• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

26 Educators providing Operating System courses

Institute of Computer Training Academy

institute of computer training academy

INSTITUTE of COMPUTER TRAINING ACADEMY (ICTA) is a national program of information technology education and development. ICTA Registered as Autonomous Body,under Govt of West Bengal based on central govt TR act,1882, Govt of India. ICTA Registered under Trade Mark Registry Act,1999, Govt of India. Registered under MHRD (CR Act), Govt of India. ICTA An ISO 9001-2015 Certified autonomous body. ICTA Registered under Department of Labour Govt of NCT (Delhi). ICTA Faculty ICTA Faculty are full time, qualified and friendly professional, always there to guide the students, specially trained to understand students psychology, internalise the knowledge uniformly and put accords difficult to understand concept with ease, thus making students learning ventures smooth and easy. The whole training time is equally divided into theory and practical sessions. A part from regular computer times. Student are allowed to utilize unlimited machine time to exercise their minds, boots their creativity and increase their level of curiosity. This build up there self confidence, allow them to explore the wide horizon of computer and gradually shapes them into confident professional. LIBRARY INFRASTRUCTURE The ICTA center have a huge stock library with a collection of around 500 volume comprising functional programming, parallel processing system database management system, client server computing, Network, operating system, multimedia, object oriented programming etc. COMPUTER LAB ICTA Center have a good computer lab.The computer lab contains high configuration computer networked with Wi-Fi. THE PLACEMENT CELL The placement cell of ICTA is responsible for coordinating the placement activities of the students of the institute. A placement coordinator from the faculty heads the placement cell with committee members representing the students. Almost all the placement activities are organized and coordinated by the students under the able guidance of faculty. PLACEMENT PROCESS An early information of the intended schedule would facility arrival at mutually convenient date. The company may deliver pre placement talk either earlier or before the campus requirements program itself. At the campus the company may conduct a written test and or interview etc. Job offer or response may be routed only through the placement coordinator. In some cases if a company wishes to conduct off campus requirements as well, they may provide the travelling allowance for such outstation selection. REGISTRATION PROCESS To get registered, students have to fill the application form provided along with information brochure. Student can buy the information brochure from any of our ICTA Authorize center. The registered center of ICTA name and code are mentioned in the Applications form. DOCUMENTS OF STUDENTS REGISTRATION Two recent passport size photo. Self attested copy of last educational qualification. Caste certificate (if sc/st/obc). COURSE STRUCTURE ICTA Course can be classified by Certificate Course. Diploma Course. Advanced Diploma Course. Vocational Course. ELEGIBILITY OF CERTIFICATE COURSE All certificate course students have must qualified class viii passed. ELEGIBILITY OF DIPLOMA COURSE All Diploma Course students have must qualified class X. ELEGIBILITY OF ADVANCED DIPLOMA COURSE All Advanced Diploma Course students have must qualified x+. EXAMINATION AND RESULTS The minimum qualifying marks for course are as follows. Practical 50 Theory 50 TOTAL. 100 Percentage Grade 80% A+ 70%-80% A 60%-70% B+ 50%-60% B 40%-50% C RE-EXAMINATION PROCESS A student at least 40%marks in each semester to qualify the exam. A students who does not clear the examination in one sitting will be allowed to re appear in the failed exam. Students failling to appear in the re examination with in the specific period of time shall not be entitled for the certificate or for further re examination.such students are to go through the complete registration procedure to get a re admission. EXAMINATION SYSTEM ICTA has only allowed OFFLINE examination system. EXAMINATION PROCEDUR The declear of exam date then students are filled by exam form our ICTA Register center and paid his/her exam fees. The pattern of questions will be the OBJECTIVE TYPES. The details of examination (date,time)will be announced by website notice board. The duration of examination will be of 1hour. Theory exam will comparison of 50 questions of 1marks and no negative marking.practical exam will carry total 50marks. STUDENT BENEFITS Quality education provide at very affordable charge. Off-line exam at your home center who is registered our Organization. Global accepted certificate after the complete of course. OUR AFFILIATION Registered as autonomous body, under Govt of west Bengal based on central Govt TR act,1882,Govt of India. Registered under trade mark registry act,1999, Govt of India. Registered under MHRD (CR Act), Govt of India. An iso 9001-2015 certified autonomous body. Registered under department of labor Govt of NCT(New Delhi). Registered under MSME(Govt of India). AFFILIATION PROSES Rules of our ICTA Authorize Centre. If any person's are interested to ICTA franchises, so the following rules are maintained You must have 5-10 computers. 1 theory and 1 practical rooms. 2 Bathrooms are required must .ladies and gents. Minimum theory rooms 200sqft. and practical rooms must be 200sqft. Must have internet connection. Good faculty. Good Electricity. Timings Maintenance. WHAT YOU WILL GET? Agreement paper. ICTA Authorized certificate. Student Registration form. Details of institute our official website www.ictaindia.com Flex 6*3 size. Sample Certificate Marksheet.

