The Digital CCTV & Remote Access course is designed to give participants a practical knowledge of integrating Analogue and Digital technologies in addition to access and control from remote locations such as laptops, tablets and mobile phones.
Duration 5 Days 30 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview The person who carries this certification should be able to acquire necessary resources, advise senior leadership, collaborate with stakeholders, evaluate effectiveness, identify cybersecurity problems, manage threats, oversee information security awareness programs, participate in risk assessments, support compliance activities, and define or implement policies and procedures to ensure protection of critical infrastructure within an information security environment. If you are looking for the ?gotta have it? cybersecurity course, then the Certified Information Systems Security Officer is for you.ÿ The C)ISSO will prepare you for multiple managerial roles inside the INFOSEC community by covering a broad range of topics. You will learn theories in security concepts, practices, monitoring and compliance in IS management. An Information Systems Security Officer is able to implement and maintain cost-effective security controls that are closely aligned with business and industry standards. The C)ISSO certification course is an idealÿway to increaseÿknowledge, expertise, and skill for managers, auditors, and INFOSEC professionals.ÿ At Mile2 we consider the C)ISSO to be one of our flagship courses.The things you learn in this course can be applied to management, prevention teams, and recovery professionals. Material learned in the Live Class or Self-Study options will apply directly to the certification exam. Course Outline Risk Management Security Management Identification and Authentication Access Control Security Models and Evaluation Operations Security Vulnerability Assessments Symmetric Cryptography and Hashing Network Connections Network Protocols and Devices Telephony, VPNs, and Wireless Security Architecture and Attacks Software Development Security Database Security Malware and Software Attacks Business Continuity Disaster Recovery Incident Management, Law, and Ethics Physical Security Additional course details: Nexus Humans C)ISSO - Certified Information Security Systems Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSO - Certified Information Security Systems Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
What is covered on this City & Guilds 2365 level 3 course? The City & Guilds 2365 Level 3 course builds on the knowledge and skills gained from the level two course, it focuses on Inspection and Testing, advanced electrical science, fault diagnosis and system design. A range of subjects are covered including electrical installation, lighting installation and design, national grid, single and three-phases, fault findings, renewable technology, electrical science, mini thinking and conduit and steel conduit. The course will include the below content which will be taught via a mixture of both theoretical and practical training: Health and Safety in Building Services Engineering Principles of Electrical Science Electrical Installations: Inspection, Testing and Commissioning Electrical Installations: Fault Diagnosis and Rectification Understanding the fundamental principles and requirements of environmental technology systems Electrical systems design Career awareness in building service engineering
Duration 4 Days 24 CPD hours This course is intended for #NAME? Overview At the completion of this course, students already familiar with the RHCT/RHCSA administration skills will have exposure to all competencies tested by the RHCSA and RHCE exams. If you are an experienced Linux© system administrator and hold a Red Hat Certified System Administrator (RHCSA©) credential or possess equivalent skills and want to broaden your ability to administer Linux systems at an enterprise level, this is the perfect course.The course will empower you to deploy and manage network servers running caching domain name service (DNS), MariaDB, Apache HTTPD, Postfix SMTP null clients, network file sharing with network file system (NFS) and server message block (SMB), iSCSI initiators and targets, advanced networking and firewall configurations, and to use bash shell scripting to help automate, configure, and troubleshoot your system. Through lectures and hands-on labs, you will be exposed to all competencies covered by the Red Hat Certified Engineer (RHCE) exam (EX300), supplementing what you have already learned in earning your RHCSA credential.This course is based on Red Hat© Enterprise Linux 7. Getting Started with the Classroom Environment Given a virtualized environment, begin to administrate multiple systems using prerequisite skills Enhance User Security Configure system to use Kerberos to verify credentials and grant privileges via sudo Bash Scripting and Tools Automate system administration tasks utilizing Bash scripts and text-based tools File Security with GnuPG Secure files with GnuPG. Software Management Use yum plugins to manage packages and understand the design of packages to build a simple package Network Monitoring Profile running services then capture and analyze network traffic Route Network Traffic Configure system to route traffic and customize network parameters with sysctl Secure Network Traffic Secure network traffic through SSH port forwarding and iptables filtering/network address translation (NAT) NTP Server Configuration Configure an NTP server Filesystems and Logs Manage local file system integrity, monitor system over time, and system logging Centralized and Secure Storage Access centralized storage (iSCSI) and encrypt filesystems SSL-encapsulated Web Services Understand SSL certificates and deploy an SSL encapsulated web service Web Server Additional Configuration Configure web server with virtual hosts, dynamic content, and authenticated directories Basic SMTP Configuration Configure an SMTP server for basic operation (null client, receiving mail, smarthost relay) Caching-Only DNS Server Understand DNS resource records and configure a caching-only name server File Sharing with NFS Configure file sharing between hosts with NFS File Sharing with CIFS Configure file and print sharing between hosts with CIFS File Sharing with FTP Configure file sharing with anonymous FTP Troubleshooting Boot Process Understand the boot process and recover unbootable systems with rescue mode
BOHS P903 - Management and control of evaporative cooling and other high risk industrial systems is there to provide background and an overview of the risk of Legionella infection and how it can be controlled in Evaporative Cooling and other high risk Industrial type systems. It is a requirement of this course that candidates have successfully completed P901 - Legionella- Management and Control of Building Hot and Cold Water Services. Where both P901 and P903 courses are run on subsequent days or as a combined course then this prerequisite is waived.
Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team?everyone from help desk staff to the Chief Information Officer?understand their role in these security processes. Overview In this course, you will assess and respond to security threats and operate a systems and network security analysis platform. You will: - Assess information security risk in computing and network environments. - Analyze reconnaissance threats to computing and network environments. - Analyze attacks on computing and network environments. - Analyze post-attack techniques on computing and network environments. - Implement a vulnerability management program. - Collect cybersecurity intelligence. - Analyze data collected from security and event logs. - Perform active analysis on assets and networks. - Respond to cybersecurity incidents. - Investigate cybersecurity incidents. - Address security issues with the organization's technology architecture. The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. 1 - ASSESSING INFORMATION SECURITY RISK Identify the Importance of Risk Management Assess Risk Mitigate Risk Integrate Documentation into Risk Management 2 - ANALYZING RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of Reconnaissance Incidents Assess the Impact of Social Engineering 3 - ANALYZING ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of System Hacking Attacks Assess the Impact of Web-Based Attacks Assess the Impact of Malware Assess the Impact of Hijacking and Impersonation Attacks Assess the Impact of DoS Incidents Assess the Impact of Threats to Mobile Security Assess the Impact of Threats to Cloud Security 4 - ANALYZING POST-ATTACK TECHNIQUES Assess Command and Control Techniques Assess Persistence Techniques Assess Lateral Movement and Pivoting Techniques Assess Data Exfiltration Techniques Assess Anti-Forensics Techniques 5 - MANAGING VULNERABILITIES IN THE ORGANIZATION Implement a Vulnerability Management Plan Assess Common Vulnerabilities Conduct Vulnerability Scans Conduct Penetration Tests on Network Assets 6 - COLLECTING CYBERSECURITY INTELLIGENCE Deploy a Security Intelligence Collection and Analysis Platform Collect Data from Network-Based Intelligence Sources Collect Data from Host-Based Intelligence Sources 7 - ANALYZING LOG DATA Use Common Tools to Analyze Logs Use SIEM Tools for Analysis 8 - PERFORMING ACTIVE ASSET AND NETWORK ANALYSIS Analyze Incidents with Windows-Based Tools Analyze Incidents with Linux-Based Tools Analyze Malware Analyze Indicators of Compromise 9 - RESPONDING TO CYBERSECURITY INCIDENTS Deploy an Incident Handling and Response Architecture Mitigate Incidents Prepare for Forensic Investigation as a CSIRT 10 - INVESTIGATING CYBERSECURITY INCIDENTS Apply a Forensic Investigation Plan Securely Collect and Analyze Electronic Evidence Follow Up on the Results of an Investigation 11 - ADDRESSING SECURITY ARCHITECTURE ISSUES Remediate Identity and Access Management Issues Implement Security During the SDLC Additional course details: Nexus Humans CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Enterprise network staff responsible for help desk support, system administration, and network design. Overview At Course Completion: - Features and functions of Group Policy - Use Group Policy management tools to manage security policies - Design a Group Policy infrastructure - Group Policy processing architecture - Back up, restore, import, and copy Group Policy Objects through the Group Policy - Management Console - Use Windows PowerShell to manage Group Policy - Implement security using Group Policy - Configure the desktop environment with Group Policy - Configure roaming profiles and Folder Redirection - Assign and publish software packages - Implement AppLocker and software restriction policies - Create and deploy Administrative Templates - Configure Group Policy preferences In this course, you will learn how to reduce costs and increase efficiencies in your network. You will discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy, and you will learn to control and manage computer systems and domain users running Windows Server 2016 and Windows clients. Create Group Policies, implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks, implement administrative and security templates, and determine best practices when deploying software packages. 