• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

9096 Network courses

LINUX - CPD Certified

4.7(47)

By Academy for Health and Fitness

24-Hour Knowledge Knockdown! Prices Reduced Like Never Before Ever wondered what powers the vast majority of web servers, supercomputers, and even smartphones around the world? The answer is Linux, a powerful and versatile operating system. Did you know that according to a recent study, over 60% of web servers in the UK run on Linux? If you're interested in a career in IT, understanding Linux is an essential skill. This LINUX course bundle equips you with the knowledge and expertise to navigate the world of Linux, from the fundamentals to advanced security practices. This LINUX - CPD Certified Bundle Contains 15 of Our Premium Courses for One Discounted Price: Course 01: Learn Linux in 5 Days Course 02: LINUX File Management System Course 03: C Programming Language for Beginners on Linux Course 04: LINUX Security and Hardening Course 05: LINUX Shell Scripting Course 06: Learn Ethical Hacking From A-Z: Beginner To Expert Course 07: Securing an Ubuntu Linux Server against Hackers Masterclass Course 08: Bash Scripting, Linux and Shell Programming Masterclass Course 09: CompTIA Network Course 10: IT Support Technician Training Course 11: CompTIA PenTest+ (Ethical Hacking) course Course 12: Web Application Penetration Testing Course Course 13: SQL Database Administrator Course 14: Microsoft Access Databases Forms and Reports Course 15: Computer Operating System and Troubleshooting This LINUX bundle offers a structured learning path that starts with the foundational concepts of Linux, guiding you through the file system, working with the command line, and scripting languages like C and Bash. As you progress, you'll delve into essential security practices to harden your Linux systems against potential threats. Learning Outcomes of LINUX - CPD Certified Bundle Gain a solid understanding of the Linux operating system fundamentals. Master essential file management techniques and navigate the Linux directory structure. Learn C programming fundamentals within the Linux environment. Implement robust security measures to protect your Linux systems. Craft effective shell scripts to automate tasks and enhance efficiency. Take the first step towards a rewarding career in Linux and related fields and enroll today! Why Choose Our LINUX Bundle? Get a Free CPD Accredited Certificate upon completion of LINUX Get a free student ID card with LINUX Training Get instant access to this LINUX course. Learn LINUX from anywhere in the world The LINUX is affordable and simple to understand The LINUX is an entirely online, interactive lesson with voiceover audio Lifetime access to the LINUX course materials The LINUX comes with 24/7 tutor support Start your learning journey straightaway with LINUX! This LINUX's curriculum has been designed by LINUX experts with years of LINUX experience behind them. The LINUX course is extremely dynamic and well-paced to help you understand LINUX with ease. You'll discover how to master the LINUX skill while exploring relevant and essential topics. CPD 150 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone interested in learning more about the topic is advised to take this LINUX - CPD Certified Diploma bundle. Requirements You will not need any prior background or expertise to enrol in this LINUX - CPD Certified Diploma bundle. Career path After completing this LINUX - CPD Certified Diploma course, you are to start your career or begin the next phase of your career. Linux administrator Network security analyst Penetration tester Web developer IT support specialist Database administrator Certificates Digital certificate Digital certificate - Included Hard copy certificate Hard copy certificate - Included

