A beginner-level course that follows a step-by-step approach to learning the fundamentals and core concepts of Apache Kafka 3.0. You will work through interesting activities such as programming a Twitter producer and Elasticsearch consumer to understand the various concepts.
Build a strong foundation in ethical hacking with this course. In this course, you will start from scratch, from setting up your hacking lab environment to implementing advanced Wi-Fi attacks. Moreover, you will learn how to perform Man in the Middle attacks after gaining access to a Wi-Fi network and protect your connected devices from these kinds of attacks.
Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of VMware Carbon Black Cloud Endpoint Standard Identify the architecture and data flows for Carbon Black Cloud Endpoint Standard communication Perform searches across endpoint data to discover suspicious behavior Manage the Carbon Black Cloud Endpoint Standard rules based on organizational requirements Configure rules to address common threats Evaluate the impact of rules on endpoints Process and respond to alerts Describe the different response capabilities available from VMware Carbon Black CloudTM This course teaches you how to use the VMware Carbon Black Cloud Endpoint? Standard product and leverage the capabilities to configure and maintain the system according to your organization?s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Data Flows and Communication Hardware and software requirements Architecture Data flows Searching Data Creating searches Analyzing events Search operators Advanced queries Policy Components Rules Local scanner Sensor capabilities Prevention Capabilities Using Rules Rule types Rule creation Reputation priority Configuring rules Evaluating rule impact Processing Alerts Alert triage Alert actions Response Capabilities Using quarantine Using live response Hash banning
Duration 2 Days 12 CPD hours This course is intended for Application developers who want to increase their understanding of Spring Security with hands-on experience and build secure Spring and Spring Boot applications. Overview By the end of the course, you should be able to meet the following objectives: Use Spring Security in Spring and Spring Boot applications Configure the Spring Security filter chain Protect HTTP endpoints with expression-based access control and the AuthorizationManager API Protect method execution Use different authentication mechanisms Handle passwords in an efficient way Integrate Spring Security with Junit 5 and MockMVC to test HTTP and method security Protect against common vulnerabilities and threats Understand what OAuth2 is Use and configure the Spring Authorization Server Implement a resource server and client This 2-day course offers hands-on experience with the major features of Spring Security, which includes configuration, authentication, authorization, password handling, testing, protecting against security threats, and the OAuth2 support to secure applications. On completion, participants will have a foundation for securing enterprise and microservices applications. Security Introduction Need for security Basic security concepts Common security vulnerabilities Spring Security Basics Introduction to Spring Security High-level architecture Overview of SecurityContext Spring Security with Spring Boot Customizing Authentication Building blocks for authentication Authentication mechanisms based on user name and password Other authentication mechanisms Authentication events Securing Web Applications Configuring authorization Using AccessDecisionsManager for authorization Using AuthorizationManager for authorization Bypassing security Method Security Method security architecture Declarative method security with annotations Security Testing Spring Security Testing Support Security mock annotations and meta-annotations Using MockMvc to test security Handling Passwords Password hashing Upgrading passwords (Optional) Protecting Against Common Vulnerabilities Hardening web applications with security headers Preventing cross-site request forgery Encrypting data in transit OAuth5 and OIDC Concepts Need for OAuth Overview of OAuth5 and OIDC OAuth5 grant types Types of tokens Spring Security OAuth5 support and OAuth5 login Spring Authorization Server Introduction to Authorization Server Spring Authorization Server endpoints Spring Authorization Server configuration Protecting and accessing resources with OAuth5 Resource server Using JWT tokens Using opaque tokens Configuring an OAuth5 client Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Spring Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Spring Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of VMware Carbon Black Cloud Audit and Remediation Identify the architecture and data flows for Carbon Black Cloud Audit and Remediation communication Describe the use case and functionality of recommended queries Achieve a basic knowledge of SQL Describe the elements of a SQL query Evaluate the filtering options for queries Perform basic SQL queries on endpoints Describe the different response capabilities available from VMware Carbon Black Cloud This course teaches you how to use the VMware Carbon Black© Cloud Audit and Remediation? product to build queries for IT hygiene, incident response, and vulnerability assessment to support your organization?s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Data Flows and Communication Hardware and software requirements Architecture Data flows Query Basics Osquery Available tables Query scope Running versus scheduling Recommended Queries Use cases Inspecting the SQL query SQL Basics Components Tables Select statements Where clause Creating basic