• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4433 Technology courses

Information Management

5.0(2)

By Institute of Beauty & Makeup

CPD Accredited | Career Oriented Learning Modules | 24x7 Tutor Support | Lifetime Access

Information Management
Delivered Online On Demand1 hour
£12

Automation with Ansible Playbooks

By Packt

Using Ansible to automate local and cloud configuration management tasks with Playbooks

Automation with Ansible Playbooks
Delivered Online On Demand17 hours 35 minutes
£13.99

Food Safety in Catering Diploma

5.0(1)

By Empower UK Employment Training

Food Safety in Catering Diploma Transform your catering business with our Food Safety in Catering Diploma. Elevate Food Safety standards across your operations. Set the benchmark for Food Safety excellence in catering. Learning Outcomes: Implement Food Safety Management Systems in catering. Conduct hazard analysis focused on Food Safety. Monitor and control risks to ensure Food Safety. Understand the basics of catering services with Food Safety in mind. Integrate food hygiene and health within Food Safety protocols. More Benefits: LIFETIME access Device Compatibility Free Workplace Management Toolkit Key Modules from Food Safety in Catering Diploma: Importance of Food Safety Management Systems Implement and manage comprehensive Food Safety Management Systems tailored for catering services. Hazard Analysis for Food Safety Conduct in-depth hazard analyses to bolster Food Safety measures in your catering business. Monitoring and Control Monitor and control food handling processes to maintain optimal Food Safety standards. Basics of Catering Services Master the basics of catering services, underpinned by stringent Food Safety regulations. Food Hygiene, Health, and Food Safety Incorporate hygiene and health best practices to fortify Food Safety in all catering operations. Culinary Management Optimize culinary management practices to uphold the highest standards of Food Safety.

Food Safety in Catering Diploma
Delivered Online On Demand3 hours 18 minutes
£5

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Understanding Cisco Data Center Foundations v1.1 (DCFNDU)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course will help you: Prepare for entry-level job roles in the high-demand area of data center environments Prepare for courses that support the Cisco Certified Network Professional Data Center certification exams Gain knowledge and hands-on skills through Cisco's unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software Overview After taking this course, you should be able to: Describe the foundations of data center networking Describe Cisco Nexus products and explain the basic Cisco NX-OS functionalities and tools Describe Layer 3 first-hop redundancy Describe Cisco Fabric Extender (FEX) connectivity Describe Ethernet port channels and virtual port channel (VPCs) Introduce switch virtualization, machine virtualization, and network virtualization Compare storage connectivity options in the data center Describe Fibre Channel communication between the initiator server and the target storage Describe Fibre Channel zone types and their uses Describe N-Port Virtualization (NPV) and N-Port Identifier Virtualization (NPIV) Describe data center Ethernet enhancements that provide a lossless fabric Describe Fibre Channel over Ethernet FCoE Describe data center server connectivity Describe Cisco UCS Manager Describe the purpose and advantages of APIs Describe Cisco ACI Describe the basic concepts of cloud computing The Understanding Cisco Data Center Foundations (DCFNDU) v1.0 course helps you prepare for entry-level data center roles. In this course, you will learn the foundational knowledge and skills you need to configure Cisco© data center technologies including: networking, virtualization, storage area networking, and unified computing. You will get an introduction to Cisco Application Centric Infrastructure (Cisco ACI), automation and cloud computing. You will get hands-on experience with configuring features on Cisco Nexus Operating System (Cisco NX-OS) and Cisco Unified Computing System (Cisco UCS). This course also earns you 30 Continuing Education (CE) credits towards recertification. Describing the Data Center Network Architectures Cisco Data Center Architecture Overview Three-Tier Network: Core, Aggregation, and Access Spine-and-Leaf Network Two-Tier Storage Network Describing the Cisco Nexus Family and Cisco NX-OS Software Cisco Nexus Data Center Product Overview Cisco NX-OS Software Architecture Cisco NX-OS Software CLI Tools Cisco NX-OS Virtual Routing and Forwarding Describing Layer 3 First-Hop Redundancy Default Gateway Redundancy Hot Standby Router Protocol Virtual Router Redundancy Protocol Gateway Load Balancing Protocol Describing Cisco FEX Server Deployment Models Cisco FEX Technology Cisco FEX Traffic Forwarding Cisco Adapter FEX Describing Port Channels and VPCs Ethernet Port Channels Virtual Port Channels Supported VPC Topologies Describing Switch Virtualization Cisco Nexus Switch Basic Components Virtual Routing and Forwarding Cisco Nexus 7000 Virtual Device Contexts (VDCs) VDC Types VDC Resource Allocation VDC Management Describing Machine Virtualization Virtual Machines Hypervisor VM Manager Describing Network Virtualization Overlay Network Protocols Virtual Extensible LAN (VXLAN) Overlay VXLAN Border Gateway Protocol (BGP) Ethernet VPN (EVPN) Control Plane VXLAN Data Plane Cisco Nexus 1000VE Series Virtual Switch VMware vSphere Virtual Switches Introducing Basic Data Center Storage Concepts Storage Connectivity Options in the Data Center Fibre Channel Storage Networking Virtual Storage Area Network (VSAN) Configuration and Verification Describing Fibre Channel Communication Between the Initiator Server and the Target Storage Fibre Channel Layered Model Fabric Login (FLOGI) Process Fibre Channel Flow Control Describing Fibre Channel Zone Types and Their Uses Fibre Channel Zoning Zoning Configuration Zoning Management Describing Cisco NPV Mode and NPIV Cisco NPV Mode NPIV Mode Describing Data Center Ethernet Enhancements Institute of Electrical and Electronic Engineers (IEEE) Data Center Bridging Priority Flow Control Enhanced Transmission Selection Data Center Bridging Exchange (DCBX) Protocol Congestion Notification Describing FCoE Cisco Unified Fabric FCoE Architecture FCoE Initialization Protocol FCoE Adapters Describing Cisco UCS Components Physical Cisco UCS Components Cisco Fabric Interconnect Product Overview Cisco I/O Module (IOM) Product Overview Cisco UCS Mini Cisco Integrated Management Controller (IMC) Supervisor Cisco Intersight? Describing Cisco UCS Manager Cisco UCS Manager Overview Identity and Resource Pools for Hardware Abstraction Service Profiles and Service Profile Templates Cisco UCS Central Overview Cisco HyperFlex? Overview Using APIs Common Programmability Protocols and Methods How to Choose Models and Processes Describing Cisco ACI Cisco ACI Overview Multitier Applications in Cisco ACI Cisco ACI Features VXLAN in Cisco ACI Unicast Traffic in Cisco ACI Multicast Traffic in Cisco ACI Cisco ACI Programmability Common Programming Tools and Orchestration Options Describing Cloud Computing Cloud Computing Overview Cloud Deployment Models Cloud Computing Services Additional course details: Nexus Humans Cisco Understanding Cisco Data Center Foundations v1.1 (DCFNDU) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Understanding Cisco Data Center Foundations v1.1 (DCFNDU) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Understanding Cisco Data Center Foundations v1.1 (DCFNDU)
Delivered OnlineFlexible Dates
Price on Enquiry