LINUX - CPD Certified
Delivered Online On Demand3 days
£75

AJSPR - Advanced Junos Service Provider Routing

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course benefits individuals responsible for implementing, monitoring, and troubleshooting Layer 3 components of a service provider's network. Overview Describe the various OSPF link-state advertisement (LSA) types. Explain the flooding of LSAs in an OSPF network. Describe the shortest-path-first (SPF) algorithm. List key differences between OSPFv2 and OSPFv3. Describe OSPF area types and operations. Configure various OSPF area types. Summarize and restrict routes. Identify some scenarios in a service provider network that can be solved using routing policy or specific configuration options. Use routing policy and specific configuration options to implement solutions for various scenarios. Describe how to troubleshoot OSPF. Explain the concepts and operation of IS-IS. Describe various IS-IS link-state protocol data unit (LSP) types. List IS-IS adjacency rules and troubleshoot common adjacency issues. Configure and monitor IS-IS. Display and interpret the link-state database (LSDB). Perform advanced IS-IS configuration options. Implement IS-IS routing policy. Explain the default operation in multiarea IS-IS. Describe IS-IS address summarization methods. Configure and monitor a multiarea IS-IS network. Describe how to troubleshoot IS-IS. Describe basic BGP operation. List common BGP attributes. Explain the route selection process for BGP. Describe how to alter the route selection process. Configure some advanced options for BGP peers. Describe various BGP attributes in detail and explain the operation of those attributes. Manipulate BGP attributes using routing policy. Explain the causes for route instability. Describe the effect of damping on BGP routing. Explain the default behavior of damping on links. Control damping using routing policy. View damped routes using command-line interface (CLI) commands. Describe the operation of BGP route reflection. Configure a route reflector. Describe the operation of a BGP confederation. Configure confederations. Describe peering relationships in a confederation. Describe how to troubleshoot BGP. Describe how to troubleshoot routing policy. This five-day course is designed to provide students with detailed coverage of OSPF, IS-IS, BGP, and routing policy. Course Outline Course Introduction OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication OSPF Areas Review of OSPF Areas Stub Area Operation Stub Area Configuration NSSA Operation NSSA Configuration Route Summarization OSPF Case Studies and Solutions Virtual Links OSPF Multiarea Adjacencies External Reachability Troubleshooting OSPF Troubleshooting OSPF IS-IS Overview of IS-IS IS-IS PDUs Neighbors and Adjacencies Configuring and Monitoring IS-IS Advanced IS-IS Operations and Configuration Options IS-IS Operations IS-IS Configuration Options IS-IS Routing Policy Multilevel IS-IS Networks Level 1 and Level 2 Operations Multilevel Configuration Troubleshooting IS-IS Troubleshooting IS-IS BGP Review of BGP BGP Operations BGP Path Selection Options Configuration Options BGP Attributes and Policy?Part 1 BGP Policy Next Hop Origin and MED AS Path BGP Attributes and Policy?Part 2 Local Preference Communities Route Reflection and Confederations Route Reflection Operation Configuration and Routing Knowledge BGP Confederations BGP Route Damping Route Flap and Damping Overview Route Damping Parameters Configuring and Monitoring Route Damping Troubleshooting BGP Troubleshooting BGP Troubleshooting Policy Troubleshooting Policy

AJSPR - Advanced Junos Service Provider Routing
Delivered OnlineFlexible Dates
Price on Enquiry

Projects in Machine Learning: From Beginner to Professional

By Packt

This course covers the basic concepts of machine learning (ML) that are crucial for getting started on the journey of becoming a skilled ML developer. You will become familiar with different algorithms and networks, such as supervised, unsupervised, neural networks, Convolutional Neural Network (CNN), and Super-Resolution Convolutional Neural Network (SRCNN), needed to develop effective ML solutions.

Projects in Machine Learning: From Beginner to Professional
Delivered Online On Demand15 hours 26 minutes
£37.99

Networking Know How Masterclass

5.0(1)

By We Are In Business

Do you struggle with networking, feeling nervous and lacking confidence when meeting new people? That's understandable, but don't let that fear hold you back any longer! Our Networking Know How Masterclass is specifically designed to help you overcome these challenges and give you the skills and confidence you need to network with ease. So, whether you're new to networking or simply looking to improve your skills, our expert guidance will take you through the process and provide you with practical tips and techniques to help you make meaningful connections. By the end of the course, you'll feel comfortable and confident reaching out to others, making small talk, and creating valuable relationships. You'll learn how to network like a pro, and you'll leave the course with a whole new level of confidence, ready to build your professional network and reach your goals. So why wait? Sign up for the course today and start your journey to successful networking!