queries Filtering Results Where clause Exporting and filtering Basic SQL Queries Query creation Running queries Viewing results Advanced Search Capabilities Advanced SQL options Threat hunting Response Capabilities Using live response Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud Audit and Remediation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud Audit and Remediation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for Security operations personnel, including analysts and incident responders Overview By the end of the course, you should be able to meet the following objectives: Utilize Carbon Black EDR throughout an incident Implement a baseline configuration for Carbon Black EDR Determine if an alert is a true or false positive Fully scope out an attack from moment of compromise Describe Carbon Black EDR capabilities available to respond to an incident Create addition detection controls to increase security This course teaches you how to use the VMware Carbon Black© EDR? product during incident response. Using the SANS PICERL framework, you will configure the server and perform an investigation on a possible incident. This course provides guidance on using Carbon Black EDR capabilities throughout an incident with an in-depth, hands-on, scenariobased lab. Course Introduction Introductions and course logistics Course objectives VMware Carbon Black EDR & Incident Response Framework identification and process Preparation Implement the Carbon Black EDR instance according to organizational requirements Identification Use initial detection mechanisms Process alerts Proactive threat hunting Incident determination Containment Incident scoping Artifact collection Investigation Eradication Hash banning Removing artifacts Continuous monitoring Recovery Rebuilding endpoints Getting to a more secure state Lessons Learned Tuning Carbon Black EDR Incident close out
Duration 1 Days 6 CPD hours This course is intended for Security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of VMware Carbon Black Cloud Enterprise EDR Identify the architecture and data flows for VMware Carbon Black Cloud Enterprise EDR communication Perform searches across endpoint data to discover suspicious behavior Manage watchlists to augment the functionality of VMware Carbon Black Cloud Enterprise EDR Create custom watchlists to detect suspicious activity in your environment Describe the process for responding to alerts in VMware Carbon Black Cloud Enterprise EDR Discover malicious activity within VMware Carbon Black Cloud Enterprise EDR Describe the different response capabilities available from VMware Carbon Black Cloud This course teaches you how to use the VMware Carbon Black© Cloud Enterprise EDR? product and leverage its capabilities to configure and maintain the system according to your organization?s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Data Flows and Communication Hardware and software requirements Architecture Data flows Searching Data Creating searches Search operators Analyzing processes Analyzing binaries Advanced queries Managing Watchlists Subscribing Alerting Custom watchlists Alert Processing Alert creation Analyzing alert data Alert actions Threat Hunting in Enterprise EDR Cognitive Attack Loop Malicious behaviors Response Capabilities Using quarantine Using live response Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud Enterprise EDR training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud Enterprise EDR course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of the Carbon Black EDR server Identify the architecture and data flows for Carbon Black EDR communication Identify the architecture for a cluster configuration and Carbon Black EDR cluster communication Describe the Carbon Black EDR server data types and data locations Use the API to interact with the Carbon Black EDR server without using the UI Create custom threat feeds for use in the Carbon Black EDR server Perform the integration with a syslog server Use different server-side scripts for troubleshooting Troubleshoot sensor-side configurations and communication This course teaches you how to use the advanced features of the VMware Carbon Black© EDR? product. This usage includes gaining access to the Linux server for management and troubleshooting in addition to configuring integrations and using the API. This course provides an in-depth, technical understanding of the Carbon Black EDR product through comprehensive coursework and hands-on scenario-based labs. This class focuses exclusively on advanced technical topics related to the technical back-end configuration and maintenance Course Introduction Introductions and course logistics Course objectives Architecture Data flows and channels Sizing considerations Communication channels and ports Server Datastores SOLR database Storage configurations and data aging Partition states Postgres Modulestore EDR API CBAPI overview Viewing API calls in the browser Utilizing the API to access data Threat Intelligence Feeds Feed structure Report indicator types Custom threat feed creation and addition Syslog Integration SIEM support Configuration Troubleshooting Server-side scripts Server logs Sensor operations Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black EDR Advanced Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black EDR Advanced Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This course covers the important topics needed to pass the AWS Certified Data Analytics-Specialty exam (AWS DAS-C01). You will learn about Kinesis, EMR, DynamoDB, and Redshift, and get ready for the exam by working through quizzes, exercises, and practice exams, along with exploring essential tips and techniques.
