• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

83 VPN courses delivered On Demand

Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training

4.3(43)

By John Academy

Description The Implementing Cisco IP Routing is a qualifying exam for the Cisco Certified Network Professional CCNP, Cisco Certified Internetwork Professional CCIP, and Cisco Certified Design Professional CCDP certifications. This Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training will help you to be certified Successfully with all the important knowledge and skills necessary to use advanced IP addressing and routing in implementing scalable and secure Cisco ISR routers connected to LANs and WANs. The exam also covers configuration of secure routing solutions to support branch offices and mobile workers. This is an advanced course on Cisco routing configuration for both IPv4 and IPv6. In this course, you will gain the knowledge to configure and optimize a routing domain using OSPF, EIGRP, BGP, PBR, IP SLA and configure redistribution when needed. It also includes the configuration of highly secure routing solutions to support branch offices and mobile workers. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Routing Services Complex Enterprise Network Frameworks, Architectures, and Models FREE 00:15:00 Creating, Documenting, and Executing an Implementation Plan 00:09:00 Overview of IP Routing 00:12:00 RIPNG 00:26:00 Configuring the Enhanced Interior Gateway Routing Protocol Understanding EIGRP Terminology and Operation 00:14:00 Planning EIGRP Routing Implementations 00:03:00 Configuring and Verifying EIGRP 00:03:00 Enable EIGRP Routing 00:01:00 Define EIGRP Networks 00:03:00 Define Bandwidth on Interfaces 00:01:00 Enable and Disable EIGRP Automatic Summarization 00:01:00 Passive Interface 00:02:00 IP Default Network 00:03:00 Configure a Router to Advertise a Default Route as the Gateway 00:02:00 Example of the IP Route Next Hop Command 00:01:00 Example of the IP Route Quad Zero Command 00:01:00 Summarization in Discontiguous Networks 00:01:00 Configuring and Verifying EIGRP in an Enterprise WAN 00:03:00 Disabling Automatic Summarization 00:01:00 Frame Relay Using Dynamic Mapping 00:03:00 EIGRP over Layer 3 MPLS VPNs 00:02:00 EIGRP over Layer 2 MPLS VPNs 00:04:00 Configuring and Verifying EIGRP Authentication 00:04:00 Configure Authentication Mode for EIGRP 00:02:00 Configure the Key Chain 00:01:00 Optimizing EIGRP Implementations 00:05:00 Enable Authentication to use the Key Chain 00:01:00 EIGRP 00:21:00 Configuring the Open Shortest Path First Protocol Understanding OSPF Terminology and Operation 00:20:00 OSPF Packets 00:11:00 Planning OSPF Routing Implementations 00:06:00 Basic OSPF Verification and Configuration 00:09:00 Configuring Single Area OSPF 00:02:00 Configuring Multi Area OSPF 00:01:00 EIGRP over Layer 3 MPLS VPNs 00:02:00 OSPF Network Types 00:11:00 Assigning Router Priority 00:02:00 Override the Default Interface Cost 00:01:00 Configure a Key for Simple Authentication 00:01:00 Configure the MD5 Key-ID and Key 00:02:00 Verifying Simple Password Authentication 00:01:00 OSPF 00:19:00 Manipulating Routing Updates Assessing Network Routing Performance Issues 00:05:00 Using Multiple Routing Protocols on a Network 00:09:00 Redistribution Supports All Routing Protocols 00:01:00 Implementing Route Redistribution 00:07:00 Redistribute Routes into RIP 00:03:00 Redistribute Routes into OSPF 00:04:00 Default Metric for Routing Protocols 00:02:00 Redistributing Routes into EIGRP 00:05:00 Applying Metric Values for EIGRP 00:03:00 Modifying the Administrative Distance for all Routing Protocols 00:06:00 Changing OSPF AD 00:15:00 Controlling Routing Update Traffic 00:11:00 Route Map 00:10:00 Using Distribute Lists and Filter Incoming Routing Updates 00:03:00 Defining a Filter for Outgoing Routing Commands 00:02:00 Distribute List In or Out and Examples 00:06:00 Distribute Lists to Avoid Route Feedback 00:05:00 Fallbacks of Distribute Lists 