Networking Know How Masterclass
Delivered Online On Demand1 hour 18 minutes
£97

AJSEC - Advanced Junos Security

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course benefits individuals responsible for implementing, monitoring, and troubleshooting Juniper security components. Overview After successfully completing this course, you should be able to: Demonstrate understanding of concepts covered in the prerequisite Juniper Security courses. Describe the various forms of security supported by the Junos OS. Describe the Juniper Connected Security model. Describe Junos security handling at Layer 2 versus Layer 3. Implement next generation Layer 2 security features. Demonstrate understanding of Logical Systems (LSYS). Demonstrate understanding of Tenant Systems (TSYS). Implement virtual routing instances in a security setting. Describe and configure route sharing between routing instances using logical tunnel interfaces. Describe and discuss Juniper ATP and its function in the network. Describe and implement Juniper Connected Security with Policy Enforcer in a network. Describe firewall filters use on a security device. Implement firewall filters to route traffic. Explain how to troubleshoot zone problems. Describe the tools available to troubleshoot SRX Series devices. Describe and implement IPsec VPN in a hub-and-spoke model. Describe the PKI infrastructure. Implement certificates to build an ADVPN network. Describe using NAT, CoS and routing protocols over IPsec VPNs. Implement NAT and routing protocols over an IPsec VPN. Describe the logs and troubleshooting methodologies to fix IPsec VPNs. Implement working IPsec VPNs when given configuration that are broken. Describe Incident Reporting with Juniper ATP On-Prem device. Configure mitigation response to prevent spread of malware. Explain SecIntel uses and when to use them. Describe the systems that work with SecIntel. Describe and implement advanced NAT options on the SRX Series devices. Explain DNS doctoring and when to use it. Describe NAT troubleshooting logs and techniques. This four-day course, designed to build off the current Juniper Security (JSEC) offering, delves deeper into Junos security, next-generation security features, and ATP supporting software. Chapter 1: Course Introduction Course Introduction Chapter 2: Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 1: Implementing Layer 2 Security Chapter 3: Firewall Filters Using Firewall Filters to Troubleshoot Routing Instances Filter-Based Forwarding Lab 2: Implementing Firewall Filters Chapter 4: Troubleshooting Zones and Policies General Troubleshooting for Junos Devices Troubleshooting Tools Troubleshooting Zones and Policies Zone and Policy Case Studies Lab 3: Troubleshooting Zones and Policies Chapter 5: Hub-and-Spoke VPN Overview Configuration and Monitoring Lab 4: Implementing Hub-and-Spoke VPNs Chapter 6: Advanced NAT Configuring Persistent NAT Demonstrate DNS doctoring Configure IPv6 NAT operations Troubleshooting NAT Lab 5: Implementing Advanced NAT Features Chapter 7: Logical and Tenant Systems Overview Administrative Roles Differences Between LSYS and TSYS Configuring LSYS Configuring TSYS Lab 6: Implementing TSYS Chapter 8: PKI and ADVPNs PKI Overview PKI Configuration ADVPN Overview ADVPN Configuration and Monitoring Lab 7: Implementing ADVPNs Chapter 9: Advanced IPsec NAT with IPsec Class of Service with IPsec Best Practices Routing OSPF over VPNs Lab 8: Implementing Advanced IPsec Solutions Chapter 10: Troubleshooting IPsec IPsec Troubleshooting Overview Troubleshooting IKE Phase 1 and 2 IPsec Logging IPsec Case Studies Lab 9: Troubleshooting IPsec Chapter 11: Juniper Connected Security Security Models Enforcement on Every Network Device Chapter 12: SecIntel Security Feed Encrypted Traffic Analysis Use Cases for SecIntel Lab 10: Implementing SecIntel Chapter 13:Advanced Juniper ATP On-Prem Collectors Private Mode Incident Response Deployment Models Lab 11: Implementing Advanced ATP On-Prem Chapter 14: Automated Threat Mitigation Identify and Mitigate Malware Threats Automate Security Mitigation Lab 12: Identifying and Mitigation of Threats Additional course details: Nexus Humans AJSEC - Advanced Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AJSEC - Advanced Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AJSEC - Advanced Junos Security
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Segment Routing on Cisco IOS XR v1.0 (SEGRTE201)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy a Cisco Integrated Threat Defense solution in their network environment. The primary audience for this course includes: Systems and network engineersTechnical architectsTechnical support personnelChannel partners and resellers Overview After completing this course, you should be able to: Describe the current network security landscape and the Cisco Integrated Threat Defense (ITD) solutionDescribe the key components of the ITD solution and their use in the networkConfigure the ISE for a baseline of operation in the ITD solutionConfigure the integration between the Stealthwatch and ISE platformsConfigure the integration between the Cisco Firepower and ISE platformsConfigure the integration between Cisco Firepower and AMP for Endpoints This course begins with an analysis of the current cybersecurity landscape and includes details on why networks today need an integrated threat defense architecture. You will integrate and verify proper operation of the key Cisco Integrated Threat Defense products, including Cisco Identity Services Engine (ISE), Cisco Stealthwatch©, Cisco Firepower© NGFW, and Cisco AMP for Endpoints. Verification includes the introduction of malware into the network to ensure proper identification, analysis, and quarantine. Course Outline Integrated Threat Defense Introduction Itd Products Identity Services Engine Setup Integration Of Stealthwatch With Identity Services Engine Integration Of Firepower With Identity Services Engine Integration Of Firepower With Amp For Endpoints