Nexus Human

nexus human

London

Nexus Human, established over 20 years ago, stands as a pillar of excellence in the realm of IT and Business Skills Training and education in Ireland and the UK.  For over two decades, Nexus Human has been a steadfast source of reliable and high-quality training solutions, catering to a diverse range of professional and educational needs. With a strong reputation in the Training Industry, Nexus Human has consistently demonstrated its commitment to equipping individuals and organisations with the skills and knowledge required to thrive in today's dynamic world.  Our training programs span a wide spectrum, encompassing IT certifications, business skills, and much more.   What sets Nexus Human apart is our unwavering dedication to staying at the forefront of industry trends and technology advancements.  Our expert instructors, coupled with cutting-edge training resources, ensure that students receive the most up-to-date and relevant knowledge available. The impact of Nexus Human extends far and wide, helping individuals enhance their career prospects and aiding businesses in achieving their goals.  This 20-year journey has solidified our institution's standing as a trusted partner in personal and professional growth, offering reliable, excellent training that continues to shape the future.  Whether you seek to upskill, reskill, or simply stay ahead of the curve, Nexus Human is the place to turn for an educational experience marked by quality, reliability, and innovation.

iStudy UK

istudy uk

We understand more than anyone how important it is for you to get the right qualifications at the right time. We also understand that when you have a lot to do, you might not always have the time free to go to a place of study. That is why we created this site, so you can take all the time you need to learn more about your chosen topics as well as be able to do the whole thing from home. We believe in empowering people by offering them opportunities to expand and extend their knowledge and skill set as well as giving them the support they need to achieve great things. With thousands of courses available and a team who will do just about anything to help you, it is safe to say that you will not find a better course provider on the internet and so we would love to work with you to make sure that you get the best experience and best results out of your education. WHAT WE DO Here at iStudy we provide a range of online training courses for those who want to gain new skills, and qualifications and update their knowledge. iStudy training courses are delivered entirely online through our sophisticated student learning portal. The student learning portal is an online learning management system that allows students to study for their courses online. This innovative technology means there is no need to attend any classes or take time off work to study. Professionally accredited courses All our courses are delivered in partnership with nationally recognised awarding bodies so be assured that what you learn with us matters when it comes to achieving your career goals. Study that suits you You do not have to give up your job or your life to get a new qualification, you can learn anytime, anywhere.

Firefly Sailing

firefly sailing

The National Firefly Association (“We”) are committed to protecting and respecting your privacy. This policy (together with our Terms and Conditions of Use and any other documents referred to on it) sets out the basis on which any personal data we collect from you, or that you provide to us, will be processed by us. Please read the following carefully to understand our views and practices regarding your personal data and how we will treat it. For the purpose of the Data Protection Act 1998 (the Act), the data controller is The National Firefly Association, which is affiliated to the Royal Yachting Association, Ensign Way, Hamble, Southampton, Hampshire SO31 4YA. Information we may collect from you We may collect and process the following data about you: Information that you provide by filling in forms on our site (our site). This includes information provided at the time of registering to use our site, subscribing to our service, posting material or requesting further services. We may also ask you for information when you enter a competition or promotion sponsored by The United Kingdom Fireball Association, and when you report a problem with our site. If you contact us, we may keep a record of that correspondence. We may also ask you to complete surveys that we use for research purposes, although you do not have to respond to them. Details of transactions you carry out through our site. Details of your visits to our site including, but not limited to, traffic data, location data, weblogs and other communication data and the resources that you access. IP addresses and cookies We may collect information about your computer, including where available your IP address, operating system and browser type, for system administration and to report aggregate information to our advertisers. This is statistical data about our users’ browsing actions and patterns, and does not identify any individual. For the same reason, we may obtain information about your general internet usage by using a cookie file which is stored on the hard drive of your computer. Cookies contain information that is transferred to your computer’s hard drive. They help us to improve our site and to deliver a better and more personalised service. They enable us: To estimate our audience size and usage pattern. To store information about your preferences, and so allow us to customise our site according to your individual interests. To speed up your searches. To recognise you when you return to our site. You may refuse to accept cookies by activating the setting on your browser which allows you to refuse the setting of cookies. However, if you select this setting you may be unable to access certain parts of our site. Unless you have adjusted your browser setting so that it will refuse cookies, our system will issue cookies when you log on to our site. Please note that our advertisers may also use cookies, over which we have no control. Where we store your personal data The data that we collect from you may be transferred to, processed, and stored at, a destination outside the European Economic Area (“EEA”). By submitting your personal data, you agree to this transfer, storing or processing. We will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this privacy policy. Where we have given you (or where you have chosen) a password which enables you to access certain parts of our site, you are responsible for keeping this password confidential. We ask you not to share a password with anyone. Unfortunately, the transmission of information via the internet is not completely secure. Although we will do our best to protect your personal data, we cannot guarantee the security of your data transmitted to our site; any transmission is at your own risk. Once we have received your information, we will use strict procedures and security features to try to prevent unauthorised access. Uses made of the information We use information held about you in the following ways: To ensure that content from our site is presented in an effective manner. To provide you with information, products or services that you request from us or which we feel may interest you, where you have consented to be contacted for such purposes. To carry out our obligations arising from any contracts entered into between you and us. To allow you to participate in interactive features of our service, when you choose to do so. To notify you about changes to our service. We may also use your data, or permit selected third parties to use your data, to provide you with information about goods and services which may be of interest to you and we or they may contact you about these by post or telephone. If you do not want us to use your data in this way, or to pass your details on to third parties for marketing purposes, you can indicate this on the registration form on which we collect your data. Disclosure of your information We may disclose your personal information to third parties if we are under a duty to disclose or share your personal data in order to comply with any legal obligation, or in order to enforce or apply our Terms and Conditions of Use and other agreements; or to protect the rights, property, or safety of The United Kingdom Fireball Association, our members, or others. This includes exchanging information with other companies and organisations for the purposes of fraud protection and credit risk reduction. Your rights

