• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4517 Security courses in Rayleigh delivered Online

Cisco Securing Networks with Cisco Firepower Next Generation Firewall v1.0 (SSNGFW)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security administrators Security consultants Network administrators System engineers Technical support personnel Cisco integrators and partners Overview After taking this course, you should be able to: Describe key concepts of NGIPS and NGFW technology and the Cisco Firepower Threat Defense system, and identify deployment scenarios Perform initial Cisco Firepower Threat Defense device configuration and setup tasks Describe how to manage traffic and implement Quality of Service (QoS) using Cisco Firepower Threat Defense Describe how to implement NAT by using Cisco Firepower Threat Defense Perform an initial network discovery, using Cisco Firepower to identify hosts, applications, and services Describe the behavior, usage, and implementation procedure for access control policies Describe the concepts and procedures for implementing security intelligence features This course gives you knowledge and skills to use and configure Cisco© Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and Secure Sockets Layer (SSL) decryption before moving on to detailed analysis, system administration, and troubleshooting. Cisco Firepower Threat Defense Overview Examining Firewall and IPS Technology Firepower Threat Defense Features and Components Examining Firepower Platforms Examining Firepower Threat Defense Licensing Cisco Firepower Implementation Use Cases Cisco Firepower NGFW Device Configuration Firepower Threat Defense Device Registration FXOS and Firepower Device Manager Initial Device Setup Managing NGFW Devices Examining Firepower Management Center Policies Examining Objects Examining System Configuration and Health Monitoring Device Management Examining Firepower High Availability Configuring High Availability Cisco ASA to Firepower Migration Migrating from Cisco ASA to Firepower Threat Defense Cisco Firepower NGFW Traffic Control Firepower Threat Defense Packet Processing Implementing QoS Bypassing Traffic Cisco Firepower NGFW Address Translation NAT Basics Implementing NAT NAT Rule Examples Implementing NAT Cisco Firepower Discovery Examining Network Discovery Configuring Network Discovery Implementing Access Control Policies Examining Access Control Policies Examining Access Control Policy Rules and Default Action Implementing Further Inspection Examining Connection Events Access Control Policy Advanced Settings Access Control Policy Considerations Implementing an Access Control Policy Security Intelligence Examining Security Intelligence Examining Security Intelligence Objects Security Intelligence Deployment and Logging Implementing Security Intelligence File Control and Advanced Malware Protection Examining Malware and File Policy Examining Advanced Malware Protection Next-Generation Intrusion Prevention Systems Examining Intrusion Prevention and Snort Rules Examining Variables and Variable Sets Examining Intrusion Policies Site-to-Site VPN Examining IPsec Site-to-Site VPN Configuration Site-to-Site VPN Troubleshooting Implementing Site-to-Site VPN Remote-Access VPN Examining Remote-Access VPN Examining Public-Key Cryptography and Certificates Examining Certificate Enrollment Remote-Access VPN Configuration Implementing Remote-Access VPN SSL Decryption Examining SSL Decryption Configuring SSL Policies SSL Decryption Best Practices and Monitoring Detailed Analysis Techniques Examining Event Analysis Examining Event Types Examining Contextual Data Examining Analysis Tools Threat Analysis System Administration Managing Updates Examining User Account Management Features Configuring User Accounts System Administration Cisco Firepower Troubleshooting Examining Common Misconfigurations Examining Troubleshooting Commands Firepower Troubleshooting

Cisco Securing Networks with Cisco Firepower Next Generation Firewall v1.0 (SSNGFW)
Delivered OnlineFlexible Dates
Price on Enquiry

