• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4542 Security courses in Syston delivered Online

Data Documentation and Record Keeping Essentials

4.3(43)

By John Academy

Master the art of effective data management with our 'Data Documentation and Record Keeping Essentials' course. Explore key topics including data collection, storage, and security, while developing strategies for comprehensive documentation. Gain the skills needed for compliance, access control, and successful record-keeping. Elevate your professional profile with essential data skills and contribute to organizational success. Enroll now for a transformative learning experience in the world of data management.

Data Documentation and Record Keeping Essentials
Delivered Online On Demand
£23.99

Voice over LTE

5.0(3)

By Systems & Network Training

Voice over LTE training course description This course provides a basic understanding of the 3G LTE Air Interface, SAE, as well as Voice over LTE options and LTE Advanced features. Investigating the standards for the EPS , formulated by the 3GPP standards body, the course will set out to examine and explain the 4G environment from user equipment to border gateway and beyond. This course will ensure the delegate has a grasp of all aspects of the current global deployments, the next steps in upgrades and the promise of things to come. What will you learn Describe the complete EPC architecture. Explain the use of QoS within the air interface & core network. Explore the features of LTE advanced. Describe the various methods of supporting voice services with 3G LTE. Describe IMS structure and control entities. Explain an IMS session. Voice over LTE training course details Who will benefit: Any engineers who are assisting in the deployment of voice services within their LTE networks. Prerequisites: Intro to Data comms & networking Telecommunications Introduction Duration 3 days Voice over LTE training course contents 3GPP standards body Release 8 - Release 12, Supported and expected features. The EPC revisited EPC revisited 3G LTE & EPC Architecture, NB, MME, SGW, PDNGW, PCRF, Interworking capabilities, Protocol stack explored, NAS signalling, Default EPS bearer, Slot allocation algorithms, Scheduling algorithms, Quality of Service requirements, Dedicated EPS bearers. VoLTE deployment strategies Common networks everywhere, GSM/WCDMA view, CDMA view. VoLTE system architecture LTE radio, LTE Radio background, LTE radio architecture, Evolved packet core, EPC entities & functions, EPS mobility management, MS entities, Home subscriber server, Policy & charging rules function. VoLTE functionality Radio functionality, Bearers & schedulers, Mobility, Circuit switched fall back handover, Mobility from 2G/3G back to LTE, Power Saving Features, Positioning services, UE radio access capabilities for VoLTE users. EPC functionalities, LTE subscriber identification, PDN connectivity establishment, EPS dedicated bearer setup, IMS identification, IP multimedia identification module, Public user identity, Private user identity, Relationship between public & private identity, identification of users device, identification of network entities, identification of services, identification without ISIM. IMS service provisioning, Enforcement of allowed services, Service triggering information, Selection of the AS, AS behaviour, Service provisioning in action. VoLTE end-to-end & signalling VoLTE subscription & device configuration. EPS attach for CSFB/IMS VoIP & default bearer. IMS registration, Constructing the REGISTER request, From UE to P-CSCF, From P-CSCF to I-CSCF, From I-CSCF to S-CSCF, S-CSCF challenges the UE, UE's response to the challenge, Registration at the S-CSCF, The 200 OK response, Third-party registration to application servers, Subscription to registration event package, Re-registration & re-authentication, De-registration, Related standards. IMS VoIP session, Constructing the INVITE request, Routing, Media negotiation, Media resource reservation & policy control, Charging, Session release. Voice continuity, PS - PS intersystem handover, Single radio voice call continuity. IMS emergency session, PDN Connection setup for emergency session, Emergency registration, Emergency session. CS fallback for EPS call case, Architecture of CS fallback in EPS, Description of SGs interface, Idle mode signalling reduction, Idle mode vs active mode, CS fallback attachment, Mobile originating call using CSFB, Mobile terminating call using CSFB, Call unrelated CSFB procedures, Mobile terminating roaming retry & forwarding. VoLTE Messaging, Native IMS messages, SMS interworking, Multimedia messaging service. Unstructured supplementary services data simulation in IMS. IMS services VoLTE radio performance Coverage, Latency, Capacity. LTE advanced features Carrier aggregation, Coordinated mMulti-point Operation (CoMP), ICIC & eICIC, Relay node deployment & donor eNBs, Improved cell edge coverage, Reduced control plane latency, Heterogeneous networks, HeNB, security gateways, HeNB gateways.

