• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

523 Static courses

Cybersecurity Law And Digital Privacy Course

3.5(2)

By Elearncollege

Description Cybersecurity Law and Digital Privacy Diploma   As the importance of technology increases and digitisation progresses, the necessity to continuously evaluate their IT infrastructure and the technological safeguards in place to protect their most valuable information assets and data is essential. It is necessary to implement cutting-edge cybersecurity solutions to combat emerging threats. Nonetheless, this is not sufficient to assure compliance with cybersecurity rules. Implementing a cybersecurity policy that sufficiently defends against would-be attackers and guarantees compliance with applicable regulations is one of the most significant problems for firms. This is more complicated since there is no one 'cybersecurity legislation' in the United Kingdom. Some regulations impose cybersecurity requirements on all firms and legislation that applies to businesses within certain industries and meets specified conditions.   Where the law in the United Kingdom does establish cybersecurity duties, firms often have the latitude and discretion to determine how to comply. This adaptability is crucial since the risks offered by potential attackers are continually and swiftly growing. Businesses are typically static targets, which benefits potential attackers. Therefore, businesses must use their limited resources to guarantee that their defence strategies and technologies remain appropriate and guard against the largest risks and vulnerabilities detected. The measures must also be appropriate for each firm, considering its conditions, risk level, technological status, and implementation expense.   Although the legislation does not penalise organisations for falling victim to cyberattacks, fines will be levied for failing to establish steps to protect systems and data from potential attackers and poor responses to assaults. This Cybersecurity Law and Digital Privacy Diploma course is designed for professionals who wish to succeed in their respective fields. This course covers all the skills and information required to become an expert in this profession. This Cybersecurity Law and Digital Privacy Diploma course will provide you with practical knowledge and insight from industry leaders and practitioners.   The Cybersecurity Law and Digital Privacy Diploma course introduces Cyber Security Law and develops to disseminate professional information. This course will offer a comprehensive overview of Cyber Security Law, covering key ideas, application tactics, and in-depth knowledge.   With Cybersecurity Law and Digital Privacy Diploma course, you may develop your professional knowledge and acquire new skills while working at home at your own pace. Cyber security Law has been expertly designed for distance e-learning so that you may acquire a professional degree without ever leaving your house!   After this course, you will have acquired thorough knowledge and practical competencies. The course also has an E-certificate, which may help you stand out on the job market by enhancing your résumé.   By completing this thorough Cybersecurity Law and Digital Privacy Diploma course, you may achieve your goals and prepare for your dream career. Cyber security Law provides students with an in-depth learning experience that may be completed at leisure to develop their professions. The Cybersecurity Law and Digital Privacy Diploma course will teach you everything necessary to progress in your chosen profession.   The Cybersecurity Law and Digital Privacy Diploma course is structured into numerous parts to provide you with the most convenient and comprehensive education. Upon completing the Cybersecurity Law and Digital Privacy Diploma course, you will receive an immediate e-certificate confirming your skill growth and ability. What you will learn 1: Introduction to Cybersecurity 2: Legal Foundations 3: Legal Governance 4: Privacy and Property 5: Cybersecurity and Crime 6: National and International Considerations in Cybersecurity 7: Cyber Laws across Common Law Nations 8: Digital Marketplace and Consumer Rights 9: DarkNet and Cryptocurrency 10: Challenges of Cybersecurity Course Outcomes After completing the course, you will receive a diploma certificate and an academic transcript from Elearn college. Assessment Each unit concludes with a multiple-choice examination. This exercise will help you recall the major aspects covered in the unit and help you ensure that you have not missed anything important in the unit. The results are readily available, which will help you see your mistakes and look at the topic once again. If the result is satisfactory, it is a green light for you to proceed to the next chapter. Accreditation Elearn College is a registered Ed-tech company under the UK Register of Learning( Ref No:10062668). After completing a course, you will be able to download the certificate and the transcript of the course from the website. For the learners who require a hard copy of the certificate and transcript, we will post it for them for an additional charge.