00:01:00 Using Prefix Lists 00:02:00 Implementing Path Control Understanding Path Control 00:05:00 Similarities of ACLs and Prefix Lists 00:01:00 Implementing Path Control using Offset-Lists 00:02:00 Configuring a Prefix List 00:04:00 Implementing Path Control Using Offset-Lists 00:03:00 Verify Offset-Lists 00:01:00 Implementing Path Control using IOS IP SLAs 00:10:00 Cisco IOS IP SLAs 00:01:00 IP SLAs Applications 00:01:00 Operations - Responders and Sources 00:01:00 IP SLAs Operations 00:01:00 Steps to Deploying IP SLAs 00:01:00 IP SLA - ICMP ECHO and ICMP ECHO Sub Commands 00:04:00 IP SLA Schedules 00:05:00 Define Tracking Objects to Track the State of IP SLAs Operations 00:02:00 Configuring Track Delay 00:01:00 Configure a Static Route for IP SLAs Tracking 00:03:00 Verify IP SLAs using Method 1 00:02:00 Verify IP SLAs using Method 2 00:02:00 Implement Path Control using Policy-Based Routing 00:09:00 Implement Path Control using Policy-Based Routing 00:01:00 Configure PBR 00:01:00 Logical PBR Operation 00:01:00 Route-Map Commands for PBR 00:03:00 Match Statements and Conditions 00:03:00 Match Commands Used in PBR 00:01:00 Specify Criteria to be Matched using Prefix Lists of ACLs 00:01:00 Specify Criteria to be Matched by Packet Length 00:01:00 Modify Matching Conditions using Set Statements 00:01:00 Set Conditions 00:03:00 Set Commands used in PBR 00:02:00 Specify the Next Hop IP Address for Matching Packets 00:01:00 Specify Interfaces Through which Packets Can be Routed 00:01:00 Specify a List of Default Next-Hop IP Addresses 00:02:00 Specify a List of Default Interfaces 00:02:00 Mark Packets Using the IP ToS Field 00:02:00 Set the 3 IP Precedence Bits in the IP Packet Header 00:01:00 Set IP Precedence Parameters 00:02:00 Identify a Route Map to Use for Policy Routing on an Interface 00:01:00 Various Methods to Verify PBR 00:02:00 Advanced Path Control Tools 00:02:00 Implementing a Border Gateway Protocol Solution for ISP Connectivity BGP Terminology, Concepts, and Operation 00:20:00 EGP and IGP 00:01:00 AS 00:02:00 IANA 00:01:00 RIRs 00:02:00 AS Numbers 00:03:00 Facts about BGP 00:03:00 BGP Neighbors 00:03:00 BGP Operational Overview 00:02:00 BGP Use between ASs 00:01:00 BGP and IGPs 00:01:00 Connecting Enterprise Networks to Internet Service Providers 00:02:00 Configuring BGP 00:12:00 Questions for Deploying Routing and Connection 00:02:00 Public IP Address Space 00:02:00 Configure Static Routes 00:02:00 Configure the Default Local Preference 00:01:00 Define BGP as the IP Routing Protocol 00:03:00 Router BGP Command Parameters 00:01:00 Identify Peer Router to Establish a BGP Session 00:02:00 Create a Peer Group 00:02:00 Assign Neighbors as Part of the Peer Group 00:02:00 Disable an Existing BGP Neighbor or Peer Group Relationship 00:02:00 Establish the IBGP Session Using a Loopback Interface 00:02:00 IBGP Source IP 00:03:00 Increase the TTL for EBGP Connections 00:03:00 Configure the Router as the Next Hop for a BGP Speaking Peer 00:02:00 Verifying and Troubleshooting BGP 00:01:00 Basic BGP Path Manipulation Using Route Maps 00:05:00 Filtering BGP Routing Updates 00:02:00 Implementing Routing Facilities for Branch Offices and Mobile Workers Planning the Branch Office Implementations 00:15:00 NAT 00:09:00 Planning for Mobile Worker Implementations 00:03:00 Routing Traffic to the Mobile Worker 00:02:00 Implementing IPv6 in the Enterprise Network Introducing IPv6 00:07:00 Configuring and Verifying IPv6 Unicast Addresses 00:06:00 Routing IPv6 Traffic 00:01:00 Configuring Static Routing 00:04:00 Configuring OSPFv3 00:07:00 OSPFv3 00:22:00 Configuring EIGRP for IPv6 00:03:00 EIGRP for IPv6 00:18:00 Multiprotocol BGP (MP-BGP) 00:03:00 Mock Exam Mock Exam- Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training 00:20:00 Final Exam Final Exam- Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training 00:20:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training
Delivered Online On Demand10 hours 56 minutes
£24

