• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

7102 Systems courses delivered Online

ISO 27001:2022 (ISMS) Lead Auditor Training Course

By TUVSW Academy

ISO/IEC 27001:2022 is an international standard of Information security, cyber security and privacy protection known as Information security management systems (ISMS), the existence of it requires competent personnel to interpret its requirements, address those to integrate ISMS in an organization, and audit the organization to assess the implementation and effectiveness of overall implementation. This course is designed for professionals who are responsible for any aspect of Information Security Management Systems (ISMS) as well as for those, specifically, who are pursuing their career in the field of auditing and certification. This course enhances the knowledge and skills of delegates to understand the standard and audit it effectively. The course is consisting of study material in form of self-study type written and exercises. Attendees of this course will be, on completion, competent to implement ISMS, Plan, Conduct & Report 1st, 2nd & 3rd party audits.   Features of Couse ✔ 100% Online Self-paced: Considering busy schedules, we have designed this course to be attended online without bounding with the timings. To make it interactive, we have created different communication groups where candidates can discuss the points with other fellows as well as the trainers of course. Also, they can interact with trainers on monthly demonstration classes. ✔ Testing the Learning: Each section of course is covered with exercise to check your understanding in real-time, and overall result is affected by exercises you complete. ✔ Self-Scheduling: This 40 Hours full fledge course is designed to match your schedule. You will get a life time access to this course and complete it on your ease. ✔ Superlative Material: The training is designed, developed and reviewed by competent auditors with extensive experience of auditing in different regions of world. ✔ Approved Course: The course is approved by one of the well-known personal certifying body “Exemplar Global”. With the approved course, you will get many benefits from Exemplar global which includes but not limited to; Exemplar Global graduate certificate with being listed on their website as auditor as well as badge of auditor from Exemplar Global. Extended learning content from Exemplar Global Complimentary access to online events, online magazine, newsletters, and low-cost professional Access to an exclusive LinkedIn Community Opportunity to explore career enhancement and employment opportunities A discount of 50% in registration fees with Exemplar Global if register through us   Who should attend this? This course is recommended to be attended by those who are involved in implementation and/ or auditing of Information Security Management Systems (ISMS), specifically ISMS Managers, Auditors and others willing to add credibility with a widely accepted qualification for auditing. Also, recommended to satisfy the applicable requirement of training and competence, if any. This course can add values to your profile if you are Intending to perform audits of Information Security Management Systems (ISMS). An ISMS Executive/ Management Representative An Existing Internal Auditor An Information Security Management Systems (ISMS) Consultant Responsible for implementing the Information Security Management Systems (ISMS) standard. Responsibility to evaluate the outcome of internal ISO 27001 – Information Security Management Systems (ISMS) audits and have responsibility/ authority to improve the effectiveness of the Information Security Management Systems (ISMS). Pursuing to make career in Information Security Management Systems (ISMS) auditing. Want to transit from older version to new   Course Duration: 40 Learning Hours and extended time of exercise & Exam.   Certificate: Those who pass all exercises with 50% at least in each exercise will be awarded with successfully completion certificate with the approval of Exemplar Global and a Lifetime validity. Note: Each exercise have 2 retakes, if a candidate fails in all 3 terms, the course will be blocked there and the candidate will have to purchase it again by paying 20% of the original price.   Language of Course: English   Pre-Requisites: ISO 27001 awareness training course.

