• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4637 Security courses in Tyldesley delivered Online

Epilepsy Awareness

5.0(5)

By Wimbledon Training Services

This course will give you an overview of epilepsy. It lists the methods of diagnosis, what a seizure is and how the brain can be affected. It will introduce some possible seizure triggers and describe what to do when someone has a seizure. It will also discuss some of the treatments offered to people with epilepsy and provide practical advice on what you can do if you witness someone having a seizure.

Epilepsy Awareness
Delivered Online On Demand
£30

Understanding your Role in Care

5.0(5)

By Wimbledon Training Services

This course will define social care and talk about why people choose it as a career and what its goals and objectives are. It will also cover job descriptions, person centred care, understanding code of practices and the basics of government legislation. Finally it will touch on dealing with conflicts at work.

Understanding your Role in Care
Delivered Online On Demand
£30

Twitter for Business

5.0(5)

By Wimbledon Training Services

Twitter is a social media platform that is used by a wide range of people, from celebrities, who use it to communicate with their fans to companies and brands who can use it to engage their customers and attract new ones. This courses will look in detail at the use of Twitter as part of your marketing activity.

Twitter for Business
Delivered Online On Demand
£108

WM103 IBM Technical Introduction to IBM MQ

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This basic course is designed for system administrators, system architects, application developers, quality assurance specialists, and technical sales and marketing professionals. Overview After completing this course, you should be able to: Summarize current business drivers and the need for flexibility Describe enterprise messaging and the capabilities it must provide Identify the main ways that IBM© MQ can impact application design Describe the basic components of IBM© MQ Differentiate between point-to-point and IBM© MQ cluster connectivity Summarize queue manager and queue manager components administrative tasks Contrast the architectural role of IBM© MQ clusters and multiple instance queue managers Describe the security provisions of IBM© MQ and IBM© MQ Advanced Message Security Describe how IBM© MQ is used as part of the communications infrastructure to: Connect application environments, such as the World Wide Web, enterprise transaction systems, and database systems Manage the distribution of publisher information to appropriate subscribers Provide file transfer management with IBM© MQ Managed File Transfer Serve as a JMS provider Interface with WebSphere Application Server Store in-flight messages for IBM© Integration Bus Interact with z/OS applications Facilitate connectivity to mobile environments with IBM© MQ Telemetry Describe the options for deployment to the Cloud In this course, you learn about IBM© MQ V9 basic components and the path that messages follow when they are exchanged between applications. You also learn how IBM© MQ administrative responsibilities can include the management of topic-based publish/subscribe messaging, managed file transfer, and deployments to the cloud. Topics include an overview of the support that IBM© MQ provides for security, publish/subscribe, high availability, administration, logging, auditing, managed file transfer, MQTT, and cloud options. Course introductionIBM© MQ overviewIBM© MQ basicsMessaging styles, topologies, and architecture overviewSystem administration overviewSecurity overviewIntroduction to IBM© MQ Managed File TransferIntroduction to IBM© MQ Telemetry and IBM© MessageSightIntroduction to the IBM© MQ ApplianceExpanding the scope of IBM© MQCourse summary

WM103 IBM Technical Introduction to IBM MQ
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black EDR: Install, Configure, Manage [V7.x]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security analyst, threat hunters, or incident responders Security professionals who work with enterprise and endpoint security tools Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of a Carbon Black EDR implementation Perform the installation, upgrade, and configuration of the Carbon Black EDR server Describe the purpose and use of multiple datastores in the server Perform live queries across endpoints to gather additional data Perform effective searches across the dataset to find security artifacts related to the endpoints Manage Threat Intelligence Feeds and Watchlists Describe connectors in Carbon Black EDR Troubleshoot server and sensor problems Analyze data found in the Heads-Up Display Manage investigations to group and summarize security incidents and artifacts Perform the different response capabilities available to users in Carbon Black EDR Use the Carbon Black EDR API to automate tasks This three-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in installing, configuring, and managing the VMware Carbon Black© EDR? environment. This course introduces you to product features, capabilities, and workflows for managing endpoint security. Hands-on labs enable learners to reinforce topics by performing operations and tasks within the product in a training environment. Course Introduction Introductions and course logistics Course objectives Planning and Architecture Describe the architecture and components of Carbon Black EDR Identify the communication requirements for Carbon Black EDR Server Installation, Upgrade, and Administration Install the Carbon Black EDR server Describe the options during the installation process Install a Carbon Black EDR sensor Confirm data ingestion in the Carbon Black EDR server Identify built-in administration tools Manage sensor groups Manage users and teams Server Datastores Describe the datastores used in Carbon Black EDR Interact with the available datastores Live Query Describe live query capabilities Perform queries across endpoints Searching and Best Practices Describe the capabilities and data available in the process search Perform process searches to find specific endpoint activity Describe the capabilities and data available in the binary search Perform binary searches to find application data Describe the query syntax and advanced use cases Perform advanced queries across the dataset Threat Intelligence Feeds and Watchlists Define Threat Intelligence Feeds Manage the available Threat Intelligence Feeds Describe the use of Watchlists Manage Watchlists in the environment Connectors in Carbon Black EDR Configure connectors in Carbon Black EDR Troubleshoot connectors Troubleshooting Identify the available troubleshooting scripts in the Carbon Black EDR server Run troubleshooting scripts to identify problems Generate a sensor log bundle Identify the location of sensor registry keys Head-Up Display Identify panels relating to endpoint data Analyze endpoint data provided by the panels Identify panels relating to operations data Analyze operations data provided by the panels Identify panels relating to server data Analyze server data provided by the panels Define alert generation in Carbon Black EDR Manage alerts Investigations Describe investigations Explore data used in an investigation Manage investigations Manage investigation events Responding to Endpoint Incidents Describe isolation in Carbon Black EDR Manage isolating endpoints Describe live response capabilities Manage live response sessions Describe hash banning Manage banned hashes Overview of Postman and the Carbon Black EDR API Explain the use of the API Differentiate the APIs available for Carbon Black EDR Explain the purpose of API tokens Create an API token Explain the API URL Create a valid API request Import a collection to Postman Initiate an API request from Postman Perform operations manually using Postman Analyze the use cases for Postman Show basic automation tasks using the API and curl Compare the usage of curl with Postman Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black EDR: Install, Configure, Manage [V7.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black EDR: Install, Configure, Manage [V7.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black EDR: Install, Configure, Manage [V7.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Port Management, Commercial law & Logistic Management