Certified Information Systems Security Officer (CISSO) - Complete Video Course

4.3(43)

By John Academy

Description: The uniquely management-focused CISSO certification promotes international security practices and recognizes the individual who manages, designs, and oversees and assesses an enterprise's information security. CISSO means higher earning potential and career advancement. Recent independent studies consistently rank CISSO as one of the highest paying and sought after IT certifications. This Certified Information Systems Security Officer (CISSO) - Complete Video Course covers everything you need to know about becoming a Certified Information Systems Security Officer. In this course you will learn about risk management, security management, authentication, access control, security models, operations security, symmetric cryptography and hashing, asymmetric cryptography and PKI, network connections, network protocols and devices, telephony, VPNs and wireless, security architecture, software development security, database security and system development, business continuity, disaster recovery, incident management, law, and ethics, and physical security, and more. So, get this to demonstrate your information security management expertise and this course will enhance your competitive advantage. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Information Systems Security Officer (CISSO) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Information Systems Security Officer (CISSO) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Risk Management FREE 00:58:00 Security Management 00:58:00 Authentication 01:01:00 Access Control 01:20:00 Security Models 01:01:00 Operations Security 01:10:00 Symmetric Cryptography and Hashing 01:19:00 Asymmetric Cryptography and PKI 01:31:00 Network Connections 01:28:00 Network Protocols and Devices 01:31:00 Telephony, VPNs and Wireless 01:13:00 Security Architecture 01:02:00 Software Development Security 01:05:00 Database Security and System Development 01:00:00 Malware and Software Attacks 00:17:00 Business Continuity 00:44:00 Disaster Recovery 00:53:00 Incident Management, Law, and Ethics 01:06:00 Physical 00:38:00 Mock Exam Mock Exam- Certified Information Systems Security Officer (CISSO) - Complete Video Course 00:20:00 Final Exam Final Exam- Certified Information Systems Security Officer (CISSO) - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Information Systems Security Officer (CISSO) - Complete Video Course
Delivered Online On Demand20 hours 55 minutes
£24

CompTIA A+ (220-1001)

4.7(160)