IOMH - Institute of Mental Health

iomh - institute of mental health

London

The IOMH - Institute of Mental Health [https://iomh.co.uk/]is dedicated to empowering individuals to unlock their full potential and thrive in multiple areas of life. Whether you're seeking personal growth, professional development, or support in overcoming life's challenges, we have the resources and expertise to guide you on your transformative journey. Our Vision At the IOMH (Institute of Mental Health), we envision a world where every person is inspired to embrace change, overcome obstacles, motivate others, and find hope in the face of adversity. We believe that through education and support, individuals can tap into their inner strength and create meaningful transformations in all aspects of life. Our Mission Our mission is to break barriers and ignite the spark of possibility within you. We are committed to offering a diverse range of courses and programs that encompass various niches, allowing you to explore and excel in multiple areas of interest. Our skillfully crafted content, designed by specialists, provides you with the knowledge and skills you need to become a well-rounded and empowered individual. WHAT WE OFFER * Expert-Curated Courses: Our courses are developed by industry-leading experts. * Fully Accredited Courses and Study Materials: Ensure quality and credibility. * Business Team Training: Tailor-made programs for corporate teams. * Affordable Subscriptions: Flexible payment options to suit your budget. * Accredited Certifications: Validate your skills and expertise. * New Courses Monthly: Stay updated with the latest trends. * Flexible Learning: Learn at your own pace and convenience. * 24/7 Support: Dedicated assistance whenever you need it. OUR VISION AT THE IOMH (INSTITUTE OF MENTAL HEALTH), WE ENVISION A WORLD WHERE EVERY PERSON IS INSPIRED TO EMBRACE CHANGE, OVERCOME OBSTACLES, MOTIVATE OTHERS, AND FIND HOPE IN THE FACE OF ADVERSITY. WE BELIEVE THAT THROUGH EDUCATION AND SUPPORT, INDIVIDUALS CAN TAP INTO THEIR INNER STRENGTH AND CREATE MEANINGFUL TRANSFORMATIONS IN ALL ASPECTS OF LIFE. OUR VISION AT THE IOMH (INSTITUTE OF MENTAL HEALTH), WE ENVISION A WORLD WHERE EVERY PERSON IS INSPIRED TO EMBRACE CHANGE, OVERCOME OBSTACLES, MOTIVATE OTHERS, AND FIND HOPE IN THE FACE OF ADVERSITY. WE BELIEVE THAT THROUGH EDUCATION AND SUPPORT, INDIVIDUALS CAN TAP INTO THEIR INNER STRENGTH AND CREATE MEANINGFUL TRANSFORMATIONS IN ALL ASPECTS OF LIFE.