Cybersecurity Law And Digital Privacy Course
Delivered Online On Demand9 days
£99

Conveyancing And Property Law Course

3.5(2)

By Elearncollege

Description Conveyancing and Property Law Diploma Conveyancing and Property Law Diploma Offers a comprehensive overview of the intricacies and foundational knowledge required in the field of property law. This online course is tailor-made for those looking to build a robust understanding of the processes, legalities, and nuances of both conveyancing and broader property law concepts. Beginning with an introduction to Conveyancing and Property Law, this course paves the way for learners to grasp the significance and role of each stage in property transactions. Before delving into any property deal, it's essential to understand the pre-contract stage in conveyancing. This segment enlightens students about the preliminary preparations and procedures that occur before a contract is finalised. This aids in ensuring smooth property transactions without any hitches. However, with every property transaction, there are various legal implications to consider. The Conveyancing and Property Law Diploma equips learners with the know-how to navigate these intricate legalities. From understanding the roles and responsibilities of involved parties to ensuring the correct protocols are followed, this course has got it covered. The journey of understanding doesn't stop at the pre-contract stage. The post-contract stage in conveyancing is equally pivotal, throwing light on what happens after a contract is inked. This includes finalising the finer details, handling any emerging challenges, and ensuring a successful property transfer. One of the major highlights of this diploma is its focus on the roles of conveyancers and solicitors. Their contribution to property transactions is immense, and having an in-depth knowledge of their roles can provide a competitive edge in the property law landscape. To ensure a holistic learning experience, this course extends its coverage to both commercial and residential property law. This bifurcation is crucial, as different rules, regulations, and considerations apply to commercial and residential properties. Leasehold and freehold properties have distinct rights and obligations. The Conveyancing and Property Law Diploma elucidates these differences, ensuring that learners are well-versed in the nuances of both. This knowledge is instrumental, especially when dealing with clients or making property investment decisions. Modern-day property law isn't static. With changing societal needs and evolving legal landscapes, property law reforms come into the picture. Through this diploma, students will gain insights into the recent reforms, ensuring they are up-to-date and ready to tackle modern property law challenges. Finally, the course caps off with property law case studies and ethical considerations. Real-life scenarios offer valuable lessons, and this segment ensures that learners can apply theoretical knowledge in practical situations. Additionally, understanding ethical considerations reinforces the importance of integrity and ethical decision-making in the field of property law. In conclusion, the Conveyancing and Property Law Diploma is not just a course but a journey. A journey that transforms an enthusiastic learner into a well-informed individual ready to tackle the vast world of property law. Whether you're a novice, a professional seeking a refresher, or someone looking to make a career switch, this course provides the foundation and advanced insights to propel you forward. Enrol today and embark on your enlightening journey into the realm of conveyancing and property law. What you will learn 1:Introduction to Conveyancing and Property Law 2:Pre-Contract Stage in Conveyancing 3:Legal Implications in Property Transactions 4:Post-Contract Stage in Conveyancing 5:The Role of the Conveyancer and Solicitor 6:Commercial Property Law 7:Residential Property Law 8:Leasehold and Freehold Properties 9:Understanding Property Law Reforms 10:Property Law Case Studies and Ethical Considerations Course Outcomes After completing the course, you will receive a diploma certificate and an academic transcript from Elearn college. Assessment Each unit concludes with a multiple-choice examination. This exercise will help you recall the major aspects covered in the unit and help you ensure that you have not missed anything important in the unit. The results are readily available, which will help you see your mistakes and look at the topic once again. If the result is satisfactory, it is a green light for you to proceed to the next chapter. Accreditation Elearn College is a registered Ed-tech company under the UK Register of Learning( Ref No:10062668). After completing a course, you will be able to download the certificate and the transcript of the course from the website. For the learners who require a hard copy of the certificate and transcript, we will post it for them for an additional charge.

Conveyancing And Property Law Course
Delivered Online On Demand9 days
£99

Confined Space Safety Course

3.5(2)

