• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4584 Security courses in Torquay delivered Online

Cisco Introduction to Cisco IOS XR (IOSXR100)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Network operations center (NOC) operators System administrators System engineers Technical support personnel Channel partners, resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Cisco IOS XR general architecture Introduction to the Cisco IOS XR command line interface (CLI) Basic system configuration Tracing the switch fabric data path Monitoring the Cisco IOS XR system Working within the Cisco IOS XR configuration file system Interpreting Cisco IOS XR error messages and log file messages Creating system core dumps This 4-day course, Introduction to Cisco IOS© XR (IOSXR100), is an instructor led, lab-based, hands-on course, where you learn the fundamental concepts on which the operating system is based and Cisco IOS XR basic operations for configuration, software, file system configuration, and monitoring. Basic troubleshooting for how to troubleshoot problems relating to process failures, frozen processes, and high CPU and memory consumption is also covered. This course introduces you to the features and functions of the Cisco IOS XR Software operating system. Through a combination of lecture and hands-on lab exercises, you gain an understanding of all major aspects of the operating system, including the architecture, high-availability components, scalability features, configuration basics, switch fabric data path, basic software operations, configuration file overview, monitoring the Cisco IOS XR operating system, and working with error messages and core dumps. Module 1: Cisco IOS XR Software Overview Cisco IOS XR Architecture High Availability Scalability Module 2: Cisco IOS XR Configuration Basics Configuration Operations Initial Configuration Reviewing the Configuration Route Processor Redundancy Module 3: Switch Fabric Architecture Cisco IOS XR Architecture, High Availability, and Scalability Review Verifying the Fabric Data Path Module 4: Cisco IOS XR Software Operations Examining the Operation Basics Examining Configuration Operations Examining Configuration Rollback and Recovery Examining Process Management Module 5: Configuration File System Overview Configuration File System Module 6: Monitoring the Cisco IOS XR Operating System Cisco IOS XR Architecture System Monitoring Commands Module 7: Error Messages and Core Dumps System Error Messages Logging System Messages Cisco IOS XR Core Dumps

Cisco Introduction to Cisco IOS XR (IOSXR100)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Asset Management Professional (CAMP)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This is an entry level course, no experience necessary Overview In this course the student will learn IAITAM Best Practice Library's 12 Key Process Areas (KPAs) The roles and responsibilities that affect an ITAM program ITAM core functional areas KPA indicators ITAM strategic positioning How ITAM can be brought into other frameworks The Certified Asset Management Professional (CAMP) Course is designed to impart an extensive overview of IT Asset Management (ITAM) best practices and processes as well as ways to embrace multiple organizational frameworks such as ITAM & IT Service Management (ITSM). This course includes the comprehensive online examination necessary for achieving CAMP Certification. Course Outline The 12 IAITAM KPAs for ITAM ITAM Business Practices Find Savings Core Functional Areas Software Asset Management Hardware Asset Management ITAM Program Core Functional Components ITAM Roles and Responsibilities Program Management Acquisition Management Asset Identification Management Communication & Education Management Compliance Management Disposal Management Documentation Management Financial Management Legislation Management Policy Management Project Management Vendor Management Additional course details: Nexus Humans Certified Asset Management Professional (CAMP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Asset Management Professional (CAMP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Asset Management Professional (CAMP)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Multicloud Cost Optimization with Cisco CloudCenter Suite (CLDCO) v1.0