By Imperial Academy

3 QLS Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 10 CPD Courses | Lifetime Access

Port Management, Commercial law & Logistic Management
Delivered Online On Demand
£399

Level 1 Diploma in Tourism and Hospitality Management

5.0(1)

By Empower UK Employment Training

Level 1 Diploma in Tourism and Hospitality Management Master Hospitality Management fundamentals, dive into Hospitality Management recruitment strategies, and specialize in front office and housekeeping. Conquer engineering and food and beverage operations in Hospitality Management. Learning Outcomes: Define Hospitality Management's key sectors. Assess Recruitment in Hospitality Management. Operate Front Office in Hospitality Management. Manage Housekeeping and Engineering effectively. Oversee Food and Beverage in Hospitality Management. More Benefits: LIFETIME access Device Compatibility Free Workplace Management Toolkit Level 1 Diploma in Tourism and Hospitality Management Course Syllabus Hospitality Management Basics: Gain a foundational grasp of Hospitality Management. Understand the breadth and scope of the Hospitality Management industry, including trends and key sectors. Recruitment: Learn the nuances of recruitment within the Hospitality Management sphere. Gain skills in staff development and training specific to Hospitality Management. Front Office: Master front office operations framed by Hospitality Management. Understand guest services, reservations, and how Hospitality Management affects check-in and check-out procedures. Housekeeping, Engineering, and Security: Delve into housekeeping and engineering under the umbrella of Hospitality Management. Master cleanliness standards, maintenance protocols, and Hospitality Management best practices in security. Food and Beverage: Engage deeply with food and beverage operations within Hospitality Management. Learn the art of menu planning, customer service, and creating memorable dining experiences in line with Hospitality Management standards. Marketing and Sales in Hospitality: Explore Hospitality Management strategies for effective marketing and sales. Learn how to attract guests and promote services under the principles of Hospitality Management.

Level 1 Diploma in Tourism and Hospitality Management
Delivered Online On Demand1 hour 24 minutes
£5

Use Steemit to Earn Steem - Cryptoception

By Compete High

🚀 Unlock the Power of Steemit and Earn Steem with 'Cryptoception' 🌟 Are you ready to dive into the world of cryptocurrency and leverage the incredible potential of Steemit to earn Steem? Look no further! Introducing 'Cryptoception,' your gateway to mastering Steemit and maximizing your earnings in the ever-evolving crypto sphere. 🔥 What is 'Cryptoception' all about? 🔥     This comprehensive online course is your ultimate guide to harnessing the power of Steemit, the revolutionary social media platform built on blockchain technology. Led by industry experts and seasoned Steemit enthusiasts, 'Cryptoception' is designed to equip you with the knowledge and strategies needed to navigate Steemit effectively and earn Steem like a pro. 📈 What You'll Learn:   Understanding Steemit: Dive deep into the mechanics of Steemit, comprehend its blockchain structure, and grasp the dynamics of earning through content creation, curation, and engagement. Optimizing Your Content: Learn insider tips and tricks to create engaging and rewarding content that attracts attention, gains followers, and ultimately boosts your earnings. Monetization Strategies: Explore various monetization techniques, including leveraging Steem Power, exploring communities, and utilizing smart strategies to maximize your rewards. Navigating the Steemit Ecosystem: Gain insights into the diverse opportunities within Steemit, including DApps, tokens, and the broader crypto ecosystem connected to Steem. Risk Management and Security: Understand the importance of security measures, risk management, and safeguarding your assets in the crypto world. 💡 Why 'Cryptoception' Stands Out:   Expert Guidance: Learn from industry experts who have navigated the intricacies of Steemit and earned significant rewards. Practical Insights: Gain actionable strategies and practical advice you can implement immediately to enhance your Steemit journey. Community Support: Join a vibrant community of like-minded individuals, exchange ideas, and grow together on your Steemit journey. 🌐 Don't Miss Out on Your Chance to Earn with Steemit! Enroll in 'Cryptoception' Today! 🌐 Join the ranks of successful Steemit users who have unlocked the potential of earning Steem while engaging with a thriving online community. Take charge of your crypto journey and turn your content into valuable rewards! Course Curriculum