A medical secretary is responsible for ensuring that a doctor's office runs smoothly so that patients receive the best possible care. A medical secretary must understand office organisation and standard procedures to provide this secretarial support. They should also be able to use medical terminologies fluently. This Medical Receptionist Skills will teach you about the medical secretarial profession and the skills needed to do the job successfully. This Course will teach you about the roles and responsibilities of a medical secretary. You will also learn various medical secretary skills, including an effective filing system, medical transcription, medical writing, maintaining medical records, an appointment system, and more. Furthermore, this comprehensive Medical Receptionist Skills will teach you the critical concepts of patient confidentiality and other legal aspects of the healthcare industry. Learning Outcomes After completing this course, learner will be able to: Understand the fundamentals of the National Health Service. Understand the roles and responsibilities of a medical secretary. Know how to organise schedules and manage appointment systems. Gain a clear understanding of the Law, Ethics and Medicine. Gain a thorough understanding of the effective filing system in medical offices. Familiarise yourself with the concept of patient confidentiality and its dos and don'ts. Become skilled at controlling and ordering stocks and supplies. Gain in-depth knowledge of Medical Terminology and Clinical Aspects. Know the importance of health and safety in the healthcare sector. Have a solid understanding of Complementary Medicine Why Choose Diploma in Medical Receptionist and Secretary from Us Self-paced course, access available from anywhere. Easy to understand, high-quality study materials. This Course developed by industry experts. MCQ quiz after each module to assess your learning. Automated and instant assessment results. 24/7 support via live chat, phone call or email. Free PDF certificate as soon as completing this Course. **Courses are included in this Medical Receptionist Skills Bundle Course Course 01: Medical Receptionist Skills Course 02: Dealing With Difficult People Course 03: Communication Skills Course Course 04: Level 4 Time Management Course Course 05: Level 5 Negotiation Skills Course Course 06: Level 5 Report Writing Course Course 07: Level 5 Proofreading & Copy Editing ***Others Included of Medical Receptionist Skills Bundle Course Free 7 PDF Certificate Access to Content - Lifetime Exam Fee - Totally Free Free Retake Exam [ Note: Free PDF certificate as soon as completing the course ] Detailed course curriculum of the Medical Receptionist Skills: Module 1: The National Health Service History Structure of the NHS The NHS Plan Resource Allocation Delivering Care Mental Health Services Public Health The NHS, the Regions and Devolution Module 2: Patient (Customer) Care The Medical Receptionist Putting Patient First Complaints Within the Health Service The Complaints Procedure Patient and Public Involvement Patient's Rights Access to Health Care Total Quality in Medical Practice Customer Care: Involving Patients and the Public Module 3: Communication Report Writing Electronic Mail & Mobile Phones: Text Messages Telephone Skills People Skills - Face to Face Meeting Performance Review & Counselling The Practice Leaflet & Hospital Information Leaflets Networking Module 4: Law, Ethics and Medicine Medical Ethics and Etiquette Doctor's Duties Patient's Right The Regulatory Bodies and Their Role Legal Aspects Certification Health and Safety at Work Module 5: Health & Safety in a Clinical Environment First Aid at Work Hazardous Substances The NHS National Patient Safety Agency (NPSA) Hepatitis & AIDS Fire Precautions Clinical Risk Management Coping With Aggression & Violence Module 6: Practical Reception Skills in General Practice Record Keeping and General Administration Information Technology Module 7: The Hospital Service The Patient's Route Through the Hospital Outpatient Appointments Admissions from the Waiting List Accident and Emergency Admissions Home From Hospital Support Day Cases and Ward Attendees Hospital Team Clinical Audit Star Ratings What is a Medical Record? Cases Notes Master Index Filing Room or Records Library Medical Records Procedure for Departments Retention of Records Destruction of Medical Records The Role of the Secretary in the Hospital Module 8: Private Medicine Private Clinic or Hospital The Secretary In Private Practice Module 9: Forms, Fees and Finances in General Practises Contracting Finance Practice Income Scotland Wales Northern Ireland Module 10: Using Information Technology Computers in General Practice Electronic Medicine Computers in Hospitals Maintaining Security Module 11: Medical Terminology and Clinical Aspects Pathology and X-ray Examinations Prescribing and Drugs Nurse Prescribing New