ISO 27001:2022 (ISMS) Lead Auditor Training Course
Delivered Online On Demand
£198

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Strategic Thinking: On-Demand

By IIL Europe Ltd

Strategic Thinking: On-Demand The goal of this course is to provide you with the building blocks and the motivation to develop the critical skill of strategic thinking. The participants will consider a four-part model that distinguishes strategic thinking from strategic planning and managing. With that understanding, you will investigate the critical components of strategic thinking and how to apply it effectively. What you Will Learn Define strategic thinking and distinguish it from strategic planning and management Explain a high-level approach to gaining strategic thinking skills Integrate other interpersonal skills, such as self-awareness, systems thinking, leadership, constructive conflict, and collaboration, into the fabric of strategic thinking skills Select appropriate techniques to apply strategic thinking in specific situations Recognize and emulate effective strategic thinking behaviors Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Interactive event: Define Strategic Thinking (ST) Interactive event: Discuss relationship of ST with Strategic Planning, Management and Decision Making Strategic Level Framework - Tying it all together Strategic thinking attributes Strategic Thinking Critical Success Factors Strategic Thinking Critical Success Factors - 5-part model Strategic Thinking and the Organization Critical Success Factors Model applied to an organization Tools Introduction (5): Environmental, 5 Forces, SWOT, Value Proposition, Integral Theory of Worldview Video: Fog of War Strategic Thinking and the Individual Critical Success Factors Model applied to an individual Tools Introduction (5): Thinking Styles, Six Thinking Hats, Reverse Thinking, Systems Thinking, Integral Theory of Worldview Strategic Thinking at the Interpersonal and Team Levels Emotional Intelligence - Self Awareness and Working With Others Team Leadership and Trust Constructive Conflict as the Gateway to Collaboration Interactive event: Testing the Models - Challenge Perspective; What's Missing Applying the critical skill of Strategic Thinking Worldview: Team versus client Trusted Advisor Interactive event: Doing what is asked (Case study, wherein participants review the default case scenario prepared for this workshop and add specific details to make the scenario more relevant to their experiences / needs. Teams develop an action plan for applying ST concepts and techniques they have learned here to the situation, then compare and contrast results.)

Strategic Thinking: On-Demand
Delivered Online On Demand45 minutes
£850

QMS Auditor (ISO 9001: 2015)Lead Auditor

By Total Compliance

QMS Auditor/Lead Auditor (ISO 9001) Welcome to our online event where you can become a certified Quality Management System (QMS) Auditor/Lead Auditor for ISO 9001. Elevate your career with the skills to lead successful quality management system audits. This intensive 5-day course is for serious professionals seeking to: Plan and lead effective audit teams Conduct complex supplier and external audits Deliver accurate, valuable audit reports Drive continual improvement in organizations Join us for a comprehensive training session that will equip you with the necessary skills to audit quality management systems effectively. Learn from industry experts and gain valuable insights into ISO 9001 standards. Don't miss this opportunity to enhance your auditing capabilities and advance your career in quality management. Register now! Enroll Today and Take Your Career to the Next Level!