1 - Introduction to Configuration Management Configuration Management Overview Configuration Management Using Group Policy Group Policy Features Introduced with Later Versions of Windows Using Windows PowerShell in the Configuration Management Process 2 - Using Group Policy Management Tools Local and Domain Policies Using Group Policy Management Console Understanding Group Policy Refresh 3 - Designing a Group Policy Infrastructure Design Stages for a Group Policy Infrastructure Planning your Group Policy Design Designing Your Group Policy Solution Deploying Your Group Policy Solution Managing Your Group Policy Solution 4 - Understanding the Architecture of Group Policy Processing Group Policy Components in AD DS Understanding the Group Policy Deployment Order Modifying Group Policy Processing 5 - Troubleshooting and Backing Up GPOs Using Group Policy Troubleshooting Tools Integration of RSoP Functionality Group Policy Logging Options Backing Up, Restoring, Importing, and Copying GPOs Building Migration Tables 6 - Securing Windows Using Group Policy Exploring the Windows Security Architecture Securing User Accounts Exploring Security Policies Windows Firewall with Advanced Security Implementing Domain Security Security Policy Options for Window Client and Windows Server 7 - Implementing Application Security Using Group Policy Managing UAC Settings Defending Against Malware Using AppLocker to Restrict Software Implementing Windows App Security Settings 8 - Configuring the Desktop Environment with Group Policy Exploring Script Types and Controlling Script Execution Defining the Desktop, Start Menu, and Taskbar Settings Defining the Control Panel Settings Defining the Windows Components Settings Configuring the Printer Management and Pruning Settings Defining the Network Settings Discovering the new Group Policy Settings 9 - Implementing User State Virtualization Configuring Folder Redirection Managing Offline Files Implementing User Experience Virtualization OneDrive for Business 10 - Assigning and Publishing Software Packages Using MSI Packages to Distribute Software Using Group Policy as a Software Deployment Method Deploying Software Setting Up Distribution Points Using the Systems Center Configuration Manager to Distribute Software 11 - Configuration Management with Windows PowerShell Introducing Windows PowerShell Using Windows PowerShell Writing PowerShell Scripts Windows PowerShell Library for Group Policy Windows PowerShell-Based Logon Scripts 12 - Implementing PowerShell Desired State Configuration Introducing Group Policy Preferences Comparing Preferences and Policy Settings Options for Applying Preferences Configure Preference Settings 13 - Configuring Group Policy Preferences Introducing Group Policy Preferences Comparing Preferences and Policy Settings Options for Applying Preferences Configuring Preferences Settings Additional course details: Nexus Humans 50255 Managing Windows Environments with Group Policy training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 50255 Managing Windows Environments with Group Policy course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This qualification aims to provide expert guidance to learners wishing to gain knowledge and understanding on Electric Vehicle charging equipment installation. This 2 day course provides expert guidance on EV charging equipment installation, an important emerging area which is not covered in detail by the current edition of the Wiring Regulations (BS 7671) or the IET’s Guidance Notes. Aimed at experienced electricians interested in understanding a wide range of equipment and systems available, this course applies to the specialised installation requirements of electric vehicle charging equipment in domestic dwellings, on-street locations, commercial and industrial premises. The course provides detailed guidance and recommendations on all aspects of the installation of Electric Vehicle Charging Equipment from the origin of the electrical supply, through distribution and final circuits, installation of the charging equipment itself to the cable between the charging equipment and vehicle’s electrical inlet. Also included are related issues of site layout and planning and subsequent inspection, testing, certification and maintenance of installations. Why take this course? Currently there is an increasing demand for new electric vehicle charging points but too few installers to roll them out. This is already a booming market which is due to get much bigger in the near future. The number of public charging connectors and locations has increased by 38% in the past 12 months and is expected to continue at that rate for years to come. Entry Requirements There are no formal entry requirements for this qualification, however we do expect you to meet the following requirements: Minimum age 18 years old (mandatory) Must be able to demonstrate the following competencies Be able to correctly install and terminate: pvc/pvc cable (twin and earth) Steel Wire armoured cable (swa) Be able to carry out an initial verification (inspection & testing) on an electrical installation and complete the necessary paperwork. Please Note: These competencies are required for the assessment and are not taught as part of the course. It is also recommended that you are up to date with your wiring regulations.
