• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4303 Pha courses

Khóa Học Full-Stack Cho Lập Trình Viên Quốc Tế Tại FPT Aptech

By Khoa Hoc Full Stack Cho Lap Trinh Vien Quoc Te Tai FPT Aptech

Trong kỷ nguyên số hiện nay, nhu cầu về lập trình viên full-stack với khả năng phát triển cả frontend lẫn backend ngày càng cao. FPT Aptech, một trong những trung tâm đào tạo lập trình viên quốc tế hàng đầu, mang đến khóa học full-stack được thiết kế chuyên biệt để đáp ứng yêu cầu này. Vậy khóa học full-stack tại FPT Aptech có gì đặc biệt và có thể giúp bạn trở thành lập trình viên quốc tế như thế nào? Hãy cùng khám phá trong bài viết dưới đây. 1. Tại sao nên chọn học tại FPT Aptech? Khóa học full-stack tại FPT Aptech cung cấp một chương trình đào tạo toàn diện, từ cơ bản đến nâng cao, giúp học viên trang bị đầy đủ các kỹ năng cần thiết để phát triển ứng dụng web hoàn chỉnh. Được thiết kế cho các lập trình viên quốc tế, khóa học không chỉ dạy các công nghệ phổ biến mà còn cập nhật các xu hướng mới nhất trong ngành. 2. Chương trình học toàn diện Khóa học full-stack tại FPT Aptech kéo dài trong 2 năm và được chia thành 4 học kỳ, bao gồm các môn học từ cơ bản đến nâng cao. Sinh viên sẽ được học các công nghệ frontend như HTML5, CSS3, và JavaScript, đồng thời làm quen với các framework như React và Angular. Về backend, chương trình đào tạo lập trình viên quốc tế Aptech bao gồm các ngôn ngữ và framework phổ biến như Node.js, PHP, và Django. Học kỳ 1: Thiết kế và phát triển website với HTML5, CSS3, JavaScript và các công cụ CMS. Học kỳ 2: Lập trình hướng đối tượng với Java SE và C#. Học kỳ 3: Công nghệ .NET, NodeJS và phân tích dữ liệu với Python. Học kỳ 4: Công nghệ Java EE và lập trình di động với Android và iOS. 70% thời lượng khóa học là thực hành, giúp học viên có cơ hội làm việc trên các dự án thực tế. Các eProject cuối mỗi học kỳ giúp sinh viên áp dụng kiến thức vào thực tiễn, xây dựng các ứng dụng web hoàn chỉnh và sẵn sàng cho công việc thực tế. Chương trình đào tạo lập trình viên full-stack tại FPT Aptech tuyển sinh các bạn trẻ đam mê công nghệ thông tin, Hệ thống đào tạo lập trình viên quốc tế Aptech từ học sinh trung học phổ thông đến sinh viên đại học và người đi làm muốn chuyển nghề. Chỉ cần bạn có đam mê với lập trình và mong muốn phát triển trong lĩnh vực này, Aptech sẽ là nơi giúp bạn hiện thực hóa ước mơ. 3. Đội ngũ giảng viên chất lượng cao FPT Aptech tự hào với đội ngũ giảng viên là các chuyên gia giàu kinh nghiệm trong ngành công nghệ thông tin. Họ không chỉ giảng dạy lý thuyết mà còn chia sẻ những kinh nghiệm thực tế quý báu. Với sự hướng dẫn của các giảng viên, sinh viên sẽ có cơ hội học hỏi từ những người đã thành công trong lĩnh vực lập trình và phát triển phần mềm. 4. Cơ hội nghề nghiệp quốc tế Sau khi hoàn thành khóa học, học viên sẽ nhận bằng Advanced Diploma in Full-Stack Development từ Tập đoàn Aptech, trường Aptech có giá trị toàn cầu. Điều này giúp mở rộng cơ hội việc làm không chỉ tại Việt Nam mà còn ở nhiều quốc gia khác. Ngoài ra, FPT Aptech cung cấp dịch vụ hỗ trợ việc làm, bao gồm ưu tiên thực tập và giới thiệu việc làm tại các công ty thuộc Tập đoàn FPT và các đối tác liên kết. Học viên có thể tiếp cận nhiều cơ hội việc làm và thực tập tại các công ty công nghệ hàng đầu. 5. Học bổng hỗ trợ FPT Aptech luôn chú trọng đến việc hỗ trợ học viên, đặc biệt là về tài chính. Một số chương trình tại đây bao gồm: Học bổng 12 năm đèn sách: Dành cho những bạn học sinh có thành tích tốt trong 12 năm học Học bổng tập làm Dev: Học bổng dành cho các bạn học sinh, sinh viên, người đi làm mong muốn chuyển ngành quan tâm đến ngành Công nghệ thông tin – Lập trình Ưu đãi học phí cho “Bộ đội xuất ngũ và Dân quân tự vệ”: Ưu đãi dành cho đối tượng bộ đội sau xuất ngũ hay dân quân tự vệ tìm kiếm tương lai mới với ngành lập trình Khóa học full-stack tại FPT Aptech không chỉ trang bị cho học viên những kiến thức và kỹ năng cần thiết để trở thành lập trình viên quốc tế mà còn mở ra cơ hội nghề nghiệp rộng lớn trên toàn cầu. Đừng quên để lại bình luận và theo dõi trang của chúng tôi để cập nhật những thông tin mới nhất từ FPT Aptech.