Web Application Penetration Testing - 30 Courses

By Compliance Central

Feeling Stuck in Your Career? TheWeb Application Penetration Testing - 30 CoursesBundle is Your Skill-Building Solution. This exceptional collection of 30 premium courses is designed to encourage growth and improve your career opportunities. Suited to meet different interests and goals, the Web Application Penetration Testing bundle provides an engaging learning experience, helping you learn skills across various disciplines. With the Web Application Penetration Testing - 30 CoursesBundle, you'll have a personalised journey that aligns with your career goals and interests. This comprehensive package helps you confidently tackle new challenges, whether entering a new field or enhancing your existing knowledge. The Web Application Penetration Testing bundle is your gateway to expanding your career options, increasing job demand, and enhancing your skill set. By enrolling in this bundle, you'll receive complimentary PDF certificates for all courses, adding value to your resume at no extra cost. Develop key skills and achieve important progress in your career and personal development. Start your journey today and experience the transformative impact of the Web Application Penetration Testing bundle on your job life and career growth! This Web Application Penetration Testing - 30 CoursesBundle Comprises the Following CPD Accredited Courses: Course 01: Web Application Penetration Testing Course Course 02: Penetration Testing with OWASP ZAP: Mastery course Course 03: CompTIA PenTest+ (Ethical Hacking) Course 04: Secure Programming of Web Applications - Developers and TPMs Course 05: IT Administration and Networking Course 06: CPTE - Certified Penetration Testing Engineer Course 07: Mile2 Certified Network Forensics Examiner (CNFE) Course 08: Computer Networks Security from Scratch to Advanced Course 09: CompTIA Security+ (SY0-601) Course 10: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 11: CompTIA Network+ Certification (N10-007) Course 12: Learn Ethical Hacking From A-Z: Beginner To Expert Course 13: The Complete Python 3 Course: Beginner to Advanced! Course 14: Deep Learning & Neural Networks Python - Keras Course 15: Machine Learning with Python Course Course 16: Azure Machine Learning Course 17: JavaScript Basics Course 18: Building Web Applications with Django and PostgreSQL Course 19: Cyber Security Awareness Training Course 20: Cyber Security Incident Handling and Incident Response Course 21: Career Development Plan Fundamentals Course 22: CV Writing and Job Searching Course 23: Learn to Level Up Your Leadership Course 24: Networking Skills for Personal Success Course 25: Ace Your Presentations: Public Speaking Masterclass Course 26: Learn to Make a Fresh Start in Your Life Course 27: Motivation - Motivating Yourself & Others Course 28: Excel: Top 50 Microsoft Excel Formulas in 50 Minutes! Course 29: Decision-Making and Critical Thinking Course 30: Time Management Training - Online Course What will make you stand out? Upon completion of this online Application Penetration Testing - 30 Courses Bundle, you will gain the following: CPD QS Accredited Proficiency with this web Application Penetration Testing Bundle After successfully completing the Web Application Penetration Testing bundle, you will receive a FREE PDF Certificate from REED as evidence of your newly acquired abilities. Lifetime access to the whole collection of learning materials of this Web Application Penetration Testing Bundle The online test with immediate results You can study and complete the Web Application Penetration Testing bundle at your own pace. Study for the Web Application Penetration Testing bundle using any internet-connected device, such as a computer, tablet, or mobile device. The Web Application Penetration Testing - 30 Coursesbundle is a premier learning resource, with each course module holding respected CPD accreditation, symbolising exceptional quality. The content is packed with knowledge and is regularly updated to ensure it remains relevant. This bundle offers not just education but a constantly improving learning experience designed to enrich both your personal and professional development. Advance the future of learning with the Web Application Penetration Testing bundle, a comprehensive, complete collection of 30 courses. Each course in the Web Application Penetration Testing bundle has been handpicked by our experts to provide a broad range of learning opportunities. Together, these modules form an important and well-rounded learning experience. Our mission is to deliver high-quality, accessible education for everyone. Whether you are starting your career, switching industries, or enhancing your professional skills, the Web Application Penetration Testing bundle offers the flexibility and convenience to learn at your own pace. Make the Counselling, Psychology & Art Therapy package your trusted partner in your lifelong learning journey. CPD 300 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Web Application Penetration Testing - 30 Courses bundle is perfect for: Expand your knowledge and skillset for a fulfilling career with the Web Application Penetration Testing bundle. Become a more valuable professional by earning CPD certification and mastering in-demand skills with the Web Application Penetration Testing bundle. Discover your passion or explore new career options with the diverse learning opportunities in the Web Application Penetration Testing bundle. Learn on your schedule, in the comfort of your home - the Web Application Penetration Testing bundle offers ultimate flexibility for busy individuals. Requirements You are warmly invited to register for this bundle. Please be aware that no formal entry requirements or qualifications are necessary. This curriculum has been crafted to be open to everyone, regardless of previous experience or educational attainment. Career path Gain a wide range of skills across various fields, improve your problem-solving capabilities, and keep current with industry trends. Perfect for those aiming for career advancement, exploring a new professional direction, or pursuing personal growth. Begin your journey with the Web Application Penetration Testing - 30 Courses bundle. Certificates CPD Certificates Digital certificate - Included

Web Application Penetration Testing - 30 Courses
Delivered Online On Demand5 days
£210