Education And Skills Training & Development

education and skills training & development

Doncaster

Welcome to the Education and Skills Training & Development Ltd's privacy notice. Education and Skills Training & Development Ltd respects your privacy and is committed to protecting your personal data. This privacy notice will inform you as to how we look after your personal data when you visit our website (regardless of where you visit it from) and tell you about your privacy rights and how the law protects you. This privacy notice is provided in a layered format so you can click through to the specific areas set out below. Please also use the Glossary to understand the meaning of some of the terms used in this privacy notice. 1. IMPORTANT INFORMATION AND WHO WE ARE 2. THE DATA WE COLLECT ABOUT YOU 3. HOW IS YOUR PERSONAL DATA COLLECTED 4. HOW WE USE YOUR PERSONAL DATA 5. DISCLOSURES OF YOUR PERSONAL DATA 6. INTERNATIONAL TRANSFERS 7. DATA SECURITY 8. DATA RETENTION 9. YOUR LEGAL RIGHTS 10. GLOSSARY 1. Important information and who we are Purpose of this privacy notice This privacy notice aims to give you information on how Education and Skills Training & Development Ltd collects and processes your personal data through your use of this website, including any data you may provide through this website when you sign up to our newsletter, purchase a product or service, take part in a competition or enrol yourself or one of your employees onto one of our courses. This website is not intended for children and we do not knowingly collect data relating to children. It is important that you read this privacy notice together with any other privacy notice or fair processing notice we may provide on specific occasions when we are collecting or processing personal data about you so that you are fully aware of how and why we are using your data. This privacy notice supplements the other notices and is not intended to override them. Controller Education and Skills Training & Development Ltd is the controller and responsible for your personal data (collectively referred to as "COMPANY", "we", "us" or "our" in this privacy notice). We have appointed a data protection officer (DPO) who is responsible for overseeing questions in relation to this privacy notice. If you have any questions about this privacy notice, including any requests to exercise your legal rights, please contact the DP] using the details set out below. Contact details Our full details are: Full name of legal entity: Education and Skills Training & Development Ltd Name or title of DPO : James Hart Email address: james.hart@education-and-skills.com Postal address: 5C Oxford House, Sixth Avenue, Doncaster DN9 3GG Telephone number: 01302 802220 You have the right to make a complaint at any time to the Information Commissioner's Office (ICO), the UK supervisory authority for data protection issues (www.ico.org.uk). We would, however, appreciate the chance to deal with your concerns before you approach the ICO so please contact us in the first instance. Changes to the privacy notice and your duty to inform us of changes This version was last updated on 1st July 2018 and is reviewed annually. It is important that the personal data we hold about you is accurate and current. Please keep us informed if your personal data changes during your relationship with us. Third-party links This website may include links to third-party websites, plug-ins and applications. Clicking on those links or enabling those connections may allow third parties to collect or share data about you. We do not control these third-party websites and are not responsible for their privacy statements. When you leave our website, we encourage you to read the privacy notice of every website you visit. 2. The data we collect about you Personal data, or personal information, means any information about an individual from which that person can be identified. It does not include data where the identity has been removed (anonymous data). We may collect, use, store and transfer different kinds of personal data about you which we have grouped together follows: · Identity Data includes first name, maiden name, last name, username or similar identifier, marital status, title, date of birth, national insurance number and gender. · Contact Data includes billing address, delivery address, email address and telephone numbers. · Financial Data includes bank account and payment card details. · Transaction Data includes details about payments to and from you and other details of products and services you have purchased from us. · Technical Data includes internet protocol (IP) address, your login data, browser type and version, time zone setting and location, browser plug-in types and versions, operating system and platform and other technology on the devices you use to access this website. · Profile Data includes your username and password, purchases or orders made by you, your interests, preferences, feedback and survey responses. · Usage Data includes information about how you use our website, products and services. · Marketing and Communications Data includes your preferences in receiving marketing from us and our third parties and your communication preferences. We also collect, use and share Aggregated Data such as statistical or demographic data for any purpose. Aggregated Data may be derived from your personal data but is not considered personal data in law as this data does not directly or indirectly reveal your identity. For example, we may aggregate your Usage Data to calculate the percentage of users accessing a specific website feature. However, if we combine or connect Aggregated Data with your personal data so that it can directly or indirectly identify you, we treat the combined data as personal data which will be used in accordance with this privacy notice. We do not collect any Special Categories of Personal Data about you (this includes details about your race or ethnicity, religious or philosophical beliefs, sex life, sexual orientation, political opinions, trade union membership, information about your health and genetic and biometric data). Nor do we collect any information about criminal convictions and offences. If you fail to provide personal data Where we need to collect personal data by law, or under the terms of a contract we have with you and you fail to provide that data when requested, we may not be able to perform the contract we have or are trying to enter into with you (for example, to provide you with goods or services). In this case, we may have to cancel a product or service you have with us but we will notify you if this is the case at the time. 3. How is your personal data collected? We use different methods to collect data from and about you including through: · Direct interactions. You may give us your Identity, Contact and Financial Data by filling in forms or by corresponding with us by post, phone, email or otherwise. This includes personal data you provide when you: · apply for our products or services; · enrol on one of our courses – government funded or not · create an account on our website; · subscribe to our service or publications; · request marketing to be sent to you; · enter a competition, promotion or survey; or · give us some feedback. · Automated technologies or interactions. As you interact with our website, we may automatically collect Technical Data about your equipment, browsing actions and patterns. We collect this personal data by using cookies, server logs and other similar technologies. We may also receive Technical Data about you if you visit other websites employing our cookies. · Third parties or publicly available sources. We may receive personal data about you from various third parties and public sources as set out below: · Technical Data from the following parties: (a) analytics providers such as Google based outside the EU; (b) advertising networks based inside the EU; and (c) search information providers based inside OR outside the EU. · Contact, Financial and Transaction Data from providers of technical, payment and delivery services based inside OR outside the EU. · Identity and Contact Data from data brokers or aggregators based inside OR outside the EU. · Identity and Contact Data from publicly availably sources such as Companies House and the Electoral Register based inside the EU. · Achievement of prior qualifications from the Learner Records Service and Department of Education via the ESFA or Student Loans Company 4. How we use your personal data We will only use your personal data when the law allows us to. Most commonly, we will use your personal data in the following circumstances: · Where we need to perform the contract we are about to enter into or have entered into with you. · Where it is necessary for our legitimate interests (or those of a third party) and your interests and fundamental rights do not override those interests. · Where we need to comply with a legal or regulatory obligation. Generally we do not rely on consent as a legal basis for processing your personal data other than in relation to sending third party direct marketing communications to you via email or text message. You have the right to withdraw consent to marketing at any time by contacting us. Purposes for which we will use your personal data We have set out below, in a table format, a description of all the ways we plan to use your personal data, and which of the legal bases we rely on to do so. We have also identified what our legitimate interests are where appropriate. Note that we may process your personal data for more than one lawful ground depending on the specific purpose for which we are using your data. Please contact us if you need details about the specific legal ground we are relying on to process your personal data where more than one ground has been set out in the table below.

