• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1258 Transport courses delivered Online

Advanced Diploma in Health and Safety

4.3(43)

By John Academy

Advanced Diploma in Health and Safety Description: For obvious reasons anyone can be at health risk at any place, be it your own work place or somewhere else. Therefore it is important to exercise safety procedures in the workplace, which you can learn from this Advanced Diploma in Health and Safety course. This course is divided into three sections, each focusing on helping you improve the health and safety standards in the workplace. To do this though, you need to learn the basics of health and safety, and that is exactly what the first section is about. Here, you will look into health and safety related accidents and issues, find out about workplace hazards, understand legal aspects and find out more about RIDDOR. In the next section - titled 'Health and Safety at Workplace' - you find out more about a managers role, find out about different types of hazards, manage stress, and write and implement a safety plan. Finally, you look into the importance of workplace safety through learn about compulsory rules, dealing with issues and concerns, conflict resolution and so much more. This course is the ultimate guide for implementing health and safety as it cover a diverse group of topics, and you would do well to get it now. Who is the course for? Business professionals who need to learn about workplace health and safety methods People who have an interest in knowing how to handle health and safety Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam, you will have the opportunity to test your proficiency with a mock exam. Certification: After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. However, you can also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hard copy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognised accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path: The Advanced Diploma in Health and Safety course is a useful qualification to possess, and would be beneficial for the following careers: Health Safety Instructor Health & Safety Representative Businessmen Entrepreneur Human Resource Manager Life Coach Mentor. Updated Version-Advanced Diploma in Health and Safety Module 1: Health and Safety at Work and the Laws 00:23:00 Module 2: Managing for Health and Safety 00:31:00 Module 3: Risk Assessment and Common Risks 00:21:00 Module 4: Accidents and Ill Health at Work 00:17:00 Module 5: Incident Management at Work 00:25:00 Module 6: Electrical, Fire and Gas Safety 00:25:00 Module 7: Measures of Fire Safety 00:25:00 Module 8: Fire Emergency: Evacuation Procedures 00:15:00 Module 9: The Fire Plan and Safety Arrangements 00:20:00 Module 10: Manual Handling Hazards and Injuries 00:23:00 Module 11: Manual Handling Risk Control 00:28:00 Module 12: Safe Lifting Techniques 00:15:00 Module 13: Working at Height 00:22:00 Module 14: Work at Height Equipment 00:21:00 Module 15: Working in Confined Spaces and the Laws 00:19:00 Module 16: Control Measures for Working in Confined Spaces 00:25:00 Module 17: Emergency Procedures for Working in Confined Spaces 00:18:00 Module 18: Safety in Different Work Settings 00:21:00 Module 19: Work Equipment Hazards and Risk Control 00:22:00 Module 20: Other Health and Safety Hazards at Work 00:23:00 Module: 21: Basic First-Aid Techniques 00:20:00 Module 22: Dealing with Minor Injuries at Workplace 00:25:00 Module 23: Call for an Emergency 00:07:00 Module 24 Health Problems Related to Hazardous Substances 00:29:00 Module 25: Identifying Hazardous Substances 00:25:00 Module 26: Control Measures and Monitoring 00:29:00 Module 27: Implementation of Control Measures 00:22:00 Certificate & Transcript Order Your Certificates and Transcripts 00:00:00 Old Version-Advanced Diploma in Health and Safety Health and Safety at Workplace Introduction 00:15:00 Health and Safety Related Accidents and ill-health 00:30:00 Legal Responsibilities and Requirements 00:30:00 Managing health and safety in Workplace 01:00:00 Health and Safety in The workplace 01:00:00 Workplace Hazards, Slips and Trips 01:00:00 General fire safety 00:30:00 Work at height 01:00:00 Building work 01:00:00 Machinery safety 01:00:00 Plant and equipment maintenance 01:00:00 Workplace transport 01:00:00 Lifting and handling 01:00:00 Noise, Vibration 01:00:00 Electricity 01:00:00 Harmful substances 01:00:00 Flammable and explosive substances 01:00:00 Managing health, Stress and Emergency Procedures 01:00:00 Role of Employer or Managers and PPE 01:00:00 Importance of Workplace Safety Why Workplace Health & Safety are Important 01:00:00 It Takes Team Effort! 01:00:00 Some Rules are Compulsory 00:30:00 Rewarding Compliance 00:30:00 You Need a Backup Plan Always 01:00:00 Dealing with Issues and Concerns 00:30:00 How to Deal with Noncompliance 00:15:00 Remember What the Workplace is for 01:00:00 Make Your Workplace a Good Place 00:30:00 Conflict Resolution 00:30:00 Are Dress Codes Appropriate? 00:30:00 Minimizing Distractions 01:00:00 People Who Work After Hours 01:00:00 Your Fire Safety Plan 01:00:00 Being Organized 00:30:00 Plan for Emergencies 00:30:00 Promoting a Safe Environment 00:30:00 Do You Need Security Guards? 00:15:00 Special Situations: The Handicapped 00:15:00 Health and Safety at Workplace (for USA) Module One - Getting Started 00:30:00 Module Two - An Overview 00:30:00 Module Three - Types of Hazards 00:30:00 Module Four - Managers Role 00:30:00 Module Five - Training 01:00:00 Module Six - Stress Management 01:00:00 Module Seven - Workplace Violence 00:30:00 Module Eight - Identifying Your Company Hazards 00:30:00 Module Nine - Drug & Alcohol Abuse 01:00:00 Module Ten - Writing the Safety Plan 00:30:00 Module Eleven - Implement the Plan 01:00:00 Module Twelve - Wrapping Up 00:30:00 Recommended Reading Recommended Reading: Advanced Diploma in Health and Safety 00:00:00 Refer A Friend Refer A Friend 00:00:00 Mock Exam Mock Exam- Advanced Diploma in Health and Safety 00:30:00 Final Exam Final Exam- Advanced Diploma in Health and Safety 00:30:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Advanced Diploma in Health and Safety
Delivered Online On Demand47 hours
£25