AZ-104T00 Microsoft Azure Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Administrators. The Azure Administrator implements, manages, and monitors identity, governance, storage, compute, and virtual networks in a cloud environment. The Azure Administrator will provision, size, monitor, and adjust resources as appropriate. This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution. Prerequisites Successful Azure Administrators start this role with experience in virtualization, networking, identity, and storage. Understanding of on-premises virtualization technologies, including: VMs, virtual networking, and virtual hard disks. Understanding of network configurations, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies. Understanding of Active Directory concepts, including users, groups, and role-based access control. Understanding of resilience and disaster recovery, including backup and restore operations. 1 - Configure Microsoft Entra ID Describe Microsoft Entra ID benefits and features Describe Microsoft Entra concepts Compare Active Directory Domain Services to Microsoft Entra ID Select Microsoft Entra editions Implement Microsoft Entra join Implement Microsoft Entra self-service password reset 2 - Configure user and group accounts Create user accounts Manage user accounts Create bulk user accounts Create group accounts Create administrative units 3 - Configure subscriptions Identify Azure regions Implement Azure subscriptions Obtain an Azure subscription Identify Azure subscription usage Implement Microsoft Cost Management Apply resource tagging Apply cost savings 4 - Configure Azure Policy Create management groups Implement Azure policies Create Azure policies Create policy definitions Create an initiative definition Scope the initiative definition Determine compliance 5 - Configure role-based access control Implement role-based access control Create a role definition Create a role assignment Compare Azure roles to Microsoft Entra roles Apply role-based access control Review fundamental Azure RBAC roles 6 - Configure Azure resources with tools Use the Azure portal Use Azure Cloud Shell Use Azure PowerShell Use Azure CLI 7 - Use Azure Resource Manager Review Azure Resource Manager benefits Review Azure resource terminology Create resource groups Create Azure Resource Manager locks Reorganize Azure resources Remove resources and resource groups Determine resource limits 8 - Configure resources with Azure Resource Manager templates Review Azure Resource Manager template advantages Explore the Azure Resource Manager template schema Explore the Azure Resource Manager template parameters Consider Bicep templates Review QuickStart templates 9 - Configure virtual networks Plan virtual networks Create subnets Create virtual networks Plan IP addressing Create public IP addressing Associate public IP addresses Allocate or assign private IP addresses 10 - Configure network security groups Implement network security groups Determine network security group rules Determine network security group effective rules Create network security group rules Implement application security groups 11 - Configure Azure DNS Identify domains and custom domains Verify custom domain names Create Azure DNS zones Delegate DNS domains Add DNS record sets Plan for Azure Private DNS zones Review Azure Private DNS zone scenarios 12 - Configure Azure Virtual Network peering Determine Azure Virtual Network peering uses Determine gateway transit and connectivity Create virtual network peering Extend peering with user-defined routes and service chaining 13 - Configure network routing and endpoints Review system routes Identify user-defined routes Determine service endpoint uses Determine service endpoint services Identify private link uses 14 - Configure Azure Load Balancer Determine Azure Load Balancer uses Implement a public load balancer Implement an internal load balancer Determine load balancer SKUs Create back-end pools Create health probes Create load balancer rules 15 - Configure Azure Application Gateway Implement Azure Application Gateway Determine Azure Application Gateway routing Configure Azure Application Gateway components 16 - Configure storage accounts Implement Azure Storage Explore Azure Storage services Determine storage account types Determine replication strategies Access storage Secure storage endpoints 17 - Configure Azure Blob Storage Implement Azure Blob Storage Create blob containers Assign blob access tiers Add blob lifecycle management rules Determine blob object replication Upload blobs Determine Blob Storage pricing 18 - Configure Azure Storage security Review Azure Storage security strategies Create shared access signatures Identify URI and SAS parameters Determine Azure Storage encryption Create customer-managed keys Apply Azure Storage security best practices 19 - Configure Azure Files and Azure File Sync Compare storage for file shares and blob data Manage Azure file shares Create file share snapshots Implement Azure File Sync Identify Azure File Sync components Deploy Azure File Sync 20 - Configure Azure Storage with tools Use Azure Storage Explorer Use the Azure Import/Export service Use the WAImportExport tool Use the AzCopy tool 21 - Configure virtual machines Review cloud services responsibilities Plan virtual machines Determine virtual machine sizing Determine virtual machine storage Create virtual machines in the Azure portal Connect to virtual machines 22 - Configure virtual machine availability Plan for maintenance and downtime Create availability sets Review update domains and fault domains Review availability zones Compare vertical and horizontal scaling Implement Azure Virtual Machine Scale Sets Create Virtual Machine Scale Sets Implement autoscale Configure autoscale 23 - Configure Azure App Service plans Implement Azure App Service plans Determine Azure App Service plan pricing Scale up and scale out Azure App Service Configure Azure App Service autoscale 24 - Configure Azure App Service Implement Azure App Service Create an app with App Service Explore continuous integration and deployment Create deployment slots Add deployment slots Secure your App Service app Create custom domain names Back up and restore your App Service app Use Azure Application Insights 25 - Configure Azure Container Instances Compare containers to virtual machines Review Azure Container Instances Implement container groups Review the Docker platform 26 - Configure file and folder backups Describe Azure Backup benefits Implement Backup Center for Azure Backup Configure Azure Recovery Services vault backup options Use the Microsoft Azure Recovery Services (MARS) agent Configure on-premises file and folder backups 27 - Configure virtual machine backups Explore options to protect virtual machine data Create virtual machine snapshots in Azure Backup Set up Azure Recovery Services vault backup options Back up your virtual machines Restore your virtual machines Implement System Center DPM and Azure Backup Server Compare the MARS agent and Azure Backup Server Implement soft delete for your virtual machines Implement Azure Site Recovery 28 - Configure Azure Monitor Describe Azure Monitor key capabilities Describe Azure Monitor components Define metrics and logs Identify monitoring data and tiers Describe activity log events Query the activity log 29 - Configure Azure alerts Describe Azure Monitor alerts Manage Azure Monitor alerts Create alert rules Create action groups 30 - Configure Log Analytics Determine Log Analytics uses Create a Log Analytics workspace Create Kusto (KQL) queries Structure Log Analytics queries 31 - Configure Network Watcher Describe Azure Network Watcher features Review IP flow verify diagnostics Review next hop diagnostics Visualize the network topology