Courses matching "Operating System"

Show all 52

Introduction to the Junos Operating System

5.0(3)

By Systems & Network Training

Junos Operating System training course description This course provides students with the foundational knowledge required to work with the Junos OS and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Delegates will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 15.1X49. What will you learn Describe the design architecture of the Junos OS. Navigate within the Junos CLI and perform tasks within the CLI operational and configuration modes. Configure and monitor network interfaces. Navigate within the Junos J-Web interface. Identify where you might use firewall filters. Explain basic routing operations and concepts. Identify key factors in Juniper Networks' security. Junos Operating System training course details Who will benefit: This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Prerequisites: TCP/IP foundation for engineers Duration 3 days Junos Operating System training course contents Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options-The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options-The J-Web Interface The J-Web GUI Configuration Lab 1: User Interface Options Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Lab 2: Initial System Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Lab 3: Secondary System Configuration Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Lab 4: Operational Monitoring and Maintenance Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Lab 5: Routing Fundamentals Routing Policy Routing Policy Overview Case Study: Routing Policy Lab 6: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Lab 7: Firewall Filters Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS Lab 8: Class of Service JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper's Security Focus Appendix A: IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration

Introduction to the Junos Operating System
Delivered in Internationally or OnlineFlexible Dates
£2,367

CompTIA A+ bootcamp essentials and electives

5.0(3)

By Systems & Network Training

CompTIA A+ bootcamp training course description This course includes A+ Certification: Systems Hardware and Networking Support Skills and A+ Certification: Operating Systems and Security Support Skills. The course will provide IT "super users" or new support professionals with the fastest route to A+ Certification. Full practical sessions will prepare students for the two A+ Certification exams. Note: Some self-study each evening will be required. What will you learn Install, configure, and troubleshoot peripheral devices, system components, print devices, wired and wireless LAN links and internet access devices. Install, configure, and troubleshoot the Microsoft Windows, Linux, and Mac OS PC operating systems plus iOS, Android, and Windows mobile devices. Perform basic PC maintenance. Configure access control measures. Perform basic PC maintenance. CompTIA A+ bootcamp training course details Who will benefit: Students wishing to take both CompTIA A+ exams. Prerequisites: PC fundamentals Duration 5 days Networking Microsoft Systems course contents Peripherals and Adapters Motherboard Components, Connection Interfaces, Display Devices, Audio and Multimedia Devices, Removable Storage Devices. System Components Mass Storage Devices, System Memory, Processors, BIOS and UEFI, Power Supplies. Troubleshooting and Mobile Devices Troubleshooting System Components, Laptops, Mobile Devices, Troubleshooting Mobile Devices. Printer and Network Hardware Printers, Configuring Printers, Troubleshooting Printers, Network Architectures, Ethernet Networks. Networks Wireless Networks, Internet Connections, Internet Protocol, Routers and Firewalls, Troubleshooting Networks. Supporting Windows (1) Windows Operating System, Administration Tools, Managing Storage, Managing Files, Managing Applications. Supporting Windows (2) Managing Devices, Managing Performance, Troubleshooting Windows, Installing Windows. Supporting Windows Troubleshooting Boot Problems, Maintenance and Backup, Threats and Vulnerabilities, Viruses and Malware, Securing Workstations, Securing Data. Supporting Windows Networks Configuring Network Connections, Securing Network Connections, Configuring Shared Resources, Virtualization and Services. Linux, OS X, and Mobile OS Linux Operating System, OS X, Mobile Operating Systems, Mobile OS Security and Troubleshooting, Safety and Environmental Procedures, Professionalism and Communication.

CompTIA A+ bootcamp essentials and electives
Delivered in Internationally or OnlineFlexible Dates
£2,797

Supporting Windows 10

5.0(3)

