• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4542 Security courses in Reading delivered Online

Level 5 Diploma in Event Management & Event Planner - QLS Endorsed

4.7(47)

By Academy for Health and Fitness

24-Hour Knowledge Knockdown! Prices Reduced Like Never Before Do you dream of transforming unforgettable occasions into reality? The UK events industry is booming, expected to reach a staggering £70 billion by 2025! If you have an eye for detail, a knack for organisation, and a love of bringing people together, then a career in event planning could be your perfect match. But where do you begin? This comprehensive Event Planner program equips you with the skills and knowledge to plan and execute exceptional events of all kinds, from weddings and social gatherings to corporate conferences and children's parties. You'll master essential skills like marketing, project management, and client communication. Specialised courses cover in-demand areas like wedding planning, party planning, and social event coordination. Additionally, you'll gain valuable insights into hospitality, catering, and compliance, ensuring you're prepared for any situation. With a single payment, you will gain access to Event Planner course, including 10 premium courses, a QLS Endorsed Hardcopy certificate (for the title course) and 11 PDF certificates for Absolutely free. This Event Planner Bundle Package includes: Main Course: Diploma in Event Planner at QLS Level 5 10 Additional CPDQS Accredited Premium Courses - Course 01: Event Planning Course 02: Kids Party Planner Certificate Course 03: Party and Event Planning Course 04: Wedding Planner Course 05: Social Events Planning Diploma Course 06: Catering Management Course 07: Hotel Concierge Certification Course 08: Restaurant Management Course 09: Receptionist Diploma Course 10: Hospitality Compliance Management Course Elevate your skills and open doors to exciting opportunities in the event industry. Enrol today and become a sought-after event planner! Learning Outcomes of Event Planner Bundle Master advanced event management principles and industry best practices. Develop expertise in planning diverse events, from parties to weddings. Acquire skills in creating enchanting experiences for children's events. Understand catering management and menu planning for exceptional dining experiences. Explore hotel concierge services and restaurant management for seamless hospitality. Gain knowledge of hospitality compliance standards for professional event execution. Why Choose Us? Get a Free QLS Endorsed Certificate upon completion of Event Planner course Get a free student ID card with Event Planner Training program (£10 postal charge will be applicable for international delivery) The Event Planner course is affordable and simple to understand This course is entirely online, interactive lesson with voiceover audio Get Lifetime access to the Event Planner course materials The Event Planner course comes with 24/7 tutor support Start your learning journey straightaway! *** Course Curriculum *** Main Course: Diploma in Event Planner at QLS Level 5 Module 01: Introduction To Event Management Module 02: Role Of An Event Planner Module 03: Event Classification Module 04: Events And Clients Module 05: Steps To Plan An Event Module 06: Invitation To The Event Module 07: Event Marketing Module 08: Catering At Events Module 09: Event Decorations Module 10: Cleaning And Waste Disposal Module 11: Event Security Module 12: Developing An Event Planning Business Course 01: Event Planning Module 01: Introduction To Event Management Module 02: Role Of An Event Planner Module 03: Event Classification Module 04: Events And Clients Module 05: Steps To Plan An Event Module 06: Invitation To The Event Module 07: Event Marketing Module 08: Catering At Events Module 09: Event Decorations Module 10: Cleaning And Waste Disposal Module 11: Event Security Module 12: Developing An Event Planning Business Course 02: Kids Party Planner Certificate Module 01: Planning a Kids' Party Module 02: Improvement Module 03: Types of Kids' Parties Module 04: Management Review Meetings Module 05: Choosing a Theme Module 06: Planning the Entertainment Module 07: Focusing on Catering Module 08: Making the Day Memorable =========>>>>> And 8 More Courses <<<<<========= How will I get my Certificate? After successfully completing the course, you will be able to order your QLS Endorsed Certificates and CPD Accredited Certificates as proof of your achievement. PDF Certificate: Free (Previously it was £12.99*11 = £143) QLS Endorsed Hard Copy Certificate: Free (For The Title Course: Previously it was £119) CPD 255 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone interested in learning more about the topic is advised to take this bundle. This bundle is ideal for: Aspiring planners Event coordinators Venue managers Party planners Hospitality professionals Business owners Requirements You will not need any prior background or expertise to enrol in this bundle. Career path After completing this bundle, you are to start your career or begin the next phase of your career. Event planner Wedding planner Conference organizer Party planner Venue manager Entrepreneur Certificates CPD Accredited Digital Certificate Digital certificate - Included Upon passing the Course, you need to order a Digital Certificate for each of the courses inside this bundle as proof of your new skills that are accredited by CPD QS for Free. Diploma in Event Planner at QLS Level 5 Hard copy certificate - Included Please note that International students have to pay an additional £10 as a shipment fee.