Khóa Học Full-Stack Cho Lập Trình Viên Quốc Tế Tại FPT Aptech
Delivered In-PersonFlexible Dates
FREE

💡XU HƯỚNG HỌC IELTS CỦA GIỚI TRẺ HIỆN NAY

By Quang Dũng

Trong những năm gần đây, xu hướng học IELTS đã ngày càng trở nên phổ biến trong giới trẻ Việt Nam. Điều này không chỉ phản ánh nhu cầu nâng cao khả năng ngoại ngữ, mà còn là một yêu cầu thiết yếu trong việc tìm kiếm cơ hội học tập và làm việc ở nước ngoài. Đặc biệt, nhiều bạn trẻ nhận thức rõ ràng rằng chứng chỉ IELTS không chỉ giúp họ mở rộng kiến thức mà còn tạo điều kiện thuận lợi cho việc xin học bổng, du học hoặc tìm kiếm việc làm tại các công ty quốc tế.  Nhiều bạn trẻ đã tận dụng các ứng dụng học tập và nền tảng trực tuyến để rèn luyện. Ngoài ra, Chương trình học IELTS hiện nay thường được thiết kế linh hoạt, giúp học viên dễ dàng tiếp cận và tiếp thu kiến thức. Các lớp học trực tuyến và offline đều có mặt, đáp ứng nhu cầu học tập đa dạng của sinh viên. Bên cạnh đó, các nguồn tài liệu phong phú từ sách vở đến video giúp học sinh tự ôn luyện hiệu quả hơn.