By Janets

Register on the CompTIA A+ (220-1001) today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The CompTIA A+ (220-1001) is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The CompTIA A+ (220-1001) Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the CompTIA A+ (220-1001), all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16.  Course Content Section 01: All about the CompTIA A+ CompTIA A+ 2019 Core 1 (220-1001) Course Introduction 00:02:00 What is the CompTIA A+? 00:02:00 Why Get A+ Certified? 00:03:00 What is on the CompTIA A+ Core 1 (220-1001) Exam? 00:09:00 How to Pass the A+ Exam 00:04:00 How to Use This Video Course 00:03:00 Section 02: Safety and Professionalism Tools of the Trade 00:06:00 Troubleshooting Theory 00:10:00 Section 03: The Visible Computer Primary PC Connections 00:05:00 External Connections 00:11:00 Inside the PC 00:08:00 What is a Computer? 00:07:00 Section 04: CPUs What is a CPU? 00:15:00 CPU Speeds and Cores 00:12:00 Caching 00:07:00 CPU Sockets 00:12:00 Installing a CPU 00:11:00 Liquid Cooling 00:04:00 Section 05: RAM RAM Technology 00:11:00 RAM Capacity 00:08:00 RAM Features 00:07:00 Installing RAM 00:07:00 Section 06: Firmware What is the BIOS? 00:06:00 POST 00:09:00 System Setup 00:09:00 Troubleshooting Firmware 00:12:00 Section 07: Motherboards Form Factors 00:06:00 Chipsets 00:05:00 Touring the Motherboard 00:14:00 Touring the Case 00:07:00 Installing a Motherboard 00:09:00 Section 08: Power Supplies The Power Supply 00:09:00 Mounting a Power Supply 00:05:00 Choosing a Power Supply 00:08:00 Cooling Your PC 00:11:00 Troubleshooting Power Supplies 00:09:00 Troubleshooting Core Components 00:14:00 Section 09: Mass Storage Technologies Introduction to Mass Storage 00:13:00 Magnetic Disk Drives 00:08:00 Solid State Drives 00:08:00 SCSI 00:03:00 Boot Order 00:07:00 Section 10: Implementing Mass Storage New Installation - First Drive 00:05:00 RAID 00:11:00 Hardware RAID 00:07:00 Mass Storage Troubleshooting 00:08:00 Section 11: Essential Peripherals Optical Media 00:10:00 USB Standards 00:10:00 Understanding USB 00:11:00 Configuring USB 00:07:00 Thunder and Lightning 00:06:00 Keyboards and Mice 00:08:00 Sight and Sound 00:06:00 Readers and Scanners 00:08:00 Using Expansion Cards 00:08:00 Section 12: Building a PC The Right PC for the Job 00:13:00 Section 13: Display Technologies Monitor Technologies 00:08:00 LCD Breakdown 00:04:00 Graphics Cards and Connections 00:13:00 Installing a Graphics Card 00:07:00 Projectors 00:05:00 Troubleshooting Monitors 00:06:00 Section 14: Essentials of Networking Introduction to Networking 00:08:00 Hubs vs. Switches 00:05:00 Hexadecimal 00:07:00 WANs and Routers 00:09:00 Cables and Connectors 00:11:00 Crimping Cables 00:10:00 Structured Cabling 00:11:00 Section 15: Local Area Networking Introduction to TCP/IP 00:14:00 Network IDs and Subnet Masks 00:05:00 Special IP Addresses 00:09:00 NAT 00:07:00 Dynamic IP Addressing 00:10:00 IPv6 00:07:00 Port Numbers 00:12:00 TCP, UDP, and ICMP 00:06:00 Understanding DNS 00:09:00 Working with DNS 00:07:00 Windows Naming 00:08:00 Routers 00:12:00 Basic Router Configuration 00:12:00 Advanced Router Configuration 00:06:00 VLANs 00:07:00 Network Troubleshooting 00:05:00 Section 16: Wireless Networking Wireless Network Hardware 00:11:00 Wi-Fi Standards 00:10:00 Basic WAP Setup 00:11:00 Connecting to a Wi-Fi Network 00:09:00 It's a Huge Mesh 00:04:00 Beyond Wi-Fi 00:07:00 Troubleshooting Wireless Connections 00:07:00 Section 17: The Internet Beyond the LAN 00:03:00 Internet Tiers 00:06:00 Dial-up Connections 00:08:00 Broadband Connections 00:10:00 Firewalls and Servers 00:06:00 FTP 00:07:00 E-Mail 00:08:00 Proxy Servers 00:06:00 Virtual Private Networks (VPNs) 00:08:00 Internet of Things (IoT) 00:04:00 Section 18: Virtualization Understanding Virtualization 00:10:00 Your First Virtual Machine 00:11:00 Advanced Virtualization Setup 00:10:00 Cloud Computing 00:08:00 Cloud Ownership 00:03:00 Cloud-Based Applications 00:06:00 Section 19: Portable Computing Laptop Features 00:08:00 Laptop Hardware Troubleshooting - The Tools 00:05:00 Laptop Hardware - Core Hardware 00:04:00 Laptop Hardware - CPU and Motherboard 00:07:00 Touring Your Laptop Display 00:04:00 Section 20: Understanding Mobile Devices What is a Mobile Device? 00:09:00 Mobile Connections 00:10:00 Touring Android 00:10:00 Touring iOS 00:08:00 Virtual Reality 00:03:00 Section 21: Care and Feeding of Mobile Devices Maintaining Mobile Devices 00:11:00 Mobile Devices and E-mail 00:10:00 Mobile Synchronization 00:08:00 Section 22: Printers and Multifunction Devices Laser Printers 00:13:00 Inkjet Printers 00:08:00 Impact Printers 00:04:00 Thermal Printers 00:04:00 Installing a Local Printer 00:14:00 Sharing Printers 00:08:00 Installing Wireless and Cloud Printers 00:10:00 Troubleshooting Printers 00:10:00 3D Printing 00:07:00 Section 23: Securing Computers Dealing with Threats 00:07:00