By Systems & Network Training

Supporting Windows 10 course description This course is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices in a Windows Server domain environment. These skills include understanding of Windows 10 features, how they can be used in an Active Directory environment and how to troubleshoot them. What will you learn Troubleshoot startup issues and operating system services on a Windows 10 PC. Troubleshoot issues related to network connectivity. Troubleshoot client configuration failures and GPO application issues. Troubleshoot issues related to application installation and operation. Recover a PC running Windows 10. Supporting Windows 10 course details Who will benefit: Anyone supporting users running Windows 10 personal computers within a medium to large enterprise. Prerequisites: None. Duration 5 days Supporting Windows 10 course contents Implementing a Troubleshooting Methodology Overview of Windows 10, Introduction to the EDST Job Role, Overview of the Troubleshooting Steps & Tools. Hands on Implementing a Troubleshooting Methodology. Hands on Using Troubleshooting Tools for Windows 10. Troubleshooting Startup Issues Overview of the Windows 10 Startup Recovery Environment, Troubleshooting Startup Settings & Operating System Services Issues, Recovering BitLocker-Protected Drives. Hands on Troubleshooting Startup Issues. Hands on Recovering BitLocker-Encrypted Drives, Creating a New BitLocker Password. Troubleshooting Hardware and Device Drivers Troubleshooting Device Driver Failures & Physical Failures, Overview of Hardware Troubleshooting, Monitoring Reliability, Configuring the Registry. Hands on Troubleshooting Device Driver Issues, Resolving Hardware Issues, Adding a Missing Device Driver to a Driver Store, Reverting a Problematic Device Driver. Hands on Troubleshooting Hardware Issues, Diagnosing Memory, Troubleshooting and Repairing Failed Disk Redundancy Synchronizing Settings, Accessing Data on a Foreign Volume. Troubleshooting Remote Computers Using Remote Desktop and Remote Assistance, Remoting with Windows PowerShell Hands on Troubleshooting Remote Computer by using Remote Desktop and Remote Assistance. Hands on Troubleshooting Remote Computer by using Windows PowerShell. Resolving Network Connectivity Issues Determining Network Settings, Troubleshooting Network Connectivity Issues, Troubleshooting Name Resolution. Hands on Resolving Network Connectivity Issues. Hands onResolving Name Resolution Issues. Troubleshooting Group Policy Overview of Group Policy Application, Resolving Client Configuration Failures and GPO Application Issues. Hands on Troubleshooting Group Policy Application Issues. Hands on Resolving Group Policy Issues. Hands on Installing and Sharing a Printer. Troubleshooting User Settings Troubleshooting Sign In Issues, Troubleshooting the Application of User Settings. Hands on Troubleshooting Sign in Problems. Hands on Troubleshooting the Application of User Settings, Resolving Folder Redirection Problem, Resolving Roaming User Profile Problem. Troubleshooting Remote Connectivity Troubleshooting VPN Connectivity Issues & DirectAccess. Hands on Troubleshooting VPN Connectivity Lab : Configuring and Troubleshooting DirectAccess Configuring and Verifying, DirectAccess Client-Side Settings, Troubleshooting DirectAccess. Troubleshooting Resource Access Within a Domain & File Permissions Issues, Recovering Files Encrypted by EFS, Troubleshooting Printer Access Issues. Lab : Troubleshooting File Access Issues Lab : Troubleshooting Access to Encrypted Files. Hands on Troubleshooting Printer Access Issues Troubleshooting Resource Access for Non Domain Member Clients Configuring and Troubleshooting Device Registration, Configuring and Troubleshooting Work Folders, Configuring and Troubleshooting OneDrive Access. Hands on Troubleshooting Resource Access for Clients that are not Domain Members. Troubleshooting Device Registration, Work Folders and OneDrive for Business. Troubleshooting Applications Troubleshooting Desktop App Installation Issues, Desktop Apps, Managing Windows Store Apps, Troubleshooting Access to Company Web Applications. Hands on Troubleshooting Desktop Apps, AppLocker Policy Application & Application Compatibility issue. Hands on Troubleshooting Access to Company Web Applications, Internet Explorer Issue & Microsoft Edge. Maintaining Windows 10 Managing & Troubleshooting Windows Activation, Troubleshooting Performance, Applying Applications. Hands on Monitoring and Troubleshooting Performance. Recovering Data and Operating System File Recovery in Windows 10, Recovering an OS. Hands on Recovering Data, Recovering Data from Azure Backup, Recovering Deleted File by Using File History. Hands on Provisioning Computer to Comply with Company Standards, Provision Computer to Comply with Company Standards.

Supporting Windows 10
Delivered in Internationally or OnlineFlexible Dates
£3,697

Java Bootcamp | 8 weeks | 8 lessons

4.6(12)

By PCWorkshops

Full stack, in-depth, comprehensive in classroom 2 month training on Java programming. 1 lesson a week; the other days you work on your own on structured homework and are supported with a 1-1 mentor.

Java Bootcamp | 8 weeks | 8 lessons
Delivered In-Person in London
£880

Principles and Practices of Cyber Security

5.0(10)

By GBA Corporate

Overview Cyber Security plays an important role in every business as it encompasses everything that relates to protecting sensitive data, personal information, intellectual property, data, and governmental and industry information systems from theft and damage attempted by criminals and adversaries. This course is designed to understand and gain practical skills to plan, deliver and monitor IT/cyber security to internal and external clients understanding a complete, knowledge in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking including understanding the basics of Kali Operating System and its tools and techniques. It will also cover WiFi security, Website security, human factors, cyber forensics, and cyber security team management, including all other areas in relation to Cyber Security.