💡XU HƯỚNG HỌC IELTS CỦA GIỚI TRẺ HIỆN NAY
Delivered In-PersonFlexible Dates
FREE

qriscila

By qriscila

Học IT có khó không? Cơ hội và thách thức với ngành lập trình Ngành công nghệ thông tin (IT) luôn thu hút nhiều bạn trẻ bởi sự phát triển mạnh mẽ và tiềm năng vô tận. Tuy nhiên, câu hỏi mà nhiều người đặt ra là "Học IT có khó không?" và liệu ngành lập trình có thực sự là lựa chọn phù hợp? Bài viết này sẽ giúp bạn hiểu rõ hơn về những cơ hội và thách thức trong ngành lập trình. Học IT có khó không? Học IT đặc biệt là lập trình, không phải là điều dễ dàng, nhưng cũng không phải là điều quá khó nếu bạn có sự đam mê và kiên trì. Để trở thành một lập trình viên giỏi, bạn cần nắm vững các kiến thức về ngôn ngữ lập trình, thuật toán, cấu trúc dữ liệu, và cơ sở dữ liệu. Tuy nhiên, điều quan trọng nhất là khả năng tự học và giải quyết vấn đề. IT là lĩnh vực không ngừng phát triển, FPT Aptech - Hệ thống đào tạo lập trình viên quốc tế và việc cập nhật kiến thức là điều không thể thiếu. Học lập trình game trong 2 năm Cơ hội trong ngành lập trình Ngành lập trình mở ra nhiều cơ hội cho những ai có đam mê và quyết tâm. Nhu cầu nhân lực cao: Với sự bùng nổ của công nghệ, nhu cầu tuyển dụng lập trình viên ngày càng tăng. Các công ty luôn tìm kiếm những nhân tài có khả năng phát triển phần mềm, ứng dụng di động, và các hệ thống thông minh. Thu nhập hấp dẫn: Ngành lập trình được biết đến với mức thu nhập cao và chế độ đãi ngộ tốt. Đây là một trong những ngành nghề có mức lương khởi điểm cao nhất, và nếu bạn có kinh nghiệm và kỹ năng chuyên môn, cơ hội thăng tiến và tăng thu nhập là rất lớn. Khóa học lập trình game full-stack tại FPT Aptech mở rộng tuyển sinh Thách thức trong ngành lập trình Bên cạnh những cơ hội, ngành lập trình cũng có những thách thức mà bạn cần đối mặt. Áp lực công việc: Làm việc trong ngành lập trình đôi khi rất căng thẳng do yêu cầu cao về chất lượng và tiến độ. Bạn sẽ phải liên tục làm việc với các deadline, đồng thời phải đảm bảo sản phẩm của mình không có lỗi. Cạnh tranh gay gắt: Mặc dù nhu cầu nhân lực cao, nhưng sự cạnh tranh trong ngành lập trình cũng rất khốc liệt. Bạn cần không ngừng nâng cao kỹ năng và kiến thức để không bị tụt hậu so với đồng nghiệp. Học IT và trở thành lập trình viên không hề dễ dàng, nhưng nếu bạn có đam mê, kiên trì, và tinh thần cầu tiến, đây sẽ là một ngành nghề mang lại nhiều cơ hội phát triển. Với những chương trình đào tạo bài bản từ FPT Aptech, bạn sẽ được trang bị đầy đủ kiến thức và kỹ năng cần thiết để bước vào thế giới công nghệ đầy tiềm năng này. Đừng quên theo dõi để cập nhật những thông tin mới nhất về ngành IT và các khóa học tại FPT Aptech.

qriscila
Delivered In-PersonFlexible Dates
FREE

Online Options

Show all 4167

Real Estate Financial Modelling School

4.3(5)

By Bayfield Training

This week long CPD accredited training is ideal for those Real Estate professionals, who are looking to bolster the DCF modelling skills. This course covers Real Estate Investment, Development, Finance & Risk.

Real Estate Financial Modelling School
Delivered in person or Online + more
£4,600