Level 5 Diploma in Event Management & Event Planner - QLS Endorsed
Delivered Online On Demand3 weeks
£119

F2810G IBM FileNet P8 Platform Administration (V5.5.x)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for administrators and users who are responsible for planning, administrating and configuring an IBM FileNet P8 Platform system Overview Introduction to IBM FileNet P8 Platform - IBM FileNet P8 Platform features - IBM FileNet P8 Platform integration options - IBM FileNet P8 Platform components - IBM FileNet P8 Platform solutions Architecture and domain structures - IBM FileNet P8 Platform Architecture - Explore the core IBM FileNet P8 Platform applications - Locate P8 domain structures - Use IBM Content Navigator Manage logging - View and archive system logs - Configure trace logging Configure auditing - Create audit definitions - Prune audit entries Manage storage areas - Create a file storage area - Create a storage policy - Create an advanced storage area Build an object store - Create JDBC data sources for an object store - Create an object store - Add the repository to an IBM Content Navigator desktop Create property templates and classes - Create a choice list - Create property templates - Create document and folder classes Modify classes and properties - Change the property template name - Modify a choice list - Work with metadata dependencies Use events to trigger actions - Create a subscription with an event action - Update the event action with new code module Configure security for IBM FileNet P8 assets - Configure initial object store security - Use the Security Script wizard - Configure default instance security - Configure security inheritance - Implement designer group access - Configure role-based access Use bulk operations - Use bulk actions to modify security for multiple documents - Use bulk operations to cancel checkout of documents Configure content-based retrieval searches - Register IBM Content Search Services - Configure index partitioning - Configure content-based indexes - Create content-based searches Work with sweeps - Configure a bulk move content job - Create a disposal policy - Create a content migration policy Move IBM FileNet P8 Platform applications between environments - Configure a destination environment - Create a source environment - Export the FileNet P8 application assets - Convert and analyze the FileNet P8 assets - Import the application assets - Run a change impact analysis in command line Introduction to IBM FileNet P8 content services containers - IBM FileNet P8 content services containers - Benefits of containers - Considerations when choosing containers Organize content across the enterprise - Plan for Multitenancy - Isolate content in an IBM FileNet P8 platform system This course teaches you the configuration and administration of an IBM FileNet P8 Platform 5.5.x system. It introduces you to the key concepts of IBM FileNet P8 Platform architecture and organizing the content across the enterprise. You will learn how to build content repositories, configure metadata, create storage areas, manage security, logging, and auditing, run bulk processing, use the sweep framework, extend the functionality with Events and Subscription, migrate and deploy FileNet P8 assets between environments, and configure content-based retrieval searches Introduction to IBM FileNet P8 Platform IBM FileNet P8 Platform features IBM FileNet P8 Platform integration options IBM FileNet P8 Platform components IBM FileNet P8 Platform solutions Architecture and domain structures IBM FileNet P8 Platform Architecture Explore the core IBM FileNet P8 Platform applications Locate P8 domain structures Use IBM Content Navigator Manage logging View and archive system logs Configure trace logging Configure auditing Create audit definitions Prune audit entries Manage storage areas Create a file storage area Create a storage policy Create an advanced storage area Build an object store Create JDBC data sources for an object store Create an object store Add the repository to an IBM Content Navigator desktop Create property templates and classes Create a choice list Create property templates Create document and folder classes Modify classes and properties Change the property template name Modify a choice list Work with metadata dependencies Use events to trigger actions Create a subscription with an event action Update the event action with new code module Configure security for IBM FileNet P8 assets Use the Security Script wizard Configure default instance security Configure security inheritance Implement designer group access Configure rolebased access +O35Use bulk operations Use bulk actions to modify security for multiple documents Use bulk operations to cancel checkout of documents Configure content-based retrieval searches Register IBM Content Search Services Configure index partitioning Configure contentbased indexes Create contentbased searches Work with sweeps Configure a bulk move content job Create a disposal policy Create a content migration policy Move IBM FileNet P8 Platform applications between environments Configure a destination environment Create a source environment Export the FileNet P8 application assets Convert and analyze the FileNet P8 assets Import the application assets Run a change impact analysis in command line Introduction to IBM FileNet P8 content services container IBM FileNet P8 content services containers Benefits of containers Considerations when choosing container Organize content across the enterprise Plan for Multitenancy Isolate content in an IBM FileNet P8 platform system

