• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

7316 Systems courses delivered Online

Linux Server Administration Made Easy with Hands-On Training

By Packt

Do you want to learn basic Linux system administration using real-world applied learning? Do you want to learn how to install and configure a Linux server? Do you prefer learning using hands-on as opposed to just a lecture and quiz? If you have answered yes to these questions, then you have chosen the right course.

Linux Server Administration Made Easy with Hands-On Training
Delivered Online On Demand3 hours 41 minutes
£13.99

ISO 27701 Internal Auditor

By Training Centre

  Being ISO 27701 Certified proves your Information Privacy Systems Audit experience, skills and knowledge, and demonstrates you are capable in the assessment of vulnerabilities, Compliance with GDPR and institutional controls within the enterprise.   Gain an in-depth understanding of GDPR solutions and how they map to compliance requirements Learn how to perform and lead Privacy Information Management System (PIMS) certification audits to ISO 19011 standards Enhance your existing or learn with new skills in the field of Data Protection Candidates deliver Assurance services to organisations by advising on conformance with PIMS requirements Become a Technical expert on the preparation required for ISO 27701 Certification Understand a Privacy Information Management System (PIMS) and its processes based on ISO/IEC 27701 Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks Acquire the competences of the auditor's role in planning, leading, and following up on a management system audit in accordance with ISO 19011. Learn how to interpret the requirements of ISO/IEC 27701 in the context of a PIMS audit About This Course   ISO 27701 Internal Auditor Certification;    Confirms your knowledge and experience Quantifies and markets your expertise Demonstrates that you have gained and maintained the level of knowledge required to meet the dynamic challenges of a modern enterprise Is globally recognized as the mark of excellence for the Information Privacy Audit professional Increases your value to your organization Gives you a competitive advantage over peers when seeking a new role Is administered by the International Examination & Certification Board (IECB), based in Estonia, and fully aligned to the ISO/IEC 17024:2012 standard (Conformity assessment - General requirements for bodies operating certification of persons)   Certified Individuals:    Are highly qualified, experienced professionals in the field of Data Protection Systems Audit Provide the enterprise with a Certification route for Information Privacy Assurance that is recognized by multinational clients, lending credibility to the enterprise Are excellent indicators of proficiency in control requirements creation and monitoring Demonstrate competence in five domains, including standards and practices; organization and management; processes; integrity, confidentiality and availability; and software development, acquisition and maintenance Demonstrate a commitment to providing the enterprise with trust in and value from your Privacy Compliance Framework Maintain ongoing professional development for successful on -the -job performance   The below job practice is organized by domains. Each domain is covered in the course.   Domain 1-The Process of Auditing Information Privacy Systems and Solutions   Provide audit services in accordance with ISO 19011 audit standards to assist the organization in protecting and controlling information privacy systems.    Domain 2 - Governance and Management of Information Privacy Technology   Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organization's strategy.    Domain 3-Information Systems Acquisition, Development and Implementation   Provide assurance that the practices for the acquisition, development, testing and implementation of information systems meet the organization's strategies and objectives.    Domain 4-Information Systems Operations, Maintenance and Service Management Provide assurance that the processes for information systems operations, maintenance and service management meet the organization's strategies and objectives.   Domain 5-Protection of Personally Identifiable Information (PII) Assets   Provide assurance that the organization's policies, standards, procedures and controls ensure the confidentiality, integrity and availability of PII.   Prerequisites   A thorough understanding of current Data Protection legislation, Information Security & Risk Management knowledge as well as ISO 19011 Auditing Standards is required to successfully pass the examination. What's Included?   Teas, Coffees, refreshments and a full Lunch* Course Slides Study Guide Exam Fees * For Classroom based Courses only Accreditation   Who Should Attend?   Auditors seeking to perform and lead Privacy Information Management System (PIMS) certification audits Managers or consultants seeking to master a PIMS audit process Individuals responsible for maintaining conformance with PIMS requirements Technical experts seeking to prepare for a PIMS audit Expert advisors in the protection of Personally Identifiable Information (PII)   Assessment     Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 3 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Our Guarantee   We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE.   *FREE training offered for retakes - come back within a year and train for free. Provided by   This course is Accredited by NACS and Administered by the IECB

