Advanced DNS training course description This two-day hands on DNS training course studies both the UNIX BIND and the Microsoft (MS DNS) implementations. The course follows on from our Definitive DNS for engineers course starting with best practices. The majority of the course is spent on securing DNS and in particular DNSSEC. Some parts are specific to BIND. Students choose whether to use Windows or UNIX for the hands on sessions. What will you learn Implement DNS best practices. Harden DNS servers. Install, configure, maintain and troubleshoot DNSSEC. Advanced DNS training course details Who will benefit: Technical staff wanting to learn DNS including: Network personnel. System administrators. Prerequisites: Total DNS for engineers Duration 2 days Advanced DNS training course contents Best practices MX and PTR records, lame delegations, disallowing recursion, TTLs, online testing. Hands on Review of your DNS servers. Split DNS Partitioning internal and external DNS, views. Hands on Implementing split DNS. Hardening DNS ACLs, recursion, queries, trusted sources, chroot jail, secure BIND template. Hands on Securing the DNS server. DNSSEC What is DNSSEC? DNSSEC benefits, DNSSEC RRs. DNSKEY, RRSIG, NSEC, DS. Hands on Creating DNSSEC keys. Securing zone transfers TSIG, shared secret. Securing DDNS. Hands on Secure file transfers. Zone integrity Trusted anchors, Chains of trust, Zone status, Zone signing, Keys. ZSK, KSK, adding keys to a zone file. Secure delegations. Hands on Zone signing Maintaining Signed zones Key rollover, pre publish, double signing, rollover cache.
Constantly making up and breaking up Improve communication Self-regulation Improve understanding Address trust and respect issues Healthy relationship course Be a better partner training for both parties Emotional intelligence and relationship disciplines training 6 sessions 1-hour x 6 https://relationshipsmdd.com/product/our-relationship-is-an-emotional-rollercoaster/
The WSET Level 2 Wine award course is suitable for anybody who has a serious interest in wine and wishes to broaden their knowledge in a structured way. The WSET Level 2 Award in Wines has full accreditation from OfQual as a Level 2 Vocational Qualification. Through a combination of tasting and theory you will explore the factors that impact the style and quality of wine and learn how to describe wines with confidence. What the course covers Wine Tasting: Taste and describe wines using the WSET Systematic Approach to Tasting Food and Wine Matching: You will learn about the key considerations when matching food and wine successfully Wine Service and Storage: Learn the correct way to store and serve wine and recognise common faults found in wines Labelling: Learn how to decode and understand labels Factors influencing the Style of Wine: Study the factors influencing the style, quality and price of wine in the vineyard and winery Grape Varieties: You'll learn about the styles of wines produced by the key international red and white grape varieties (Chardonnay, Pinot Grigio, Sauvignon Blanc, Riesling, Cabernet Sauvignon, Pinot Noir, Merlot and Syrah/Shiraz) as well as the styles of wines made with 22 regionally important grape varieties grown in 70 wine regions (GI's) around the world Sparkling and Fortified wines: You will be taught how grape varieties and winemaking processes influence the style of wines in these two key wine categories Key Wine-Producing regions of the World: Learn about the main styles of wines from the key wine-producing regions. France, Germany, Italy, Spain, Portugal, USA, Argentina, Chile, Australia, New Zealand and South Africa Examination: The 1 hour, 50 multiple-choice question exam is taken in the afternoon of the final day of the course and the exam fee is included in the course cost. A mark of 55% required to pass. Certification: All students who pass will be issued with a certificate suitable for framing and a lapel pin. N.B. In addition to classroom teaching, students are expected to complete around 12 hours of private study in their own time. No prior wine knowledge is required however the course builds upon the WSET Level 1 Award in Wines course. It is not essential to complete Level 1 to join the Level 2 course but if you are a complete beginner you may wish to consider this option. We recommend you read the course specification document HERE for full details of the content, structure and assessment criteria. Any questions please get in touch. The course fee includes All WSET course materials including; Looking Behind the Label course manual, Study Guide, Specification book, and SAT ® Tasting Card Approx 40 delicious wines to taste including Champagne & Port The use of professional ISO tasting glasses 3 days of professional WSET tuition by a WSET Certified tutor Teaching of the WSET Level 2 Systematic Approach to Tasting Wine (SAT) ® which will enable you to analyse wines objectively and consistently Registration with WSET and all examination fees Internationally-recognised certificate and pin badge upon successful completion Practice multiple choice questions provided FREE OF CHARGE Comprehensive student support outside of class time should you have any questions before, during and after the course VAT at 20% (VAT receipt can be provided on request) Special Educational Needs Please make us aware if you have a condition that may mean you qualify for additional help during the exam such as dyslexia. Funding Funding for this course is available: DEVELOP is the educational programme of The Drinks Trust, the drinks and hospitality industry charity. DEVELOP offers fully funded training and skills courses, delivered by industry-leading providers for people already working, or with an ambition to work, in the drinks and hospitality industry. Manchester Wine School has partnered with The Drinks Trust to bring courses free of charge to eligible students. All of the WSET courses are available for funding with DEVELOP. To learn more please visit the Drinks Trust website HERE Criteria of eligibility for DEVELOP funding: must be 18 or over, eligible to work in the UK, have a National Insurance Number, and be earning less than £26k/pa
Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.