AZ-104T00 Microsoft Azure Administrator
Delivered OnlineFlexible Dates
£2,380

How to make an impact in your first 90 days as a new CISO

4.4(5)

By The Security Company (International) Limited

Information on the risks and practical advice to address them TSC's eBooks, whitepapers, and reports cover some of the most important risks in information and cyber security — risks that constantly challenge information and cyber security professionals who work tirelessly to reduce them across their organisations and home users alike.

How to make an impact in your first 90 days as a new CISO
Delivered Online On Demand20 minutes
FREE

Certified Data Center Facilities Operations Manager (CDFOM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is someone who works, or has ambition to work, in a leadership role in data center operations such as a data center facilities manager, data center operations manager, who has the responsibility to achieve and improve the high-availability and manageability of the data center operations. Overview After completion of the course the participant will be able to: Perform the needs analysis translating business requirements to data center services Set-up and manage the data center operations team Implement and monitor safety- and security practices Identify a suitable maintenance program for the data center facility and its equipment Select the appropriate policies and procedures required for data center operations Monitor the data center availability, capacity and capability Manage and implement basic data center projects Set-up and implement an environmental sustainability program Select an appropriate back-up site to support organizational resilience Identify and respond to risk in the data center Manage and support the document life cycle Create a basic budget proposal Select and manage vendors and measure their performance Manage data center assets Managing the facilities of today?s high-end and high-availability data centers is an extremely demanding and complex task which is often underestimated. There is often very little appreciation and understanding of the complexities of managing today's mission-critical data centers where downtime is not an option, especially since many of the data centers are operating at, or near, their design limits. Operations management at the facilities layer makes all the difference. Even a data center designed to the highest redundancy level as per the ANSI/TIA-942 standard could still experience many unscheduled downtime events due to poor planning, operations, maintenance and management processes. Service Level Management Service Level Management Needs analysis Capability assessment Service portfolio Service catalogue Service Level Agreements (SLAs) Availability measurement Data points in SLA Service reporting Complaint procedure Customer satisfaction measurement Service Improvement Process (SIP) SLA content The Data Center Organization Operational issues Organization chart Roles and responsibilities Skills matrix Contingency / backup roles Shift management Performance management Career development Training and assessment Job rotation Succession planning Disciplinary program Managing Safety & Statutory Requirements Safety policies and regulations Occupational Health and Safety (OH&S) Safety awareness training Permit to Work (PTW) Lock-out / Tag-out Personal Protective Equipment (PPE) Testing and tagging of equipment Emergency preparedness and response Reporting of safety issues Reviews / internal audit / external audit Managing Physical Security Security policies and procedures Security standards and guidelines Security staff Security awareness Security incident management Disciplinary program Reviews, internal and external audits Facilities Management Maintenance policies and procedures Various maintenance programs Outsourcing of maintenance activities Maintenance contract options Warranty Maintenance schedule Service situations Spart part management Contamination control Data Center Operations Policies and procedures for data center operations Service operations and the daily data center operations Monitoring / Reporting / Control Monitoring requirements Escalation procedures Reporting Trend analysis Reviews Project Management Project management Project organization Project manager Project phases Environment Sustainability The importance of sustainability Sustainability policies Environmental management Power efficiency indicators - Waste management - Water management ICT utilisation management Environmental performance measurements Renewable energy factor (REF) Organizational Resilience Business continuity Data center facility options Business Impact Analysis Type of facility Human resources Facility, equipment and consumables Governance, Risk and Compliance Management commitment Coordination, collaboration and integration Compliance Risk management Document management Financial management Vendor management Asset management Additional course details: Nexus Humans Certified Data Center Facilities Operations Manager (CDFOM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Center Facilities Operations Manager (CDFOM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Data Center Facilities Operations Manager (CDFOM)
Delivered OnlineFlexible Dates
£2,050

