seekers wanting to enhance their CV with essential IT skills. Prerequisites This IT Skills for IT / Non - IT Professionals was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. Career path IT Manager: £45,000 - £65,000 per annum Network Engineer: £30,000 - £50,000 per annum Database Administrator: £35,000 - £55,000 per annum Cloud Solutions Architect: £60,000 - £80,000 per annum IT Security Specialist: £40,000 - £60,000 per annum Systems Analyst: £35,000 - £55,000 per annum Course Curriculum Section 1: Introduction Unit 1: Introduction 00:01:00 Unit 2: Course Outline 00:06:00 Section 2: Information Technology Unit 1: Facts about Information Technology (IT) 00:05:00 Unit 2: What is Information Technology & How IT Works 00:02:00 Section 3: Components of IT Unit 1: IT Components 00:02:00 Section 4: Hardware Unit 1: What is Hardware 00:02:00 Unit 2: Examples of Computer 00:02:00 Unit 3: Computer Hardware Manufacturers 00:04:00 Unit 4: Hardware Jobs 00:05:00 Section 5: Operating System Unit 1: What is Operating System 00:02:00 Unit 2: Examples of Operating System 00:08:00 Unit 3: Operating System Jobs 00:10:00 Unit 4: OS Tools Related Jobs 00:02:00 Section 6: Application/Software Unit 1: What is Application/Software 00:03:00 Unit 2: Software Building Tools and Languages 00:03:00 Unit 3: Software/Application Building Jobs 00:03:00 Unit 4: Software/Application User Jobs 00:03:00 Section 7: Networking Unit 1: What is Computer Networking 00:02:00 Unit 2: Computer Network Companies 00:02:00 Unit 3: Network Jobs 00:04:00 Section 8: Security Unit 1: What is Computer Security 00:02:00 Unit 2: Security Companies 00:01:00 Unit 3: Security Jobs 00:03:00 Section 9: Traffic Flow & Enterprise Level IT Components Unit 1: How Information Flow within IT 00:02:00 Unit 2: Enterprise Level IT Components 00:02:00 Section 10: Storage Unit 1: What is Storage 00:05:00 Unit 2: Storage Companies and Technologies 00:02:00 Unit 3: Jobs in Storage 00:02:00 Section 11: Database Unit 1: What is Database 00:02:00 Unit 2: Database Type and Technologies 00:04:00 Unit 3: Database Jobs 00:02:00 Section 12: Virtualisation & Cloud Unit 1: What is Virtualisation 00:03:00 Unit 2: What is Cloud Technology 00:02:00 Unit 3: Virtualisation and Cloud Companies 00:02:00 Unit 4: Virtualisation and Cloud Jobs 00:02:00 Section 13: Management & Other IT Jobs Unit 1: IT Management Jobs 00:03:00 Unit 2: Other IT Jobs 00:09:00 Assignment Assignment - IT Skills for IT / Non - IT Professionals 00:00:00

IT Skills for IT / Non - IT Professionals
Delivered Online On Demand1 hour 59 minutes
£10.99

CSCS Health & Safety Test

By MJ Electrical Training

Discover a streamlined pathway to obtaining your CSCS Health and Safety qualification with our online course and City & Guilds exam. Designed for construction workers, our program offers test-your-knowledge exercises, 200+ practice questions, and comprehensive mock exams, ensuring effective preparation for success.