CompTIA A+ (220-1001)
Delivered Online On Demand17 hours 29 minutes
£25

Certified Information Systems Professional - Complete Video Training

4.3(43)

By John Academy

Description: A certificate in Information technology from an internationally recognized institution will increase your career opportunity very much. The Certified Information Systems Professional - Complete Video Training course provides you extensive lessons about the Information System field. Divided into four parts, the course teaches you how to be a certified auditor, security manager, security officer and security professional. Certified Information Systems Auditor (CISA) section illustrates you the process of auditing information systems while the Certified Information Security Manager (CISM) part deals with the information security issues. Here, you will learn the system of information security program development, incident management, and risk management. Next, Certified Information Systems Security Officer (CISSO) course teaches how to be an excellent information system security officer by utilising the information system in the security field. Finally, the Certified Information Systems Security Professional (CISSP) section shows you the path for becoming a security professional by focusing the security issues such as asset security, communication and network security, security operations, etc. In short, the bundle video course will help you to achieve certification in above four fields and helps you to know the practical knowledge about Information System. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Information Systems Professional - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Information Systems Professional - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. The Process of Auditing Information Systems Management of the Audit Function FREE 00:20:00 ISACA IT Audit and Assurance Standards and Guidelines 01:16:00 Risk Analysis 00:21:00 Internal Controls 00:17:00 Performing An IS Audit 01:07:00 Control Self-Assessment 00:09:00 The Evolving IS Audit Process 00:12:00 Governance and Management of IT Corporate Governance 00:06:00 IT Governance 00:02:00 IT Monitoring and Assurance Practices for Board and Senior Management 00:40:00 Information Systems Strategy 00:05:00 Maturity and Process Improvement Models 00:01:00 IT Investment and Allocation Practices 00:05:00 Policies and Procedures 00:17:00 Risk Management 00:31:00 IS Management Practices 00:50:00 IS Organizational Structure and Responsibilities 00:17:00 Auditing IT Governance Structure and Implementation 00:06:00 Business Continuity Planning 00:37:00 Information Systems Acquisition, Development and Implementation Business Realization 01:21:00 Project Management Structure 00:08:00 Project Management Practices 00:18:00 Business Application Development 00:42:00 Business Application Systems 00:38:00 Alternative Forms of Software Project Organization 00:03:00 Alternative Development Methods 00:10:00 Infrastructure Development/Acquisition Practices 00:09:00 Information Systems Maintenance Practices 00:09:00 System Development Tools And Productivity Aids 00:05:00 Business Process Reengineering And Process Change Projects 00:08:00 Application Controls 00:07:00 Auditing Application Controls 00:14:00 Auditing Systems Development, Acquisition And Maintenance 00:08:00 Information Systems Operations, Maintenance and Support Information Systems Operations 00:19:00 Information Systems Hardware 00:13:00 IS Architecture and Software 00:39:00 Network Infrastructure 01:16:00 Disaster Recovery Planning 00:19:00 