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is ideal for developers, engineers and others including: Cloud solution architects Cloud administrators Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview After taking this course, you should be able to: Describe what clouds are supported and how to configure clouds for Cost Optimizer Examine the Cost Optimizer snapshots of costs incurred by the various clouds installed for an organization This course, Mulitcloud Cost Optimization with Cisco CloudCenter Suite (CLDCO) v1.0, teaches you how the reporting and analysis of consumption the cost optimizer provides, functions within a Cisco© CloudCenter Suite. The cost optimizer works together with two other primary mechanisms: a workload manager that helps users deploy applications and manage governance policies, and an action orchestrator that provides seamless integration and workflow automation. Through lessons and hands-on experiences, you will learn the functionality of the CloudCenter cost optimizer Implementing Cisco CloudCenter Suite Cost Optimizer Cisco CloudCenter Suite Cost Optimizer Examining Cost Optimizer Inventory, Reports, Rightsizing, and Troubleshooting Configure Cost and Inventory Reports in the User Interface Lab outline Create Users, User Roles, and Cloud Permissions Create Cost Group and Billing Unit Use Cisco CloudCenter Suite Cost Optimizer Representational State Transfer (REST) API Additional course details: Nexus Humans Cisco Multicloud Cost Optimization with Cisco CloudCenter Suite (CLDCO) v1.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Multicloud Cost Optimization with Cisco CloudCenter Suite (CLDCO) v1.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Multicloud Cost Optimization with Cisco CloudCenter Suite (CLDCO) v1.0
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Automation for Cisco Service Provider Solutions v1.0 (SPAUI)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for Service Provider networking professionals in job roles such as: Network administrators Network architects Network designers Network engineers Network managers Network Operations Center (NOC) personnel Network supervisors Overview After taking this course, you should be able to: Use NETCONF and RESTCONF programmability protocols on Cisco devices Describe and use tools to validate YANG data models on Cisco devices Describe and configure model-driven telemetry on Cisco devices Describe and configure network traffic automation with Cisco XTC Describe and use network automation tools that utilize SSH Automate service provider network configuration with Cisco NSO Describe how to automate virtualized resources with Cisco ESC Describe how to automate service provider WAN with Cisco WAE This course prepares you to implement and support automation solutions in a Service Provider network infrastructure, using network programmability principles, protocols, tools, and mechanisms. Through a combination of lessons and hands-on labs, you will learn to deploy, configure, monitor, and operate Service Provider network environments using modern data models. These models allow you to represent operational data and new network management protocols in order to administer hundreds or thousands of devices in a single operation, replacing traditional, time-consuming, error prone, device-by-device Command Line Interface (CLI) management. The course also introduces powerful automation solutions that can streamline network operations. This course also prepares you for the CCNP-Service Provider concentration exam 300-535. Implementing Network Device Programmability Interfaces with NETCONF and RESTCONF Implement NETCONF Protocol Implement RESTCONF Protocol Implementing Model-Driven Programmability with YANG YANG Data Models YANG Tools YANG Development Kit Implementing Model-Driven Telemetry Implementing Model-Driven Telemetry with gRPC Implementing Model-Driven Telemetry with gNMI Automating Service Provider Network Traffic with Cisco XTC Cisco XTC Fundamentals Configure Cisco XTC Automating Networks with Tools That Utilize SSH Implement Device Configurations with Python Netmiko Library Implement Device Configurations with Ansible Playbooks Orchestrating Network Services with Cisco NSO Cisco NSO Fundamentals Cisco NSO Device Manager Cisco NSO Services Implement Device Configurations with Python Automating Virtualized Resources with Cisco Elastic Services Controller Cisco ESC Architecture Cisco ESC Resource Management Automating the WAN with Cisco WAE Describe the Cisco WAE Components Additional course details: Nexus Humans Cisco Implementing Automation for Cisco Service Provider Solutions v1.0 (SPAUI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Automation for Cisco Service Provider Solutions v1.0 (SPAUI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Automation for Cisco Service Provider Solutions v1.0 (SPAUI)
Delivered OnlineFlexible Dates
Price on Enquiry

Online Options

Show all 4584

Maryland Security Officer Initial & Renewal Course

5.0(1)

By MDSPOSA & USTASC TRAINING PORTAL

This course meets and exceeds the Maryland requirement for the security officer course of 12 hours. The course is taught over 2 days, 6 hours per day. In this course, you will learn the required curriculum for security officers prescribed by the Maryland Police and Corrections Training Commission.