F2810G IBM FileNet P8 Platform Administration (V5.5.x)
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Developing iRules for BIG-IP

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for system administrators, network administrators and application developers responsible for the customization of traffic flow through a BIG-IP system. This course provides networking professionals a functional understanding of iRules development. The course builds on the foundation of the Administering BIG-IP or Configuring LTM course, demonstrating how to logically plan and write iRules to help monitor and manage common tasks involved with processing traffic on the BIG-IP system. Extensive course labs consist of writing, applying and evaluating the effect of iRules on local traffic. This hands-on course includes lectures, labs, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Leveraging F5 Support Resources and Tools Module 2: Getting Started with iRules Customizing Application Delivery with iRules Triggering an iRule Leveraging the DevCentral Ecosystem Creating and Deploying iRules Module 3: Exploring iRule Elements Introducing iRule Constructs Understanding iRule Events and Event Context Working with iRule Commands Logging from an iRule Using SYSLOG-NG (LOG Command) Working with User-Defined Variables Working with Operators and Data Types Working with Conditional Control Structures (IF and SWITCH) Incorporating Best Practices in iRules Module 4: Developing and Troubleshooting iRules Mastering Whitespace and Special Symbols Grouping Strings Developing and Troubleshooting Tips Using Fiddler to Test and Troubleshoot iRules Module 5: Optimizing iRule Execution Understanding the Need for Efficiency Measure iRule Runtime Efficiency Using Timing Statistics Modularizing iRules for Administrative Efficiency Using Procedures to Modularize Code Optimizing Logging Using High-Speed Logging Commands in an iRule Implementing Other Efficiencies Using Looping Control Structures (WHILE, FOR, FOREACH Commands) Module 6: Securing Web Applications with iRules Integrating iRules into Web Application Defense Mitigating HTTP Version Attacks Mitigating Path Traversal Attacks Using iRules to Defends Against Cross-Site Request Forgery (CSRF) Mitigating HTTP Method Vulnerabilities Securing HTTP Cookies with iRules Adding HTTP Security Headers Removing Undesirable HTTP Headers Module 7: Working with Numbers and Strings Understanding Number Forms and Notation Working with Strings (STRING and SCAN Commands) Combining Strings (Adjacent Variables, CONCAT and APPEND Commands) Using iRule String Parsing Functions (FINDSTR, GETFIELD, and SUBSTR Commands) Module 8: Processing the HTTP Payload Reviewing HTTP Headers and Commands Accessing and Manipulating HTTP Headers (HTTP::header Commands) Other HTTP commands (HTTP::host, HTTP::status, HTTP::is_keepalive, HTTP::method, HTTP::version, HTTP::redirect, HTTP::respond, HTTP::uri) Parsing the HTTP URI (URI::path, URI::basename, URI::query) Parsing Cookies with HTTP::cookie Selectively Compressing HTTP Data (COMPRESS Command) Module 9: Working with iFiles and Data Groups Working with iFiles Introducing Data Groups Working with Old Format Data Groups (MATCHCLASS, FINDCLASS) Working with New Format Data Groups (CLASS MATCH, CLASS SEARCH) Module 10: Using iRules with Universal Persistence, Stream, and Statistics Profiles Implementing Universal Persistence (PERSIST UIE Command) Working with the Stream Profile (STREAM Command) Collecting Statistics Using a Statistics Profile (STATS Command) Collecting Statistics Using iStats (ISTATS Command) Module 11: Incorporating Advanced Variables Reviewing the Local Variable Namespace Working with Arrays (ARRAY Command) Using Static and Global Variables Using the Session Table (TABLE Command) Processing Session Table Subtables Counting ?Things? Using the Session Table