CSCS Health & Safety Test
Delivered Online On Demand1 hour
£174

Driver CPC - 1 Day Periodic 7 Hour Course/The Professional Driver - Birmingham

By Total Compliance

The Professional Driver 7-Hour Course for One Day Course Introduction: This one-day course is designed to provide professional drivers with the essential knowledge and skills required to operate their vehicles safely and efficiently. The course covers a wide range of topics, including: Licence requirements Personal protective equipment (PPE) Vehicle pre-trip inspections Safe and economic driving Bridge strike avoidance and route planning Vehicle security Overnight parking The course is delivered in a classroom/remote location setting and includes a mix of lectures, interactive discussions, and practical exercises. Participants will also have the opportunity to network with other professional drivers and share their experiences. Who should attend? This course is suitable for all professional drivers, regardless of experience level. It is particularly beneficial for drivers who are new to the profession, as well as drivers who are looking to refresh their skills and knowledge. What will you learn? Upon completion of this course, participants will be able to: Understand and comply with all applicable licence requirements for professional drivers Identify and use the correct PPE for different driving tasks Conduct pre-trip vehicle inspections to identify any potential problems Drive safely and economically, taking into account road conditions, traffic, and fuel efficiency Avoid low bridges and plan routes effectively Secure vehicles to prevent theft and hijacking Park vehicles safely overnight We look forward to seeing you there! 😃

Driver CPC - 1 Day Periodic 7 Hour Course/The Professional Driver - Birmingham
Delivered In-PersonFlexible Dates
£71.18

Backstage/The Mandy Network - Introductory Event

4.4(69)

By Central Film School

DATE: Thursday 17th October TIME: 3:45pm LOCATION: Online Join us for an introductory session with The Mandy Network, as they provide useful skills and insight into how to build your career, be cast in upcoming films and find the best collaborators for your projects. Areas covered will include: Interactive session - Example of a real job posting on our site and going through the real candidates, their CVs, cover notes. This exercise should give them a view of how the employer thinks when they hire talent. How to find cast and crew for your projects How to approach job hunting How to make the most of online job platform and make your profile standout Common mistakes and pitfalls Advice on CV and Cover Notes An exclusive offer from Mandy for your students

Backstage/The Mandy Network - Introductory Event
Delivered OnlineJoin Waitlist
FREE

Red Hat Linux Diagnostics and Troubleshooting (RH342)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Senior system administrators who wish to learn more about troubleshooting. Have earned a Red Hat Certified System Administrator (RHCSA) or have similar experience. It is recommend that students have earned a Red Hat Certified Engineer (RHCE) or have similar experience. Overview As a result of attending this course, students should be able to leverage the software development life-cycle process to plan, create, test, and provision host systems within an organization. Students should be able to demonstrate the following skills: - Installation of Red Hat Satellite 6 - Software life-cycle management of software used to provision and maintain configured hosts within a controlled production environment This course enriches your skills by providing the tools and techniques that you need to successfully diagnose, and fix, a variety of potential issues. You will work through hands-on problems in various subsystems to diagnose and fix common issues. You will learn develop the skills to apply the scientific method to a structured form of troubleshooting. You will then apply this approach in troubleshooting various types of problems, including boot issues, hardware issues, storage issues, RPM issues, network issues, third-party application issues, security issues, and kernel issues. At the end of the course, you will be empowered to complete various comprehensive review labs to test your skills. 1 - INTRODUCTION TO TROUBLESHOOTING Describe a generalized strategy for troubleshooting. 2 - TAKE PROACTIVE STEPS TO PREVENT SMALL ISSUES Prevent small issues from becoming large problems by employing proactive system administration techniques. 3 - TROUBLESHOOT BOOT ISSUES Identify and resolve issues that can affect a system's ability to boot. 4 - IDENTIFY HARDWARE ISSUES Identify hardware problems that can affect a system?s ability to operate. 5 - TROUBLESHOOT STORAGE ISSUES Identify and fix issues related to storage. 6 - TROUBLESHOOT RPM ISSUES Identify and fix problems in, and using, the package management subsystem. 7 - TROUBLESHOOT NETWORK ISSUES Identify and resolve network connectivity issues. 8 - TROUBLESHOOT APPLICATION ISSUES Debug application issues. 9 - DEAL WITH SECURITY ISSUES Identify and fix issues related to security subsystems. 10 - TROUBLESHOOT KERNEL ISSUES Identify kernel issues and assist Red Hat Support in resolving kernel issues. 11 - RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING COMPREHENSIVE REVIEW Practice and demonstrate knowledge and skills learned in Red Hat Enterprise Linux Diagnostics and Troubleshooting.