ISO 27701 Internal Auditor
Delivered OnlineFlexible Dates
£1,250

Transmission demystified

5.0(3)

By Systems & Network Training

Transmission demystified training course description Transmission is the process of sending information along a medium of, copper, fibre or wireless. This course looks at transmission techniques for both telecommunications and data communications with a particular focus on Microwave, SDH, DWDM transmission. The course aims to demystify these technologies by explaining all the buzzwords used in transmission. What will you learn Describe various transmission technologies such as multiplexing and demultiplexing. Explain how Microwave works. Explain how SDH works. Explain how DWDM works. Transmission demystified training course details Who will benefit: Anyone working in telecommunications. Prerequisites: None. Duration 2 days Transmission demystified training course contents Transmission basics Systems, media, signals. Signal degradation, noise, distortion, attenuation. Digital, analogue. Modulation, encoding. RF Frequency, wavelength. Distance / range issues, interference, Antenna, power, dB, RF propagation, testing. Microwave transmission What is microwave transmission, point to point communications, line of sight, parabolic antenna, relays, planning considerations, rain and other issues Wired transmissions Copper, Fibre, optical transmission, fibre characteristics, fibre component parts. Multi Mode Fibre (MMF). Single Mode Fibre (SMF). Fibre connections. Lasers. Attenuations, dispersion, optical signal noise ratios (OSNR) and their effects. Channel Spacing and Signal Direction. Limiting factors to single wavelength. Introduction to SDH Timing and synchronisation of digital signals, the plesiochronous digital hierarchy (PDH), the synchronous digital hierarchy (SDH), service protection with SDH. TDM. SDH6 Standards, basic units, frames, STM1 frame, bit rates, STM0, STM1, STM4, STM16, STM64, STM256, SDH architecture, rings, Add drop multiplexors. SDH network topologies, structure of SDH equipment, SDH synchronisation, protection switching in SDH networks, SDH alarm structure, testing of SDH, equipment and systems, Ethernet over SDH. WDM overview Multiplexing, TDM, WDM benefits. WDM standards. CWDM vs. DWDM. Four Wave Mixing (FWM). Impact and countermeasures to FWM on WDM.tructure of SDH equipment, SDH synchronisation, protection switching in SDH networks, SDH alarm structure, testing of SDH, equipment and systems, Ethernet over SDH. DWDM ITU G.694.1, channel and spacing. Optical Terminal Multiplexers (OTM). Optical Add/Drop Multiplexers (OADM). Adding versus dropping. Optical Amplifiers. Erbium Doped Fibre Amplifiers (EDFA). Transponders and Combiners. Optical and Electrical Cross Connects (OXCs/DXCs). Cross Connect types (Transparent/Opaque). Advantages and disadvantages of various Optical cross connects. IP transmission Telecommunications versus data communications, IP transmission, VoIP, MPLS.

Transmission demystified
Delivered in Internationally or OnlineFlexible Dates
£1,727

Information Security Management Principle

5.0(10)

By GBA Corporate

Overview Objective Understand the requirement of Information Security Concepts and Definitions of Information Security Management Systems Deeply Analysing the policies, Standards and procedures How to deliver a balanced ISMS and following its security procedures Analysing the Information risk management Evaluating the organisational responsibilities Understanding the Information security controls Scrutinising Legal framework Techniques of Cryptographic models

Information Security Management Principle
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Professional Electrical Engineering Course for Light Current Systems

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Professional Electrical Engineering Course for Light Current Systems
Delivered Online On Demand4 hours 17 minutes
£25

UNIX system administration

5.0(3)