Maryland Security Officer Initial & Renewal Course
Delivered Online + more
$250

IT Cyber Security Engineer – Job Ready Programme

4.8(9)

By Skill Up

IT Cyber Security Engineer – Job Ready Programme Enrol in Our IT Cyber Security Engineer – Job Ready Programme with Career Support! Gain access to 3,000+ online courses and earn Free Certificates to showcase your skills and boost your career potential. Step into the high-demand world of cyber security with a comprehensive programme designed for the UK job market. Master critical areas like penetration testing, secure cloud architecture, AI-powered threat detection, and GDPR compliance—skills that can lead to roles earning up to £95,000 a year. As UK businesses face £27 billion in cybercrime losses annually, the demand for skilled IT Cyber Security Engineers has never been greater. Whether you're changing careers or upskilling, this course equips you with in-demand expertise in threat intelligence, cryptography, and secure coding. Become the digital defence every company needs. Start your journey toward a resilient and rewarding career in cyber security today. Professional Diploma in IT Cyber Security Engineer – 25 Core Courses – Course 01: Cyber Security Online Course: DOSS and DDOS – Course 02: Cyber Security Training: Incident Handling & Response – Course 03: Security Threat Management – Course 04: Certified Information Security Manager (CISM) – Course 05: Certified Information Systems Security Professional (CISSP) – Course 06: CompTIA Advanced Security Practitioner (CASP) – Course 07: Computer Network Security Complete Training – Course 08: CyberSec First Responder: Threat Detection and Response [QLS Level 7] – Course 09: Bash Scripting and Shell Programming for Beginners – Course 10: Ethical Hacking Masterclass – Course 11: CompTIA PenTest+ Ethical Hacking Course – Course 12: BlackArch Linux: Ethical Hacking and Penetration Testing – Course 13: Ultimate Linux Security and Hardening Training – Course 14: The Complete Python Hacking Course: Beginner to Advanced! – Course 15: SQL Database Basics – Course 16: CompTIA Network+ Certification (N10-008) – Course 17: CompTIA A+ Core 1 (220-1101) Course – Course 18: CompTIA A+ Core 2 (220-1102) Course – Course 19: CompTIA Security+ (SY0-601) – Course 20: CompTIA Cloud+ CV0-002 Course – Course 21: Cisco CCENT/CCNA Interconnecting Cisco Networking Devices Part 1 – Course 22: Cisco CCNA Interconnecting Cisco Networking Devices Part 2 (ICND2) Training – Course 23: Cisco ASA Firewall Training with Step-by-Step Lab Workbook – Course 24: FortiGate Firewall Training Step-by-Step Lab Workbook – Course 25: Palo Alto Firewall Training with Step-by-Step Lab Workbook Job Readiness & Career Development Training (Complementary) – Course 01: Career Development Training – Course 02: Effective CV Writing – Course 03: CV Writing and Interview Tricks – Course 04: Ace the Interview – Interview Prep That Makes a Difference – Course 05: Job Search Skills – Course 06: Effective Communication Skills for Professionals – Course 07: Boost Your Confidence, Assertiveness – Course 08: Body Language Secrets – Course 09: Coaching and Mentoring – Course 10: Presentation Skills – Present like a Pro – Course 11: Public Speaking Course – Course 12: Project Management Training – Course 13: Leadership & Management – Course 14: Negotiation and Agreement Training – Course 15: Workplace Equality & Diversity – Course 16: Professional Development and Personal Well-being – Course 17: Emotional Intelligence and Human Behaviour – Course 18: Time Management: Step By Step Training – Course 19: Cross-Cultural Awareness – Course 20: Productivity Boosting – Course 21: Critical Thinking & Problem Solving – Course 22: Perfect LinkedIn Profile Creation – Course 23: Resume Writing Skills & Job Search With LinkedIn – Course 24: Email Writing – Course 25: Learn Microsoft Word, PowerPoint & Outlook In 90 Minutes!

IT Cyber Security Engineer – Job Ready Programme
Delivered Online + more
£299 to £399

SCADA – HMI & Communications

By Technique Learning Solutions

What does this course cover? This five-day course covers a range of topics, all of which are covered via a mixture of theoretical and practical training – we aim for our courses to be as hands-on as possible. The course specifically covers: An introduction to SCADA systems, including elements, servers, hardware and software, tags, plus more. A range of systems including automatic control, FIELDBUS, and wireless communication systems. An introduction to serial interferences, ethernet networks, fibre optics, and wireless. Process variables Communications include case studies to establish communication with HMI (Siemens, Allen Bradley, and Pro-face) . Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), sensors and alarms. Introduction to OPC, covering how to configure OPC UA servers and how to program an OPC UA client. Client and servers development Connection management Security configuration Trends and historical data System components What will I gain from this SCADA HMI course? Upon successful completion of this course, candidates will gain a City & Guilds accredited certificate in Scada, HMI and communications.