Red Hat Linux Diagnostics and Troubleshooting (RH342)
Delivered OnlineFlexible Dates
Price on Enquiry

70-646 - Windows Server 2008 Administration

4.3(43)

By John Academy

Description: The 70-646 - Windows Server 2008 Administration course will prepare you for Exam 70-646: Pro: Windows Server 2008, Server Administrator. Throughout the course, you will learn everything that you need to know about passing the exam. The course starts with the installation system of Windows 2008. After that, the course will teach you how to configure the change plan and how to prepare the server for 2008 migration. The course will teach you the ways of monitoring Windows server, the Windows Server Security, Server backup and restore, Maintenance Plan and Windows Server Troubleshooting. In short, the course will teach about the planning for server deployment and management, application and data provisioning, business continuity and high availability, and monitoring and maintain servers. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? 70-646 - Windows Server 2008 Administration is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our 70-646 - Windows Server 2008 Administration is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Preparing for Windows 2008 Installation Overview of Windows Server 2008 Deployment FREE 00:15:00 Making a Deployment Plan for Windows 2008 Server 00:08:00 Planning Migration 00:08:00 Configuration Change Plan Developing a Change Control Process 00:17:00 Developing Configuration Changes 00:13:00 Reviewing Configuration Changes 00:07:00 Preparing for Server 2008 Migration Server Migration 00:16:00 How to Plan for the Server Decommissioning Process 00:14:00 Planning an Example of Commissioning a Windows Server 2008 File Server 00:32:00 Server Migration and Planning for Roles Planning for Windows Server 2008 Hardware 00:15:00 Planning for Windows Server 2008 Core 00:19:00 Combining Windows Server 2008 Server Roles 00:19:00 Planning for Windows Server 2008 File Servers 00:15:00 Understanding Application Server Role Requirements 00:11:00 Overview of the Application Server Role Components 00:06:00 Supporting the .NET Framework 00:07:00 Distributed File System What's Required for DFS 00:08:00 Planning for High Availability in DFS 00:13:00 Managing DFS 00:20:00 Windows Server 2008 High Availability Network Load Balancing 00:13:00 Understanding Failover Clustering in Windows Server 2008 00:11:00 Creating Clusters in Windows Server 2008 00:05:00 Monitoring Windows Server Setting Up Monitoring 00:18:00 Measuring Performance Objects 00:04:00 Calculating a Server Baseline 00:12:00 Which Monitoring Tools to Use 00:07:00 Planning Notification Methods 00:25:00 Windows Server Security Designing a Multi-Layer Defense 00:22:00 Network-Based Security for Windows Server 2008 00:42:00 Host-Based Security for Windows Server 2008 00:20:00 Windows Server Backup and Restore Backup Strategies with Windows Server 2008 00:48:00 Planning a Server Restore Policy 00:16:00 Verifying Restored Data 00:16:00 Planning an EFS Restore Policy 00:07:00 Windows Server Maintenance Plan Planning for Security Update Management 00:22:00 Basic Windows Server 2008 Management Tasks 00:20:00 Automating Windows Server 2008 Maintenance 00:08:00 Planning for Business Continuity Planning for Business Continuity 00:20:00 Reviewing Core Operating System Components 00:07:00 Reviewing Log Files 00:04:00 Evaluating Security Issues 00:10:00 Windows Server Troubleshooting Discovering Hardware Support Issues 00:12:00 Handling Device Driver Failures 00:07:00 Handling Hardware Component Failures 00:05:00 Determining the Scale of Network Issues 00:13:00 Name Resolution in Windows Server 2008 00:12:00 Fixing IP Connectivity Issues 00:09:00 Mock Exam Mock Exam- 70-646 - Windows Server 2008 Administration 00:20:00 Final Exam Final Exam- 70-646 - Windows Server 2008 Administration 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

70-646 - Windows Server 2008 Administration
Delivered Online On Demand11 hours 58 minutes
£11.99

Interior Designer Courses Online Mega Bundle

By Study Plex

Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Interior Design - Style and Impact Interior Design Principles Colour In Interiors Space Planning in Interiors Textiles and Fabrics For Interiors Styling and Staging Interior Spaces Obtain Your Certificate Order Your Certificate of Achievement 00:00:00

Interior Designer Courses Online Mega Bundle
Delivered Online On Demand
£42