By Elearncollege

Description Confined Space Safety Diploma Confined spaces can be inherently dangerous places to work. From the tight restrictions on movement to the potential for hazardous atmospheres, there are numerous risks that workers need to be aware of. That's where the Confined Space Safety Diploma comes into play, offering comprehensive training for those working in, or managing teams in, confined spaces. The Confined Space Safety Diploma is a meticulously designed online course that ensures participants are well-equipped with the knowledge and skills needed to safely navigate the challenges posed by confined spaces. Tailored for the modern learner, this course blends theory with real-world examples, ensuring that students not only understand the material but can also apply it practically. Starting with the basics, the course introduces learners to the concept of confined spaces, ensuring a robust foundational understanding. It then moves on to the various hazards and risks associated with confined spaces. By understanding these threats, participants can be better prepared and more proactive in their safety measures. Legislation and regulations play a pivotal role in confined space safety. The Confined Space Safety Diploma breaks down the key legislative pieces, offering clarity on what is expected from both employers and employees. This ensures that everyone is on the same page, adhering to the highest safety standards. Before anyone enters a confined space, certain pre-entry procedures must be followed. The course delves into these critical steps, ensuring that all potential dangers are identified and mitigated before entry. Furthermore, with confined spaces often posing risks related to air quality and ventilation, the section on ventilation and atmospheric monitoring is indispensable. Protection is paramount. Therefore, the Confined Space Safety Diploma offers a thorough exploration of Personal Protective Equipment (PPE) and gear. Understanding the right equipment to use and how to use it can be the difference between safety and disaster. No safety measures can be effective without proper training and competency. The course underscores the importance of continual training, ensuring that all individuals working in or around confined spaces are competent and aware of best practices. Of course, even with the best preparations, emergencies can happen. The section on rescue and emergency procedures is designed to equip learners with the tools and knowledge they need to act swiftly and effectively should a crisis arise. To ensure that the learning is grounded in real-world examples, the course includes a series of case studies. These lessons learned from actual incidents provide invaluable insights, reinforcing the importance of the safety measures discussed. Lastly, the world of confined space safety isn't static. As technologies evolve and new techniques are developed, it's crucial for professionals to stay updated. The Confined Space Safety Diploma closes with a look at the latest advancements in the field, ensuring that learners are abreast of the most current safety methodologies. In summary, the Confined Space Safety Diploma is an indispensable resource for anyone involved in confined space work. This online course offers a thorough, up-to-date, and practical approach to safety, ensuring that participants are well-prepared to face the challenges of confined spaces head-on. Whether you're a seasoned professional or just starting out, this diploma will elevate your understanding and practice of confined space safety to new heights. Don't miss out on this opportunity to invest in safety and expertise. What you will learn 1:Understanding Confined Spaces 2:Hazards and Risks in Confined Spaces 3:Legislation and Regulations 4:Pre-entry Procedures 5:Ventilation and Atmospheric Monitoring 6:Personal Protective Equipment (PPE) and Gear 7:Training and Competency 8:Rescue and Emergency Procedures 9:Case Studies and Lessons Learned 10:Advancements in Confined Space Safety Course Outcomes After completing the course, you will receive a diploma certificate and an academic transcript from Elearn college. Assessment Each unit concludes with a multiple-choice examination. This exercise will help you recall the major aspects covered in the unit and help you ensure that you have not missed anything important in the unit. The results are readily available, which will help you see your mistakes and look at the topic once again. If the result is satisfactory, it is a green light for you to proceed to the next chapter. Accreditation Elearn College is a registered Ed-tech company under the UK Register of Learning( Ref No:10062668). After completing a course, you will be able to download the certificate and the transcript of the course from the website. For the learners who require a hard copy of the certificate and transcript, we will post it for them for an additional charge.