Use Steemit to Earn Steem - Cryptoception
Delivered Online On Demand1 hour
£4.99

Configuring Juniper Networks Firewall/IPSec VPN Products

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for network engineers, support personnel, reseller support, and others responsible for implementing Juniper Networks ScreenOS firewall products. Overview After successfully completing this course, you should be able to:Explain the Juniper Networks security architecture.Configure administrative access and options.Back up and restore configuration and ScreenOS files.Configure a ScreenOS device in transparent, route, Network Address Translation (NAT), and IP version 6 (IPv6) modes.Discuss the applications of multiple virtual routers.Configure the Juniper Networks firewall to permit and deny traffic based on user defined policies.Configure advanced policy options.Identify and configure network designs for various types of network address translation.Configure policy-based and route-based VPN tunnels. This course is the first in the ScreenOS curriculum. It is a course that focuses on configuration of the ScreenOS firewall/virtual private network (VPN) products in a variety of situations, including basic administrative access, routing, firewall policies and policy options, address translation, and VPN implementations. The course combines both lecture and labs, with significant time allocated for hands-on experience. Students completing this course should be confident in their ability to configure Juniper Networks firewall/VPN products in a wide range of installations. Chapter 1: Course IntroductionChapter 2: ScreenOS Concepts, Terminology, and PlatformsChapter 3: Initial Connectivity Lab 1: Initial Configuration Chapter 4: Device Management Lab 2: Device Administration Chapter 5: Layer 3 Operations Lab 3: Layer 3 Operations Chapter 6: Basic Policy Configuration Lab 4: Basic Policy Configuration Chapter 7: Policy Options Lab 5: Policy Options Chapter 8: Address Translation Lab 6: Address Translation Chapter 9: VPN ConceptsChapter 10: Policy-Based VPNs Lab 7: Policy-Based VPNs Chapter 11: Route-Based VPNs Lab 8: Route-Based VPNs Chapter 12: IPv6 Lab 9: IPv6 Appendix A: Additional FeaturesAppendix B: Transparent Mode Lab 10: Transparent Mode (Optional) Additional course details: Nexus Humans Configuring Juniper Networks Firewall/IPSec VPN Products training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Configuring Juniper Networks Firewall/IPSec VPN Products course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Configuring Juniper Networks Firewall/IPSec VPN Products
Delivered OnlineFlexible Dates
Price on Enquiry

B6255 IBM Cognos Analytics - Enterprise Administration (V11.1.x)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Administrators Overview Please refer to course overview This offering covers the fundamental concepts of installing and configuring IBM Cognos Analytics, and administering servers and content, in a distributed environment. In the course, participants will identify requirements for the installation and configuration of a distributed IBM Cognos Analytics software environment, implement security in the environment, and manage the server components. Students will also monitor and schedule tasks, create data sources, and manage and deploy content in the portal and IBM Cognos Administration. Introduction to IBM Cognos Analytics administration IBM Cognos Analytics components Administration workflow IBM Cognos Administration IBM Cognos Configuration Identify IBM Cognos Analytics architecture Features of the IBM Cognos Analytics architecture Examine the multi-tiered architecture, and identify logging types and files Examine IBM Cognos Analytics servlets Performance and installation planning Balance the request load Configure IBM Cognos Analytics Secure the IBM Cognos Analytics environment Identify the IBM Cognos Analytics security model Define authentication in IBM Cognos Analytics Define authorization in IBM Cognos Analytics Identify security policies Secure the IBM Cognos Analytics environment Administer the IBM Cognos Analytics server environment Administer IBM Cognos Analytics servers Monitor system performance Manage dispatchers and services Tune system performance, and troubleshoot the server Audit logging Dynamic cube data source administration workflow Manage run activities View current, past, and upcoming activities Manage schedules Manage content in IBM Cognos Administration Data sources and packages Manage visualizations in the library Deployment Other content management tasks Examine departmental administration capabilities Create and manage team members Manage activities Create and manage content and data Manage system settings Manage Themes, Extensions, and Views Share services with multiple tenants

B6255 IBM Cognos Analytics - Enterprise Administration (V11.1.x)
Delivered OnlineFlexible Dates
Price on Enquiry