• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1156 OV courses in Glasgow

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Advanced Junos Service Provider Routing

5.0(3)

By Systems & Network Training

Advanced Junos SP Routing course description This is designed to provide students with detailed coverage of OSPF, IS-IS, BGP, and routing policy. Students will gain experience in configuring, monitoring, and troubleshooting the Junos operating system and in monitoring device and protocol operations. This course uses Juniper Networks vMX Series Routers for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. What will you learn Describe and configure OSPF area types and operations. Configure and monitor IS-IS. Describe basic BGP operation. Explain the causes for route instability. Describe how to troubleshoot routing policy. Explain the default behaviour of damping on links. Advanced Junos SP Routing course details Who will benefit: Network staff working with Junos at layer 3. Prerequisites: Junos Intermediate Routing Duration 5 days Advanced Junos SP Routing course contents OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication Lab: OSPF Multi-Area Networks Chapter 3: OSPF Areas Review of OSPF Areas Stub Area Operation and Configuration NSSA Operation and Configuration Route Summarization Lab: OSPF Route Summarization OSPF Case Studies and Solutions Virtual Links OSPF Multiarea Adjacencies External Reachability Lab: Advanced OSPF Options and Routing Policy Troubleshooting OSPF Troubleshooting OSPF Lab: OSPF Troubleshooting IS-IS Overview of IS-IS IS-IS PDUs Neighbors and Adjacencies Configuring and Monitoring IS-IS Lab: IS-IS Configuration and Monitoring Advanced IS-IS Operations and Configuration Options IS-IS Operations IS-IS Configuration Options IS-IS Routing Policy Lab: Advanced IS-IS Configuration Options and Routing Policy Multilevel IS-IS Networks Level 1 and Level 2 Operations Multilevel Configuration Lab: Configuring a Multilevel IS-IS Network Troubleshooting IS-IS Troubleshooting IS-IS Lab: IS-IS Troubleshooting BGP Review of BGP BGP Operations BGP Path Selection Options Configuration Options Lab: BGP and BGP Attributes BGP Attributes and Policy - Part1 BGP Policy Next Hop Origin and MED AS Path Lab: BGP Attributes - Next Hop, Origin, MED, and AS Path Attributes and Policy - Part2 Local Preference Communities Lab: BGP Attributes - Local Preference and Communities Route Reflection and Confederations Route Reflection Operation Configuration and Routing Knowledge BGP Confederations Lab: Scaling BGP BGP Route Damping Route Flap and Damping Overview Route Damping Parameters Configuring and Monitoring Route Damping Lab: BGP Route Damping Troubleshooting BGP Troubleshooting BGP Lab: BGP Troubleshooting Troubleshooting Policy Troubleshooting Policy Lab: Policy Troubleshooting

Advanced Junos Service Provider Routing
Delivered in Internationally or OnlineFlexible Dates
£4,997

Advanced Satellite communications

5.0(3)

By Systems & Network Training

Satellite communications training course description This course starts by recaping some of the essential satellite knowledge required and proceeds to explore the deeper aspects of satellite communications, including hardware, communications and error control coding. What will you learn Explain how satellite communications work. Explain how RF works Explain the architecture of satellite systems. Use spectrum analysers. Satellite communications training course details Who will benefit: Anyone working with satellite systems. Prerequisites: None. Duration 3 days Satellite communications training course contents Basic Principles of Satellite Communications GEO, MEO and LEO satellites. Launching and orbits. Frequency bands and polarisation. Satellite footprints. Multibeam coverage. Power spectra. Link budgets. Modulation and coding. Access technologies. Earth station components. Space segment components. Satellite system services. Satellite operators. Radio frequency propagation Electromagnetic waves principles and generation. Reception of the EM wave. Space wave, sky wave and surface wave theory. The isotropic radiator. Types of antennae and their basic properties. Polar diagrams. International frequency allocation. Spectrum management and utilisation. Radio wave propagation. Line of sight propagation. Propagation for satellite comms. Free space path loss. Path attenuation. Noise and Interference. Power and its measurement. Satellite antennae and other hardware Power flux density. Effective aperture. Horn antennae. Parabolic reflector. Offset feed. Cassegrain and Gregorian antennae. Antenna feed systems - Horn, TMC, OMJ and polarizer. Antenna steering and mount systems. Array antennae. LNA, LNB, LNC. Microwave tubes - TWT and Klystron. Polarizers. Earth and Space Segments and the link Earth station antennae. Transponders. Antennae sub systems. Power supplies. Link budgets. System noise. System losses. Interference. Satellite switching. Ground Communications Equipment Baseband signals. Analogue and Digital systems. Overview of modulation - AM, FM, PM. Digital Modulation. Frequency conversion -up and down conversion. Filters, mixers, local oscillators, IF amplifiers and group delay equalisers. Access methods - single and multiple access systems. Data networks. Television transmission - analogue and digital. Digital signal compression. MPEG processing. Satellite Navigation Longitude, latitude, altitude, GPS, How GPS works, timing, alternatives to GPS. Mobile satellite services Voice and Phones, BGAN, TV, GPS to program aerial, VSAT. Error Control Coding The need for coding. Linear block codes. Cyclic codes. Convolution codes. Interleaving and concatenated codes. Coding gain. Turbo codes. Test and measurement Theory and practice of Spectrum Analysers.