CertNexus Certified Cyber Secure Coder (CSC-210)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for software developers, testers, and architects who design and develop software in various programming languages and platforms, including desktop, web, cloud, and mobile, and who want to improve their ability to deliver software that is of high quality, particularly regarding security and privacy. This course is also designed for students who are seeking the CertNexus Cyber Secure Coder (CSC) Exam CSC-210 certification Overview In this course, you will employ best practices in software development to develop secure software.You will: Identify the need for security in your software projects. Eliminate vulnerabilities within software. Use a Security by Design approach to design a secure architecture for your software. Implement common protections to protect users and data. Apply various testing methods to find and correct security defects in your software. Maintain deployed software to ensure ongoing security... The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle. This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development. Identifying the Need for Security in Your Software Projects Identify Security Requirements and Expectations Identify Factors That Undermine Software Security Find Vulnerabilities in Your Software Gather Intelligence on Vulnerabilities and Exploits Handling Vulnerabilities Handle Vulnerabilities Due to Software Defects and Misconfiguration Handle Vulnerabilities Due to Human Factors Handle Vulnerabilities Due to Process Shortcomings Designing for Security Apply General Principles for Secure Design Design Software to Counter Specific Threats Developing Secure Code Follow Best Practices for Secure Coding Prevent Platform Vulnerabilities Prevent Privacy Vulnerabilities Implementing Common Protections Limit Access Using Login and User Roles Protect Data in Transit and At Rest Implement Error Handling and Logging Protect Sensitive Data and Functions Protect Database Access Testing Software Security Perform Security Testing Analyze Code to find Security Problems Use Automated Testing Tools to Find Security Problems Maintaining Security in Deployed Software Monitor and Log Applications to Support Security Maintain Security after Deployment

CertNexus Certified Cyber Secure Coder (CSC-210)
Delivered Online
£2,085

Real Estate Investor (Advanced Development Cash Flow Modelling in Excel)

4.3(5)

By Bayfield Training

The Real Estate Investor course primarily focuses on financial modelling and commercial considerations in the real estate industry across various sectors, geographies, and project types.

Real Estate Investor (Advanced Development Cash Flow Modelling in Excel)
Delivered in person or Online + more
£2,000

Introduction to Good Manufacturing Practice

By Research Quality Association

Course Information This course offers foundational guidance and practical support tailored for individuals operating within Good Manufacturing Practice (GMP) frameworks. Explore the fundamental prerequisites of a pharmaceutical quality system (PQS) and delve into the application of quality risk management (QRM) principles, aligning with current regulations and guidance. Gain insights into pivotal aspects such as requirements, roles, and responsibilities, encompassing change control, document management, and key documentation essential for effective implementation of GMP with a focus on regulatory inspections and common findings. Is this course for you? Ideal for professionals engaged in GMP across various sectors, including: Research and Development (R&D) Contract Manufacturing Organisations Manufacturing Units Quality Control (QC) Laboratories Auditing Roles. What will you learn? Event objectives - by the end of the course, delegates shall: Have an awareness of the basic requirements of GMP Be aware of UK and EU GMP Rules and Guidance and relevant publications Understand the roles and responsibilities associated with GMP Be able to contribute to and maintain quality documentation Have a basic understanding of product lifecycle and manufacturing Understand the requirements of GMP in the QC laboratory context Have a basic understanding of risk management and mitigation principles Understand the need for quality systems and quality assurance activities Be aware of common regulatory findings. Learning outcomes: delegates will be able to: Implement their role within GMP with confidence and knowledge of the principle requirements Contribute effectively to the GMP quality system and their organisation’s compliance Comprehend where their organisation’s activities sit within the larger GMP arena Know where to seek further information within the published rules and guidance, UK Legislation, European Commission Directives, ICH Guidance and other relevant publications, as well as via the internet. Tutors Tutors will be comprised of (click the photos for biographies): Louise Handy Director, Handy Consulting Ltd Programme Please note timings may be subject to alteration. Day 1 09:30 Introductions and Scope of the Course Understand the group requirements and the tutor's background and experience. 09:45 Background and Regulatory Environment Setting the scene, understanding the context, key legislation. 10:30 Principles of GMP Key points and requirements. 11:15 Break 11:30 Personnel and Responsibilities Management and staff, duties and accountabilities. 12:00 Overview of GMP Manufacturing Basics of the product life cycle. 12:30 Lunch 13:15 Risk Management Workshop Practical exploration of risk and mitigation activities. 14:30 QC Laboratories Activities and practicalities. 15:15 Break 15:30 Compliance Quality Assurance and Self Inspection. 16:15 Question Time A chance for questions on the practicalities of GMP. 16:30 Close of Course Extra Information Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 7 Points   Development Level Learn