F5 Networks Developing iRules for BIG-IP
Delivered OnlineFlexible Dates
Price on Enquiry

Definitive Salt for engineers

5.0(3)

By Systems & Network Training

Definitive Salt training course description Salt is a remote execution framework and configuration management system. This course covers Salt from the basics. After a quick first taste the course moves onto execution modules, salt states, minion and master data, jinja, Salt extensions and then topology and configuration options. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Install and use Salt. Describe the architecture of Salt. Manage configurations with Salt. Extend Salt. Definitive Salt training course details Who will benefit: Anyone working with Salt. Prerequisites: Linux fundamentals. Duration 2 days Definitive Salt training course contents Introduction What is Salt? High- level architecture, Some quick examples, system management, configuration management, A brief history, Topology options, Extending Salt. Quick start: First taste of Salt Single-master setup, from packages, bootstrap scripts, Starting up, Basic commands, salt: the main workhorse, salt-key: key management, salt-call: execution on the minion, salt-run: co-ordination of jobs on the master, summary of commands, Key management, viewing keys, accepting keys, rejecting keys, key files, Minion targeting, minion ID, list (-L), glob, regular expressions (-E), grains (-G), compound (-C), targeting summary, Additional remote execution details, Conclusion. Execution modules: The functional foundation sys: information and documentation about modules, sys.doc basic documentation, sys.list_modules, sys.list_functions: simple listings, cmd: execute via shell, cmd.run: run any command, pkg: manage packages, virtual modules, pkg.lists_pkgs: list all installed packages, pkg.available version: see what version will be installed, pkg.install: install packages, user: manage users, user.add: add users, user.list_users, user info: get user info, saltutil: access various Salt utilities, Summary. Configuration management: Salt states Salt files overview, SLS example: adding a user, working with the multi-layered state system, Highstate and the top file, the top file, State ordering, require: depend on another state, watch: run based on other changes, odds and ends, Summary. Minion data / master data Grains are minion data, performing basic grain operations, setting grains, targeting with grains in the top file, Pillars are data from the master, querying pillar data, querying other sources with external pillars, Renderers give data options. Extending Salt: part I Introduction to Jinja, Jinja basics, Templating with Jinja, filtering by grains, Custom execution module, Custom state modules, Custom grains, External pillars, Summary. More on the matter Runners, manage minions, manage jobs, The orchestrate runner, The event system, The reactor system, Summary. Extending Salt: part II Python client API, reading configuration data on a master and minion, using the master client (localclient) API, Using the caller client API, Custom runners, writing a custom runner, using the runnerclient API, Summary. Topology and configuration options Master configuration, directories and files, logging, access control, files server options, Topology variations, masterless minions, peer systems, syndication masters, multiple masters. Brief introduction to salt-cloud Overview, Setup AWS and salt-cloud, installing salt-cloud, cloud providers, cloud profiles, cloud maps, Introspection via salt cloud, Creating infrastructure, More information. Using vagrant to run Salt examples YAML.

Definitive Salt for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Data Protection (GDPR) Foundation Certificate

By CloudLearn

The Data Protection (GDPR) Foundation Certificate is the course for people who need a formal qualification to demonstrate a clear, concise and generic understanding of the UK General Data Protection Regulation and Data Protection Act 2018, in support of the practical knowledge often acquired in the workplace. It is suitable for the public, private and third sectors and will teach participants essential UK GDPR skills and sufficient knowledge to assist their organisation toward their data protection implementation and UK GDPR accountability requirement. The course is suitable for beginners but anyone with significant data protection knowledge will also get considerable benefit from it. This Foundation Certificate is an internationally recognised qualification, endorsed by TQUK, which is regulated by Ofqual, a UK Government department. Copies of the slides for the course are sent out a few days in advance. As the course covers a lot of ground in a short time we recommend attendees who know nothing about data protection to read through these. Note: This course is delivered live, online, using Zoom. It will be delivered 9.30 - 12.30 and 13.30 - 16.30 approx. Course Content Topics covered include: Background to Data Protection Legislation Scope Essential Definitions The Core of Data ProtectionPrinciplesLegal BasisTransparency/Privacy NoticesRights and Their Management Data Security Obligations and Breach Notification International Transfers (including cloud) Data Processors and ContractsDue Diligence Data Sharing and Joint ControllersAd Hoc and Planned Data Protection by DesignData Protection Impact Assessments Data Protection Officers Accountability and Action Plan The ICO and Enforcement Questions/discussion throughout the course Suitability - Who should attend? Anyone with an interest in data protection or needing a detailed introduction. Anyone involved in supporting data protection compliance in an organisation. Outcome / Qualification etc. Learning Outcomes: Be aware of the importance of data protection legislation and the GDPR Understand the key obligations of the GDPR and DPA Understand the rationale behind a data protection audit and gap analysis Assist with policies and procedures required for data protection compliance and accountability