Principles and Practices of Cyber Security
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

HTML5 development fundamentals

5.0(3)

By Systems & Network Training

HTML5 development training course description This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-375, and build an understanding of these topics: Manage the Application Life Cycle, Build the User Interface by Using HTML5, Format the User Interface by Using CSS, Code by Using JavaScript. This course leverages the same content as found in the Microsoft Official Academic Course (MOAC) for this exam. What will you learn Manage the Application Life Cycle. Build the User Interface by Using HTML5. Format the User Interface by Using CSS. Code by Using JavaScript. HTML5 development training course details Who will benefit: Anyone working with HTML5. Prerequisites: None. Duration 3 days HTML5 development training course contents Managing the Application Life Cycle Platform fundamentals Packaging and the runtime environment: app package, app container, credentials/permission sets, host process, leverage existing HTML5 skills and content for slate/tablet applications. Manage the state of an application Manage session state, app state and persist state information; understand states of an application; understand the differences between local and session storage. Debug and test a HTML5 touch-enabled application Touch gestures; gestures you test on a device. HTML5 UI: Text, Graphics, and Media HTML5 tags for text content and graphics. When, why and how to use Canvas; when, why and how to use scalable vector graphics (SVG). HTML5 tags to play media. Video and audio tags. HTML5 UI: Organization, Input, and Validation HTML5 tags to organise content and forms Tables, lists, sections; semantic HTML. HTML5 tags for input and validation CSS Essentials: Content Flow, Positioning, styling Core CSS concepts Separate presentation from content (create content with HTML and style content with CSS); manage content flow (inline versus block flow); manage positioning of individual elements( float versus absolute positioning); manage content overflow (scrolling, visible and hidden); basic CSS styling. CSS Essentials: Layouts Arrange UI content by using CSS Use flexible box and grid layouts to establish content alignment, direction and orientation; proportional scaling and use of "free scale" for elements within a flexible box or grid; order and arrange content; concepts for using flex box for simple layouts and grid for complex layouts; grid content properties for rows and columns; use application templates. Managing Text Flow by Using CSS Regions and using regions to flow text content between multiple sections (content source, content container, dynamic flow, flow-into, flow-from, msRegionUpdate, msRegionOverflow, msGetRegionContent); columns and hyphenation and using these CSS settings to optimise the readability of text; use "positioned floats" to create text flow around a floating object Managing the Graphical Interface by Using CSS Graphics effects (rounded edges, shadows, transparency, background gradients, typography and Web Open Font Format); 2-D 3-D transformations (translate, scale, rotate, skew and 3-D perspective transitions and animations); SVG filter effects; Canvas. JavaScript and coding essentials Manage and maintain JavaScript, Create and use functions; jQuery and other third-party libraries. Update the UI by using JavaScript Locate/access elements; listen and respond to events; show and hide elements; update the content of elements. Animations, Graphics, and Accessing Data Code animations with JavaScript animation; manipulate the canvas; work with images, shapes and other graphics. Access data access by using JavaScript Send and receive data; transmit complex objects and parsing; load and save files; App Cache; datatypes; forms; cookies; localStorage JavaScript coding for Touch Interface, Device and Operating System Resources, and More Respond to the touch interface, Gestures, how to capture and respond to gestures, Code additional HTML5 APIs, GeoLocation, Web Workers, WebSocket; File API, Access device and operating system resources, In- memory resources, such as contact lists and calendar; hardware capabilities, such as GPS, accelerometer and camera.

HTML5 development fundamentals
Delivered in Internationally or OnlineFlexible Dates
£2,367

Essential SDN for engineers

5.0(3)

By Systems & Network Training

Essential SDN training course description Software Defined Networking (SDN) has become one of the industries most talked technologies. This training course cuts through the hype and looks at the technology, architecture and products available for SDN along with looking at the impact it may have on your network. What will you learn Explain how SDN works. Describe the architecture of SDN. Explain the relationship between SDN and OpenFlow. Recognise the impact SDN will have on existing networks. Essential SDN training course details Who will benefit: Anyone wishing to know more about SDN. Prerequisites: None. Duration 2 days Essential SDN training course contents Introduction What is SDN? What is OpenFlow? SDN benefits. The SDN stack and architecture. SDN architecture SDN applications, SDN switches, SDN controllers, Network Operating Systems. Control plane, data plane. Control to Data Plane Interface (CDPI), Northbound interfaces. SDN components, control and data plane abstractions. Network Operating Systems Finding the topology, Global view, control program, configuration based on views, graph algorithm. OpenFlow Just one part of SDN. Open Networking Foundation, OpenFlow ports, Flow tables, OpenFlow Channels. The OpenFlow protocol, OpenFlow header, OpenFlow operations. OpenFlow versus OpFlex. SDN and open source OpenDaylight, OpenVSwitch, Open Networking Forum, Open Network Operating System. OpenStack Neutron. SDN implications Separation of control and data plane, NOS running on servers, Emphasis on edge complexity, core simplicity, OpenvSwitch, Incremental migration, importance of software. SDN vs NVF.