Advanced Satellite communications
Delivered in Internationally or OnlineFlexible Dates
£4,997

Definitive Microsoft Lync for engineers

5.0(3)

By Systems & Network Training

Microsoft Lync training course description This course teaches IT staff how to plan, design, deploy, configure, and administer a Microsoft Lync Server solution. The course emphasizes Lync Server Enterprise Unified Communications features focussing particularly on coexisting with and migrating from legacy communication services. The labs in this course create a solution that includes IM and Presence, Conferencing, and Persistent Chat. This course helps prepare for Exam 70-336. What will you learn Describe the Lync Server architecture. Install and deploy Lync Server. Use Lync Server management interfaces. Deploy and manage clients. Manage and administer dial-in conferencing. Design audio and video for web conferencing. Plan for instant message and presence Federation. Deploy and configure persistent chat in Lync. Configure archiving and monitoring services. Troubleshoot Lync Server. Describe the required daily, weekly, and monthly maintenance tasks. Use SIP commands and analyze SIP logs. Configure high availability features in Lync. Design load balancing in Lync Server. Backup and restore Lync Server data. Microsoft Lync training course details Who will benefit: Technical staff working with Microsoft Lync. Prerequisites: Supporting Windows 2008 or 2012. Duration 5 days Microsoft Lync training course contents Microsoft Lync Server architecture Lync Server architecture, Lync core capabilities, Lync design process, assessing infrastructure requirements and updating the design, planning for all Microsoft solutions framework phases. Designing a Lync Server topology Infrastructure requirements for Lync Server, using the planning tool, using topology builder, server infrastructure, documentation. Hands on Environment preparation and Lync Server pools. Users and rights in Microsoft Lync Server Managing Lync Server, role based access control. Hands on Using the management shell, configuring role-based access control. Client/device deployment and management Deploy and manage clients, prepare for device deployment, IP phones. Hands on Clients. Conferencing in Lync Server Introduction to conferencing in Lync Server, designing for audio\video and web conferencing, dial-in conferencing in Lync Server, managing and administering conferencing. Hands on Conferencing in Microsoft Lync. Designing and deploying external access Conferencing and external capabilities of Lync Server, planning for IM and presence federation, designing edge services. Hands on Deploying Edge Server and Configuring Remote Access, Validating the Edge Server. Deploying Lync Server persistent chat Overview of persistent chat architecture in Lync Server, designing persistent chat, deploying and persistent chat. Hands on persistent chat server. Monitoring and archiving The archiving service, the monitoring service, configuring archiving and monitoring. Hands on Archiving and monitoring in Lync Server. Administration and maintenance of Lync Lync Server troubleshooting tools, Lync Server operational tasks, Lync Server troubleshooting techniques. Hands on Lync administration tools, centralized logging service, analysing Lync Server logs and traces. High Availability in Lync Server High availability in Lync Server, configuring high availability in Lync Server, planning for load balancing, designing load balancing. Hands on Configuring database mirroring, experiencing a scheduled SQL Server outage, experiencing an unscheduled SQL Server outage. Disaster recovery in Lync Server Disaster recovery in Lync Server, tools for backing up and restoring Lync Server, critical Lync Server data to back up and restore, critical data to export and import, designing branch site resiliency. Hands on Configure pool pairing, experiencing a pool failure or outage. Planning a migration to Lync Server Coexistence and migration, migration steps, planning for clients and devices. Designing a client migration and device migration strategy. Hands on Creating a migration plan, documenting the migration phases.