Data Protection (GDPR) Foundation Certificate
Delivered OnlineFlexible Dates
£300

M.D.D CO-PARENTING COUNSELLING PACKAGE (ISSUES WITH EX)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Introducing Co-Parenting Counseling Package: Nurturing Healthy Co-Parenting Relationships for the Well-being of Your Children Are you facing challenges in co-parenting and seeking support to build a healthy and cooperative co-parenting relationship? Miss Date Doctor’s Co-Parenting Counseling Package offers you a constructive and nurturing environment to enhance communication, resolve conflicts, and prioritize the well-being of your children. Co-parenting after separation or divorce can be complex and emotionally charged. Our experienced counselors specialize in co-parenting dynamics and are here to assist you in navigating the journey of raising your children together in a positive and supportive manner. Here’s how the Co-Parenting Counseling Package can support you: Effective Communication: Our counselors will help you develop open and effective communication strategies, ensuring that you can discuss parenting matters calmly and constructively. Conflict Resolution: Co-parenting counseling focuses on resolving conflicts in a healthy and respectful manner, reducing tension and promoting a harmonious co-parenting relationship. Creating a Co-Parenting Plan: We’ll work with you to create a comprehensive co-parenting plan that outlines responsibilities, schedules, and agreements, providing clarity and structure for both parents and children. Child-Centered Approach: The well-being of your children is paramount. Co-parenting counseling emphasizes a child-centered approach, ensuring that their needs and feelings are considered in decision-making. Co-Parenting Boundaries: Establishing healthy boundaries is essential for successful co-parenting. Our counselors will help you set clear boundaries and expectations for co-parenting interactions. Parenting Consistency: Consistency is crucial for children’s stability. Co-parenting counseling promotes parenting consistency between households to provide a sense of security for your children. Handling Transitions: Our counselors will assist you in managing transitions between households, ensuring that they are as smooth and stress-free as possible for the children. Conflict Minimization: Co-parenting counseling aims to minimize conflict and create a more harmonious environment for all family members involved. The Co-Parenting Counselling Package at Miss Date Doctor is designed to empower you and your co-parent to build a positive and supportive co-parenting relationship. Our counsellors provide guidance and support to ensure that your children grow up in a loving and stable environment, even after separation or divorce. Invest in the well-being of your children and take the first step towards nurturing a healthy co-parenting relationship. Embrace the opportunity to create a positive and cooperative co-parenting dynamic, focused on the best interests of your children. Let our skilled counsellors guide you towards a brighter co-parenting future filled with understanding, cooperation, and mutual respect 3 X 1 hour https://relationshipsmdd.com/product/co-parenting-counselling-package/

M.D.D CO-PARENTING COUNSELLING PACKAGE (ISSUES WITH EX)
Delivered in London or UK Wide or OnlineFlexible Dates
£500

MS Azure - Automation and Log Anayltics

4.3(43)