SWSA v3.0-Securing the Web with Cisco Web Security Appliance

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SWSA v3.0-Securing the Web with Cisco Web Security Appliance
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle 19c Database Administration I (DBA I) (TTOR20519)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This hands-on course is geared for experienced DBAs new to Oracle 19c, who can work in Linux and have basic experience with SQL scripting. Overview This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our Oracle Certified expert facilitator, students will learn how to: How to use tools to access an Oracle Database Generate database creation scripts by using DBCA How to create a container database (CDB) by using the CREATE DATABASE command Learn about Startup and shut down Oracle databases Initialization parameter files and initialization parameters Tools that are used to administer Oracle Net Services How to use the Oracle Connection Manager Control utility to administer Oracle Connection Manager How to create a new PDB from the PDB seed. Logical and physical storage structures in an Oracle database Usage of Oracle Database features that save space Explanation of DML and undo data generation Learn about general architecture of Oracle Data Pump and SQL*Loader How to use SQL*Loader to load data from a non-Oracle database (or user files) Bonus Content / Time Permitting: Explanation of maintenance windows Bonus Content / Time Permitting: Employ basic monitoring procedures and manage performance Oracle 19C Database Administration I (Oracle DBA I) is a comprehensive, hands-on course provides concrete information on the design of an Oracle Database instance and database, allowing you to manage your database investment. In this class, you will learn how to create database storage structures that align with your requirements and business models. You will also learn how to create users and administer databases as well as harden the databases to meet your business requirements. This is the foundational course for learning about Oracle Database and it does not assume prior knowledge or Oracle technologies, however you should have incoming experience working with SQL, and be comfortable with Linux and working from the command line. This training is NOT Official Oracle University training. This is independent, adjustable content that aligns with current topics, skills and tools that participants need to excel in these areas. Introduction to Oracle Database Oracle Multitenant Container Database Oracle Database Instance Configurations Database Sharding Oracle Database Server Accessing an Oracle Database Oracle Database Tools Database Tool Choices SQL Developer Enterprise Manager Database Express Creating an Oracle Database by Using DBCA Planning the Database Choosing a Database Template Configuration Assistant Creating an Oracle Database by Using a SQL Command Creating a Container Database Enable Pluggable Database Starting Up and Shutting Down a Database Instance Starting the Oracle Database Instance Shutting Down an Oracle Database Instance Opening and Closing PDBs Managing Database Instances Investigating Initialization Parameter Files Viewing Initialization Parameters by Using SQL*Plus Modifying Initialization Parameters by Using SQL*Plus Viewing Diagnostic Information Oracle Net Services Overview Oracle Net Services Components Oracle Net Listener Configuring Naming Methods Configuring the Oracle Network to Access a Database Creating a Net Service Name for a PDB Configuring and Administering the Listener Exploring the Default Listener Creating a Second Listener Connecting to a Database Service Using the New Listener Configuring a Shared Server Architecture Configuring Shared Server Mode Configuring Clients to Use a Shared Server Configuring Oracle Connection Manager for Multiplexing and Access Control Oracle Connection Manager Processes Filtering Rules Session Multiplexing Creating PDBs Creating a New PDB from the PDB Seed Cloning Remote PDBs in Hot Mode Relocating PDBs Managing PDBs Renaming a PDB Setting Parameter Values for PDBs Database Storage Overview Logical and Physical Database Structures Tablespaces and Data Files Types of Segments Monitoring Tablespace Space Usage Creating and Managing Tablespaces Viewing Tablespace Information Creating a Tablespace Managing Temporary and Permanent Tablespaces Improving Space Usage Managing Space in Tablespaces Using Compression Enabling the Resumable Space Allocation Feature Creating and Managing User Accounts Creating Common and Local Users Creating a Local User for an Application Exploring OS and Password File Authentication Configuring Privilege and Role Authorization Granting a Local Role (DBA) to PDBADMIN Using SQL*Developer to Create Local Roles Configuring User Resource Limits Using SQL*Developer to Create a Local Profile & Users Configuring a Default Role for a User Implementing Oracle Database Auditing Enabling Unified Auditing Creating Audit Users Creating an Audit Policy Introduction to Loading and Transporting Data General Architecture Oracle Data Pump SQL Loader Loading Data into a PDB from an External File Moving Data from One PDB to Another PDB Transporting a Tablespace Using External Tables to Load and Transport Data Querying External Tables Unloading External Tables Automated Maintenance Tasks Overview Automated Maintenance Tasks Maintenance Windows Predefined Maintenance Windows Bonus: Managing Tasks and Windows Enabling and Disabling Automated Maintenance Tasks Modifying the Duration of a Maintenance Window Bonus: Database Monitoring and Performance Tuning Overview Performance Planning Considerations Automatic Workload Repository (AWR) Advisory Framework Bonus: Monitoring Database Performance & Processes Server-Generated Alerts Setting Metric Thresholds Performance Monitoring Examining the Database Background Processes Bonus: Tuning Database Memory Viewing Memory Configurations Bonus: Analyzing SQL and Optimizing Access Paths Using the Optimizer Statistics Advisor