Introduction to Good Manufacturing Practice
Delivered Online
£382 to £512

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online
£3,495

Certified Data Centre Professional (CDCP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional who works in and around the data centre and who has the responsibility to achieve and improve the availability and manageability of the data centre. Overview After completion of the course the participant will be able to:? Choose an optimum site for mission-critical data centre based on current and future needs? Describe all components that are important for high availability in a data centre and how to effectively setup the data centre? Name and apply the various industry standards? Describe the various technologies for UPS, fire suppression, cooling, monitoring systems, cabling standards, etc, and to select and apply them effectively to cost-efficiently enhance the high-availability of the data centre.? Review the electrical distribution system to avoid costly downtime? Enhance cooling capabilities and efficiency in the data centre by using existing and new techniques and technologies for the increased cooling requirements of the future? Design a highly reliable and scalable network architecture and learn how to ensure installers apply proper testing techniques? Create effective maintenance contracts with equipment suppliers ensuring the best return on investment? Setup effective data centre monitoring ensuring the right people get the right message? Ensure proper security measures, both procedural and technical, are established to safeguard your company's valuable information in the data centre The course will address how to setup and improve key aspects such as power, cooling, security, cabling, safety, etc., to ensure a high available data centre. It will also address key operations and maintenance aspects. The Data Centre, it?s Importance and Causes for DowntimeData Centre Standards and Best PracticesData Centre Location, Building and Construction Selecting appropriate sites and buildings and how to avoid pitfalls Various components of an effective data centre and supporting facilities setup Raised Floor/Suspended Ceiling Uniform, concentrated and rolling load definitions Applicable standards Raised Floor guidelines Signal Reference Grid, grounding of racks Disability act and regulations Suspended ceiling usage and requirements Light Standards Light fixture types and placement Emergency lighting, Emergency Power Supply (EPS) Power Infrastructure Power infrastructure layout from generation to rack level ATS and STS systems Redundancy levels and techniques Three-phase and single-phase usage Power distribution options within the computer room Power cabling versus bus bar trunking Bonding versus grounding Common Mode Noise and isolation transformers Distribution boards, form factors and IP-protection grades Power quality guidelines Real power versus apparent power How to size and calculate load in the data centre Generators Static and dynamic UPS systems, selection criteria, how they operate and energy efficiency option Battery types, correct selection and testing Thermo-graphics Electro Magnetic Fields Electrical fields and magnetic fields definitions and units of measurements Sources of EMF Effects of EMF on human health and equipment (H)EMP Standards EMF shielding solutions Equipment Racks Rack standards, properties and selection criteria Security considerations Power rail/strip options Cooling Infrastructure Temperature and humidity recommendations Cooling measurement units and conversion rates Sensible and latent heat definitions Differences between comfort and precision cooling Overview of different air conditioner technologies Raised floor versus non-raised floor cooling Placement of air conditioner units and limitations to be observed Supplemental cooling options Cold aisle/hot aisle containment Water Supply Importance of water supply and application areas Backup water supply techniques Designing a Scalable Network Infrastructure The importance of a Structured Cabling System Planning considerations Copper and Fiber cable technology and standards ANSI/TIA-942 Cabling hierarchy and recommendations Testing and verification SAN storage cabling Network redundancy Building-to-building connectivity Network monitoring system requirements Fire Suppression Standards for fire suppression Detection systems Various total flooding fire suppression techniques and systems, their benefits and disadvantages Handheld extinguishers Signage and safety Regulatory requirements and best practices Data Centre Monitoring Data centre monitoring requirements EMS versus BMS Water leak detection systems Notification options and considerations Operational Security and Safety Practices Data centre security layers Physical, infrastructure and organisational security Safety measures and essential signage Labelling Choosing a labelling scheme Recommended labelling practices Network labelling Documentation How to setup proper documentation Document management policies and procedures Cleaning Cleaning practices for the data centre MTBF/MTTR Standards and definitions Calculation models The ?real? value Maintenance Contracts/SLA/OLAEXAM: Certified Data Centre Professional Additional course details: Nexus Humans Certified Data Centre Professional (CDCP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Centre Professional (CDCP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Data Centre Professional (CDCP)
Delivered Online
£1,500

