• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

35 Police courses in Wombwell delivered Live Online

CCSA Check Point Certified Security Administrator

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is recommended for technical professionals who support, install, deploy or administer Check Point products. Overview Know how to perform periodic administrator tasks. Describe the basic functions of the Gaia operating system. Recognize SmartConsole features, functions, and tools. Understand how SmartConsole is used by administrators to give user access. Learn how Check Point security solutions and products work and how they protect networks. Understand licensing and contract requirements for Check Point security products. Describe the essential elements of a Security Policy. Understand the Check Point policy layer concept. Understand how to enable the Application Control and URL Filtering software. Blades to block access to various applications. Describe how to configure manual and automatic NAT. Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements. Describe different Check Point Threat Prevention solutions for network attacks. Articulate how the Intrusion Prevention System is configured, maintained and tuned. Understand the Infinity Threat Prevention system. Knowledge about Check Point's IoT Protect. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. Course Outline Configure the Security Management Server. Use the WebUI to run the First Time Wizard. Install the Smart Console. Install the Alpha Gateway using the network detailed in the course topology. Demonstrate how the Security Management Server and Gateway communicate. Test SIC Status. Create multiple administrators and apply different roles and permissions for simultaneous administration. Validate existing licenses for products installed on the network. Create and configure host, network and group objects. Create a simplified Security Policy. Demonstrate how to use Security Zones in policy. Demonstrate how to share a layer between Security Polices. Configure Network Address Translation for server and network objects. Enable Identity Awareness. Deploy user access roles for more granular control of the security Policy. Generate network Traffic and use traffic visibility tools to monitor the data. Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic.

CCSA Check Point Certified Security Administrator
Delivered OnlineFlexible Dates
Price on Enquiry

AJEX - Advanced Junos Enterprise Switching Using Enhanced Layer 2 Software

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring EX Series switches using Junos ELS. Overview After successfully completing this course, you should be able to: Restrict traffic flow within a VLAN. Manage dynamic VLAN registration. Tunnel Layer 2 traffic through Ethernet networks. Review the purpose and operations of a spanning tree. Implement multiple spanning-tree instances in a network. Implement one or more spanning-tree instances for a VLAN. List the benefits of implementing end-user authentication. Explain the operations of various access control features. Configure and monitor various access control features. Describe processing considerations when multiple authentication and access control features are enabled. Describe some common IP telephony deployment scenarios. Describe features that facilitate IP telephony deployments. Configure and monitor features used in IP telephony deployments. Explain the purpose and basic operations of CoS. Describe CoS features used in Layer 2 networks. Configure and monitor CoS in a Layer 2 network. Describe a basic troubleshooting method. List common issues that disrupt network operations. Identify tools used in network troubleshooting. Use available tools to resolve network issues. This two-day course provides detailed coverage of virtual LAN (VLAN) operations. Chapter 1: Course Introduction Course Introduction Chapter 2: Troubleshooting as a Process Before You Begin The Troubleshooting Process Challenging Network Issues The Troubleshooting Process Lab Chapter 3: Junos Product Families The Junos OS Control Plane and Data Plane Field-Replaceable Units Junos Product Families Lab: Identifying Hardware Components Chapter 4: Troubleshooting Toolkit Troubleshooting Tools Best Practices Lab: Using Monitoring Tools and Establishing a Baseline Chapter 5: Hardware and Environmental Conditions Hardware Troubleshooting Overview Memory and Storage Boot Monitoring Hardware-Related System Logs Chassis and Environmental Monitoring Lab: Monitoring Hardware and Environmental Conditions Chapter 6: Control Plane Control Plane Review System and User Processes Monitoring Routing Tables and Protocols Monitoring Bridging Monitoring the Address Resolution Protocol Lab: Control Plane Monitoring and Troubleshooting Chapter 7: Control Plane Protection Protection Overview DDOS Protection Loopback Filter Lab: Control Plane Monitoring and Troubleshooting Chapter 8: Data Plane ? Interfaces Interface Properties General Interface Troubleshooting Ethernet Interface Troubleshooting Lab: Monitoring and Troubleshooting Ethernet Interfaces Chapter 9: Data Plane ? Other Components Definition of a Data Plane Problem Data Plane Components Data Plane Forwarding Load-Balancing Behavior Firewall Filters and Policers Data Plane Troubleshooting Case Study Lab: Isolate and Troubleshoot PFE Issues Chapter 10: Staging and Acceptance Testing Initial Inspection and Power-on General System Checks Interface Testing Chapter 11: Troubleshooting Routing Protocols Troubleshooting OSPF Troubleshooting BGP Troubleshooting Routing Loops and Route Oscillation Lab: Troubleshooting Routing Protocols Chapter 12: High Availability High Availability Overview Graceful Routing Engine Switchover Graceful Restart Nonstop Active Routing and Bridging Unified In-Service Software Upgrade Chapter 13: Network Monitoring SNMP RMON Telemetry Flow Monitoring Lab: Monitoring the Network Chapter 14: vMX Troubleshooting vMX Overview Troubleshooting Lab: Monitoring vMX Chapter 15: JTAC Procedures Opening a Support Case Customer Support Tools The Content of a PR Transferring Files to JTAC Chapter 16: Automated Support and Prevention Overview Service Now Service Insight Lab: Automated Support and Prevention