Definitive Microsoft Lync for engineers
Delivered in Internationally or OnlineFlexible Dates
£4,997

Leadership Identity Through Self-Discovery

5.0(1)

By Puritas

This module focuses on developing leadership confidence through self-discovery, emphasising the importance of understanding one's unique leadership style and personal philosophy. Participants will explore their core identity as leaders and learn strategies to enhance their influence, credibility, and relationships within their organisation. Exploring the link between self-discovery and effective leadership, focusing on developing confidence to lead from within. Testimonial: “Without guidance, personal branding can quickly become an exercise in aspiration and competition; letting the carefully curated public personas of others dictate our own validity and definition of success. Clarity on who we truly are, what matters to us and therefore how we position ourselves in the world takes reflection and time. Rachael’s work in this area has inspired the nearly 100 delegates who have been part of our HR Leadership Academy over the past 8 years, and I have no doubt will continue to resonate with future cohorts.” MD, Nina Metson - Suffolk

Leadership Identity Through Self-Discovery
Delivered In-Person in Bishop Stortford + 9 more or UK WideFlexible Dates
£1,500 to £2,500

Trauma Risk Managment - TRiM Practitioner

5.0(1)

By Strongmind Resiliency Training Ltd

Trauma Risk Management is an evidence based, peer delivered risk assessment and ongoing support system, designed specifically to help in the management of traumatic events.

Trauma Risk Managment - TRiM Practitioner
Delivered In-Person in InternationallyFlexible Dates
£4,800