Layer 3 switching for engineers

5.0(3)

By Systems & Network Training

Layer 3 switching training course description A hands on switching course for those already familiar with the basics of Ethernet switching. The course focuses on L3 switching along with the QoS and security features that layer 3 switches can add to the network. What will you learn Explain how layer 3 switches work. Troubleshoot layer 3 switching. Implement QoS on switches. Secure networks with L3 switches. Layer 3 switching training course details Who will benefit: Technical staff working with Ethernet switches. Prerequisites: Definitive Ethernet switching for engineers Duration 2 days Layer 3 switching training course contents Switches Switch review, VLANs, inter VLAN routing. Hands on VLANs and tagging, separating networks with routers. VLANs and IP addressing IP addresses, subnet masks, default gateways. Hands on L3 switches and VLANs What are layer 3 switches Routers in switches, configuring a switch to route, switch ports, router ports, when to switch, when to route. What is the difference between a router and a L3 switch? Hands on Analysing packet flows through a L3 switch. L3 switches and static routes Why use static routes? Default routes. Hands on Configuring static routes. L3 switches and routing protocols RIP, OSPF. Hands on RIP, OSPF. First hop redundancy Default gateways, VRRP/HSRP/GBLP. Load sharing, critical IP addresses. Interaction between STP and L3 redundancy Hands on VRRP. Multicasting and L3 switches IGMP, IGMP snooping, multicasts and routers, PIM. Hands on Multicasts between VLANs. IPv6 IPv6 and L2 switches, IPv6 and L3 switches. Hands on Adding IPv6 into the network. QoS DSCP, 802.1Q, 802.1p, mapping, classification, policy, Ingress queues, Egress queues. Dropping frames, limiting bandwidth. Hands on Voice through switches. Security Layer 2 security, filtering at layer 3. Hands on Controlling inter VLAN traffic.

