• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4526 Security courses in Whetstone delivered Online

Bodyguard Training

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Bodyguard Training
Delivered Online On Demand7 hours 59 minutes
£25

Computer Engineering: Software and Web development, Coding, Network, Database & Security

4.8(9)

By Skill Up

Flash Sale! 24-in-1 Diploma Bundle | CPD Certified | Free PDF & Transcript Certificates | Lifetime Access

Computer Engineering: Software and Web development, Coding, Network, Database & Security
Delivered Online On Demand7 days
£129

C01M01 - FD&FA Fundamentals - BS 5839-1 (online)

5.0(1)

By Ember Compliance

This is a gateway course for all further learning in FD&FA systems.

C01M01 - FD&FA Fundamentals - BS 5839-1 (online)
Delivered Online + more
£230

24-Hour Basic Security Officer Training

By LAWES Private Training Academy

Our basic security training covers laws and regulations governing security officer practices and procedures within the State of Georgia. Students learn basic case management, report writing, maintaining a good relationship with law enforcement, and surveillance methods. We also cover laws, regulations, ethics, and investigative tools and techniques. Trained officers will then be certified and licensed with the state to work for a business or agency.

24-Hour Basic Security Officer Training
Delivered Online On Demand14 days
FREE

Cybersecurity: Protecting Yourself and Your Company From Phishing Attacks

5.0(1)

By Enspark

Some sources estimate that up to 91% of cyber security breaches begin with email scams, also known as phishing. While these types of attacks have been around for decades, they are becoming more common and more dangerous due to the growing sophistication of cyber criminals and their ability to trick employees. However, with the proper training, everyone in your organization can learn to identify phishing and protect your company from costly attacks. Our four-part series on phishing covers what a phishing attack is, how to quickly recognize one, rules for protecting yourself and your organization, and how to respond to an attempted attack. Learning Objectives Recognize the red flags and common tactics used in email-based phishing attacks, enabling you to identify and avoid potential threats.;Discover best practices for handling suspicious emails and social media-based phishing scams.;Gain insights into the importance of employee awareness and vigilance in preventing phishing attacks, ensuring your organization remains a challenging target for cybercriminals.

Cybersecurity: Protecting Yourself and Your Company From Phishing Attacks
Delivered Online On Demand30 minutes
£14.95

Definitive SIP for engineers

5.0(3)

By Systems & Network Training

SIP training course description A hands on course covering IP telephony with SIP. The course starts with a brief review of knowledge students should already possess including RTP and RTCP. The main focus is on SIP though, progressing from what SIP is through SIP signalling, call processing and architectures, moving onto more advanced issues including security, multimedia, and interoperability. Hands-on practicals follow each major theory session. What will you learn Explain how SIP works. Analyse SIP packets. Deploy SIP IP telephony solutions. Integrate SIP with other telephony solutions. SIP training course details Who will benefit: Technical staff working with SIP. Prerequisites: Definitive VoIP for engineers Duration 3 days SIP training course contents VoIP review What is VoIP? Brief review of IP, Brief review of telephones and voice. RTP, RTCP, mixers and translators. Hands on Analysing RTP packets. What is SIP? Why SIP? SIP history, SIP standards, SIP capabilities, key services, how SIP works, and a basic SIP call. Hands on Peer to peer SIP. SIP messages SIP sessions, SIP flows, Message structure, INVITE, ACK, BYE, CANCEL, OPTIONS, REGISTER. Extension methods. Response codes. SIP call flows. Hands on Analysing SIP packets. SIP architectures UA client, UA server, Proxy servers, Redirect servers, registrars. SIP phones, gateways, application servers, and other products. Stateful and stateless servers. Various call scenarios. Hands on SIP proxies. SIP addressing URLs, SIP addresses, registration, Location and Directory servers. Address tracking. Hands on SIP and DNS. Supplementary services SIP signalling, signalling compression, Call hold, Call forwarding, Home and away scenarios, transfers, conferences, call control. Hands on Analysing SIP supplementary services. SDP What is SDP? Multimedia, multimedia session announcement, invitation and others. Relationship with SIP. Hands on Video conferencing with SIP. SIP security Access control, Authentication, encryption, firewalls. Hands on SIP authentication. Interoperability Inter working with PSTN, ISUP to SIP mapping, SIP and 3G, SIP-T, SIP and SIGTRAN. SIP and H323. Hands on SIP and gateways. SIP mobility Terminal mobility, service mobility, personal mobility, Mobile IP, SIP signalling flows in 3G.