AJEX - Advanced Junos Enterprise Switching Using Enhanced Layer 2 Software
Delivered OnlineFlexible Dates
Price on Enquiry

CCSA PlusCCSE Check Point Certified Security Administrator and Expert Bundle

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for technical professionals who support, install, deploy or administer Check Point products. This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview CCSA Know how to perform periodic administrator tasks. Describe the basic functions of the Gaia operating system. Recognize SmartConsole features, functions, and tools. Understand how SmartConsole is used by administrators to give user access. Learn how Check Point security solutions and products work and how they protect networks. Understand licensing and contract requirements for Check Point security products. Describe the essential elements of a Security Policy. Understand the Check Point policy layer concept. Understand how to enable the Application Control and URL Filtering software. Blades to block access to various applications. Describe how to configure manual and automatic NAT. Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements. Describe different Check Point Threat Prevention solutions for network attacks. Articulate how the Intrusion Prevention System is configured, maintained and tuned. Understand the Infinity Threat Prevention system. Knowledge about Check Point's IoT Protect. CCSE Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. CCSA Outline Configure the Security Management Server. Use the WebUI to run the First Time Wizard. Install the Smart Console. Install the Alpha Gateway using the network detailed in the course topology. Demonstrate how the Security Management Server and Gateway communicate. Test SIC Status. Create multiple administrators and apply different roles and permissions for simultaneous administration. Validate existing licenses for products installed on the network. Create and configure host, network and group objects. Create a simplified Security Policy. Demonstrate how to use Security Zones in policy. Demonstrate how to share a layer between Security Polices. Configure Network Address Translation for server and network objects. Enable Identity Awareness. Deploy user access roles for more granular control of the security Policy. Generate network Traffic and use traffic visibility tools to monitor the data. Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic. CCSE Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent

CCSA PlusCCSE Check Point Certified Security Administrator and Expert Bundle
Delivered OnlineFlexible Dates
Price on Enquiry