Layer 3 switching for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

CCTV Operator Training Course

By IOMH - Institute of Mental Health

Overview The importance of CCTV operations cannot be overstated in today's security landscape. With millions of CCTV cameras actively monitoring public and private spaces across the UK, CCTV operators play a crucial role in maintaining public safety and protecting property. These systems are instrumental in deterring crime, providing valuable evidence for investigations, and ensuring swift responses to incidents. Our CPD Certified CCTV Operator Training course is designed to equip you with the essential skills and knowledge needed for this pivotal role. You will learn about the operational requirements and technical aspects of CCTV systems, mastering the art of monitoring live feeds and effectively managing surveillance equipment. Understanding and adhering to data protection regulations is also a key focus, ensuring all monitoring activities are conducted ethically and legally. Whether you are starting your career or aiming to advance in security, this course offers a comprehensive foundation. Gain the expertise to contribute confidently to safety and security initiatives, becoming an integral part of the surveillance workforce. Join us and make a difference in the field of CCTV operations today. Become proficient in CCTV Operator Training - CPD Certified by grasping all the essential knowledge from our top-quality course step by step. Enrol now to ensure that your CCTV Operator Training - CPD Certified mastery is not limited to only conceptual frameworks! This CCTV Operator Training - CPD Certified will assist you in standing out from the crowd and being more efficient in your chosen area of expertise. Furthermore, if you require assistance with the CCTV Operator Training - CPD Certified, we will provide experts who will support and guide you. So, add this CCTV Operator Training - CPD Certified to your cart and boost your personal and career development. In this CCTV Operator Training - CPD Certified, you will: Sharpen your skills to help you advance your career. Acquire a comprehensive understanding of various related topics and tips from industry experts. Learn in-demand knowledge and skills in high demand among UK employers, which will help to kickstart your CCTV Operator Training - CPD Certified career. Enrolling in the CCTV Operator Training - CPD Certified can assist you in getting into your desired career faster than you ever imagined. So, without further ado, start now! Details Perks of Learning with IOMH One-to-one support from a dedicated tutor throughout your course. Study online - whenever and wherever you want. Instant Digital/ PDF certificate 100% money back guarantee 12 months access Process of Evaluation After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement After completing the CCTV Operator course, you will receive your CPD-accredited Digital/PDF Certificate for £5.99. To get the hardcopy certificate for £12.99, you must also pay the shipping charge of just £3.99 (UK) and £10.99 (International). Who Is This Course for? Security specialists are looking to specialise in CCTV monitoring. Individuals interested in becoming CCTV operators. Existing CCTV operators seeking to expand their skills. Business owners and managers are overseeing CCTV systems. Anyone needing to comply with CCTV data protection laws. Requirements There is no prerequisite to enrol in this course. You don't need any educational qualification or experience to enrol in the CCTV Operator course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course. Career Path CCTV Operator - £18K to £22K per year Security Officer - £19K to £25K per year Surveillance Officer - £20K to £28K per year Security Manager - £35K to £55K per year Private Investigator - £20K to £50K per year Course Curriculum Module 01: Operational Requirement Operational Requirement 00:12:00 Module 02: CCTV Operator Skills And Ability CCTV Operator Skills And Ability 00:11:00 Module 03: Basics Of CCTV Basics Of CCTV 00:10:00 Module 04: Technical Guidance Technical Guidance 00:09:00 Module 05: Monitoring CCTV Cameras Monitoring CCTV Cameras 00:10:00 Module 06: Watch Surveillance Watch Surveillance 00:09:00 Module 07: Data Protection Regulations Data Protection Regulations 00:10:00 Module 08: Job Requirements Of A CCTV Operator Job Requirements Of A CCTV Operator 00:10:00

CCTV Operator Training Course
Delivered Online On Demand1 hour 21 minutes
£11

55215 SharePoint Online Power User

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is intended for both novice and experienced SharePoint users who wish to make full use of SharePoint Online. Overview #NAME? This course delivers the complete site owner story from start to finish in an engaging and practical way to ensure you have the confidence to plan and create new sites or manage your existing sites in SharePoint Online. Your goal is to learn how to make SharePoint online relevant to your team by using a sites functionality to help you share information and collaborate with your colleagues. During the class, you will also learn best practices and ?what not to do? as you watch live, interactive demonstrations and put theory into practice with hands on exercises in SharePoint Online. 1 - An Introduction to SharePoint Online Introducing Office 365 and SharePoint Getting started with Office 365 The cloud revolution Login to Office 365 What is Office 365 Using the app launcher What is SharePoint Office 365 settings Introducing Office 365 Groups Delve Ownership and Access OneDrive 2 - Creating Sites Planning your sites Create new subsites The Office 365 tenant Site templates Web addresses Apply a them Site collections Building your navigation Create a new site Delete subsites Team site navigation User interface: classic vs modern Site contents: classic vs modern Where does classic come from? 3 - Creating and Managing Web Pages The types of pages found in SharePoint Classic SharePoint pages Modern SharePoint pages How to use classic team site pages Create news and site pages Review features of publishing sites Web parts Save, publish, share and delete pages Communication sites 4 - Working with Apps An introduction to apps Co-authoring Marketplace apps Check In ? Out Adding apps to a site Edit and view file properties Create and manage columns Quick edit view Public and personal views File commands Managing app settings Copy link and Share Content approval Folders Major and minor versioning The recycle bin Document sets Alerts Working with files in a library OneDrive sync Create, Upload and edit files Working with classic lists 5 - Building processes with Flow and PowerApps What are business processes? Design and publish a Flow Classic tools for designing processes Getting started with PowerApps in SharePoint Design and test a classic workflow Enhance data capture with PowerApps Getting started with Flow in SharePoint Test a Flow and PowerApps enriched list 6 - Customizing Security Office 365 Group access Share a file Updating Office 365 Group Security Remove a user Managing access to SharePoint Customizing SharePoint security New sites private vs public Create permission levels and groups Setup access requests Security inheritance Share a site Security best practices 7 - Working with Search Delve Search tips An introduction to SharePoint search Accessing classic search Search in folders, libraries and sites Promoted results Search results 8 - Enterprise Content Management Managed metadata service Information management policies An introduction to content types The records center Create and manage content type In-place records management Deploy content types The content organizer Using content types in apps Durable links The content type hub