Voice over LTE
Delivered in Internationally or OnlineFlexible Dates
£2,367

Information Management

5.0(1)

By Course Gate

Imagine yourself being an expert in information management when the entire world is drowning in data. Indeed, it will give you an edge in multiple industries if you can gain concrete skills in this field. This information management course has been designed to equip you with all the basic knowledge to start your pathway to becoming an industry leader in the data sector. Picture the first module as your grand entry into the world of data. Here, you will be introduced to the fundamentals terminology. Plus, you will also get insights into how data is critical to business growth.  The second module 2 of this course will teach you about the strategies for managing information. Understanding this module will help you sync information and manage goals with the organisation's primary mission. Plus, you will learn strategic planning, creating a roadmap of data to action, and data governance.  In module 3, you will explore database systems, design, and data storage. Here, you will also have an idea about the NoSQL databases. Module 5 sheds light on auditing information systems. It will help you determine the tools and techniques to evaluate data reliability. Here, you will learn audit principles, planning, risk assessment, and procedures.  The final module of this course focuses on ethical considerations related to data management. The key concepts you will learn here are ethical framework, data privacy laws, data ethics, and data protection strategies. At the end of this module, you can ensure responsible data handling and robust data protection management. Enrol in this top-notch information systems management course to secure yourself in a job market with an average salary of £39,000 per year in the UK. Learning Outcome Gain proficiency in analysing and interpreting data for decision-making Build a strategic mindset to prepare an excellent information strategy Acquire skills to ensure efficient data storage plus retrieval Ability to use MIS to assist managerial decision-making Develop auditing skills to ensure compliance, security, data integrity Have a clear understanding of ethical awareness related to data Career path Data Analyst Information Security Specialist Database Administrator IT Project Manager Chief Information Officer Business intelligence analyst Course Curriculum Module 01: Introduction to Information Management Introduction to Information Management 00:32:00 Module 02: Information Management Strategy Information Management Strategy 00:17:00 Module 03: Databases and Information Management Databases and Information Management 00:29:00 Module 04: Management Information Systems (MIS) Management Information Systems (MIS) 00:16:00 Module 05: Auditing Information Systems Auditing Information Systems 00:16:00 Module 06: Ethical and Social Issues and Data Protection Ethical and Social Issues and Data Protection 00:27:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00

Information Management
Delivered Online On Demand2 hours 17 minutes
£11.99

CompTIA PenTest+ Ethical Hacking Course

4.8(9)

By Skill Up

Are you interested in a career in ethical hacking? If so, then the CompTIA PenTest+ Ethical Hacking Course is for you! This course will teach you everything you need to know to become a professional penetration tester.

CompTIA PenTest+ Ethical Hacking Course
Delivered Online On Demand10 hours 48 minutes
£25