Protection of Information Assets Importance Of Information Security 00:43:00 Logical Access 00:37:00 Network Infrastructure Security 00:39:00 Auditing Information Security Management Framework 00:03:00 Auditing Network Infrastructure Security 00:13:00 Environmental Exposures and Controls 00:02:00 Physical Access Exposures and Controls 00:05:00 Mobile Computing 00:05:00 Information Security Governance Information Security Governance Overview FREE 00:25:00 Effective Information Security Governance 00:24:00 Information Security Concepts and Technologies 00:20:00 Information Security Manager 00:09:00 Scope and Charter of Information Security Governance 00:10:00 Information Security Governance Metrics 00:23:00 Information Security Strategy Overview 00:02:00 Creating Information Security Strategy 00:36:00 Determining Current State Of Security 00:06:00 Information Security Strategy Development 00:10:00 Strategy Resources 00:40:00 Strategy Constraints 00:07:00 Action Plan to Implement Strategy 00:20:00 Information Risk Management Risk Management Overview 00:16:00 Good Information Security Risk Management 00:15:00 Information Security Risk Management Concepts 00:13:00 Implementing Risk Management 00:17:00 Risk Assessment 00:39:00 Controls Countermeasures 00:23:00 Recovery Time Objectives 00:18:00 Risk Monitoring and Communication 00:04:00 Information Security Program Development Development of Information Security Program 00:11:00 Information Security Program Objectives 00:09:00 Information Security Program Development Concepts 00:14:00 Scope and Charter of Information Security Program Development 00:22:00 Information Security Management Framework 00:16:00 Information Security Framework Components 00:12:00 Information Security Program Resources 01:04:00 Implementing an Information Security Program 00:27:00 Information Infrastructure and Architecture 00:14:00 Information Security Program 00:14:00 Security Program Services and Operational Activities 00:45:00 Information Security Incident Management Incident Management Overview 00:28:00 Incident Response Procedures 00:29:00 Incident Management Organization 00:19:00 Incident Management Resources 00:36:00 Incident Management Objectives 00:14:00 Incident Management Metrics and Indicators 00:17:00 Current State of Incident Response Capability 00:11:00 Developing an Incident Response Plan 00:32:00 BCP DRP 00:36:00 Testing Response and Recovery Plans 00:10:00 Executing the Plan 00:27:00 Information Systems Security Officer Risk Management FREE 00:58:00 Security Management 00:58:00 Authentication 01:01:00 Access Control 01:20:00 Security Models 01:01:00 Operations Security 01:10:00 Symmetric Cryptography and Hashing 01:19:00 Asymmetric Cryptography and PKI 01:31:00 Network Connections 01:28:00 Network Protocols and Devices 01:31:00 Telephony, VPNs and Wireless 01:13:00 Security Architecture 01:02:00 Software Development Security 01:05:00 Database Security and System Development 01:00:00 Malware and Software Attacks 00:17:00 Business Continuity 00:44:00 Disaster Recovery 00:53:00 Incident Management, Law, and Ethics 01:06:00 Physical 00:38:00 Information Systems Security Professional Security and Risk Management FREE 00:24:00 Asset Security 00:12:00 Security Engineering 00:15:00 Communication and Network Security 00:10:00 Identity and Access Management 00:10:00 Security Assessment and Testing 00:12:00 Security Operations 00:36:00 Software Development Security 00:13:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Information Systems Professional - Complete Video Training
Delivered Online On Demand48 hours
£22