Lean Six Sigma Black Belt Certification Program: In-House Training

By IIL Europe Ltd

Lean Six Sigma Black Belt Certification Program: In-House Training This course is specifically for people wanting to become Lean Six Sigma Black Belts, who are already Lean Six Sigma practitioners. If advanced statistical analysis is needed to identify root causes and optimal process improvements, (Lean) Six Sigma Green Belts typically ask Black Belts or Master Black Belts to conduct these analyses. This course will change that. Green Belts wanting to advance their statistical abilities will have a considerable amount of hands-on practice in techniques such as Statistical Process Control, MSA, Hypothesis Testing, Correlation and Regression, Design of Experiments, and many others. Participants will also work throughout the course on a real-world improvement project from their own business environment. This provides participants with hands-on learning and provides the organization with an immediate ROI once the project is completed. IIL instructors will provide free project coaching throughout the course. What you Will Learn At the end of this program, you will be able to: Use Minitab for advanced data analysis Develop appropriate sampling strategies Analyze differences between samples using Hypothesis Tests Apply Statistical Process Control to differentiate common cause and special cause variation Explain and apply various process capability metrics Conduct Measurement System Analysis and Gage R&R studies for both discrete and continuous data Conduct and analyze simple and multiple regression analysis Plan, execute, and analyze designed experiments Drive sustainable change efforts through leadership, change management, and stakeholder management Successfully incorporate advanced analysis techniques while moving projects through the DMAIC steps Explain the main concepts of Design for Six Sigma including QFD Introduction: DMAIC Review IIL Black Belt Certification Requirements Review Project Selection Review Define Review Measure Review Analyze Review Improve Review Control Introduction: Minitab Tool Introduction to Minitab Minitab basic statistics and graphs Special features Overview of Minitab menus Introduction: Sampling The Central Limit Theorem Confidence Interval of the mean Sample size for continuous data (mean) Confidence Interval for proportions Sample size for discrete data (proportions) Sampling strategies (review) Appendix: CI and sample size for confidence levels other than 95% Hypothesis Testing: Introduction Why use advanced stat tools? What are hypothesis tests? The seven steps of hypothesis tests P value errors and hypothesis tests Hypothesis Testing: Tests for Averages 1 factor ANOVA and ANOM Main Effect Plots, Interaction Plots, and Multi-Vari Charts 2 factor ANOVA and ANOM Hypothesis Testing: Tests for Standard Deviations Testing for equal variance Testing for normality Choosing the right hypothesis test Hypothesis Testing: Chi Square and Other Hypothesis Test Chi-square test for 1 factor ANOM test for 1 factor Chi-square test for 2 factors Exercise hypothesis tests - shipping Non-parametric tests Analysis: Advanced Control Charts Review of Common Cause and Special Cause Variation Review of the Individuals Control Charts How to calculate Control Limits Four additional tests for Special Causes Control Limits after Process Change Discrete Data Control Charts Control Charts for Discrete Proportion Data Control Charts for Discrete Count Data Control Charts for High Volume Processes with Continuous Data Analysis: Non-Normal Data Test for normal distribution Box-Cox Transformation Box-Cox Transformation for Individuals Control Charts Analysis: Time Series Analysis Introduction to Time Series Analysis Decomposition Smoothing: Moving Average Smoothing: EWMA Analysis: Process Capability Process capability Discrete Data: Defect metrics Discrete Data: Yield metrics Process Capability for Continuous Data: Sigma Value Short- and long-term capabilities Cp, Cpk, Pp, Ppk capability indices Analysis: Measurement System Analysis What is Measurement System Analysis? What defines a good measurement system? Gage R&R Studies Attribute / Discrete Gage R&R Continuous Gage R&R Regression Analysis: Simple Correlation Correlation Coefficient Simple linear regression Checking the fit of the Regression Model Leverage and influence analysis Correlation and regression pitfalls Regression Analysis: Multiple Regression Analysis Introduction to Multiple Regression Multicollinearity Multiple Regression vs. Simple Linear Regression Regression Analysis: Multiple Regression Analysis with Discrete Xs Introduction Creating indicator variables Method 1: Going straight to the intercepts Method 2: Testing for differences in intercepts Logistic Regression: Logistic Regression Introduction to Logistic Regression Logistic Regression - Adding a Discrete X Design of Experiments: Introduction Design of Experiment OFAT experimentation Full factorial design Fractional factorial design DOE road map, hints, and suggestions Design of Experiments: Full Factorial Designs Creating 2k Full Factorial designs in Minitab Randomization Replicates and repetitions Analysis of results: Factorial plots Analysis of results: Factorial design Analysis of results: Fits and Residuals Analysis of results: Response Optimizer Analysis of results: Review Design of Experiments: Pragmatic Approaches Designs with no replication Fractional factorial designs Screening Design of Experiment Case Study Repair Time Blocking Closing: Organizational Change Management Organizational change management Assuring project sponsorship Emphasizing shared need for change Mobilizing stakeholder commitment Closing: Project Management for Lean Six Sigma Introduction to project management Project management for Lean Six Sigma The project baseline plan Work Breakdown Structure (WBS) Resource planning Project budget Project risk Project schedule Project executing Project monitoring and controlling and Closing Closing: Design for Lean Six Sigma Introduction to Design for Lean Six Sigma (DMADV) Introduction to Quality Function Deployment (QFD) Summary and Next Steps IIL's Lean Six Sigma Black Belt Certification Program also prepares you to pass the IASSC Certified Black Belt Exam (optional)

Lean Six Sigma Black Belt Certification Program: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£6,295

Professional Management is crucial to your company's success. In fact, managers can have the single largest impact on your organisation's productivity and overall profitability, with more influence over employee morale and performance than anyone else.

Professional Management Programme
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£2,225

UPSTREAM OIL & GAS ASSET MANAGEMENT

5.0(10)

By GBA Corporate

Overview This course highlights Overview of upstream asset management HSE issues and energy project investment analysis Exploration and appraisal well decisions Field development decisions Asset optimization

UPSTREAM OIL & GAS ASSET MANAGEMENT
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779

Credit Risk in Bank

5.0(10)

By GBA Corporate

Overview Objectives Understand the fundamental concepts of credit risk Evaluate and understand internal and external credit ratings Understand value at risk (VaR) and its use in measuring credit risk Explain the counterparty risk for derivatives, particularly over-the-counter derivatives Describe different credit risk models according to the recommendations of the Basel Committee

Credit Risk in Bank
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779