Confined Space Safety Course
Delivered Online On Demand9 days
£99

Clinical Cupping Therapy Course

By iStudy UK

Want to learn cupping therapy massage that doesn't leave big red or purple circular marks all over the body? Welcome to the Clinical Cupping Therapy Course. This introductory Clinical Cupping Therapy Course course is for anyone who wishes to learn the techniques needed to provide therapeutic cupping therapy massage. In this course, you will learn the step-by-step procedure of cupping therapy massage to treat muscle and joint pains effectively. You will develop an understanding of the conditions in which you can apply cupping therapy to remove toxins and improves blood flow. This course will also explain how to perform cupping therapy massage on different areas of the body, and introduce some effective home stretches or strengthening exercises for pain and muscle spasm relief. You will also learn how to use cupping therapy massage to ensure the most relaxing treatment experience and effectively practice therapeutic cupping therapy massage anywhere in the world. What You'll Learn Gain a thorough understanding of therapeutic cupping therapy massage. Know the correct methods and techniques of cupping therapy massage. Discover how to treat muscle and joint pains, manage stress or anxiety by using cupping therapy. Learn quick home exercises that can be done between treatments to reduce pain faster. Use cupping therapy to treat your own pains, as well as friends, family or clients. Discover cupping therapy massage techniques that don't leave big red or purple marks. Confidently use cupping therapy massage to become a fully qualified practitioner. Requirements To do cupping massage therapy, you will need a set of vacuum cups. I prefer the silicone cups, but you can use the cups that use a pump handle as well. I do not teach the fire cupping therapy method in this course. You will need any form of lubricant to do cupping therapy massage. This can be moisturizers, massage oils, massage creams, coconut oil or any other of your favourite oil. Who this course is for Cupping massage therapy is perfect for massage therapists and other health practitioners, but it is also great for anyone that would love to learn cupping. It is easy, simple, effective and safe. Introduction Welcome to my course! FREE 00:01:00 Learn the 2 different cupping techniques in under 2 minutes FREE 00:02:00 Ok, so let's get serious for a minute. What is so wrong about the red marks? 00:02:00 So How Does Cupping Work? 00:03:00 What Types Of Cups Should I Buy And Why? 00:03:00 These Cups People Swear By, But I have Just Had No Luck with Them 00:02:00 A Rundown On How To Do Cupping On Someone's Back 00:04:00 The Contraindications to Cupping 00:02:00 What should you do your treatment on? 00:01:00 Let's have a little practice shall we? 00:03:00 It's cupping time! The Upper Body And Limbs How this Section Of The Course Works 00:02:00 Neck Pain/Neck Tension 00:04:00 How To Do Cupping For Neck Pain And Tension 00:03:00 How To Do Cupping For The Neck On Someone Else 00:05:00 Some Advanced Techniques For Neck Pain And Tension 00:08:00 Neck Exercises To Relieve Pain 00:01:00 Shoulder/Rotator Cuff Pain/Shoulder Impingements 00:10:00 How To Do Cupping For Rotator Cuff and shoulder problems 00:11:00 Exercises to do for rotator cuff problems 00:06:00 Frozen Shoulder 00:04:00 Exercises For Frozen Shoulder 00:03:00 Extension Exercise For Upper Back Pain Relief 00:03:00 Chest/Respiration/Colds 00:05:00 Biceps Tendonitis/Upper Arm Pain 00:04:00 Tennis Elbow Pain/Forearm Extensor Pain 00:03:00 How To Do Cupping For Tennis Elbow And Extensors Pain 00:03:00 Home Exercises For Tennis Elbow 00:04:00 Golfers Elbow Pain 00:01:00 Carpal Tunnel Syndrome/Wrist Pain 00:02:00 How To Treat Carpal Tunnel Syndrome, Golfer's Elbow And Forearm Pain 00:03:00 Home Exercises For Carpal Tunnel Syndrome 00:01:00 Advanced Techniques For The Arms And Forearms 00:02:00 Hand/Thumb Pain 00:02:00 Home Trigger Point release Techniques For Thumb/Hand Pain 00:03:00 How To Do Cupping For Relaxation/Stress Relief 00:03:00 How To Do A Relaxing Cupping Massage For The Back And Neck 00:06:00 It's cupping time! The Lower Back And Limbs Welcome To Section 3 00:02:00 Lower Back Pain 00:04:00 How To Do Cupping For The Lower Back And Sciatica 00:07:00 Sciatica 00:05:00 Sciatica Summary 00:03:00 Hip Pain, Piriformis Syndrome, Bursitis, S.I. Joint Dysfunction And Buttock Pain 00:06:00 How To Do Cupping For Hip Pain 00:03:00 Hamstring Strains, Hamstring Pain 00:01:00 How To Do Cupping For The Hamstrings. 00:03:00 Thigh Pain and Groin Strains 00:01:00 How To Do Cupping For The Thigh (Quadriceps) and groin area 00:04:00 How To Do Cupping For Iliotibial Band Syndrome 00:03:00 Knee Pain, Runners Knee, Meniscal Pain 00:01:00 How To Do Cupping For Knee Pain 00:03:00 Calf Pain, Calf Cramps and Tired And Sore Calves 00:03:00 How To Do Cupping For The Calf 00:04:00 How To Stretch The Calf Muscles Correctly 00:02:00 Advanced Techniques For The Thighs, Hamstrings And The Lower Leg 00:01:00 Ankle Sprains, Chronic Ankle Pain 00:07:00 A Quick Word About Treating Acute Sprains And Strains 00:03:00 How To Do Cupping For Ankle Pain And Sprains 00:03:00 Treating Chronic Ankle Pain 00:02:00 Plantar Fasciitis/Heel Spur, Foot Pain and Tired Feet 00:02:00 How To Do Cupping For Plantar Fasciitis And Generalized Foot Pain 00:02:00 A Great Home Exercise For Plantar Fasciitis And Any Foot Pain 00:01:00 How Long Should You Stretch A Muscle For? Here is the answer 00:01:00 How Often Should You Treat Someone? 00:03:00 A Word about acupressure and also static cupping What about using static cupping? 00:01:00 Treating using acupressure points as well 00:02:00