This is the package for improving your relationship and learning more about the five love languages, communicating, understanding, compromise, respect and trust. This package is a relationship educational package aimed at improving and enhancing your relationships with loved ones you will be taught the ideal approaches and social skills to maintain more formidable and long lasting relationships https://relationshipsmdd.com/dating-improve-my-relationship-packages/
Five half-day Leadership modules with mini work placed projects to bring the learning into action in the workplace.
Dealing with infidelity Rebuilding trust Ascertaining problem areas Establishing personality differences Moving forward from cheating Respect foundation building Enabling healthy communication patterns 6 sessions 45 mins https://relationshipsmdd.com/product/he-wont-admit-he-cheated-package/
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.
Essential IMS training course description The IP Multimedia Core Network Subsystem (IMS) is defined by 3GPP as a new mobile infrastructure. This course studies the discreet elements in the IMS. What will you learn Describe the IMS. Describe the IMS architecture. Explain how charging, security and QoS is handled in the IMS. Explain how the IMS supports service enablers such as Push to talk and Presence. Essential IMS training course details Who will benefit: Telecommunications staff. Prerequisites: Mobile communications overview Duration 2 days Essential IMS training course contents Mobile communications review The role of IP in telecommunications. GSM to IMS. Enhanced multimedia services, Push To, convergence, conferencing, roaming. What is IMS? What it is, why IMS, standard bodies: 3GPP, IETF, OMA, IMS services. MMD comparison. IMS architecture blocks Overview, IMS functions, IMS interfaces, IMS protocols, IMS elements, IMS reference points. Access network, IMS in GSM, CDMA, WiFi & PSTN networks. Core network. Application, Control and Call planes. HSS - User database Identification. The user database, role of HSS, SLF and multiple HSSs. 'Normal' identities, IMPI, IMPU. IMS signalling: SIP What is SIP? SIP URI, contact address, UAs, Proxies, basic SIP call flow, SIP sessions. IMS other protocols Megaco, Diameter, XML, XCAP, COPS, RTP/RTCP, SDP, H.324M, IM and MSRP. Call/Session Control Call Session Control Functions (CSCF). Domains. Home networks, visited networks. CSCF and SIP. P-CSCF, P-CSCF discovery, P-CSCF functions. I-CSCF, DNS and I-CSCF. S-CSCF, S-CSCF functions, ENUM lookups. QoS. Example call flows. IMS services Open service platform, Application Servers, profiles, AS interface with S-CSCF. 'Normal' services (Caller ID, Call waiting, transferâ¦) Push to talk Over Cellular (PoC), IMS conferencing, Group management, IMS Presence, IMS Messaging. Other possible applications. Media servers. (MRFC, MRFP). Gateways IMS PSTN procedures, BGCF, PSTN interface. SGW, MGCF, MGW Charging Architecture, Offline, online and flow based charging, charging reference points, CCF, DIAMETER, ICID, IOI. IMS security IMS security architecture, identities, AAA, public and private user ID, service filters, Cx interface, RADIUS, Diameter protocol, 3GPP AKA, integrity, privacy, NDS, IPSEC, trust, assertion.