By Systems & Network Training

UNIX system administration training course description This five day hands on course provides a comprehensive coverage of core UNIX administration tasks. The course covers generic UNIX and is available for any UNIX distribution required. What will you learn Administer & configure UNIX systems. Maintain UNIX by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure UNIX system. Describe the organisation and implementation of the filesystem. UNIX system administration training course details Who will benefit: System administrators Network administrators. Prerequisites: UNIX fundamentals. Duration 5 days UNIX system administration training course contents Part 1 Exploring UNIX command-line tools Using a shell, shell configuration, environment variables, getting help, streams, redirection and pipes, processing text using filters, manipulating files, regular expressions, grep, sed. Managing software Package concepts, comparison of package formats, RPM, rpm commands, yum, dpkg, apt-cache, apt-get, dselect, aptitude, converting between package formats, dependencies and conflicts, startup script problems, shared libraries, library management, managing processes, the kernel: the first process, process lists, foreground & background processes, process priorities, killing processes. Configuring hardware Configuring firmware and hardware, RQs, I/O addresses, DMA addresses, Boot disks, coldplug and hotplug devices, configuring expansion cards and PCI cards, kernel modules, USB devices, UNIX USB crivers, configuring hard disks, partitioning systems, LVM, common layouts, creating partitions and filesystems, maintaining filesystem health, tuning, journals, checking filesystems, monitoring disk use, mounting and unmounting filesystems. Managing files File management commands, file naming and wildcards, file archiving, links, directory commands, file ownership and group, file access control, permissions, chmod, defaults, file attributes, disk quotas, enabling and setting quotas, locating files, the FHS. Booting UNIX and editing files Installing boot loaders, GRUB legacy, GRUB 2, alternative boot loaders, the boot process, boot messages, runlevels and the initialization process, runlevel functions, runlevel services, alternative boot systems, upstart, system. Part 2 Configuring the X window system Localization, configuring basic X features, X server options, methods of configuring X, X display information, X fonts, the X GUI login system, XDMCP server, using X for remote access, screen display settings, setting your time zone, your locale, configuring printing, conceptualizing the UNIX printing architecture, understanding PostScript and ghostscript, running a printing system, configuring CUPS, monitoring and controlling the print queue. Administering the system Managing users and groups, tuning user and system environments, using system log files, understanding syslogd, setting logging options, manually logging data, rotating l;og files, reviewing log file contents, maintaining the system time, UNIX time concepts, manually setting the time, using NTP, running jobs in the future, understanding the role of cron, creating system cron jobs, creating user cron jobs, using anacron, using at. Configuring basic networking TCP/IP, network hardware, network addresses, hostnames, network ports, configuring UNIX for a local network, configuring with DHCP, static IP address, configuring routing, using GUI configuration tools, ifup and ifdown, diagnosing network connections, testing connectivity, tracing a route, checking network status , examining network traffic, additional tools. Writing scripts, configuring email, and using databases The shell environment, aliases, shell configuration files, writing scripts, commands, variables, conditional expressions, loops, functions, managing email, choosing email software, securing your email server, managing data with SQL, picking a SQL package, understanding SQL basics, using MySQL. Securing your system Administering network security, super server restrictions, disabling unused servers, administering local security, securing passwords, limiting root access, setting login, process, SUID/SGID files, configuring SSH, using GPG, generating, importing and revoking keys, encrypting and decrypting data, signing messages and verifying signatures.

UNIX system administration
Delivered in Internationally or OnlineFlexible Dates
£2,797

Linux system administration (LPIC-1)

5.0(3)