Define terms used in stand-alone systems Name common applications for stand-alone systems; describe basic component layouts Describe differences between AC and DC coupling State principle elements of a microgrid Define the importance of an accurate load analysis Review load analysis procedures; perform a load analysis based on daily data Review battery bank sizing for lead-acid and lithium-ion battery types Define array sizing variables and how they affect design for both MPPT and non-MPPT charge controllers Explain charge controller types and describe maximum power point tracking and voltage step-down Examine the calculations for PV array sizing Describe the difference between sizing for a non-MPPT and an MPPT charge controller Complete array configuration calculations for a system with a non-MPPT and an MPPT charge controller Summarize the parameters to check when selecting a charge controller Explain the purpose of DC load control and the three ways it can be implemented Identify design variables, advantages, and disadvantages of DC-only PV systems Describe how to size and integrate components for a recreational vehicle (RV) application Identify installation and maintenance considerations specific to mobile applications Identify applications and considerations for DC lighting systems Specify a battery-based inverter given electrical load and surge requirements Describe various configurations for stacking and clustering multiple inverters Examine inverter / charger size considerations Describe multiwire branch circuit wiring and concerns with single-phase supplies Describe the purpose and function of a generator Identify considerations that impact generator selection Solve for location-based performance degradation Specify a generator given electrical load, battery charging, and surge requirements Estimate approximate generator run time List generator maintenance Describe the National Electrical Code (NEC®) Articles that apply to the different parts of PV and energy storage systems (ESS) Identify NEC® requirements for workspace clearances, disconnects, and overcurrent protection devices (OCPD) that apply to PV systems Locate and apply specific requirements for storage batteries, stand-alone systems, and energy storage systems Identify labeling requirements List relevant building and fire codes Review installation considerations and best practices for stand-alone systems as related to batteries, design strategies, monitoring and metering, balance of system (BOS) equipment Review DC-coupled stand-alone residential system design Define operating modes of off-grid AC coupled PV systems Explain charge regulation of AC coupled PV inverters in a stand-alone system Discuss AC coupled PV system design strategies; evaluate equipment options for AC coupled off-grid applications Design a stand-alone microgrid system with PV (AC and DC coupled) and generator power sources Distinguish between isolated and non-isolated microgrids Compare concepts of centralized versus decentralized generation and controls Identify different types of microgrid analysis and planning software Review isolated microgrid use case examples Identify general PPE for battery system maintenance Develop a battery maintenance plan Identify methods to measure battery state of charge Identify common causes of battery problems and how to avoid them Identify PPE for lead-acid battery maintenance Develop a battery maintenance plan for lead-acid batteries Describe how to correctly add water to a flooded lead-acid (FLA) battery bank Identify methods to measure battery state of charge of FLA batteries Define when and why equalization is needed Identify common causes of battery problems and how to avoid them Note: SEI recommends working closely with a qualified person and/or taking PV 202 for more information on conductor sizing, electrical panel specification, and grounding systems. These topics will part of this course, but they are not the focus.
Students who complete PV203 will be able to: Recognize demand and PV production curves Identify the common types of PV systems and their major components Describe DC and AC coupled systems Discuss load profiles and modes of operation, including: peak load shaving, time-of-use, zero-sell, self-consumption prioritization, demand-side management Introduce utility-scale storage and microgrids Explain the relationship between real power, apparent power, and reactive power Complete a load estimate for different system types and for seasonal loads; evaluate electrical requirements of loads Identify phantom loads and efficiency upgrades Estimate starting surge and power factor requirements Describe the differences when sizing battery-based systems compared to grid-direct systems Choose a peak sun hour value based on design criteria for various systems Review battery basics and terminology Describe and compare different battery chemistries and technologies Find the capacity and voltage of different batteries; determine state of charge List safety precautions and hazards to be aware of when working with batteries; list appropriate personal protective equipment (PPE) Identify appropriate battery enclosures Calculate values for current, voltage, and energy for different battery bank configurations Review battery bank design parameters Complete a lithium-ion battery bank design example Review and compare different design example costs List features, options, and metering available for different types of battery chargers Explain basics of lithium battery charging Compare generator types and duty cycle ratings, including fuel options Identify specifications critical for choosing appropriate battery-based inverters Discuss different overcurrent protection devices and equipment disconnects and when/where they are required Define the maximum voltage drop slowed for the proper functioning of a battery-based PV system Identify safe installation procedures List basic commissioning tests which should be completed before and after a system is operating