SCADA – HMI & Communications
Delivered in Clay Cross or Online + more
£500

INTERNATIONAL CUSTOMS

By Export Unlocked Limited

This module aims to develop knowledge and understanding of customs procedures associated with international trade. The module includes trade agreements, tariffs and taxes, immigration, intellectual property rights, clearance procedures, transport regulations, sanitary and Phyto-sanitary measures, customs valuation, preference systems and anti-dumping measures.

INTERNATIONAL CUSTOMS
Delivered Online
£395

C01M04 - FD&FA Commissioning principles - BS 5839-1 (online)

5.0(2)

By Ember Compliance

Learners will develop knowledge from the FD&FA foundation module and/or industry experience and apply this to the commissioning, handover, and acceptance of FD&FA systems.

C01M04 - FD&FA Commissioning principles - BS 5839-1 (online)
Delivered Online + more
£230

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

Preliminary Electronic Security Course

By Hi-Tech Training

The Preliminary Electronic Security Course is an introductory (or revision) course designed to provide participants who have no previous Electrical or Electronics experience with the background skills required to attend the CCTV Installation Course, Access Control Course or Fire Alarm Foundation Course. The course gives both an introduction to electronics and electronic security and shows how the two fields merge together. Ideal for a beginner wishing to learn more about this fascinating area. A large practical content is guaranteed. The day will be an excellent learning experience with a skilled instructor. It is a great introduction to the other courses we provide.

Preliminary Electronic Security Course
Delivered Online
£85 to £685

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in Internationally or OnlineFlexible Dates
£3,697

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered OnlineFlexible Dates
£2,475

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

Educators matching "Security"

Show all 19
Four Echoes

four echoes

London

Echoes of the Four Directions is a coming together of Native American Indian individuals from various tribes, for the purpose of Providing American Indians and non -native American Indians information and education in regards to Native American Indians and our culture. One of the ways we do this is with EDUCATIONAL and CULTURAL PRESENTATIONS. Echoes of The Four Directions will guide and assist you in conducting research for tracing tribal ancestry or tribal affiliation. (no fees involved). CULTURAL DIVERSITY – Echoes of the Four Directions is available as a consultant and or facilitator for both general diversity training and or customized Native American diversity training. The following is a list of what we offer. 1. Speaker – you may pick a topic or we can suggest one for you. FEE $50.00 2. Speaker and native display such as beadwork, artifacts, silverwork, rattles, etc. – display items are explained and discussed. (This is our most requested program). FEE $75.00 3. Native flute playing, talk and demonstration. FEE $50.00 4. Native Silver smith demonstration. FEE $50.00 5. Native bead work demonstration. FEE $50.00 6. Native Story telling. FEE $50.00 7. Native intertribal social dancing demonstration. FEE $50.00 8. Native woman’s traditional shaw dancing demonstration. FEE $50.00 9. Native children’s games and crafts (this is usually reserved for events such as festivals). Fee $100.00 10. Samples of Native foods such as corn soup, boiled peanuts, Native chili, fry bread, and native beverages. FEE 150.00 and up Note: If your program requires Echoes of the Four Directions to travel more than 50 miles one way, there is a minimum of $100.00 a program. Programs can be combined to meet the minimum fee. ECHOES OF THE FOUR DIRETIONS If you, your group, organization or school are interested in any of the listed programs, or even something that is not listed, please e-mail us at aliyo@verizon.com to discuss it. If we are able to sell our art, or food at your function, we may be able to negotiate a discount on the fees listed, or arrange a trade. Our programs can be geared to any age range from daycare level, to university and senior citizen age. We do festivals, cultural events, civic events, historical programs and so on. Specializing in, but not limited to “Eastern Woodlands Cultures.”