Oracle 19c Database Administration I (DBA I) (TTOR20519)
Delivered OnlineFlexible Dates
Price on Enquiry

Fundamentals of Port Management Strategies

By Imperial Academy

Level 5 QLS Endorsed Course | CPD & CiQ Accredited | Audio Visual Training | Free PDF Certificate | Lifetime Access

Fundamentals of Port Management Strategies
Delivered Online On Demand
£12

Warehouse - CPD Accredited

By Compliance Central

Have you ever ordered something from Amazon and received the wrong product? Chances are, no, you haven't. That's because Amazon warehouse operatives are skilled and good at their job. Speaking of Amazon, with the ever-looming pandemic outside and everyone ordering things from home, companies like Amazon, TESCO, eBay and all these big eCommerce companies are hiring warehouse operatives in large numbers. This warehouse operative course is a quick and easy way to learn the essentials of working in a warehouse. With its step by step lessons and no fluff method of content delivery, the course saves you time and money as it's available at a discounted price at the moment. Warehouse Operative course Learning Outcomes: Upon successful completion of this highly appreciated Warehouse Operative course, you'll be a skilled professional, besides- The purpose of the warehouse and several Layouts. Principles, tools, and procedures in warehousing Techniques and tools for completing orders Examine the many storage devices utilised in warehouses. Implement the appropriate security measures. Good Practices for Warehousing Curriculum Breakdown of the warehouse operative Course Module 01: The Role Module 02: Introduction to Warehouse Safety Module 03: Health and Safety Management Module 04: General Warehouse Hazards Module 05: Manual and Mechanical Handling Module 06: Site Safety Each topic has been designed to deliver more information in a shorter amount of time. This makes it simple for the learners to understand the fundamental idea and apply it to diverse situations. Key Features of Warehouse Operative course: CPD Accredited Course Unlimited Retake Exam & Tutor Support Easy Accessibility to the Course Materials 100% Learning Satisfaction Guarantee Lifetime Access & 24/7 Support Self-paced Course Modules Covers to Explore Multiple Job Positions So, without any further ado, get started now. The faster you learn, the sooner you can start building your career as a Warehouse Operative. Certification CPD Accredited (CPD QS) Certificate Digital (PDF) & Hardcopy certificates are available Who is this course for? Those looking to pursue a profession in warehouse management. A person who wishes to begin their career in supply chain management in a warehouse setting. Owners and partners of e-commerce businesses who need to grow and start their own warehouse processes. Jobseekers who are looking to ace their logistics and supply chain management interviews. Requirements Students seeking to enrol for Along with the warehouse course should meet the following requirements; Basic knowledge of English Language, which already you have Be age 16 years or above Basic Knowledge of Information & Communication Technologies for studying online or digital platform. Stable Internet or Data connection in your learning devices. Career path The course will enhance your knowledge and improve your confidence in exploring opportunities in various sectors related to Warehouse Operative, such as- Warehouse Managers Supply Chain Officer Inventory Managers Logistics Manager international Business Managers Importers - Exporters Freight Managers and Supervisors Courier and Parcel operators E-Commerce Fulfilment Managers Business Consultants Certificates Certificate of completion Digital certificate - Included After successfully completing this course, you can get CPD accredited digital PDF certificate for free. Certificate of completion Hard copy certificate - Included After successfully completing this course, you can get CPD accredited hardcopy certificate for free. The delivery charge of the hardcopy certificate inside the UK is £3.99 and international students need to pay £9.99 to get their hardcopy certificate.