JTNOC - Junos Troubleshooting in the NOC

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The course content is aimed at operators of devices running the Junos OS in a NOC environment. These operators include network engineers, administrators, support personnel, and reseller support personnel. Overview After successfully completing this course, you should be able to: Reduce the time it takes to identify and isolate the root cause of an issue impacting your network. Gain familiarity with Junos products as they pertain to troubleshooting. Become familiar with online resources valuable to Junos troubleshooting. Gain familiarity with Junos tools used in troubleshooting. Identify and isolate hardware issues. Troubleshoot problems with the control plane. Troubleshoot problems with interfaces and other data plane components. Describe the staging and acceptance methodology. Troubleshoot routing protocols. Describe how to monitor your network with SNMP, RMON, Junos Traffic Vision (formerly known as JFlow), and port mirroring. Become familiar with JTAC procedures. This instructor-led four-day course is designed to provide introductory troubleshooting skills for engineers in a network operations center (NOC) environment. Chapter 1: Course Introduction Course Introduction Chapter 2: Troubleshooting as a Process Before You Begin The Troubleshooting Process Challenging Network Issues The Troubleshooting Process Lab Chapter 3: Junos Product Families The Junos OS Control Plane and Data Plane Field-Replaceable Units Junos Product Families Lab: Identifying Hardware Components Chapter 4: Troubleshooting Toolkit Troubleshooting Tools Best Practices Lab: Using Monitoring Tools and Establishing a Baseline Chapter 5: Hardware and Environmental Conditions Hardware Troubleshooting Overview Memory and Storage Boot Monitoring Hardware-Related System Logs Chassis and Environmental Monitoring Lab: Monitoring Hardware and Environmental Conditions Chapter 6: Control Plane Control Plane Review System and User Processes Monitoring Routing Tables and Protocols Monitoring Bridging Monitoring the Address Resolution Protocol Lab: Control Plane Monitoring and Troubleshooting Chapter 7: Control Plane Protection Protection Overview DDOS Protection Loopback Filter Lab: Control Plane Monitoring and Troubleshooting Chapter 8: Data Plane ? Interfaces Interface Properties General Interface Troubleshooting Ethernet Interface Troubleshooting Lab: Monitoring and Troubleshooting Ethernet Interfaces Chapter 9: Data Plane ? Other Components Definition of a Data Plane Problem Data Plane Components Data Plane Forwarding Load-Balancing Behavior Firewall Filters and Policers Data Plane Troubleshooting Case Study Lab: Isolate and Troubleshoot PFE Issues Chapter 10: Staging and Acceptance Testing Initial Inspection and Power-on General System Checks Interface Testing Chapter 11: Troubleshooting Routing Protocols Troubleshooting OSPF Troubleshooting BGP Troubleshooting Routing Loops and Route Oscillation Lab: Troubleshooting Routing Protocols Chapter 12: High Availability High Availability Overview Graceful Routing Engine Switchover Graceful Restart Nonstop Active Routing and Bridging Unified In-Service Software Upgrade Chapter 13: Network Monitoring SNMP RMON Telemetry Flow Monitoring Lab: Monitoring the Network Chapter 14: vMX Troubleshooting vMX Overview Troubleshooting Lab: Monitoring vMX Chapter 15: JTAC Procedures Opening a Support Case Customer Support Tools The Content of a PR Transferring Files to JTAC Chapter 16: Automated Support and Prevention Overview Service Now Service Insight Lab: Automated Support and Prevention Additional course details: Nexus Humans JTNOC - Junos Troubleshooting in the NOC training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JTNOC - Junos Troubleshooting in the NOC course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

JTNOC - Junos Troubleshooting in the NOC
Delivered OnlineFlexible Dates
Price on Enquiry

LEVEL 2: BUILDING BRIDGES OF EMPATHY: THE SIX STAGES FRAMEWORK BOOK CLUB

By Six Stages Diversity Framework

This seminar supports you to implement ideas from the Six Stages Framework. It is designed for those who are reading or have read my book Understanding and Dealing with Everyday Racism- The Six Stages Framework

LEVEL 2: BUILDING BRIDGES OF EMPATHY: THE SIX STAGES FRAMEWORK BOOK CLUB
Delivered OnlineFlexible Dates
FREE

Educators matching "Police"

Show all 12
Academy of K9 Detection

academy of k9 detection

Huddersfield

In a world where terrorism and criminality are daily news it is crucial that our emergency services are trained to meet the ever changing threat. AKD specialise in security and K9 training to assist all front line personnel in their mission. Mission: To provide 1st responder security services and training to the highest recognised global industry standards. Provide enhancement and efficiency of capability in the fight against terrorism and criminality in order to protect life, property, liberty and the public interest. Goal AKD will provide products and services that aim to improve the operational standards, quality assurance, profitability and end user capability for all our clients. Our Story AKD and a collective of organisations have come together to provide a ‘one stop shop’ solution for your 1st responder security needs. AKD formed this year as a shop window to the world for delivery of Police, Military and security training, supply of K9 assets and handlers, and establishing a paradigm of operational capability to the very highest of standards. Our highly experienced staff are all specialists in their given fields. Their aim to bring about change in the security and K9 industry to ensure client reputation, exacting standards and safety of the public. AKD look to form strategic partnerships, alliances and in time a collective of security and K9 organisation who work together to provide the best this industry has to offer. Training Quality Assurance AKD are ratified by OCNcredit4learning an internationally recognised accrediting body. Going forward into 2021 OCN will accredit training deliverables assuring quality and competency. Our training material is mapped against the European and UK National Occupational Standards (NOS), British Standards Institute (BSI), Homeland Security Qualification (HSQ), National Occupational Standards, Security Industry Authority (SIA), Skills for Security (SfS), Skills for Justice (SfJ) to ensure sector compliance.