QMS Auditor (ISO 9001: 2015)Lead Auditor
Delivered OnlineFlexible Dates
£1,225

Competency Management & Assurance in the Energy Industry

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course Within the energy industry, it is a requirement, both contractual and in some areas legislative, to ensure effective internal systems are in place which support employee development and provide evidence of their competence. A Competence Management and Assurance process - if correctly developed and applied - provides employees and organisations with the tools to demonstrate competence and contributes to career development of the individual. The 3 full-day course focuses on Competence Management Systems (CMS) which are typically in use within the Energy Industry, their structure and process development requirements. In addition, the course details the assessment process, the role of the competency assessors within the organisation and the relationship between competence management and training provision. For impactful learning, the course instructor uses a variety of instructional methodologies such as lectures, discussions, individual reflection, games, mystery puzzles, video, case studies, team syndication, group presentations, sharing and feedback. Training Objectives This course will provide attendees with an understanding of: The role of competencies in the Energy industry The benefits of Competency Management System to the organisation The components of a Competency of Competency Management System The know how to implement the Competency Management System The roles and responsibilities within a Competency Management System The know how to develop Competency Models The relationship between Competency Management and Capability Development The know how to conduct Organisational Analysis The know how to conduct Job Analysis and Task Analysis The know how to develop Competency Standards and Development Guides using the 70:20:10 principle The competency assessment process, tools and methodologies The know how to package and communicate the Competency Assessment Reports to Management Competency Management Case Studies in the Energy Industry Target Audience This course will benefit professionals from Human Resource and Capability Development as well as Line Managers. Course Level Basic or Foundation Trainer Your expert course leader is an independent consultant trainer with more than 30 years of experience in People & Organizational Development. She has retired from her full-time job and is currently serving as an Associate Consultant / Trainer with several Learning & Development organizations operating in Malaysia and Singapore. A chemist by training, her interest in People & Organizational Development was so intense that she decided to switch profession during her earlier years of employment, and she has never looked back since. She has gathered extensive hands-on experience, leading key projects and delivering learning programs in her field of expertise with numerous leading organizations in South East Asia, the Middle East and Europe. A project that she is particularly proud in completing was the transformation of PETRONAS Management Training Institute into a regional Leadership Centre. While leading this project, she was given the opportunity to be seconded to General Electric (GE), a Fortune 500 multinational known for its cutting-edge leadership development innovation. She was instrumental in the development of the existing leadership model for PETRONAS. In addition, she was also extensively involved in the development and implementation of Technical Competency Development process that is currently being used by more than 20 disciplines in the organization. Another massive project that she was heavily involved in was the creation of the quality culture for PETRONAS. The project saw the establishment of PETRONAS' own quality principles where she played a key role in propagating the desired mindset towards the creation of a high performing culture. Her involvement in this project took her to many PETRONAS Operating Companies which spanned into several countries across the globe including Malaysia, Indonesia, Vietnam, Sudan, South Africa and Switzerland, creating awareness through learning programs and consultancy services. The PETRONAS Quality Principles have since evolved into shared values that are now known as the PETRONAS Culture Beliefs. In keeping her expertise current after retiring from full-time employment since 2017, she has continued to deliver learning programs, providing coaching and consultancy services to selected Oil & Gas companies in Malaysia, Indonesia, Singapore, India, Oman and Thailand. Among her most recent work are virtual learning deliveries and consultancies during the COVID-19 pandemic to some government linked companies / agencies in Malaysia and PTT Exploration & Production Company of Thailand. Outside her professional circle, she is an avid cyclist, a jungle tracker and a mount climber. She is also an accredited trainer from the Human Resource Development Corporation (HRD CORP). POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Competency Management & Assurance in the Energy Industry
Delivered in Internationally or OnlineFlexible Dates
£1,633 to £1,899

Essential QSIG

5.0(3)

By Systems & Network Training

QSIG training course description A concise overview of QSIG, covering the development, current use and future of this private network signalling protocol. What will you learn Describe the use of QSIG. Describe the evolution of QSIG. Describe functionality of the QSIGProtocol Stack. Describe functionality and use of the main Supplementary Services and Additional Network Functions within QSIG. QSIG training course details Who will benefit: Network/Systems Engineers Operators/Planners or anyone working within the QSIG Arena. Prerequisites: Telecommunications Introduction Duration 1 day QSIG training course contents Introduction What is QSIG? User benefits, flexible interconnection, public ISDN synergy, feature transparency-end to end intelligence, innovation specialist features - heterogeneous environment. Evolution of QSIG Evolution of QSIG, ISDN PBX Networking, Specification forum (IPNS), QSIG standardisation. The ITU-T reference model extended for corporate networks. QSIG Protocol Q Protocol stack, QSIG basic call layer 3 - SubLayer 1, QSIG Generic Functional layer 3 Sub-Layer 2 (GF), QSIG protocols for supplementary services & ANF's- Layer 3, Sub-Layer 3, Layer 3 Message Overview. Supplementary Services and ANFs QSIG supplementary services standardisation methodology. QSIG Services and additional network features: Advice of charge, Call Completion, (CCBS, CCNR), Call Forwarding and diversion (CFB, CFNR, CFU, CD), Services (CINT, CI, CO, CT, CW, DDI) Services cont. (DND, DNDO), Identification Services - (CLIP, COLP, CLIR, CNIP, CONP, CNIR), Other QSIG services and additional network features (Mobile, Multi Subscriber Number (MSN), Operator Services, Recall (RE), Sub-Addressing (SUB)), User to user signalling, compliance with services. Conclusion - QSIG1 FAQ's, European Computer Manufacturers Association. The Future.