Warehouse - CPD Accredited
Delivered Online On Demand2 hours
£12

Cyber Security & Ethical Hacking

4.7(160)

By Janets

Register on the Cyber Security & Ethical Hacking today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Cyber Security & Ethical Hacking is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Cyber Security & Ethical Hacking Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Cyber Security & Ethical Hacking, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Introduction to Ethical Hacking Hacking Terms 00:07:00 VA vs PT and Rule of Engagement 00:09:00 Methodologies 00:07:00 Type of Pen Testing 00:06:00 Phases of Penetration Test 00:04:00 10 Steps to Follow 00:04:00 Setting up a Penetration Testing Lab What is Linux OS - Benefits 00:04:00 What is Kali Linux 00:03:00 Virtual Box Installation 00:06:00 Kali Linux Installation in VB 00:12:00 Install Metasploitable on Virtual Box 00:09:00 Install DVWA in Kali 00:18:00 Install TOR 00:09:00 Executing Basic Commands in Kali 00:12:00 Executing Advance Commands in Kali 00:14:00 Information Gathering What is Information Gathering 00:04:00 Maltego Part 1 00:07:00 Maltego Part 2 00:06:00 HTTrack 00:05:00 The Harvester 00:02:00 NSLookup 00:03:00 RedHawk 00:05:00 SHODAN 00:09:00 OSNIT Framework 00:05:00 Scanning and Enumeration What is Scanning 00:07:00 What is Nmap 00:05:00 Zenmap GUI 00:17:00 What is Enumeration 00:03:00 Types of Enumeration 00:03:00 Enumeration Using Hyena - 1 00:07:00 Enumeration Using Hyena - 2 00:06:00 VAPT What is Vulnerability Assessment 00:04:00 Phases of Vulnerability Assessment 00:08:00 Vulnerability Scoring Systems 00:09:00 Introduction to Nessus 00:05:00 Create and Configure Nessus Network Policy 00:08:00 Nessus Launch Scan and Analyse Result 00:08:00 Firewalls What is IDS 00:11:00 What Are Firewalls 00:10:00 What is DMZ 00:06:00 IDS Evasion Techniques 00:08:00 Firewall Evasion Techniques 00:09:00 Firewall Pentesting 00:02:00 WAPT Introduction to Web Servers 00:05:00 Types of Web Server Attacks 00:05:00 Web Server Penetration Testing 00:04:00 Countermeasures of Web Servers? 00:05:00 OWASP Top 10 Attacks Part 1 00:05:00 OWASP Top 10 Attacks Part 2 00:07:00 Website Foot Printing Part 1 00:05:00 Website Foot Printing Part 2 00:03:00 Command Execution Low 00:06:00 Command Execution Medium 00:07:00 Configuring Burp Suite 00:16:00 File Upload Low 00:10:00 File Upload Medium 00:07:00 File Upload High 00:08:00 SQL Injection 00:04:00 SQL Injection II 00:05:00 Manual SQL 00:17:00 Automating SQL 00:09:00 Countermeasures of SQL Injection 00:03:00 What Is XSS 00:03:00 Types of XSS 00:06:00 XSS Low 00:11:00 XSS Medium 00:05:00 XSS High 00:11:00 Countermeasures of XSS 00:04:00 What is CSRF 00:06:00 CSRF Practical 00:07:00 What is a Brute Force Attack? 00:05:00 Brute Force Political 00:18:00 Web Application Penetration Testing? 00:09:00 Web Application Countermeasures 00:06:00 Denial of Service What is Denial of Service (DOS)? 00:03:00 Types of DOS attack? 00:05:00 What is a BOTNET? 00:03:00 Malware Threats Introduction to Malware 00:09:00 Trojan 00:08:00 Types of Trojans 00:08:00 Viruses and Worms 00:07:00 Types of Viruses 00:10:00 Countermeasures 00:07:00 Social Engineering Introduction to Social Engineering 00:05:00 Social Engineering 00:06:00 Installing BeEF Framework 00:09:00 Getting User Credentials Using BeEF Framework 00:11:00 Cryptography Introduction to Cryptography 00:05:00 Symmetric Encryption 00:03:00 DES and AES 00:06:00 Asymmetric Encryption 00:03:00 RSA and Diffie 00:07:00 Hashing 00:07:00 Public Key Infrastructure (PKI) and Certificate Authority (CA) 00:10:00 Digital Signatures 00:09:00 Transport Layer Security (TLS) 00:04:00 Calculating One Way Hashes Using HashCal 00:04:00 Basic Data Encryption Advance and Decryption Package 00:05:00 Report Writing Introduction to Report Writing 00:08:00 Component of a Report 00:14:00 Bonus Section Why we need to fix vulnerabilities 00:05:00 Hacker Sponsored Security 00:03:00 Key Terms in Bug Bounty Program 00:05:00 Bug Bounty Definition 00:03:00 Public or Private Bug Bounty Program 00:04:00 What is HackerOne 00:05:00 Why Organizations will hire you 00:08:00