St Wilfrid's Catholic Primary School

st wilfrid's catholic primary school

Sheffield

We process personal data to provide public services. Personal data is information about living identifiable individuals. It can be a name, address, contact details, photograph, sound recording; it can be details of someone’s behaviour, lifestyle, physical or mental health needs; it can be a unique number, such as a vehicle registration plate, National Insurance number, etc. We decide what personal data we need and how to use it, so we are a Data Controller and registered as such on the Information Commissioner’s Register of Data Controllers. When we collect personal data, we are required to make sure you are clear what data we need and why, what we intend to do with it, what your individual rights are, and who you can contact for enquiries or concerns about the use of your personal data. This is called a privacy notice and we can do this verbally or in writing. This page is our general privacy notice and we have included specific privacy notices below for the services that process large amounts of personal data, for example council tax, planning, parking, elections, licensing, housing, etc. Why we collect and use personal data We collect and use personal information to: provide, plan and manage our services carry out our regulatory, licensing and enforcement roles carry out any other tasks which we have to do by law make and take payments and grants and spot fraud listen to your ideas about our services tell you about our services evaluate and improve services We might collect your personal data directly from yourself, from someone acting on your behalf, or from another third party. We might collect this data in person, over the telephone, in writing, or captured as an image, audio or film recording. We can only use your personal data if we have a lawful basis for doing so. The lawful basis will be recorded on the Council’s Record of Processing Activity and, where appropriate, on relevant service area privacy notices. If we rely on consent to process your data, you have the right to withdraw that consent at any time. To withdraw consent, either contact the Service that you provided the consent to or contact the information management team. Sharing your information We share personal data internally within the council and also with external third parties so we can carry out our work. Internal sharing might include checking your eligibility for a service (eg free school meals) or keeping accurate records, whereas external sharing might be to ensure you receive the right service (eg social care support). Who we share information with depends on the service we are providing and your circumstances, but may include: healthcare, social and welfare organisations and professionals providers of goods and services financial organisations, including debt collection, tracing and credit referencing agencies elected members local and central government ombudsman and regulatory authorities professional advisors and consultants police forces, other law enforcement and prosecuting authorities voluntary and charitable organisations Disclosure and Barring Service Courts and Tribunals utilities providers When personal data is shared, only the minimum amount is shared and relevant contracts and / or agreements will be in place. Fraud prevention and detection We are required by law to protect the use of public funds and for this reason we share information with internal services and other bodies responsible for auditing or administering of public funds to detect and prevent fraud. This sharing includes, but is not exclusive to the Council’s external auditor, Department for Work and Pensions, other local authorities, HM Revenue and Customs, the Police, credit reference agencies. We also share personal data with the Cabinet Office for the National Fraud Initiative. This is a national data matching exercise, which takes electronic data from the private and public sectors to identify potential fraudulent claims and payments. The Cabinet Office stipulates the data that they need and subsequently provides us with details of the cases where the matching indicates an inconsistency or potential for fraud, so that we can investigate further. This data matching is carried out under the Local Audit and Accountability Act (part 6, Schedule 9) and does not rely on your consent. How long we keep information for This varies depending on the type of information, as well as the legal requirements and reason we are keeping the information. In some instances the law sets the length of time information has to be kept. We also have retention and disposal schedules which give details about how long we need to keep different types of information. Your data rights You have the following rights in regard to your personal information, to: access copies of any records we hold about you have any information we hold about you corrected have any information we hold about you deleted or destroyed restrict how information we hold about you can be used or shared object to information about you being held have any information we hold about you transferred to a third party challenge decisions relating to you made using automated decision making and profiling (currently we have no services that use automated decision making or profiling for decision making) Please note there may be times that we cannot fulfil these rights fully because of legal reasons, for example we cannot delete your data if we still need it. If you want to exercise any of the above rights, please make a subject access request. Make a subject access request Who to contact about the way your personal data is handled If you have any queries, concerns or complaints about the way we process your personal data, including the way we handle information requests, you can contact our Customer Services or the Data Protection Officer. If you are not satisfied with our response or believe we are not processing your personal data in accordance with the law you have the right to contact the Information Commissioner’s Office.