Full Stack Development encompasses the complete creation of end-to-end development of both the front-end and back-end of an application. LSET Bridges The Gap Between Education And Employment

FULL STACK JAVA
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

Data Analysis with Pandas and Python

By Packt

This course offers an immersive experience in data analysis, guiding you from initial setup with Python and Pandas, through series and DataFrame manipulation, to advanced data visualization techniques. Perfect for enhancing your data handling and analysis skills.

Data Analysis with Pandas and Python
Delivered Online On Demand19 hours 26 minutes
£67.99

Cyber security courses in Dubai

By Edoxi Training Institute

Boost your cyber security skills with Edoxi's Cyber Security courses in Dubai. Learn how to safeguard networks and data from cyber threats. With Edoxi’s cyber security courses upskill your knowledge in the areas such as Security Engineering, System Security, Software Security, cyberattacks, Security Software, Software Testing, and more.

Cyber security courses in Dubai
Delivered In-PersonFlexible Dates
FREE

Selenium WebDriver 4 with Java - Zero To Hero

By Packt

This course will teach you how Selenium WebDriver is used to test web applications. You will start by understanding the concepts of Java and gradually move toward understanding Selenium, TestNG framework, Maven, Jenkins, Cucumber, Gherkin, and a lot more interesting topics that will make you a pro in automation testing.

Selenium WebDriver 4 with Java - Zero To Hero
Delivered Online On Demand38 hours 52 minutes
£149.99

Introduction to Design Thinking: Virtual In-House Training

By IIL Europe Ltd

Introduction to Design Thinking: Virtual In-House Training Innovation is the cornerstone of highly successful companies, especially those that continue to be successful over the years and decades. Design thinking practices fuel this continual innovation, as they are the critical links from inspiration to delivery, concept to showroom floor, and start-up to global business. Design thinking is a structured approach to promoting innovation and creative problem-solving. It is not a new approach. It has been around for centuries, as the art, architecture, and inventions of mankind illustrate. By examining the steps to achieving great design and maximum utility of product, design thinking approaches provide a framework in which to develop new solutions to problems and new products to sell. This highly interactive course is designed to help participants think like designers to generate innovation, and to help teams to produce more innovation and creativity. Since design thinking is based on doing rather than thinking, we participants are challenged to apply the techniques, in the classroom, to create new ideas and solutions to a case study project. What you will Learn At the end of this program, you will be able to: Explain the underlying principles and value of using Design Thinking for innovation Describe the basic concepts of the Stanford Model for Design Thinking Evaluate a set of basic Design Thinking techniques for application to your projects Apply tools, techniques, and skills aligned with the 5 stages of the Stanford Model Drive innovation through Design Thinking at some level in your work environment Foundation Concepts Problems and solutions The Design Thinking difference Design Thinking skills and abilities Design Thinking mindset Design Thinking frameworks Stages of Design Thinking Problems and solutions The Design Thinking difference Design Thinking skills and abilities Design Thinking mindset Design Thinking frameworks General Practices Team formation Visualization Improvisation Personalization Empathize Practices Overview of Empathize techniques Observation Engagement Interviews Define Practices Overview of Define practices Unpacking techniques Defining the customer techniques Integrating the Define experience Ideate Practices Overview of Ideate practices Reusable techniques for the Ideate stage New Ideate techniques to explore Prototype & Test Practices Overview of Prototype practices Examples of prototypes Overview of Testing practices Forms of testing techniques Adopt and Adapt Design Thinking Overview of Design Thinking implementation Design Thinking implementation challenges Success in implementing Design Thinking Summary and Next Steps Workshop summary Next steps: Personal Action Plans

Introduction to Design Thinking: Virtual In-House Training
Delivered OnlineFlexible Dates
£850