Certified Data Centre Specialist (CDCS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is an IT, facilities or data centre operations professional working in and around the data centre and having the responsibility to achieve and improve high-availability and manageability of the data centre. Overview After completion of the course the participant will be able to:? Understand the design life cycle of data centres and the stages involved? Discuss the data centre requirements in great level of detail with vendors, suppliers and contractors to ensure that these requirements are met? Validate design plans, quotes and offers proposed by vendors/contractors? Understand redundancy levels for both the data centre design/setup and maintenance? Understand the various building considerations such as bullet proofing, mitigation of seismic activity, fire ratings and thermal stability? Understand how to install a raised floor that meets requirements, avoiding misalignment, level differences and leakage? Understand how to read a Single Line Electrical Diagram to identify and avoid the most common design issues? Choose the correct UPS and parallel configuration, learn and avoid classic parallel installation mistakes? Understand how to calculate battery banks, validate offered configurations to ensure they meet requirements? Understand what distance to keep to avoid EMF issues for human safety and equipment disturbances? Understand the fundamental cooling setup, CFM, Delta-T and other important factors? Understand contamination factors and limitations? Understand full details of fire suppression options, how to calculate gas content and verify installations? Understand how to measure data centre energy efficiency and how to improve it The course will bring participants to the level of a suitable sparring partner with suppliers. They will be able to verify offers provided by vendors for correctness, effectiveness and efficiency. Data Centre Design/Life Cycle Overview Overview of the phases of a data centre life cycle Planning, re-alignment and continuous improvement Standards and Rating Level Definitions Rating level history Difference between Uptime and TIA-942 Rating level definitions Redundancy options (N+1), 2N, 2(N+1) Concurrent Maintainability/Compartmentalisation Example configurations Substation and feed requirements Maintenance options Operational processes guidelines/standards Skill development Building Considerations Building location considerations Floor and hanging loads requirements Fire rating for walls and glass Blast protection Bullet proofing Forced entry protection Advanced Raised Floor & Suspended Ceiling Raised floor installation guidelines Techniques to install a proper and leveled raised access floor Common mistakes Choosing the right tiles and their locations Seismic-mitigating floor constructions Choosing the correct suspended ceiling Advanced Power Power infrastructure layout; Formulas which you should know for the data centre Single Line Electrical diagrams; how to read to ensure key components are present for protection Over current protection devices (MCB/MCCB/VCB/ACB/Fuses) definitions and what to use where Earth Leakage devices (RCB/RCD/ELCB/GFCI/ALCI/RCBO), definitions and what to use where Sizing of protective components Lightning strikes and surge protection devices (TVSS/SPD), how they operate, where to use and how to install Power cabling and cable run considerations PDU/DB setup and minimum requirements Generators; Generator types: Standy/Prime/Continuous Component make up and functions Fuel storage and calculation Paralleling of gen-sets Generator room/area requirements UPS Systems; Required specifications for UPS systems How to read data sheets and select the correct UPS Requirements for parallel configurations and avoid pitfalls such as single point of failures How parallel installation should be done, classic mistakes made by installers and how to avoid these Harmonic