CertNexus Certified Internet of Things Practitioner (CIoTP)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for IT professionals with baseline skills in computer hardware, software support, and development who want to learn how to design, develop, implement, operate, and manage Internet of Things devices and related systems. It is for those interested in learning more about embedded systems, microcontroller programming, IoT security, and the development life cycle for IoT projects. While students will gain hands-on experience assembling a prototype IoT device and using software development tools, these activities are closely guided, so previous experience in electronics assembly and programming are not required. This course prepares students for taking the CertNexus Certified Internet of Things (IoT) Practitioner (Exam ITP-110). Overview In this course, you will learn how to apply Internet of Things technologies to solve real-world problems. You will: Construct and program an IoT device. Communicate with an IoT device using wired and wireless connections. Process sensor input and control an actuator on an IoT device. Manage security, privacy, and safety risks on IoT projects. Plan an IoT prototyping and development project. In this course, you will learn general strategies for planning, designing, developing, implementing, and maintaining an IoT system through various case studies and by assembling and configuring an IoT device to work in a sensor network. You will create an IoT device based on an ESP8266 microcontroller, implementing various common IoT features, such as analog and digital sensors, a web-based interface, MQTT messaging, and data encryption. The instructor led course includes an exam voucher for the Certified Internet of Things Practitioner (CIoTP) exam (exam ITP-110). Planning an IoT Implementation Select a General Architecture for an IoT Project Identify Benefits and Challenges of IoT Constructing and Programming an IoT Device Select and Configure a Processing Unit Select a Microcontroller Power Source Use a Software Development Kit to Program an IoT Device Communicating with an IoT Device Communicate Using Wired Connections Communicate Using Wireless Connections Communicate Using Internet Protocols Processing IoT Data Process IoT Device Input and Output Process Data in the Cloud Provide Machine to Machine Communication Managing Risks on IoT Projects Identify IoT Security and Privacy Risks Manage IoT Security and Privacy Risks Manage IoT Safety Risks Undertaking an IoT Project Identify Real World Applications for IoT Follow the IoT Development Lifecycle Additional course details: Nexus Humans CertNexus Certified Internet of Things Practitioner (CIoTP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified Internet of Things Practitioner (CIoTP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified Internet of Things Practitioner (CIoTP)
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat Linux Diagnostics and Troubleshooting with Exam (RH343)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Red Hat Enterprise Linux Diagnostics and Troubleshooting course is aimed at senior system administrators who wish to learn more about troubleshooting. Overview As a result of attending this course, students should be able to analyze the operational state of computer systems and identify potential issues. When problems appear, students will be able to successfully resolve the issue, returning it to a secure and stable working condition. Students should be able to demonstrate the following skills: Diagnostic and analysis procedures Preventive maintenance planning and implementation System recovery using proven tools and techniques This course enriches your skills by providing the tools and techniques that you need to successfully diagnose, and fix, a variety of potential issues. You will work through hands-on problems in various subsystems to diagnose and fix common issues.You will learn develop the skills to apply the scientific method to a structured form of troubleshooting. You will then apply this approach in troubleshooting various types of problems, including boot issues, hardware issues, storage issues, RPM issues, network issues, third-party application issues, security issues, and kernel issues. At the end of the course, you will be empowered to complete various comprehensive review labs to test your skills.This course covers the same material as RH342, but includes the Red Hat Certified Specialist in Linux Diagnostics and Troubleshooting exam (EX342) Introduction to troubleshooting Describe a generalized strategy for troubleshooting. Take proactive steps to prevent small issues Prevent small issues from becoming large problems by employing proactive system administration techniques. Troubleshoot boot issues Identify and resolve issues that can affect a system's ability to boot. Identify hardware issues Identify hardware problems that can affect a system?s ability to operate. Troubleshoot storage issues Identify and fix issues related to storage. Troubleshoot RPM issues Identify and fix problems in, and using, the package management subsystem. Troubleshoot network issues Identify and resolve network connectivity issues. Troubleshoot application issues Debug application issues. Deal with security issues Identify and fix issues related to security subsystems. Troubleshoot kernel issues Identify kernel issues and assist Red Hat Support in resolving kernel issues. Red Hat Enterprise Linux Diagnostics and Troubleshooting comprehensive review Practice and demonstrate knowledge and skills learned in Red Hat Enterprise Linux Diagnostics and Troubleshooting. Additional course details: Nexus Humans Red Hat Linux Diagnostics and Troubleshooting with Exam (RH343) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Linux Diagnostics and Troubleshooting with Exam (RH343) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat Linux Diagnostics and Troubleshooting with Exam (RH343)
Delivered OnlineFlexible Dates
Price on Enquiry

Windows server 2019 administration

5.0(3)