Clinical Cupping Therapy Course
Delivered Online On Demand3 hours 28 minutes
£25

Juniper - Introduction to the Junos Operating System (IJOS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview After successfully completing this course, you should be able to: Describe the basic design architecture of the Junos OS. Identify and provide a brief overview of Junos devices. Navigate within the Junos CLI. Perform tasks within the CLI operational and configuration modes. Restore a Junos device to its factory-default state. Perform initial configuration tasks. Configure and monitor network interfaces. Describe user configuration and authentication options. Perform secondary configuration tasks for features and services such as system logging (syslog) and tracing, Network Time Protocol (NTP), configuration archival, and SNMP. Monitor basic operation for the Junos OS and devices. Identify and use network utilities. Upgrade the Junos OS. Perform file system maintenance and password recovery on a Junos device. Navigate within the Junos J-Web interface. Explain basic routing operations and concepts. View and describe routing and forwarding tables. Configure and monitor static routing. Configure and monitor OSPF. Describe the framework for routing policy and firewall filters. Explain the evaluation of routing policy and firewall filters. Identify instances where you might use routing policy. Write and apply a routing policy. Identify instances where you might use firewall filters. Write and apply a firewall filter. Describe the operation and configuration for unicast reverse path forwarding (RPF). This three-day course provides students with the foundational knowledge required to work with the Juniper Networks Junos operating system and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. Key topics include user interface options with a heavy focus on the command-line interface (CLI), configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos devices. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Course Outline COURSE INTRODUCTION Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options: The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options: The J-Web Interface User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Routing Policy Routing Policy Overview Case Study: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper Networks? Security Focus A IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration Additional course details: Nexus Humans Juniper - Introduction to the Junos Operating System (IJOS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Juniper - Introduction to the Junos Operating System (IJOS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Juniper - Introduction to the Junos Operating System (IJOS)
Delivered OnlineFlexible Dates
Price on Enquiry

Python - Object-Oriented Programming

By Packt

Learn Python OOP language used diversely in applications like data science, game/web development, machine learning, and AI. This course provides all you need to master OOPs like classes, objects, data abstraction, methods, overloading, and inheritance. The course primarily aims to help you tackle complex programming and use OOP paradigms efficiently.

Python - Object-Oriented Programming
Delivered Online On Demand3 hours 30 minutes
£56.99

Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training

4.3(43)