Cyber Security & Ethical Hacking
Delivered Online On Demand12 hours 17 minutes
£25

Purchase Ledger Assistant

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Purchase Ledger Assistant
Delivered Online On Demand4 hours 14 minutes
£25

Cisco Implementing Cisco Data Center Core Technologies v1.1 (DCCOR)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network designers Network administrators Network engineers Systems engineers Data center engineers Consulting systems engineers Technical solutions architects Field engineers Cisco integrators and partners Server administrator Network manager Overview After taking this course, you should be able to: Implement routing and switching protocols in Data Center environment Implement overlay networks in data center Introduce high-level Cisco Application Centric Infrastructure (Cisco ACI™) concepts and Cisco Virtual Machine manager (VMM) domain integration Describe Cisco Cloud Service and deployment models Implement Fibre Channel fabric Implement Fibre Channel over Ethernet (FCoE) unified fabric Implement security features in data center Implement software management and infrastructure monitoring Implement Cisco UCS Fabric Interconnect and Server abstraction Implement SAN connectivity for Cisco Unified Computing System™ (Cisco UCS) Describe Cisco HyperFlex™ infrastructure concepts and benefits Implement Cisco automation and scripting tools in data center Evaluate automation and orchestration technologies The Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.1 course helps you prepare for the Cisco© CCNP© Data Center and CCIE© Data Center certifications for advanced-level data center roles. In this course, you will master the skills and technologies you need to implement data center compute, LAN and SAN infrastructure. You will also learn the essentials of automation and security in data centers. You will gain hands-on experience deploying, securing, operating, and maintaining Cisco data center infrastructure including: Cisco MDS Switches and Cisco Nexus Switches; Cisco Unified Computing System? (Cisco UCS©) B-Series Blade Servers, and Cisco UCS C-Series Rack Servers. Implementing Data Center Switching Protocols Spanning Tree Protocol Port Channels Overview Implementing First-Hop Redundancy Protocols Hot Standby Router Protocol (HSRP) Overview Virtual Router Redundancy Protocol (VRRP) Overview Implementing Routing in Data Center Open Shortest Path First (OSPF) v2 and Open Settlement Protocol (OSP) v3 Border Gateway Protocol Implementing Multicast in Data Center IP Multicast in Data Center Networks Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Implementing Data Center Overlay Protocols Cisco Overlay Transport Virtualization Virtual Extensible LAN Implementing Network Infrastructure Security User Accounts and Role Based Access Control (RBAC) Authentication, Authorization, and Accounting (AAA) and SSH on Cisco NX-OS Describing Cisco Application-Centric Infrastructure Cisco ACI Overview, Initialization, and Discovery Cisco ACI Management Describing Cisco ACI Building Blocks and VMM Domain Integration Tenant-Based Components Cisco ACI Endpoints and Endpoint Groups (EPG) Describing Packet Flow in Data Center Network Data Center Traffic Flows Packet Flow in Cisco Nexus Switches Describing Cisco Cloud Service and Deployment Models Cloud Architectures Cloud Deployment Models Describing Data Center Network Infrastructure Management, Maintenance, and Operations Time Synchronization Network Configuration Management Explaining Cisco Network Assurance Concepts Need for Network Assurance Cisco Streaming Telemetry Overview Implementing Fibre Channel Fabric Fibre Channel Basics