Cisco Implementing Segment Routing on Cisco IOS XR v1.0 (SEGRTE201)
Delivered OnlineFlexible Dates
Price on Enquiry

Professional Certificate Course in Designing Supply Chain Networks in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

Designing Supply Chain Networks offers a comprehensive exploration of supply chain network design, covering essential aspects such as types of networks, key design processes, and various designing methods. Participants will gain insights into optimizing supply chain structures to enhance efficiency and maximize organizational success.   This course delves into the fundamentals of defining supply chain networks, understanding different types, and mastering the intricacies of supply chain network design. Participants will explore key aspects and engage in the learning process of supply chain network design, acquiring proficiency in strategic planning methods. After the successful completion of the course, you will be able to learn about the following,⦁ Defining Supply Chain Networks⦁ Understanding the Types of Supply Chain Networks.⦁ Learning the Supply Chain Network Design.⦁ Understanding the Key Aspects of Supply Chain Network Design.⦁ Learning the Supply Chain Network Design Process.⦁ Understanding the Key Aspects of Supply Chain Network Design.⦁ Learning the Supply Chain Network Designing Methods. This course provides a deep dive into the art of designing supply chain networks, covering critical elements from types of networks to key design processes. Participants will develop expertise in supply chain network design, enabling them to strategically optimize structures for enhanced efficiency and organizational success. Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Designing Supply Chain Networks Self-paced pre-recorded learning content on this topic. Designing Supply Chain Networks Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience, Supply Chain Network Designer Logistics Network Analyst Distribution Network Planner Network Optimization Specialist Transportation Network Strategist Supply Chain Infrastructure Designer Inventory Network Manager Network Design Consultant Strategic Supply Chain Planner Operations Network Architect Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in Designing Supply Chain Networks in London 2024
Delivered Online On Demand14 days
£34

Coaching at Work

By Inovra Group

Overview Networking has become a crucial factor in the modern workplace. It is the most effective method of developing your business or career and is a key component of your personal brand. This one day course will teach you how to be able to build strong business relationships, develop a level of personal credibility and increase your network of contacts in order to enhance your visibility and create opportunities for yourself and your organisation. Description This training course will help your participants build a professional reputation and develop a network of connections through the two key methods available to them; face-to-face and online. Attendees will discover how to effectively combine these two approaches and create a strategy for networking success that will generate their own community and actively grow their personal network. This will result in an improved performance in their approach to networking and consequently provide opportunities and prospects that will increase their business success. The training provides them with the tools and techniques to both plan a successful, strategic approach to networking and develop their personal communication skills, which will ensure they build effective business relationships. Topics covered: Why Network? – Establishing the importance of networking with some shocking statistics and an activity that defines the importance of networking to the individual. This is followed by some insight into the key aims of a networking strategy, what puts people off, as well as some personal revelations about networking. Increase Your Business Presence – Looking at the components of a strong business presence, including; credibility, personal brand, visibility and social capital. Developing a Networkers Attitude – An exercise that clarifies the perfect attitudes and behaviours of great networkers and comparing the participants against this. Thus identifying areas for development. Face to Face Networking – An overview and insight into the main types of face to face networking opportunities available with the benefits and pitfalls of each. Online Networking – An overview of the different social media and online networking tools and how to get the best out of them. Includes; LinkedIn, Twitter, Facebook and online forums. Communication Skills for Networking Success – Ensuring a good first impression, creating an opening sound bite and writing an online profile that promotes and engages. Developing a Conversation – Building on the opening sound bite and developing a conversation through good questioning techniques and following a selection of key networking rules. Including an activity to test and practice the skills. Working a Room – A fun activity that embeds and develops learning while encouraging practice and communication. This activity covers 10 of the main skills required to work a room. Breaking into a Group – Identifying body language to spot when a group or pair is open to new people entering the conversation or would rather not encourage participation. Knowing how to break into a group, what to say and how to remain professional. Exiting a Conversation – Developing some techniques to extricate oneself from a conversation without causing embarrassment or rudeness. The Follow-Up – Using a structure to identify the most important contacts created and establishing when and how to follow up with each group. Includes example follow-up email and a chance to develop their own. Creating a Network Plan – Participants are provided with a networking action plan to review and complete. This sets them on the journey of developing their networking skills and ensures they have a strategy and goals to target. Who should attend Anyone who is looking to improve their networking performance, or the networking performance of a management or sales team. Requirements for Attendees No pre-requisites required.