By John Academy

Description The Implementing Cisco IP Routing is a qualifying exam for the Cisco Certified Network Professional CCNP, Cisco Certified Internetwork Professional CCIP, and Cisco Certified Design Professional CCDP certifications. This Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training will help you to be certified Successfully with all the important knowledge and skills necessary to use advanced IP addressing and routing in implementing scalable and secure Cisco ISR routers connected to LANs and WANs. The exam also covers configuration of secure routing solutions to support branch offices and mobile workers. This is an advanced course on Cisco routing configuration for both IPv4 and IPv6. In this course, you will gain the knowledge to configure and optimize a routing domain using OSPF, EIGRP, BGP, PBR, IP SLA and configure redistribution when needed. It also includes the configuration of highly secure routing solutions to support branch offices and mobile workers. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Routing Services Complex Enterprise Network Frameworks, Architectures, and Models FREE 00:15:00 Creating, Documenting, and Executing an Implementation Plan 00:09:00 Overview of IP Routing 00:12:00 RIPNG 00:26:00 Configuring the Enhanced Interior Gateway Routing Protocol Understanding EIGRP Terminology and Operation 00:14:00 Planning EIGRP Routing Implementations 00:03:00 Configuring and Verifying EIGRP 00:03:00 Enable EIGRP Routing 00:01:00 Define EIGRP Networks 00:03:00 Define Bandwidth on Interfaces 00:01:00 Enable and Disable EIGRP Automatic Summarization 00:01:00 Passive Interface 00:02:00 IP Default Network 00:03:00 Configure a Router to Advertise a Default Route as the Gateway 00:02:00 Example of the IP Route Next Hop Command 00:01:00 Example of the IP Route Quad Zero Command 00:01:00 Summarization in Discontiguous Networks 00:01:00 Configuring and Verifying EIGRP in an Enterprise WAN 00:03:00 Disabling Automatic Summarization 00:01:00 Frame Relay Using Dynamic Mapping 00:03:00 EIGRP over Layer 3 MPLS VPNs 00:02:00 EIGRP over Layer 2 MPLS VPNs 00:04:00 Configuring and Verifying EIGRP Authentication 00:04:00 Configure Authentication Mode for EIGRP 00:02:00 Configure the Key Chain 00:01:00 Optimizing EIGRP Implementations 00:05:00 Enable Authentication to use the Key Chain 00:01:00 EIGRP 00:21:00 Configuring the Open Shortest Path First Protocol Understanding OSPF Terminology and Operation 00:20:00 OSPF Packets 00:11:00 Planning OSPF Routing Implementations 00:06:00 Basic OSPF Verification and Configuration 00:09:00 Configuring Single Area OSPF 00:02:00 Configuring Multi Area OSPF 00:01:00 EIGRP over Layer 3 MPLS VPNs 00:02:00 OSPF Network Types 00:11:00 Assigning Router Priority 00:02:00 Override the Default Interface Cost 00:01:00 Configure a Key for Simple Authentication 00:01:00 Configure the MD5 Key-ID and Key 00:02:00 Verifying Simple Password Authentication 00:01:00 OSPF 00:19:00 Manipulating Routing Updates Assessing Network Routing Performance Issues 00:05:00 Using Multiple Routing Protocols on a Network 00:09:00 Redistribution Supports All Routing Protocols 00:01:00 Implementing Route Redistribution 00:07:00 Redistribute Routes into RIP 00:03:00 Redistribute Routes into OSPF 00:04:00 Default Metric for Routing Protocols 00:02:00 Redistributing Routes into EIGRP 00:05:00 Applying Metric Values for EIGRP 00:03:00 Modifying the Administrative Distance for all Routing Protocols 00:06:00 Changing OSPF AD 00:15:00 Controlling Routing Update Traffic 00:11:00 Route Map 00:10:00 Using Distribute Lists and Filter Incoming Routing Updates 00:03:00 Defining a Filter for Outgoing Routing Commands 00:02:00 Distribute List In or Out and Examples 00:06:00 Distribute Lists to Avoid Route Feedback 00:05:00 Fallbacks of Distribute Lists 00:01:00 Using Prefix Lists 00:02:00 Implementing Path Control Understanding