• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1946 RES courses in London

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3697

CCNP core

5.0(3)

By Systems & Network Training

CCNP training course description The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.2 course provides the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You'll learn to implement security principles within an enterprise network and how to overlay network design using solutions such as SDAccess and SD-WAN. Course content includes 3 days of self-study material. This course helps you prepare for the 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) exam What will you learn Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Prepare you prepare to take the 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) exam CCNP training course details Who will benefit: Mid-level network engineers, Network administrators, Network support technicians, Help desk technicians. Prerequisites: Implementation of Enterprise LAN networks. Basic understanding of Enterprise routing and wireless connectivity, and Python scripting Duration 5 days CCNP training course content Cisco Enterprise Network Architecture: Access, distribution, core in the hierarchical network. Cisco Switching Paths: Switching mechanisms, TCAM, CAM, process switching, fast switching, and CEF. Implementing Campus LAN Connectivity: Troubleshoot L2 connectivity using VLANs and trunkingBuilding Redundant Switched Topology: STP Implementing Layer 2 Port Aggregation Troubleshoot link aggregation using Etherchannel EIGRP Implement and optimize OSPFv2/v3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4/v6 Implement EBGP interdomain routing, path selection, and single and dual-homed networkingImplementing Network Redundancy: HSRP and VRRP Implement static and dynamic NAT Virtualization Protocols and TechniquesVPNs and Interfaces: Overlay technologies such as VRF, GRE, VPN, and LISP Wireless Principles: RF, antenna characteristics, and wireless standards.Wireless Deployment: Models available, autonomous AP deployments and cloud-based designs within the centralized Cisco WLC architecture Wireless Roaming and Location ServicesWireless AP Operation: How APs communicate with WLCs to obtain software, configurations, and centralized managementWireless Client Authentication: EAP, WebAuth, and PSK wireless client authentication on a WLC. Troubleshoot wireless client connectivity issues using various available tools Troubleshoot networks using services such as NTP, SNMP, Cisco IP SLAs, NetFlow, and Cisco IOS EEM Explain network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshootingMulticast Protocols: IGMP v2/v3, PIM DM/SM and RPs Introducing QoS: Concepts and features. Implementing Network Services: Secure administrative access for Cisco IOS devices using CLI access, RBAC, ACL, and SSH, and device hardening concepts to secure devices from less secure applications Using Network Analysis ToolsInfrastructure Security: Scalable administration using AAA and the local database, features and benefits Enterprise Network Security Architecture: VPNs, content security, logging, endpoint security, personal firewalls, and other security features. Automation and Assurance with Cisco DNA Center: Purpose, function, features, and workflow. Intent-Based Networking, for network visibility, proactive monitoring, and application experienceCisco SD-Access Solution: Nodes, fabric control plane, and data plane, VXLAN gatewaysCisco SD-WAN Solution: Components and features of Cisco SD-WAN solutions, including the orchestration, management, control, and data planesBasics of Python Programming: Python components and conditionals with script writing and analysis Network Programmability: NETCONF and RESTCONF APIs in Cisco DNA Center and vManage Labs: Investigate the CAM. Analyze CEF. Troubleshoot VLAN and Trunk Issues. Tuning STP and Configuring RSTP. Configure MSTP. Troubleshoot EtherChannel. Implement Multi-area OSPF. Implement OSPF Tuning. Apply OSPF Optimization. Implement OSPFv3. Configure and Verify Single-Homed EBGP. Implementing HSRP. Configure VRRP. Implement NAT. Configure and Verify VRF. Configure and Verify a GRE Tunnel. Configure Static VTI Point-to-Point Tunnels. Configure Wireless Client Authentication in a Centralized Deployment. Troubleshoot Wireless Client Connectivity Issues. Configure Syslog. Configure and Verify Flexible NetFlow. Configuring Cisco IOS EEM. Troubleshoot Connectivity and Analyze Traffic with Ping, Traceroute, and Debug. Configure and Verify Cisco IP SLAs. Configure Standard and Extended ACLs. Configure Control Plane Policing. Implement Local and Server-Based AAA. Writing and Troubleshooting Python Scripts. Explore JSON Objects and Scripts in Python. Use NETCONF Via SSH. Use RESTCONF with Cisco IOS XE.

CCNP core
Delivered in Internationally or OnlineFlexible Dates
£3697

Development and Preparation of Training Specialist and HR

5.0(10)

By GBA Corporate

Overview Understanding the roles and responsibilities of HR and Training specialists is very important as they play a very important role in any business. It acts as a bridge between all the departments of the work and holds many responsibilities to manage issues, and problems, making sure work is progressing efficiently, resolving disputes and many more which becomes a core part of HR. Human Resources (HR) plays a crucial role in all sizes of businesses. It is an essential part of making success along with the development of the organization. The main focus of HR is to train employees, retail talent and implement employee motivation programs The development and preparation of training specialists and HR programs are designed for individuals who are seeking a future in this field. The topics are related to the working of training specialists and HR like teamwork, motivation, recruitment and performance appraisal.