Developments in Pharmacy Module 12: Audit, Health Economics and Ensuring Quality for the Medical Receptionist and Secretary Audit Health Economics and Cost-effective Medicine Private Finance Initiative Clinical Governance National Institute for Clinical Excellence (NICE) National Clinical Assessment Service (NCAS) National Service Framework (NSF) Patient Surveys Module 13: Complementary Medicine Acupuncture Alexander Technique Aromatherapy Chiropractic Homoeopathy Hydrotherapy Hypnotherapy Osteopathy Reflexology ------------------- ***Communication Skills Course*** Module 01: Introduction to Communication Module 02: The Communication Skills Module 03: Different Types of Communication Module 04: Different Methods of Communication Module 05: Styles of Communication Module 06: Barriers to Communication Module 07: Assessing Communication Competence: Relevant Criteria Module 08: Seven Actions for Effective Communication Module 09: Do's and Don'ts of Effective Communication ------------------- ***Level 4 Time Management Course*** Module 1: Basics of Time Management Module 2: Prioritise Your Time Module 3: Organise Your Time Module 4: Using Your Time Efficiently Module 5: Time Management in the Workplace Module 6: Time Management For Students Module 7: Time Management Software Module 8: Create a Value-Based Time Management Plan ------------------- ***Level 5 Proofreading & Copy Editing*** Module 01: An Overview of Proofreading Module 02: Use of the Style Guide Module 03: Spelling and Grammar Module 04: Paper-based Proofreading Module 05: On the Screen Proofreading Module 06: Basics of Copy Editing Module 07: Copy Editing - the Use of Language Module 08: Copy Editing - Checking Accuracy and Facts Module 09: Copy Editing - Legal Checks Module 10: Career Development ------------------- ***Dealing With Difficult People*** Module 01: Difficult People and Their Difficult Behaviour Module 02: Communicating With Difficult People Module 03: Standing Up to Difficult People Module 04: A Quick Guide to the Seven Classically Difficult Types Module 05: Dealing with Bosses Who Drive You Barmy Module 06: Colleagues to Throttle Module 07: Dealing With Impossible People Module 08: The Temper Tantrum Type ------------------- ***Level 5 Negotiation Skills Course*** Module 01: An Overview of Negotiation Module 02: How to Prepare For Negotiations Module 03: The Process of Negotiation Module 04: Ways of Developing Persuasion & Influencing Skills Module 05: Ways of Developing Communication Skills Module 06: How to Develop Active Listening Skills Module 07: Comprehending Body Language Module 08: Assertiveness and Self Confidence Module 09: Managing Anger Module 10: Managing Stress Module 11: Negotiation Tactics to Closing a Better Deal Module 12: Ways of Overcoming Sales Objections ------------------- ***Level 5 Report Writing Course*** Module 01: Introduction to Report Writing Module 02: The Basics of Business Report Writing Module 03: The Practical Side of Report Writing (Part-1): Preparation & Planning Module 04: The Practical Side of Report Writing (Part-2): Collecting and Handling Information Module 05: The Practical Side of Report Writing (Part-3): Writing and Revising Report Module 06: The Creative Side of Report Writing (Part -1): A Style Guide to Good Report Writing Module 07: The Creative Side of Report Writing (Part -2): Improving the Presentation of Your Report Module 08: Developing Research Skills Module 09: Developing Creativity & Innovation Module 10: Develop Critical Thinking Skills Module 11: Interpersonal Skill Development Assessment Method After completing each module of the Medical Receptionist Skills, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Once you complete all the modules in this manner, you will be qualified to request your certification. Certification After completing the MCQ/Assignment assessment for this course, you will be entitled to a Certificate of Completion from Training Tale. It will act as proof of your extensive professional development. The certificate is in PDF format, which is completely free to download. A printed version is also available upon request. It will also be sent to you through a courier for £13.99. Who is this course for? This Medical Receptionist Skills is ideal for Health Care Professionals who work and will be working in healthcare settings such as hospitals, clinics, and healthcare facilities. Requirements There are no specific requirements for this Medical Receptionist Skills because it does not require any advanced knowledge or skills. Career path After completing this Medical Receptionist Skills, you will have developed a set of skills necessary for career advancement and will be able to pursue a variety of job opportunities, including - Medical Receptionist Medical Secretary Healthcare Administrator GP Receptionist Patient Coordinator Certificates Certificate of completion Digital certificate - Included