55215 SharePoint Online Power User
Delivered OnlineFlexible Dates
£2,380

Attacking and Securing .Net Web Applications (TT8320-N)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate-level programming course, designed for experienced .Net developers who wish to get up and running on developing well defended software applications. Real world programming experience with .Net is required. Overview Students who attend Attacking and Securing .Net Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a .Net perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on .Net security training that offers a unique look at .Net application security. Beginning with penetration testing and hunting for bugs in .Net web applications, you thoroughly examine best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, driving home the mechanics of how to secure .Net web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Injection Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? .NET Issues and Best Practices Making Application Security Real Time Permitting Topics Cryptography Overview .NET Cryptographic Services

Attacking and Securing .Net Web Applications (TT8320-N)
Delivered OnlineFlexible Dates
Price on Enquiry

AZ-801T00 Configuring Windows Server Hybrid Advanced Services

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators who already implement and manage on-premises core technologies want to secure and protect their environments, migrate virtual and physical workloads to Azure Iaas, enable a highly available, fully redundant environment, and perform monitoring and troubleshooting. This course teaches IT Professionals to configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to leverage the hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, and how to secure Azure VMs running Windows Server. The course also teaches IT Professionals how to perform tasks related to high availability, troubleshooting, and disaster recovery. The course highlights administrative tools and technologies including Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate, and Azure Monitor. Prerequisites An understanding of the following concepts as related to Windows Server technologies: High availability and disaster recovery Automation Monitoring Troubleshooting 1 - Secure Windows Server user accounts Configure user account rights Protect user accounts with the Protected Users group Describe Windows Defender Credential Guard Block NTLM authentication Locate problematic accounts 2 - Hardening Windows Server Describe Local Password Administrator Solution Configure Privileged Access Workstations Secure domain controllers Analyze security configuration with Security Compliance Toolkit Secure SMB traffic 3 - Windows Server update management Explore Windows Update Outline Windows Server Update Services server deployment options Define Windows Server Update Services update management process Describe the process of Update Management 4 - Secure Windows Server DNS Implement split-horizon DNS Create DNS policies Implement DNS policies Secure Windows Server DNS Implement DNSSEC 5 - Implement Windows Server IaaS VM network security Implement network security groups and Windows IaaS VMs Implement adaptive network hardening Implement Azure Firewall and Windows IaaS VMs Implement Windows firewall with Windows Server IaaS VMs Choose the appropriate filtering solution Deploy and configure Azure firewall using the Azure portal Capture network traffic with network watcher Log network traffic to and from a VM using the Azure portal 6 - Audit the security of Windows Server IaaS Virtual Machines Describe Azure Security Center Enable Azure Security Center in hybrid environments Implement and assess security policies Protect your resources with Azure Security Center Implement Azure Sentinel 7 - Manage Azure updates Describe update management Enable update management Deploy updates View update assessments Manage updates for your Azure Virtual Machines 8 - Create and implement application allowlists with adaptive application control Describe adaptive application control Implement adaptive application control policies 9 - Configure BitLocker disk encryption for Windows IaaS Virtual Machines Describe Azure Disk Encryption and server-side encryption Configure Key Vault for Azure Disk Encryption Encrypt Azure IaaS Virtual Machine hard disks Back up and recover data from encrypted disks Create and encrypt a Windows Virtual Machine 10 - Implement change tracking and file integrity monitoring for Windows IaaS VMs Implement Change Tracking and Inventory Manage Change Tracking and Inventory Manage tracked files Implement File Integrity Monitoring Select and monitor entities Use File Integrity Monitoring 11 - Introduction to Cluster Shared Volumes Determine the functionality of Cluster Shared Volumes Explore the architecture and components of Cluster Shared Volumes Implement Cluster Shared Volumes 12 - Implement Windows Server failover clustering Define Windows Server failover clustering Plan Windows Server failover clustering Implement Windows Server failover clustering Manage Windows Server