Path Control 00:05:00 Similarities of ACLs and Prefix Lists 00:01:00 Implementing Path Control using Offset-Lists 00:02:00 Configuring a Prefix List 00:04:00 Implementing Path Control Using Offset-Lists 00:03:00 Verify Offset-Lists 00:01:00 Implementing Path Control using IOS IP SLAs 00:10:00 Cisco IOS IP SLAs 00:01:00 IP SLAs Applications 00:01:00 Operations - Responders and Sources 00:01:00 IP SLAs Operations 00:01:00 Steps to Deploying IP SLAs 00:01:00 IP SLA - ICMP ECHO and ICMP ECHO Sub Commands 00:04:00 IP SLA Schedules 00:05:00 Define Tracking Objects to Track the State of IP SLAs Operations 00:02:00 Configuring Track Delay 00:01:00 Configure a Static Route for IP SLAs Tracking 00:03:00 Verify IP SLAs using Method 1 00:02:00 Verify IP SLAs using Method 2 00:02:00 Implement Path Control using Policy-Based Routing 00:09:00 Implement Path Control using Policy-Based Routing 00:01:00 Configure PBR 00:01:00 Logical PBR Operation 00:01:00 Route-Map Commands for PBR 00:03:00 Match Statements and Conditions 00:03:00 Match Commands Used in PBR 00:01:00 Specify Criteria to be Matched using Prefix Lists of ACLs 00:01:00 Specify Criteria to be Matched by Packet Length 00:01:00 Modify Matching Conditions using Set Statements 00:01:00 Set Conditions 00:03:00 Set Commands used in PBR 00:02:00 Specify the Next Hop IP Address for Matching Packets 00:01:00 Specify Interfaces Through which Packets Can be Routed 00:01:00 Specify a List of Default Next-Hop IP Addresses 00:02:00 Specify a List of Default Interfaces 00:02:00 Mark Packets Using the IP ToS Field 00:02:00 Set the 3 IP Precedence Bits in the IP Packet Header 00:01:00 Set IP Precedence Parameters 00:02:00 Identify a Route Map to Use for Policy Routing on an Interface 00:01:00 Various Methods to Verify PBR 00:02:00 Advanced Path Control Tools 00:02:00 Implementing a Border Gateway Protocol Solution for ISP Connectivity BGP Terminology, Concepts, and Operation 00:20:00 EGP and IGP 00:01:00 AS 00:02:00 IANA 00:01:00 RIRs 00:02:00 AS Numbers 00:03:00 Facts about BGP 00:03:00 BGP Neighbors 00:03:00 BGP Operational Overview 00:02:00 BGP Use between ASs 00:01:00 BGP and IGPs 00:01:00 Connecting Enterprise Networks to Internet Service Providers 00:02:00 Configuring BGP 00:12:00 Questions for Deploying Routing and Connection 00:02:00 Public IP Address Space 00:02:00 Configure Static Routes 00:02:00 Configure the Default Local Preference 00:01:00 Define BGP as the IP Routing Protocol 00:03:00 Router BGP Command Parameters 00:01:00 Identify Peer Router to Establish a BGP Session 00:02:00 Create a Peer Group 00:02:00 Assign Neighbors as Part of the Peer Group 00:02:00 Disable an Existing BGP Neighbor or Peer Group Relationship 00:02:00 Establish the IBGP Session Using a Loopback Interface 00:02:00 IBGP Source IP 00:03:00 Increase the TTL for EBGP Connections 00:03:00 Configure the Router as the Next Hop for a BGP Speaking Peer 00:02:00 Verifying and Troubleshooting BGP 00:01:00 Basic BGP Path Manipulation Using Route Maps 00:05:00 Filtering BGP Routing Updates 00:02:00 Implementing Routing Facilities for Branch Offices and Mobile Workers Planning the Branch Office Implementations 00:15:00 NAT 00:09:00 Planning for Mobile Worker Implementations 00:03:00 Routing Traffic to the Mobile Worker 00:02:00 Implementing IPv6 in the Enterprise Network Introducing IPv6 00:07:00 Configuring and Verifying IPv6 Unicast Addresses 00:06:00 Routing IPv6 Traffic 00:01:00 Configuring Static Routing 00:04:00 Configuring OSPFv3 00:07:00 OSPFv3 00:22:00 Configuring EIGRP for IPv6 00:03:00 EIGRP for IPv6 00:18:00 Multiprotocol BGP (MP-BGP) 00:03:00 Mock Exam Mock Exam- Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training 00:20:00 Final Exam Final Exam- Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training 00:20:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training
Delivered Online On Demand10 hours 56 minutes
£24