Coaching at Work
Delivered In-Person in Wakefield or UK WideFlexible Dates
£800

Learn Hacking Windows 10 Using Metasploit from Scratch

By Packt

In this course, you will start as a beginner without any previous knowledge about hacking. The course focuses on both practical and theoretical sides to ensure that you understand the attack before performing it. Learn how black hat hackers hack and White hat hackers secure Windows OS with the help of advanced methods.

Learn Hacking Windows 10 Using Metasploit from Scratch
Delivered Online On Demand10 hours 28 minutes
£18.99

Cisco ASA Essentials (ASAE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students who need to know how to implement and manage Cisco ASA 5500-X. Overview Upon successful completion of this course, students should be able to do the following:? Technology and features of the Cisco ASA? Cisco ASA product family? How ASAs protect network devices from attacks? Bootstrap the security appliance? Prepare the security appliance for configuration via the Cisco Adaptive Security Device Manager (ASDM)? Launch and navigate ASDM? Essential security appliance configuration using ASDM and the command-line interface (CLI)? Configure dynamic and static address translations? Configure access policy based on ACLs? Use object groups to simplify ACL complexity and maintenance? Use the Modular Policy Framework to provide unique policies to specific data flows? Handle advanced protocols with application inspection? Troubleshoot with syslog and tcp ping? Configure the ASA to work with Cisco Secure ACS 5.2 for RADIUS-based AAA of VPNs? Implement site-to-site IPsec VPN? Implement remote access IPsec and SSL VPNs using the Cisco AnyConnect 3.0 Secure Mobility Client? Work with the 5.x Legacy Cisco IPsec VPN client and Anyconnect VPN client? Deploy clientless SSL VPN access, including smart tunnels, plug-ins, and web-type ACLs? Configure access control policies to implement your security policy across all classes of VPN? Configure Active/Standby failover for both firewall and VPN high availability Student will gain the essential skills required to configure, maintain, and operate Cisco ASA 5500-X Series Adaptive Security Appliances based on ASA Software v9.x. Cisco ASA Essentials ? Lesson 1: Evaluating Cisco ASA Technologies ? Lesson 2: Identifying Cisco ASA Families Basic Connectivity and Device Management ? Lesson 1: Preparing the Cisco ASA for Network Integration ? Lesson 2: Managing Basic Cisco ASA Network Settings ? Lesson 3: Configuring Cisco ASA Device Management Features Network Integration ? Lesson 1: Configuring Cisco ASA NAT Features ? Lesson 2: Configuring Cisco ASA Basic Access Control Features Cisco ASA Policy Control ? Lesson 1: Cisco ASA Modular Policy Framework ? Lesson 2: Configuring Cisco ASA Connection Policy Cisco ASA VPN Architecture and Common Components ? Lesson 1: Implementing Profiles, Group Policies, and User Policies ? Lesson 2: Implementing PKI Services Cisco ASA Clientless Remote Access SSL VPN Solutions ? Lesson 1: Deploying Basic Clientless VPN Solutions ? Lesson 2: Deploying Advanced Application Access for Clientless SSL VPNs Cisco AnyConnect Remote Access SSL Solutions ? Lesson 1: Deploying a Basic Cisco AnyConnect Full-Tunnel SSL VPN Solution Cisco ASA Remote Access IPsec VPNs ? Lesson 1: Deploying Cisco Remote Access VPN Clients ? Lesson 2: Deploying Basic Cisco Remote Access IPsec VPN Solutions Cisco ASA Site-to-Site IPsec VPN Solutions ? Lesson 1: Deploying Basic Site-to-Site IPsec VPNs ? Lesson 2: Deploying Advanced Site-to-Site IPsec VPNs Cisco ASA High Availability and Virtualization ? Lesson 1: Configuring Cisco ASA Active/Standby High Availability Labs Lab 1: Prepare the ASA for Administration Lab 2: Fundamental ASA Configuration Lab 3: Network Address Translation (NAT) Lab 4: Basic Access Control Lab 5: Basic Protocol Inspection Lab 6: Licensing, ACS, and Public CA Lab 7: Basic Clientless SSL VPN Lab 8: Clientless SSL VPN - Thin Apps Lab 9: Basic AnyConnect Full Tunnel SSL VPN Lab 10: Remote Access IPSec VPN Lab 11: IPSec Site-to-Site VPN Lab 12: Active/Standby Failover

Cisco ASA Essentials (ASAE)
Delivered OnlineFlexible Dates
Price on Enquiry