By John Academy

Description Get a comprehensive overview of Automation and Log Analytics in Azure in the MS Azure - Automation and Log Anayltics course. Microsoft Azure is a cloud computing platform that offers more than 600 Azure services. The course especially focuses on two major Azure services: Automation and Log Analytics. Azure Automation gives you the ability to automate frequent, time-consuming, and error-prone cloud management tasks. On the other hand, Log Analytics helps you to collect, correlate, and visualize structured and unstructured data. Using Log Analytics, you can monitor cloud and on-premises environments to maintain availability and performance. You will also monitor and systems to maintain availability and performance. Throughout the course, you will learn how to use these two services for making your office work easy. You will explore the strategies of creating an automation account, Runbooks, and creating and viewing OMS workspace. Finally, you will be familiarized with the Azure security Centre. Assessment: This course does not involve any MCQ test. Students need to answer assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Once the answers are submitted, the instructor will check and assess the work. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? MS Azure - Automation and Log Anayltics is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our MS Azure - Automation and Log Anayltics is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Introduction Introduction FREE 00:02:00 Azure Automation Azure Automation 00:03:00 Creating Azure Automation Accounts 00:03:00 Automation Assets 00:04:00 Creating Runbooks 00:07:00 Log Analytics Log Analytics Overview 00:03:00 Creating and Viewing OMS Workspaces 00:10:00 Azure Security Center Intro to Azure Security Center 00:04:00 Detection as a Service 00:02:00 ASC Investigations 00:06:00 Conclusion Course Recap 00:03:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

MS Azure - Automation and Log Anayltics
Delivered Online On Demand47 minutes
£11.99

Diploma in Airport Operations Course - Level 3 (QLS Endorsed)

By Kingston Open College

QLS Endorsed + CPD QS Accredited - Dual Certification | Instant Access | 24/7 Tutor Support

Diploma in Airport Operations Course  - Level 3 (QLS Endorsed)
Delivered Online On Demand2 hours
£15

Cisco Implementing Secure Solutions with Virtual Private Networks v1.0 (SVPN)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for professionals in the following job roles: Network security engineer CCNP Security candidate Channel Partner Overview After taking this course, you should be able to: Introduce site-to-site VPN options available on Cisco router and firewalls Introduce remote access VPN options available on Cisco router and firewalls Review site-to-site and remote access VPN design options Review troubleshooting processes for various VPN options available on Cisco router and firewalls The Implementing Secure Solutions with Virtual Private Networks (SVPN) v1.0 course teaches you how to implement, configure, monitor, and support enterprise Virtual Private Network (VPN) solutions. Through a combination of lessons and hands-on experiences you will acquire the knowledge and skills to deploy and troubleshoot traditional Internet Protocol Security (IPsec), Dynamic Multipoint Virtual Private Network (DMVPN), FlexVPN, and remote access VPN to create secure and encrypted data, remote accessibility, and increased privacy. Course Outline Introducing VPN Technology Fundamentals Implementing Site-to-Site VPN Solutions Implementing Cisco Internetwork Operating System (Cisco IOS©) Site-to-Site FlexVPN Solutions Implement Cisco IOS Group Encrypted Transport (GET) VPN Solutions Implementing Cisco AnyConnect VPNs Implementing Clientless VPNs Lab Outline Explore IPsec Technologies Implement and Verify Cisco IOS Point-to-Point VPN Implement and Verify Cisco Adaptive Security Appliance (ASA) Point-to-Point VPN Implement and Verify Cisco IOS Virtual Tunnel Interface (VTI) VPN Implement and Verify Dynamic Multipoint VPN (DMVPN) Troubleshoot DMVPN Implement and Verify FlexVPN with Smart Defaults Implement and Verify Point-to-Point FlexVPN Implement and Verify Hub and Spoke FlexVPN Implement and Verify Spoke-to-Spoke FlexVPN Troubleshoot Cisco IOS FlexVPN Implement and Verify AnyConnect Transport Layer Security (TLS) VPN on ASA Implement and Verify Advanced Authentication, Authorization, and Accounting (AAA) on Cisco AnyConnect VPN Implement and Verify Clientless VPN on ASA

Cisco Implementing Secure Solutions with Virtual Private Networks v1.0 (SVPN)
Delivered OnlineFlexible Dates
Price on Enquiry