Definitive SIP for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

Oracle Database Security - Detective Controls

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for Administrator, Database Administrator, Security Specialist, and Systems Administrator. Overview Upon successful completion of this course, students will be able to Enumerate Oracle auditing solutions to monitor database security requirements, Implement Oracle Audit Vault and Database Firewall, Configure Oracle Audit Vault and Database Firewall, Explain Oracle Compliance Framework, and Configure basic Compliance Framework rules. In the Oracle Database Security: Detective Controls course, students learn how they can use Oracle Database administration auditing features to meet the compliance requirements of their organization. IntroductionUsing Unified AuditUsing Fine-Grained AuditIntroduction to Oracle Audit Vault and Database Firewall (AVDF)Planning the Oracle Audit Vault and Database Firewall ImplementationInstalling the Audit Vault ServerConfiguring the Audit Vault ServerConfiguring Oracle AVDF and Deploying the Audit Vault AgentNetworking and Oracle AVDFInstalling a Database FirewallConfiguring Oracle AVDF and Deploying Database FirewallUsing Host MonitoringConfiguring High AvailabilityCreating Custom Collection Plug-insManaging the Audit Vault ServerManaging the Database FirewallsOverview of the Auditing and Reporting FeaturesPerforming Administrative TasksCreating Audit Policies for Oracle DatabasesCreating Database Firewall PoliciesOracle AVDF ReportsManaging Entitlements Additional course details: Nexus Humans Oracle Database Security - Detective Controls training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database Security - Detective Controls course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle Database Security - Detective Controls
Delivered OnlineFlexible Dates
Price on Enquiry

70-642 - Configuring Windows Server 2008 R2 Network Infrastructure

4.3(43)

By John Academy

Description: The course provides all the necessary information that a Microsoft Certified Technology Specialist in Windows Server 2008 Network Infrastructure Configuration should know. In the 70-642 - Configuring Windows Server 2008 R2 Network Infrastructure course, you will learn how to work with IP addressing and services, names resolution, file and print services, network access and remote access, and monitoring network services. The course teaches you about the proper ways of configuring addresses and services through a detailed analysis of configuring IPv4 and IPv6, the ways of configuring dynamic host configuration protocol (DHCP), configuring routing, creating DHCP Servers for your network, creating Windows Firewall with Advanced Security, and deploying DNS server. The course will also teach you the process of connecting Windows with LAN, managing files and printers, and the ways of securing Windows through updates. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? 70-642 - Configuring Windows Server 2008 R2 Network Infrastructure is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our 70-642 - Configuring Windows Server 2008 R2 Network Infrastructure is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Understanding and Configuring IP Introducing the OSI Model FREE 00:24:00 How IPv4 Works 00:26:00 Subnets and Supernets 00:25:00 What's New with IPv6 00:10:00 Configuring Windows with an IPv4 Address 00:28:00 Configuring IP Based Solutions Why Use a DHCP Server 00:59:00 Creating DHCP Servers for Your Network 00:19:00 How Windows Performs Name to IP Resolution 00:15:00 Configuring Windows to Use DNS 00:23:00 How Does DNS Really Work 00:17:00 Deploying DNS Servers 00:35:00 DNS Configurable Options 00:15:00 Managing Different Types of DNS Zones 00:29:00 Configuring Zone Replication and Transfers 00:25:00 Understanding IP Routing Routing Explained 00:29:00 Router Communication Protocols 00:51:00 Connecting Windows to the LAN NAT Explained 00:11:00 Making NAT Work 00:07:00 Remote Access to Other Networks 00:20:00 WiFi Basics 00:51:00 Securing the Client, Network, and Communications Communication Security: IPSec 00:33:00 Enforcing IPSec with Policies 01:04:00 Network Security with NAP 00:28:00 Client Security with Windows Firewall 01:02:00 Other Security Solutions 00:29:00 Managing Files Working with File Security 00:15:00 Server Role - File Services 00:23:00 Using DFS 00:36:00 Using EFS 00:41:00 Performing a Backup and Restore 00:17:00 Monitoring Systems How to Install and Use Network Monitor and SNMP 00:37:00 Windows Performance and Reliability Monitoring 00:36:00 Looking at Event Logs 00:06:00 Configuring Event Forwarding 00:27:00 Managing Printers Server Role - Print Services 00:04:00 How to Share Printers 00:35:00 Securing Windows Through Updates What is Windows Server Update Services? 00:10:00 Planning & Deploying the WSUS Installation 00:06:00 Using Windows Server Update Services 00:22:00 Using WSUS 00:11:00 Mock Exam Mock Exam- 70-642 - Configuring Windows Server 2008 R2 Network Infrastructure 00:20:00 Final Exam Final Exam- 70-642 - Configuring Windows Server 2008 R2 Network Infrastructure 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