failover clustering Implement stretch clusters Define cluster sets 13 - Implement high availability of Windows Server VMs Select high-availability options for Hyper-V Consider network load balancing for Hyper-V VMs Implement Hyper-V VM live migration Implement Hyper-V VMs storage migration 14 - Implement Windows Server File Server high availability Explore the Windows Server File Server high-availability options Define Cluster Shared Volumes Implement Scale-Out File Server Implement Storage Replica 15 - Implement scale and high availability with Windows Server VM Describe virtual machine scale sets Implement scaling Implement load-balancing VMs Create a virtual machine scale set in the Azure portal Describe Azure Site Recovery Implement Azure Site Recovery 16 - Implement Hyper-V Replica Define Hyper-V Replica Plan for Hyper-V Replica Configure and implement Hyper-V Replica Define extended replication Define Azure Site Recovery Implement Site Recovery from on-premises site to Azure Implement Site Recovery from on-premises site to on-premises site 17 - Protect your on-premises infrastructure from disasters with Azure Site Recovery Azure Site Recovery overview Workloads supported for protection with Azure Site Recovery Run a disaster recovery drill Failover and failback 18 - Implement hybrid backup and recovery with Windows Server IaaS Describe Azure Backup Implement recovery vaults Implement Azure Backup policies Recover Windows IaaS Virtual Machines Perform file and folder recovery Perform backup and restore of on-premises workloads Manage Azure Virtual Machine backups with Azure Backup service 19 - Protect your Azure infrastructure with Azure Site Recovery What is Azure Site Recovery Prepare for disaster recovery with Azure Site Recovery Run a disaster recovery drill Failover and failback using Azure Site Recovery 20 - Protect your virtual machines by using Azure Backup Azure Backup features and scenarios Back up an Azure virtual machine by using Azure Backup Restore virtual machine data 21 - Active Directory Domain Services migration Examine upgrade vs. migration Upgrade a previous version of Active Directory Domain Services to Windows Server 2022 Migrate to Active Directory Domain Services in Windows Server 2022 from a previous version Explore the Active Directory Migration Tool 22 - Migrate file server workloads using Storage Migration Service Storage Migration Service overview and usage scenarios Storage migration requirements Migrate a server with Storage migration Evaluate storage migration considerations 23 - Migrate Windows Server roles Describe the Windows Server Migration Tools Install the Migration Tools Migrate roles using the Migration Tools 24 - Migrate on-premises Windows Server instances to Azure IaaS virtual machines Plan your migration Describe Azure Migrate Perform server assessment Assess physical servers with Azure Migrate Migrate Windows Server workloads by using Azure Migrate 25 - Upgrade and migrate Windows Server IaaS virtual machines Describe Azure Migrate Migrate Windows Server workloads by using Azure Migrate Describe storage migration Migrate file servers by using Storage Migration Service 26 - Containerize and migrate ASP.NET applications to Azure App Service Azure Migrate App Containerization overview 27 - Monitor Windows Server performance Use Performance Monitor to identify performance problems Use Resource Monitor to review current resource usage Review reliability with Reliability Monitor Implement a performance monitoring methodology Use Data Collector Sets to analyze server performance Monitor network infrastructure services Monitor virtual machines running Windows Server Monitor performance with Windows Admin Center Use System Insights to help predict future capacity issues Optimize the performance of Windows Server 28 - Manage and monitor Windows Server event logs Describe Windows Server event logs Use Windows Admin Center to review logs Use Server Manager to review logs Use custom views Implement event log subscriptions 29 - Implement Windows Server auditing and diagnostics Describe basic auditing categories Describe advanced categories Log user access Enable setup and boot event collection 30 - Troubleshoot Active Directory Recover objects from the AD recycle bin Recover the AD DS database Recover SYSVOL Troubleshoot AD DS replication Troubleshoot hybrid authentication issues 31 - Monitor Windows Server IaaS Virtual Machines and hybrid instances Enable Azure Monitor for Virtual Machines Monitor an Azure Virtual Machine with Azure Monitor Enable Azure Monitor in hybrid scenarios Collect data from a Windows computer in a hybrid environment Integrate Azure Monitor with Microsoft Operations Manager 32 - Monitor your Azure virtual machines with Azure Monitor Monitoring for Azure VMs Monitor VM host data Use Metrics Explorer to view detailed host metrics Collect client performance counters by using VM insights Collect VM client event logs 33 - Troubleshoot on-premises and hybrid networking Diagnose DHCP proble

AZ-801T00 Configuring Windows Server Hybrid Advanced Services
Delivered OnlineFlexible Dates
£2,380