By Systems & Network Training

Windows server 2019 administration course description This five-day instructor-led course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing identity, networking, storage and compute by using Windows Server 2019, and who need to understand the scenarios, requirements, and options that are available and applicable to Windows Server 2019. The course teaches IT professionals the fundamental administration skills required to deploy and support Windows Server 2019 in most organizations. What will you learn Administrate Windows Server 2019. Configure file servers and storage. Manage Hyper-V virtualization and containers. Implement HA and disaster recovery solutions. Implement service monitoring and performance monitoring, and apply troubleshooting. Perform upgrades and migration related to AD DS, and storage. Windows server 2019 administration course details Who will benefit: Technical staff working with Windows server 2019. Prerequisites: TCP/IP foundation for engineers. Some Windows experience. Duration 5 days Windows server 2019 administration course contents Windows server administration overview Windows server administration principles and tools, Introducing Windows Server 2019, Windows Server Core Overview. Lab: Deploying and configuring Server Core, Implementing and using remote server administration. Identity Services in Windows server AD DS, Windows Server domain controllers, Azure AD, Group Policy, Active Directory Certificate Services. Lab: Deploying a new domain controller on Server Core, Configuring Group Policy, Deploying and using certificate services. Network Infrastructure services in Windows server DHCP, DNS services, IPAM. Lab: Deploying and configuring DHCP, Deploying and configuring DNS. File Servers and Storage management Volumes and file systems, sharing in Windows Server, Storage Spaces in Windows Server, Data Deduplication, Iscsi, Distributed File System. Lab: Implementing Data Deduplication, Configuring iSCSI storage, Configuring redundant storage spaces, Implementing Storage Spaces Direct. Hyper-V virtualization and containers Hyper-V in Windows Server, Configuring VMs, Securing virtualization in Windows Server, Containers in Windows Server, Overview of Kubernetes. Lab: Creating and configuring VMs, Installing and configuring containers. High Availability in Windows Server Planning for failover clustering implementation, Creating and configuring failover cluster, stretch clusters, High availability and disaster recovery solutions with Hyper-V VMs. Lab: Configuring iSCSI storage, Configuring a failover cluster, Deploying and configuring a highly available file server, Validating the highly available file server deployment. Disaster recovery in Windows Server Hyper-V Replica, Backup and restore infrastructure in Windows Server. Lab: Implementing Hyper-V Replica, Implementing backup and restore with Windows Server Backup. Windows Server security Credentials and privileged access protection, Hardening Windows Server, Just Enough Administration in Windows Server, Securing and analyzing SMB traffic, Windows Server update management. Lab: Configuring Windows Defender Credential Guard, Locating problematic accounts, Implementing LAPS. Remote Desktop Services in Windows Server Remote Desktop Services, session-based desktop deployment, personal and pooled virtual desktops. Lab: Implementing RDS, Configuring RemoteApp collection settings, Configuring a virtual desktop template. Remote access and web services in Windows Server Overview of RAS in Windows Server, Implementing VPNs, Implementing NPS, Implementing Always On VPN, Implementing Web Server in Windows Server. Lab: Implementing Web Application Proxy, Implementing VPN in Windows Server, Deploying and Configuring Web Server. Monitoring, performance, and troubleshooting Windows Server monitoring tools, Performance Monitor, Monitoring event logs for troubleshooting. Lab: Establishing a performance baseline, Identifying the source of a performance problem, Viewing and configuring centralized event logs, Identifying the source of a performance problem, Describe monitoring tools and performance monitoring in Windows Server, Describe event logging and perform event logging monitoring for troubleshooting purposes. Upgrade and migration in Windows Server AD DS migration, Storage Migration Service, Windows Server migration tools. Lab: Selecting a process to migrate server workloads, Planning how to migrate files by using Storage Migration Service.

Windows server 2019 administration
Delivered in Internationally or OnlineFlexible Dates
£2,797

C)ISRM - Certified Information System Risk Manager Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Information Systems Risk Manager students will be prepared to pass the CISRM exam.  Certified Information Systems Risk Manager, CISRM, course is made for IT and IS professionals who are involved with all aspects of risk management. Requests for this particular area of certification is growing fast in the employment sector. Recent high-profile breaches in both the public and private sectors have increased awareness for the need for Risk Management professionals. Mile2?s CISRM certification exam will test your knowledge in all areas of risk management. If you would like some training and test preparation before taking the Certified Information System Risk Manager Exam we offer the CISRM course as both a live class and a self-study combo. First, you will learn to assess a system, then implement risk controls. Finally, you will be able to monitor and maintain risk procedures. With this training, you will be able to identify risks associated with specific industries. After course completion, you will be able to design, implement, monitor and maintain risk-based, efficient and effective IS controls. Knowledge of all of these areas will be required to pass the CISRM exam. Course Outline The Big Picture Domain 1 ? Risk Identification Assessment and Evaluation Domain 2 ? Risk Response Domain 3 ? Risk Monitoring Domain 4 ? IS Control Design and Implementation

C)ISRM - Certified Information System Risk Manager Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

C30M01 - Evacuation Alert systems - BS 8629 (online)

5.0(1)

By Ember Compliance

Learners will be introduced to EAS as part of the fire safety solution for tall residential properties. This CPD course provides learners with an understanding of the requirements of BS 5839-1 in relation to, design, installation, commissioning, and maintenance of EAS.

C30M01 - Evacuation Alert systems - BS 8629 (online)
Delivered Online + more
£230

Microsoft Power BI - The Complete Masterclass [2023 EDITION]

By Packt

Are you someone wishing to learn the skills to analyze data professionally using Power BI? Do you want to learn to create impressive reports? Then this is the right course for you! Learn the complete workflow in Power BI from A-to-Z and advanced analytics with DAX-calculated columns and measures, forecasting, and advanced analytics.

Microsoft Power BI - The Complete Masterclass [2023 EDITION]
Delivered Online On Demand14 hours 31 minutes
£82.99