70-642 - Configuring Windows Server 2008 R2 Network Infrastructure
Delivered Online On Demand18 hours 21 minutes
£24

AZ-140T00 Configuring and Operating Microsoft Azure Virtual Desktop

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students for AZ-140: Configuring and Operating Microsoft Azure Virtual Desktop are interested in delivering applications on Azure Virtual Desktop and optimizing them to run in multi-session virtual environments. As an Azure Virtual Desktop administrator, you will closely with the Azure Administrators and Architects, along with Microsoft 365 Administrators. Azure Virtual Desktop administrator responsibilities include planning, deploying, packaging, updating, and maintaining the Azure Virtual Desktop infrastructure. They also create session host images, implement and manage FSLogix, monitor Azure Virtual Desktop performance, and automate Azure Virtual Desktop management tasks. This course teaches Azure administrators how to plan, deliver, and manage virtual desktop experiences and remote apps, for any device, on Azure. Lessons include implementing and managing networking for Azure Virtual Desktop, configuring host pools and session hosts, creating session host images, implementing, and managing FSLogix, monitoring Azure Virtual Desktop performance and health, and automating Azure Virtual Desktop management tasks. Students will learn through a mix of demonstrations and hands-on lab experiences deploying virtual desktop experiences and apps on Azure Virtual Desktop and optimizing them to run in multi-session virtual environments. Candidates of this course must have solid Azure administration skills. This course assumes prior experience, including virtualization, networking, identity, storage, backup and restore, and disaster recovery. Students should have knowledge of on-premises virtual desktop infrastructure technologies as they relate to migrating to Azure Virtual Desktop. Students are expected to have used the tools common to the Azure environment, such as the Azure PowerShell and Cloud Shell. 1 - Azure Virtual Desktop Architecture Azure Virtual Desktop for the enterprise Azure Virtual Desktop components Personal and pooled desktops Service updates for Azure Virtual Desktop desktops Azure limitations for Azure Virtual Desktop Virtual machine sizing for Azure Virtual Desktop Azure Virtual Desktop pricing 2 - Design the Azure Virtual Desktop architecture Assess network capacity and speed requirements for Azure Virtual Desktop Azure Virtual Desktop Experience Estimator Recommend an operating system for an Azure Virtual Desktop implementation Balancing host pools Recommendations for using subscriptions and management groups Configure a location for the Azure Virtual Desktop metadata Recommend a configuration for performance requirements 3 - Design for user identities and profiles Select an appropriate licensing model for Azure Virtual Desktop based on requirements Personal and multi-session desktop scenarios Recommend an appropriate storage solution Plan for a desktop client deployment Plan for Azure Virtual Desktop client deployment - Remote Desktop Protocol (RDP) Windows Desktop client to multiple devices Hybrid Identity with Azure Active Directory Plan for Azure Active Directory (AD) Connect for user identities 4 - Implement and manage networking for Azure Virtual Desktop Implement Azure virtual network connectivity Manage connectivity to the internet and on-premises networks Understanding Azure Virtual Desktop network connectivity Implement and manage network security for Azure Virtual Desktop Configure Azure Virtual Desktop session hosts using Azure Bastion Monitor and troubleshoot network connectivity for Azure Virtual Desktop Plan and implement Remote Desktop Protocol Shortpath Configure Remote Desktop Protocol Shortpath for managed networks Configure Windows Defender Firewall with Advanced Security for RDP Shortpath Plan and implement Quality of Service for Azure Virtual Desktop 5 - Implement and manage storage for Azure Virtual Desktop Storage for FSLogix components Configure storage for FSLogix components Configure storage accounts Create