Essential SDN for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Linux shell scripting

5.0(3)

By Systems & Network Training

Linux shell scripting training course description A practical introduction to writing scripts using the Bourne shell under any Linux operating system. Applicable for those using the Korn shell as well. What will you learn Read shell scripts. Write shell scripts. Use different types of quotes. Recognise the role of shell scripts within the Linux system. Linux shell scripting training course details Who will benefit: Programmers developing programs under UNIX. Administrators / support personnel who wish to find out more about the workings of Linux or write simple utility programs. Prerequisites: Linux Fundamentals Duration 2 days Linux shell scripting training course contents Review of Linux fundamentals Basic shell scripts What does the shell do? How are commands executed? Different shells. what is a shell script? Comments, creating shell scripts. Variables Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. Positional parameters $0 to $9, $#, $* and others. shift parameter substitution. Control statements The test command The if statement while loops for loops The case statement. Special characters Redirection of errors, here documents, quoting. Arithmetic in shell scripts The expr command. System shell scripts Screen handling The terminfo database, The tput command. Advanced issues (optional session) Shell functions, getopts, xargs, debugging shell scripts, portability issues. Extras in the Korn shell. Optimising shell scripts The time command, performance tips.

Linux shell scripting
Delivered in Internationally or OnlineFlexible Dates
£1,497

Securing Kubernetes and Containers

5.0(3)

By Systems & Network Training

Securing Kubernetes training course description This course introduces concepts, procedures, and best practices to harden Kubernetes based systems and container-based applications against security threats. It deals with the main areas of cloud-native security: Kubernetes cluster setup, Kubernetes cluster hardening, hardening the underlying operating system and networks, minimizing microservices vulnerabilities, obtaining supply chain security as well as monitoring, logging, and runtime security. What will you learn Harden Kubernetes systems and clusters. Harden containers. Configure and use Kubernetes audit logs. Securing Kubernetes training course details Who will benefit: Technical staff working with Kubernetes Prerequisites: Kubernetes_for_engineers_course.htm Definitive Docker for engineers Duration 2 days Securing Kubernetes training course contents This course does not only deal with the daily security administration of Kubernetes-based systems but also prepares delegates for the official Certified Kubernetes Security Specialist (CKS) exams of the Cloud Native Computing Foundation (CNCF). Structure: 50% theory 50% hands on lab exercise Module 1: User and authorization management Users and service accounts in Kubernetes Authenticating users Managing authorizations with RBAC Module 2: Supply chain security Vulnerabilit checking for images Image validation in Kubernetes Reducing image footprint Secure image registries Module 3: Validating cluster setup and penetration testing Use CIS benchmark to review the security configuration of Kubernetes components. Modify the cluster components' configuration to match the CIS Benchmark. Penetration testing Kubernetes for known vulnerabilities. Module 4: System hardening Use kernel hardening tools Setup appropriate OS level security domains Container runtime sandboxes Limit network access Module 5: Monitoring and logging Configure Kubernetes audit logs Configure Audit Policies Monitor applications behaviour with Falco

Securing Kubernetes and Containers
Delivered in Internationally or OnlineFlexible Dates
£1,727

UNIX fundamentals

5.0(3)

By Systems & Network Training

UNIX fundamentals training course description An introduction to using the UNIX operating system focussing on the command line. Appropriate for all versions of UNIX. The starting point for all UNIX work, we concentrate on the technical aspects rather than issues such as using browsers. The course is heavily practical in nature. What will you learn Describe UNIX. Log in and use UNIX commands to perform a variety of tasks from manipulating and printing files to looking at and killing processes. Create and edit files with vi. Recognise the role of the administrator. Write simple shell scripts. Customise the user environment. UNIX fundamentals training course details Who will benefit: Anybody who needs to use a UNIX system. Prerequisites: None. Duration 3 days UNIX fundamentals training course contents What is UNIX? Operating systems, UNIX flavours, UNIX features. Getting started Logging in, changing passwords, logging out. UNIX basics Command structure. The UNIX manuals, basic commands (who, date, tty, uname, echo, banner...) Filesystem commands Home directories, manipulating files and directories, Filesystem layout, Pathnames, hard and symbolic links. The UNIX Editors ed, vi, shell escapes, .exrc Extracting data from files grep, find, cut, sort and paste Permissions Theory, chmod, chown, newgrp.. Processes ps, kill, background processes, at, exec, priorities. The Shell Metacharacters, piping and redirection. Basic shell scripting What are shell scripts? Simple scripts, control structures. Variables. Arguments. Customising your environment Environmental variables, stty, .profile and other startup files More shell features Bash and other shells, the history facility, command line editing, aliases, job control, miscellaneous features. Introduction to administration The root user, su and tar Archiving files Backups, tar, cpio, dd, gzip. Unix and hardware Main hardware components, Unix device drivers. Connecting to a network IP configuration, ifconfig, ping, netstat, traceroute, dig.

UNIX fundamentals
Delivered in Internationally or OnlineFlexible Dates
£1,697