Filters; Active/Passive filters and their application Battery Banks; Battery bank terminology Designing battery banks, how to calculate, and double check the battery bank to be installed Battery charging pitfalls and ensuring the right charger is being installed and used Using parallel battery banks; how to properly install them, limitations and risks when using batteries in parallel How to test batteries correctly and make decisions on cell/block or string replacement Battery casing choices; ABS, V0, V1, V2 Alternative energy storage; flywheel, re-usable cell, compressed air UPS, etc. Advanced Electro Magnetic Fields Sources of EMF Difference between single, three phase and bus-bar EMF Options available to measure EMF and how to interpret the results from single-axes and composite measurements Guidance on safe distance for equipment and humans Calculation of EMF attenuation factor for shielding material permeability and saturation factors Advanced Cooling Important definitions; dry-bulb, wet-bulb, dew-point, RH, sensible and latent heat Psychometric chart and ASHRAE recommendations Environmental class definitions and thermal specifications Temperature/humidity measurements guideline Heat dissipation methods Altitude impact on temperature intake to ICT equipment Floor plan setup for effective cooling Differences in tile surface and supporting structure and the air-flow performance impact Rack door construction and the flow performance impact Equipment Delta-T and its impact Optimising air flow Thermal units conversions Calculations for air volume displacement (CFM/CMH) Cooling capacity calculations Air-conditioning selection De- / humidifying options Air conditioning efficiency SHR impact on cost saving Efficiency indicator New cooling principle and techniques (Submerged, VSD/VRF/ECF/water- and air side economisers) Redundancy guidelines for air-conditioners avoiding classic misconceptions and mistakes for meeting ANSI/TIA-942 compliant designs Installation requirements Connections to fire panel and EPO Commissioning of air conditioners Set points and calibration CFD (Computational Fluid Dynamics) Advanced Fire Protection The fire triangle and elements to stop a fire Detection systems in detail (VESDA, VIEW, smoke sensors) Considerations for installation of sensors Proper testing of smoke sensors Water based systems i.e. deluge, wet-pipe, dry-pipe, pre-action and why most of them don't work and how to detect this Details on Inert and Halocarbon systems and how to select the correct system for your data centre How to calculate the gas content ensuring the appropriate level is installed to suppress the fire including safety considerations Other requirements for gas systems such as release times, hold times, pipe install requirements and other important factors Requirements for the fire detection panel Installation verification, methods, what to check and how New advanced fire suppression technologies Design and Install Scalable Networking Cabling System ANSI/TIA942 cabling structure topology ToR, EoR Design Intelligent patching systems Installation best practice such as routing, bending radius, separation from power, containment fill ratio, fiber link loss calculator, bonding and grounding requirement Standard for telecommunications labeling and administration Environmental Specifications and Contamination Control Acoustic noise effects, regulations, specifications and limits Data centre contaminations and classifications Measurements, standards and limits Preventive measures and avoidance Data Centre Efficiency Business drivers to go Green High-availability or Green? Green guidelines and standards How to measure it and what are acceptable numbers compared to the general industry PUE classes defined by Green Grid and issues with PUE Techniques for saving energy in all parts of the data centre i.e. application/system level, cooling, power distribution Mock ExamEXAM: Certified Data Centre Specialist