Development and Preparation of Training Specialist and HR
Delivered in Internationally or OnlineFlexible Dates
£1718 to £3626

HR and Recruitment

5.0(10)

By GBA Corporate

Overview A specialised and effectual Human Resources function is an important part of an organisation, providing the resources for a productive workforce. In this competitive world to provide the right resources to the organisation, HR Professionals need to enhance their skills to understand the effective way of recruitment.

HR and Recruitment
Delivered in Internationally or OnlineFlexible Dates
£1718 to £3626

Industrial Cost Control

5.0(10)

By GBA Corporate

Overview With the major responsibility of managing finances, managers have also responsibilities to write and control budgets. They face a number of decisions that need planning and forecasting, especially preparing budgets. Using examples and exercises from the gas and oil industry, this course is designed to break down all sorts of financial restrictions in an informative yet engaging style. It will provide the necessary skills to develop efficient strategic planning, forecasting and budgeting processes. The main aim of the training is to enable the participants to understand the framework that builds strategies for annual budgets targeting efficient management and organisational performance. Our course will explain financial terms and budgeting tools in such a way that a financial professional or even a non-financial profession will be able to understand and relate to in their working environment. It will include a lot of examples, a budgeting format and case studies.

Industrial Cost Control
Delivered in Internationally or OnlineFlexible Dates
£1718 to £3626

STRATEGIC THINKING AND FEASIBILITY STUDIES FOR BUSINESS PLANNING

5.0(10)

By GBA Corporate

Overview A Strategic thinking and feasibility study is an effective way to safeguard against the wastage of investment or scarce resources. Organisations can reduce the risk of developing unpopular and impractical projects by conducting a feasibility study. A business plan can start only after a proposed business idea has been proven feasible. If feasible, we can proceed with a high level of confidence that the business plan will result in a profitable opportunity. It will provide a “roadmap” that shows how a business may be created and developed.

STRATEGIC THINKING AND FEASIBILITY STUDIES FOR BUSINESS PLANNING
Delivered in Internationally or OnlineFlexible Dates
£1718 to £3626

Contract Management - Principles and Practices

5.0(10)

By GBA Corporate

Overview Contract Management Principles and Practices provide an overview of all phases of contracting, from requirements development to closeout, and discuss how incentives can be used to improve contract results. Explore these vital issues from the manager's perspective, highlighting key roles and responsibilities to give participants greater influence over how work is performed. Finally, discover specific actions that can be taken to help ensure that contractors or subcontractors perform as required under the contract. This course guide you through all the principles and practices of contract management and preparation. 

Contract Management - Principles and Practices
Delivered in Internationally or OnlineFlexible Dates
£1718 to £3626

Enterprise Risk Management

5.0(10)

By GBA Corporate

Overview With the change in the density of enterprise risk, new risks have emerged, and managing it has become everyone's responsibility. The new Enterprise Risk Management course offers you the exclusive opportunity to learn the concepts and principles of the newly updated ERM framework and to integrate the framework into your organisation's strategy. The course is designed with all the modules to provide you with the knowledge necessary to understand and apply Enterprise Risk Management - Integrating with Strategy and Performance. The ERM framework assists management and boards of directors with their respective duties for managing risk.

Enterprise Risk Management
Delivered in Internationally or OnlineFlexible Dates
£1718 to £3626

Digital Transformation

5.0(10)

By GBA Corporate

Overview Digital technologies dramatically reshape your business. Almost all business, companies are trying to pursue significant changes to gain the beneficial effects of this new technological development and some are working hard to attain the benefit of this trend to survive. This has opened new economic opportunities which are progressively opening for organisations that need to reshape. The course will help to gain the knowledge to boost skills and to comprehend the procedures that are obligatory to communicate with clients in new ways and govern the rebellion of the media landscape. It will deliver the delegate's practises and procedures that will explain to them to cope with digital transformation, from organisational change to integrating new competencies. Participants will also learn the methods of developing a marketing strategy and managing a digital marketing Project.

Digital Transformation
Delivered in Internationally or OnlineFlexible Dates
£1718 to £3626

Forensic Accounting for Frauds

5.0(10)

By GBA Corporate

Overview Corporate frauds have the inherent power to bring large organizations to their knees, cause huge monetary loss, prompt lawsuits followed by significant legal expenses, lead to the imprisonment of employees and deteriorate confidence in the market, governments, and institutions. In response, corporations and governments across the globe have stepped up their effort to inspect, prevent and penalize fraudulent practices; resulting in a greater emphasis on the domains of forensic auditing and accounting in the current economy. This training course will empower you to recognize the root causes of fraud and white-collar crime in the current economy, understand the categories of fraud, equip you with methodologies of fraud detection and prevention, and heighten your ability to detect potential fraudulent situations. In addition to the fundamentals of fraud investigation and detection in a digital environment; profit-loss evaluation, analysis of accounting books, legal concepts, and quantification of financial damages are also examined in this course

Forensic Accounting for Frauds
Delivered in Internationally or OnlineFlexible Dates
£1718 to £3626