Gain valuable insights into power systems with EnergyEdge's classroom training course. Take the first step towards expertise.

Introduction to Power Systems
Delivered In-PersonFlexible Dates
£2,699 to £2,799

Cisco Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security engineer Network engineer Network designer Network administrator Systems engineer Consulting systems engineer Technical solutions architect Network manager Cisco integrators and partners Overview After taking this course, you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW) Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco© CCNP© Security and CCIE© Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower© Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch© Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. Describing Information Security Concepts* Information Security Overview Assets, Vulnerabilities, and Countermeasures Managing Risk Vulnerability Assessment Understanding Common Vulnerability Scoring System (CVSS) Describing Common TCP/IP Attacks* Legacy TCP/IP Vulnerabilities IP Vulnerabilities Internet Control Message Protocol (ICMP) Vulnerabilities TCP Vulnerabilities User Datagram Protocol (UDP) Vulnerabilities Attack Surface and Attack Vectors Reconnaissance Attacks Access Attacks Man-in-the-Middle Attacks Denial of Service and Distributed Denial of Service Attacks Reflection and Amplification Attacks Spoofing Attacks Dynamic Host Configuration Protocol (DHCP) Attacks Describing Common Network Application Attacks* Password Attacks Domain Name System (DNS)-Based Attacks DNS Tunneling Web-Based Attacks HTTP 302 Cushioning Command Injections SQL Injections Cross-Site Scripting and Request Forgery Email-Based Attacks Describing Common Endpoint Attacks* Buffer Overflow Malware Reconnaissance Attack Gaining Access and Control Gaining Access via Social Engineering Gaining Access via Web-Based Attacks Exploit Kits and Rootkits Privilege Escalation Post-Exploitation Phase Angler Exploit Kit Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Stateful Firewall Overview Security Intelligence Overview Threat Information Standardization Network-Based Malware Protection Overview Intrusion Prevention System (IPS) Overview Next Generation Firewall Overview Email Content Security Overview Web Content Security Overview Threat Analytic Systems Overview DNS Security Overview Authentication, Authorization, and Accounting Overview Identity and Access Management Overview Virtual Private Network Technology Overview Network Security Device Form Factors Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Network Address Translation Cisco ASA Interface Access Control Lists (ACLs) Cisco ASA Global ACLs Cisco ASA Advanced Access Policies Cisco ASA High Availability Overview Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Cisco Firepower NGFW Network Address Translation (NAT) Cisco Firepower NGFW Prefilter Policies Cisco Firepower NGFW Access Control Policies Cisco Firepower NGFW Security Intelligence Cisco Firepower NGFW Discovery Policies Cisco Firepower NGFW IPS Policies Cisco Firepower NGFW Malware and File Policies Deploying Email Content Security Cisco Email Content Security Overview Simple Mail Transfer Protocol (SMTP) Overview Email Pipeline Overview Public and Private Listeners Host Access Table Overview Recipient Access Table Overview Mail Policies Overview Protection Against Spam and Graymail Anti-virus and Anti-malware Protection Outbreak Filters Content Filters Data Loss Prevention Email Encryption Deploying Web Content Security Cisco Web Security Appliance (WSA) Overview Deployment Options Network Users Authentication Secure HTTP (HTTPS) Traffic Decryption Access Policies and Identification Profiles Acceptable Use Controls Settings Anti-Malware Protection Deploying Cisco Umbrella* Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Managing Cisco Umbrella Cisco Umbrella Investigate Overview and Concepts Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Keys in Cryptography Public Key Infrastructure Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps IPsec Static Virtual Tunnel Interface Dynamic Multipoint VPN Cisco IOS FlexVPN Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs Cisco IOS VTIs Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies Secure Sockets Layer (SSL) Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Cisco ASA Remote Access VPN Configuration Cisco Firepower NGFW Remote Access VPN Configuration Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Cisco Identity Services Engine Cisco TrustSec Describing 802.1X Authentication 802.1X and Extensible Authentication Protocol (EAP) EAP Methods Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications RADIUS Change of Authorization Configuring 802.1X Authentication Cisco Catalyst© Switch 802.1X Configuration Cisco Wireless LAN Controller (WLC) 802.1X Configuration Cisco Identity Services Engine (ISE) 802.1X Configuration Supplicant 802.1x Configuration Cisco Central Web Authentication Describing Endpoint Security Technologies* Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Application Whitelists and Blacklists Host-Based Malware Protection Sandboxing Overview File Integrity Checking Deploying Cisco Advanced Malware Protection (AMP) for Endpoints* Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Cisco AMP Device and File Trajectory Managing Cisco AMP for Endpoints Introducing Network Infrastructure Protection* Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Network Telemetry Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Deploying Control Plane Security Controls* Infrastructure ACLs Control Plane Policing Control Plane Protection Routing Protocol Security Deploying Layer 2 Data Plane Security Controls* Overview of Layer 2 Data Plane Security Controls Virtual LAN (VLAN)-Based Attacks Mitigation Sp

Cisco Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR)
Delivered OnlineFlexible Dates
Price on Enquiry

Django 3 - Full Stack Websites with Python Web Development

By Packt

In this course, we will be using Django 3 to build 3 stunning websites with HTML5, CSS3, and Bootstrap 4. This format will allow you to learn Django and not just follow along like a robot. We will use Python in this course, so if you have never used Python before, we will start with a Python refresher to get you up to speed (no other Python experience required).

Django 3 - Full Stack Websites with Python Web Development
Delivered Online On Demand8 hours 25 minutes
£59.99