Certified Data Centre Specialist (CDCS)
Delivered Online
£2,050

ISO 31000:2018 (RM) Auditor Training Course

By TUVSW Academy

ISO 31000:2018 is an international standard of Risk Management, the existence of it requires competent personnel to interpret its guidelines, address those to integrate Risk Management in an organization’s operations and audit organization to assess the implementation and effectiveness of overall implementation. This course is designed for professionals who are responsible of any aspect of Risk Management as well as for those, specifically, who are pursuing their career in the field of auditing Risk Management. This course enhances the knowledge and skills of delegates to understand the standard and audit it effectively. Course is consisting of study material in form of written details. Attendees of this course will be, on completion, competent to implement Risk Management, Plan, Conduct & Report 1st, 2nd & 3rd party audits. This course also discusses about different risk assessment techniques such as Brainstorming Structured or semi-structured interviews Delphi technique Check-lists Preliminary hazard analysis (PHA) HAZOP Hazard analysis and critical control points (HACCP) Toxicity assessment Structured “What-if” Technique (SWIFT) Scenario analysis Business impact analysis (BIA) Root cause analysis (RCA) Failure modes and effects analysis (FMEA) and failure modes and effects and criticality analysis (FMECA) Fault tree analysis (FTA) Event tree analysis (ETA) Cause-consequence analysis Cause-and-effect analysis Layers of protection analysis (LOPA) Decision tree analysis Human reliability assessment (HRA) Bow tie analysis Reliability centred maintenance Sneak analysis (SA)and sneak circuit analysis (SCI) Markov analysis Monte Carlo simulation Bayesian statistics and Bayes Nets FN curves Risk indices Consequence/ probability matrix Cost/benefit analysis (CBA) Multi-criteria decision analysis (MCDA)   Features of Couse ✔ 100% Online Self-paced: Considering the busy lives, we have designed this course to be attended online without bounding with the schedules. To make it interactive, we have created different communication groups where candidate can discuss the points with other fellows as well as the trainers of course. ✔ Testing the Learning: Each section of course is covered with exercise to check your knowledge in real-time, and overall result is affected by exercises you complete. ✔ Self-Scheduling: This 40 Hours full fledge course is designed to match you schedule. You will get a life time access to this course and complete it on your ease. ✔ Superlative Material: The training is designed, developed and reviewed by competent auditors having an extensive experience of auditing in different regions of world. ✔ Approved Course: The course is approved by one of the well-known personal certifying body “IRCP”.   Who should attend this? This course is recommended to be attended by those who are involved in implementation and/ or auditing of Risk Management System, specifically Risk Managers, Auditors and others willing to add credibility with a widely accepted qualification for auditing. Also, recommended to satisfy the applicable requirement of training and competence, if any. This course can add values to your profile if you are Intending to perform audits of RM. A Risk Management Executive/ Management Representative An Existing Internal Auditor A Ris Management Consultant Responsible for implementing the ISO 31000 standard. Responsibility to evaluate the outcome of internal RM audits and have responsibility/ authority to improve the effectiveness of the RM. Pursuing to make career in RM auditing.   Course Duration: 40 Learning Hours and extended time of exercise & Exam.   Certificate: Those who pass all exercises with 50% at least in each exercise and 70% overall marks will be awarded with successfully completion certificate with approval of Exemplar Global and a Lifetime validity.   Language of Course: English   Pre-Requisites: Knowledge of Risk Management

ISO 31000:2018 (RM) Auditor Training Course
Delivered Online On Demand
£198

Online Chemical Peels Course

By KBH Training Academy

Online Chemical Peel Course What are chemical peels? A chemical peel is a procedure in which a chemical solution is applied to the skin to remove the top layers. The skin that grows back is smoother. With a light or medium peel, you may need to undergo the procedure more than once to get the desired results. Course content * Health and safety * Code of practice for hygiene in beauty salons * Sterilisation and disinfection * Appearance of the therapist * Ergonomics * Handwashing * What are chemical peels * Skin ageing * Free radicals * Fitzpatrick skin types * Glycolic Acid * Lactic Acid * Tartaric Peel * Malic Acid * Phytic Peel * Mandelic Peel * Enzyme Peels * Salicylic Peel * PHA Peel * Alan Peel * TCA Peels * Jessner Peel * Contra-actions * Contra-indications * Treatment protocols Kbh Training kit *2x Aftercare cream *1x Facial jelly mask * Seanergy peel 2 treatments Certificate You will receive an end of course certificate which is accredited by the cpd group and allows you to work on public How do Online Courses work? http://www.kbhtrainingacademy.com/online-courses Duration of Course? You will have 3 months to complete the course before it expires Will I require a model? Yes, usually 1 model is required to complete all of the required case studies Are there video tutorials? Yes, you will have links to YouTube and training videos to watch the treatment being performed Do I Need Experience Before Booking a Course? We’re pleased to offer courses to people with lots of different experiences. However, previous experience nor qualifications are not necessary if you would like to enrol on our Course. Do you offer finance? http://www.kbhtrainingacademy.com/finance

Online Chemical Peels Course
Delivered Online On Demand12 weeks
£49 to £134

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online
£3,495

Educators matching "Pha"

Show all 432