Essential QSIG
Delivered in Internationally or OnlineFlexible Dates
£1,397

Cyber Incident Response for Business Professionals

By Mpi Learning - Professional Learning And Development Provider

This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT's NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy.

Cyber Incident Response for Business Professionals
Delivered Online On Demand
£350

AN10 IBM AIX Basics

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This basic course is intended for anyone who requires basic AIX/UNIX user skills to be able to work in an AIX environment. This course is also a prerequisite for many courses in the AIX Systems Administration curriculum. Overview Log in to an AIX system and set a user password Use AIX online documentation Manage AIX files and directories Describe the purpose of the shell Use the vi editor Execute common AIX commands and manage AIX processes Customize the working environment Use common AIX utilities Write simple shell scripts Use the AIXWindows Environment Use the Common Desktop Environment This course enables you to perform everyday tasks using the AIX operating system. Day 1 Introduction to AIX Using the System AIX Documentation Files and Directories Using Files Day 2 File Permissions The vi Editor Shell Basics Using Shell Variables Day 3 Processes Controlling Processes Customizing the User Environment AIX Utilities, Part I AIX Utilities, Part I (Continued) AIX Utilities, Part II Day 4 AIX Utilities, Part II (Continued) Additional Shell Features The AIX Graphical User Interface

AN10 IBM AIX Basics
Delivered OnlineFlexible Dates
Price on Enquiry

AutoCAD Electrical Training Course | Bespoke

By London Design Training Courses

Why Choose AutoCAD Electrical Training Course | Bespoke? Course Link Master electrical drawings, schematics, and layouts. Utilize symbol libraries and automated circuit design. Access recorded lessons and lifetime email support.  "Say goodbye to group classes and hello to 1-on-1 Courses. Dial 02077202581 or WhatsApp 07970325184 to reserve your dates. Duration: 16 hrs. Method: 1-on-1, Personalized attention. Schedule: Tailor your own hours of your choice, available from Mon to Sat between 9 am and 7 pm. AutoCAD Electrical Training Course: Specialized electrical CAD design skills with precision. Streamlined workflows for efficient design. Consistent adherence to industry standards. Increased productivity in electrical design. Enhanced collaboration with other professionals. Access to recorded lessons for review. Lifetime email support for ongoing assistance. Learn AutoCAD for electrical design. Enroll now and create accurate and professional electrical drawings with confidence. Choose in-person or live online sessions. AutoCAD Electrical Training Course: Specialized electrical CAD design skills with precision. Streamlined workflows for efficient design. Consistent adherence to industry standards. Increased productivity in electrical design. Enhanced collaboration with other professionals. Access to recorded lessons for review. Lifetime email support for ongoing assistance. Learn AutoCAD for electrical design. Enroll now and create accurate and professional electrical drawings with confidence. Choose in-person or live online sessions. AutoCAD Electrical Course Content: Introduction to AutoCAD Electrical Software: Overview and features of AutoCAD Electrical Understanding the software interface and tools Project file structure and management Layout and Navigation: Navigating the AutoCAD Electrical workspace Creating new project files and using attribute editors Understanding WDD, WDX, and WDF project files Exploring the Project Manager interface and attribute editors Electrical Diagram Drawing: Numbering and titling wires in diagrams Labelling components Utilizing diagram symbol libraries Creating and editing Electrical Control Circuits (ECC) Component dialog box and Circuit Scale dialog box Introduction to Programmable Logic Controllers (PLCs) and Integrated Systems: PLC Symbols and Concepts Inserting Programmable Logic Controllers (PLCs) into diagrams Adding PLC Units to diagrams Working with PLC Input and Output points and circuits Understanding PLC-based classification Using the Spreadsheet to PLC Input and Output Points utility Custom and Bespoke Symbols: Creating custom symbols for Switches, Wires, Contactors, Motors, Transformers, etc. Specifying symbol conventions and standards Offline and online usage of AutoCAD Electrical databases Drawing for Terminals and Plans: Implementing Terminal symbols in diagrams Handling terminal plans and locations Working with compound level terminals and locations Utilizing the Component command for single and multiple components Managing Jumpers and wiring Modifying Terminal Strips and Dual In-Line Packages (DIP) Understanding DIN Rail, Electrical Enclosure, Circuit Breakers, and Electrical Equipment Generating PDFs and Reports: Exporting drawings to PDF format Organizing report templates Automating the generation of reports Creating Electrical Audit Reports This AutoCAD Electrical course provides comprehensive knowledge of the software, focusing on electrical diagram drawing, symbol creation, PLC integration, terminal planning, and report generation. Participants will gain the skills needed to efficiently design electrical systems using AutoCAD Electrical software. Upon completing the AutoCAD Electrical course, participants will master the intricacies of the software. They will adeptly create accurate electrical diagrams, seamlessly integrate PLCs, design personalized symbols, strategize terminal layouts, and produce reports with precision and efficiency. Armed with these skills, graduates will possess the expertise to confidently design complex electrical systems. This proficiency opens avenues in various job roles such as Electrical Design Engineer, CAD Technician, Control Systems Designer, or even Project Manager in industries like manufacturing, automation, and engineering consultancy.