Virtual Storage Area Network (VSAN) Overview Implementing Storage Infrastructure Services Distributed Device Aliases Zoning Implementing FCoE Unified Fabric Fibre Channel over Ethernet Describing FCoE Implementing Storage Infrastructure Security User Accounts and RBAC Authentication, Authorization, and Accounting Describing Data Center Storage Infrastructure Maintenance and Operations Time Synchronization Software Installation and Upgrade Describing Cisco UCS Server Form Factors Cisco UCS B-Series Blade Servers Cisco UCS C-Series Rack Servers Implementing Cisco Unified Computing Network Connectivity Cisco UCS Fabric Interconnect Cisco UCS B-Series Connectivity Implementing Cisco Unified Computing Server Abstraction Identity Abstraction Service Profile Templates Implementing Cisco Unified Computing SAN Connectivity iSCSI Overview Fibre Channel Overview Implementing Unified Computing Security User Accounts and RBAC Options for Authentication Introducing Cisco HyperFlex Systems Hyperconverged and Integrated Systems Overview Cisco HyperFlex Solution Describing Data Center Unified Computing Management, Maintenance, and Operations Compute Configuration Management Software Updates Implementing Cisco Data Center Automation and Scripting Tools Cisco NX-OS Programmability Scheduler Overview Describing Cisco Integration with Automation and Orchestration Software Platforms Cisco and Ansible Integration Overview Cisco and Puppet Integration Overview Describing Cisco Data Center Automation and Orchestration Technologies (Self-study) Power On Auto Provisioning Cisco Data Center Network Manager Overview Additional course details: Nexus Humans Cisco Implementing Cisco Data Center Core Technologies v1.1 (DCCOR) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Data Center Core Technologies v1.1 (DCCOR) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Data Center Core Technologies v1.1 (DCCOR)
Delivered OnlineFlexible Dates
Price on Enquiry

Driver CPC 1-Day Periodic 7-Hour Course: Accidents, Incidents, Breakdowns / DG Awareness Training - ONLINE

By Total Compliance

Enhance your road safety knowledge and compliance. This course provides 7 hours of Driver CPC training, focusing on critical areas of road safety and legal compliance. Accidents, Incidents and Breakdowns module will equip you with the skills to: Understand common causes of accidents and how to mitigate risks. Learn proper procedures for dealing with accidents, breakdowns, and other incidents. Develop strategies to ensure personal safety and the safety of fellow road users. Dangerous Goods Awareness module will cover: Understand the different hazard classes and types of dangerous goods. Learn about the legal requirements for transporting and storing dangerous goods. Discover the essential safety protocols for handling hazardous materials. Identify and assess potential risks associated with dangerous goods. Apply best practices for documentation and labeling. By completing this course, you will be better prepared to handle unexpected situations on the road, reduce the risk of accidents, and ensure legal compliance. Ideal for professional drivers looking to refresh their knowledge and improve their overall safety performance.

Driver CPC 1-Day Periodic 7-Hour Course: Accidents, Incidents, Breakdowns / DG Awareness Training - ONLINE
Delivered Online
£69.95

Supply Chain Logistics Operative Level 2

By Rachel Hood

Managing the movement of goods across all sectors and distances for a range of customers from private individuals and sole traders through to large global organisations.

Supply Chain Logistics Operative Level 2
Delivered OnlineFlexible Dates
Price on Enquiry