file shares Configure disks 6 - Create and configure host pools and session hosts for Azure Virtual Desktop Automate creation of an Azure Virtual Desktop host pool using PowerShell Configure host pool assignment type Customize Remote Desktop Protocol (RDP) properties for a host pool Manage licensing for session hosts that run Windows client Deploying Azure AD-joined virtual machines in Azure Virtual Desktop 7 - Create and manage session host image for Azure Virtual Desktop Create a managed virtual machine (VM) image Modify a session host image Plan for image update and management Create and use an Azure Compute Gallery using the portal Create an Azure Virtual Desktop image by using VM Image Builder Install Microsoft 365 Apps on a master Virtual Hard Disk image Install language packs in Azure Virtual Desktop 8 - Manage access for Azure Virtual Desktop Role-based access control (RBAC) for Azure Virtual Desktop Plan and implement Azure roles and role-based access control (RBAC) for Azure Virtual Desktop Using Azure Virtual Desktop with Microsoft Intune Configuring screen capture protection for Azure Virtual Desktop 9 - Manage security for Azure Virtual Desktop Plan and implement Conditional Access policies for connections to Azure Virtual Desktop Plan and implement multifactor authentication (MFA) in Azure Virtual Desktop Understand Conditional Access policy components Manage security by using Azure Security Center Security posture management and threat protection 10 - Implement and manage FSLogix Plan for FSLogix FSLogix profile containers and Azure files Install FSLogix Storage options for FSLogix profile containers Profile Container vs Office Container Configure Office Containers Installing Microsoft Office using FSLogix application containers Configure Cloud Cache Configure Profile Containers Create a profile container with Azure NetApp Files and capacity pool Manage Rule Sets and application masking 11 - Configure user experience settings Virtual desktop optimization principles Persistent virtual desktop environments Configure user settings through group policies Configure user settings through Endpoint Manager policies Configure session timeout properties Configure device redirections Configure Universal Print Implement the Start Virtual Machine on Connect feature Troubleshoot user profile issues Troubleshoot Azure Virtual Desktop clients 12 - Install and configure apps on a session host MSIX app attach How MSIX app attach works Set up a file share for MSIX app attach Upload MSIX images to Azure NetApp Files in Azure Virtual Desktop How to configure apps for users Using the OneDrive sync app on virtual desktops Using Microsoft Teams on Azure Virtual desktop Publish built-in apps in Azure Virtual Desktop Troubleshoot application issues for Azure Virtual Desktop 13 - Plan for disaster recovery Disaster recovery for Azure Virtual Desktop Virtual machine replication FSLogix configuration 14 - Automate Azure Virtual Desktop management tasks Scale session hosts using Azure Automation Create or update an Azure Automation account Create an Azure Automation Run As account Create the Azure Logic App and execution schedule 15 - Monitor and manage performance and health Monitor Azure Virtual Desktop by using Azure Monitor Log Analytics workspace for Azure Monitor Monitor Azure Virtual Desktop by using Azure Advisor How to resolve Azure Advisor recommendations Diagnose graphics performance issues Additional course details: Nexus Humans AZ-140T00 Configuring and Operating Windows Virtual Desktop on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-140T00 Configuring and Operating Windows Virtual Desktop on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-140T00 Configuring and Operating Microsoft Azure Virtual Desktop
Delivered OnlineFlexible Dates
£2,380

Cybersecurity: An Introduction to Cybersecurity

5.0(1)

By Enspark

Delve into cybersecurity beyond tools: understand employee roles, cybercrime motivations, and the evolving threat landscape. Learn to guard against breaches with awareness.

Cybersecurity: An Introduction to Cybersecurity
Delivered Online On Demand10 minutes
£5.95