AutoCAD Electrical Training Course | Bespoke
Delivered in London or OnlineFlexible Dates
£480

Definitive Kubernetes for engineers

5.0(3)

By Systems & Network Training

Kubernetes for engineers training course description This course covers how Kubernetes addresses the challenges of distributed systems. Hands on sessions follow all the major theory chapters. What will you learn Explain what Kubernetes is and how it works. Create and run containers on Kubernetes using the Docker image format and container runtime. Kubernetes for engineers training course details Who will benefit: Anyone working with Docker or Kubernetes. Prerequisites: Definitive Docker for engineers. Duration 2 days Kubernetes for engineers training course contents Introduction Velocity, Scaling your service and your teams, Abstracting your infrastructure. Creating and running containers Container images, Building application images with Docker, Storing images in a remote registry, The Docker container runtime. Deploying a Kubernetes cluster Installing Kubernetes on a public cloud provider, Installing Kubernetes locally using minikube, Running Kubernetes on Raspberry Pi, The Kubernetes client, Cluster components. Common kubectl Commands Namespaces, Contexts, Viewing Kubernetes API objects, Creating, Updating, and Destroying Kubernetes objects, Labelling and annotating objects, Debugging commands. Pods Pods in Kubernetes, Thinking with pods, The pod manifest, Running pods, Accessing your pod, Health checks, Resource management, Persisting data with volumes, Putting It all together. Labels and Annotations Labels, Annotations. Service Discovery What Is Service discovery? The service object, Looking beyond the cluster, Cloud integration, Advanced details. ReplicaSets Reconciliation loops, Relating pods and ReplicaSets, Designing with ReplicaSets, ReplicaSet Spec, Creating a ReplicaSet, Inspecting a ReplicaSet, Scaling ReplicaSets, Deleting ReplicaSets. DaemonSets DaemonSet scheduler, Creating DaemonSets, Limiting DaemonSets to specific nodes, Updating a DaemonSet, Deleting a DaemonSet. Jobs The job object, Job patterns. ConfigMaps and secrets ConfigMaps, Secrets, Naming constraints, Managing ConfigMaps and secrets. Deployments Your first deployment, Creating deployments, Managing deployments, Updating deployments, Deployment strategies, Deleting a deployment. Integrating storage solutions and Kubernetes Importing external services, Running reliable singletons, Kubernetes-native storage with StatefulSets. Deploying real-world applications Parse, Ghost, Redis.

Definitive Kubernetes for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727