By Systems & Network Training

LPIC-1 training course description This five day hands on course provides a comprehensive coverage of core Linux administration tasks. The course covers generic Linux and is available for any Linux distribution required. It closely follows the LPIC curriculum allowing delegates to achieve the relevant certification if required. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. LPIC-1 training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals (LPI 010) Duration 5 days LPIC-1 training course contents Part I Exam 101 Exploring Linux Command-Line Tools Using a Shell, Shell Configuration, Environment Variables, Getting Help, Streams, Redirection and Pipes, Processing Text Using Filters, Manipulating files, Regular Expressions, grep,sed. Managing Software Package Concepts, Comparison of package formats, RPM, rpm Commands, Yum, Debian Packages, dpkg, apt-cache, apt-get, dselect, aptitude, Converting Between Package Formats, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring Hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing Files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and Editing Files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Part II Exam 102 265 Securing the X Window System Localization, Configuring Basic X Features, X Server Options, Methods of Configuring X, X Display Information, X Fonts, The X GUI Login System, XDMCP Server, Using X for Remote Access, Screen Display Settings, Setting Your Time Zone, Your Locale, Configuring Printing, Conceptualizing the Linux Printing Architecture, Understanding PostScript and Ghostscript, Running a Printing System, Configuring CUPS, Monitoring and Controlling the Print Queue. Administering the System Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring Basic Networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Writing Scripts, Configuring Email, and Using Databases The Shell Environment, Aliases, Shell Configuration Files, Writing Scripts, Commands, Variables, Conditional Expressions, Loops, Functions, Managing Email, Choosing Email Software, Securing Your Email Server, Managing Data with SQL, Picking a SQL Package, Understanding SQL Basics, Using MySQL Securing Your System Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures.

Linux system administration (LPIC-1)
Delivered in Internationally or OnlineFlexible Dates
£2,797

Banking and Financial Institutional Analysis

5.0(10)

By GBA Corporate

Overview This course will provide participants with an introduction to the key elements to consider in analysing financial institutions for example factors used in the assessment of the operational performance of financial institutions including but not limited to solvency, liquidity, earnings, management and systems/controls. The program will primarily cover banking institutions but there will also be some sessions devoted to risks associated with insurance companies. 

Banking and Financial Institutional Analysis
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Digital Asset Management

5.0(10)

By GBA Corporate

Overview This course shows participants how to deal with documents in an electronic way to get rid of the paper's hard copy which takes a lot of space and time. It will also update you with the Digital Asset management or EDRMS system and changes that happen to take place with the passage of time. The advanced technology leads to Advance EDRMS systems with enhances features.

Digital Asset Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Enterprise Linux System Admin Fast Track with Exam Prep

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Practiced Linux system administrators who currently manage Linux servers at the enterprise level - Skilled Linux system administrators who who want or are required to demonstrate competencies by earning the RHCSA This course is designed for experienced Linux System Administrators who want to harden their technical skill sets and become accredited with the RHCSA certification. Accessing the command line Log in to a Linux system and run simple commands using the shell. Managing Files from the command line Work with files from the bash shell prompt. Managing local Linux users and groups Manage Linux users and groups and administer local password policies. Controlling access to files with Linux file system permissions Set access permissions on files and interpret the security effects of different permission settings. Managing SELinux security Use SELinux to manage access to files and interpret and troubleshoot SELinux security effects. Monitoring and managing Linux processes Monitor and control processes running on the system. Installing and updating software packages Download, install, update, and manage software packages from Red Hat and yum package repositories. Controlling services and daemons Control and monitor network services and system daemons using systemd. Managing Red Hat Enterprise Linux networking Configure basic IPv4 networking on Red Hat Enterprise Linux systems. Analyzing and storing logs Locate and interpret relevant system log files for troubleshooting purposes. Managing storage and file systems Create and use disk partitions, logical volumes, file systems, and swap spaces. Scheduling system tasks Schedule recurring system tasks using cron and systemd timer units. Mounting network file systems Mount network file system (NFS) exports and server message block (SMB) shares from network file servers. Limiting network communication with firewalld Configure a basic local firewall. Additional course details: Nexus Humans Enterprise Linux System Admin Fast Track with Exam Prep training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Enterprise Linux System Admin Fast Track with Exam Prep course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Enterprise Linux System Admin Fast Track with Exam Prep
Delivered OnlineFlexible Dates
Price on Enquiry