Managing and Troubleshooting PCs - Part 1

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for If you are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, the CompTIA© A+© Certification course is the first step in your preparation. Overview In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. You will:Identify the hardware components of personal computers and mobile digital devices.Identify the basic components and functions of operating systems.Identify networking and security fundamentals.Identify the operational procedures that should be followed by professional PC technicians.Install, configure, and troubleshoot display devices.Install and configure peripheral components.Manage system components.Manage data storage.Install and configure Microsoft Windows.Optimize and maintain Microsoft Windows.Work with other operating systems.Identify the hardware and software requirements for client environment configurations.Identify network technologies.Install and configure networking capabilities.Support mobile digital devices.Support printers and multifunction devices.Identify security threats, vulnerabilities, and controls.Implement security controls.Troubleshoot system-wide issues. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. Hardware Fundamentals Topic A: Personal Computer Components Topic B: Storage Devices Topic C: Mobile Digital Devices Topic D: Connection Interfaces Operating System Fundamentals Topic A: PC and Mobile Operating Systems Topic B: PC Operating System Tools and Utilities Networking & Security Fundamentals Topic A: Network Types Topic B: Network Components Topic C: Common Network Services Topic D: Cloud Concepts Topic E: Security Fundamentals Safety & Operational Procedures Topic A: Basic Maintenance Tools and Techniques Topic B: Personal and Electrical Safety Topic C: Environmental Safety and Materials Handling Topic D: Professionalism and Communication Topic E: Organizational Policies and Procedures Topic F: Troubleshooting Theory Supporting Display Devices Topic A: Install Display Devices Topic B: Configure Display Devices Topic C: Troubleshoot Video and Display Devices Installing & Configuring Peripheral Components Topic A: Install and Configure Input Devices Topic B: Install and Configure Output Devices Topic C: Install and Configure Input/Output Devices Topic D: Install and Configure Expansion Cards Managing System Components Topic A: Identify Motherboard Components and Features Topic B: Install and Configure CPUs and Cooling Systems Topic C: Install Power Supplies Topic D: Troubleshoot System Components Managing Data Storage Topic A: Identify RAM Types and Features Topic B: Troubleshoot RAM Issues Topic C: Install and Configure Storage Devices Topic D: Configure the System Firmware Topic E: Troubleshoot Hard Drives and RAID Arrays Installing & Configuring Microsoft Windows Topic A: Implement Client-Side Virtualization Topic B: Install Microsoft Windows Topic C: Use Microsoft Windows Topic D: Configure Microsoft Windows Topic E: Upgrade Microsoft Windows Optimizing & Maintaining Microsoft Windows Topic A: Optimize Microsoft Windows Topic B: Back Up and Restore System Data Topic C: Perform Disk Maintenance Topic D: Update Software Working with Other Operating Systems Topic A: The OS X Operating System Topic B: The Linux Operating System Customized Client Enviroments Topic A: Types of Common Business Clients Topic B: Custom Client Environments Networking Technologies Topic A: TCP/IP Properties and Characteristics Topic B: TCP/IP Topic C: Internet Connections Topic D: Ports and Protocols Topic E: Networking Tools Installing & Configuring Networking Capabilities Topic A: Configure Basic Windows Networking Topic B: Configure Network Perimeters Topic C: Using Windows Networking Features Topic D: Install and Configure SOHO Networks Supporting Mobile Digital Devices Topic A: Install and Configure Exterior Laptop Components Topic B: Install and Configure Interior Laptop Components Topic C: Other Mobile Devices Topic D: Mobile Device Accessories and Ports Topic E: Mobile Device Connectivity Topic F: Mobile Device Synchronization Topic G: Troubleshoot Mobile Device Hardware Supporting Printers & Multifunction Devices Topic A: Printer and Multifunction Technologies Topic B: Install and Configure Printers Topic C: Maintain Printers Topic D: Troubleshoot Printers Security Threats, Vulnerabilities, and Controls Topic A: Common Security Threats and Vulnerabilities Topic B: General Security Controls Topic C: Mobile Security Controls Topic D: Data Destruction and Disposal Methods Implementing Security Controls Topic A: Secure Operating Systems Topic B: Secure Workstations Topic C: Secure SOHO Networks Topic D: Secure Mobile Devices Troubleshooting System-Wide Issues Topic A: Troubleshoot PC Operating Systems Topic B: Troubleshoot Mobile Device Operating Systems and Applications Topic C: Troubleshoot Wired and Wireless Networks Topic D: Troubleshoot Common Security Issues

Managing and Troubleshooting PCs - Part 1
Delivered OnlineFlexible Dates
Price on Enquiry