Windows Server 2016 Complete Video Training

4.3(43)

By John Academy

Description: Windows Server 2016 is a server operating system that is designed to handle corporate networking, Internet/intranet hosting, databases, enterprise-scale messaging and similar functions more efficiently. Developed by Microsoft, it is a part of the Windows NT family of operating systems. With the proper knowledge of Windows Server 2016, you can able to handle your office environment proficiently. The Windows Server 2016 Complete Video Training course is for you if you want to master the features and functions of Windows Server 2016. Apart from this, the bundled video course will help you to prepare for the various exam of Microsoft Windows Server 2016 MCSA certification. The course is divided into four sections where each section helps you with a specific exam and the practical use of Windows Server. The 70-740 Exam section teaches you the methods of installing Windows Server in Host and Compute Environments along with the other features such as storage. On the other hand, the 70-741 series teaches you how to do networking with Windows server including implementing Domain Name system, etc. Next, you will learn about the functionality of Windows Server in the 70-742 section that focuses on the Web Application proxy implementations, Microsoft Azure AD and Directory Synchronization, etc. Finally, in the 70-744 part, you will know how to secure your Windows server. In short, the Windows Server 2016 Complete Video Training course helps you to understand all the necessary information skills if you want to use Windows Server 2016. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Windows Server 2016 Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Windows Server 2016 Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Installing Windows Servers in Host and Computer Environments Determining Windows Server 2016 Installation FREE 00:54:00 Installing Windows Server 2016 Core and Nano Editions 01:35:00 Managing Windows Installations with Windows PowerShell 00:01:00 Create, Manage, and Maintain Windows Images to Deploy 00:33:00 Implementing Local and Enterprise Storage Solutions Managing Disks and Volumes in Windows Server 2016 01:00:00 Implementing and Managing Storage Spaces 00:45:00 Configuring Data Deduplication 00:39:00 Understanding Various Types of Storage 00:15:00 Fibre Channel, iSCSI, and Fibre Channel over Ethernet 00:18:00 Understanding iSNS, DCB, and MPIO 00:09:00 Configuring File and Folder Sharing in Windows Server 2016 00:21:00 Implementing Hyper-V Virtualization Installing Hyper-V Virtualization 00:26:00 Configuring Storage and Networking on Hyper-V Hosts 00:38:00 Configuring and Managing Virtual Machines 00:34:00 Implementing Windows Containers Understanding Windows Server and Hyper-V Containers 00:17:00 Deploying Windows Server and Hyper-V Containers 00:08:00 Using Docker to Install, Configure, and Manage Containers 00:12:00 Implementing High Availability Overview of High Availability and Disaster Recovery 00:55:00 Implementing Network Load Balancing 00:25:00 Planning and Configuring Failover Clustering 01:10:00 Maintaining a Failover Cluster 00:15:00 Troubleshooting Failover Clustering 00:11:00 Integrating Failover Clustering and Hyper-V 00:23:00 Configuring Site Availability 00:12:00 Maintaining and Monitoring Server Environments Windows Server Update Services 00:33:00 Windows PowerShell Desired State Configuration (DSC) 00:10:00 Windows Server 2016 Monitoring Tools 00:43:00 Plan and Implement IPv4 and IPv6 Networks Plan and Implement IP Addressing Schemes for IPv4 Networks FREE 01:31:00 Configuring IPv4 Hosts 00:18:00 Managing and Troubleshooting IPv4 Connectivity 00:35:00 Implementing IPv6 for Network Hosts 00:20:00 Implementing IPv6 Transitioning and Coexistence 00:16:00 Installing and Configuring DHCP Overview of the DHCP Server Role 00:16:00 Managing and Troubleshooting DHCP 00:48:00 Installing and Configuring DNS Implementing DNS Servers 00:27:00 Creating and Configuring DNS Zones 00:52:00 Understanding Active Directory Integration 00:23:00 Configuring Advanced DNS Settings 00:41:00 Implementing and Managing IP Address Management Overview of IPAM 00:15:00 IPAM Deployment 00:49:00 Implementing Remote Access Remote Access Overview 00:27:00 Implementing the Web Application Proxy 00:08:00 Planning and Implementing VPNs 00:31:00 Overview of DirectAccess 00:21:00 Implementing DirectAccess 00:27:00 Installing and Configuring Branch Office Networking Configuring Networking for Branch Offices 00:39:00 Implementing Distributed File Systems 00:44:00 Implementing BranchCache 00:19:00 Implementing Advanced Networking Features Implementing Networking Features for High Performance 00:23:00 Implementing Hyper-V Advanced Networking Features 00:13:00 Introduction to Software-Defined Networking 00:10:00 Overview of Network Virtualization 00:06:00 Installing and Configuring Domain Controllers Overview of Active Directory Domain Services FREE 01:00:00 Overview of Domain Controllers 00:30:00 Deploying Domain Controllers 1 01:00:00 Managing Active Directory Objects Overview of AD DS Object Management 00:23:00 Managing User Accounts 01:07:00 Managing Groups 01:06:00 Managing Computer Accounts 00:20:00 Managing Organizational Units 00:41:00 Securing Active Directory Domain Services Securing Domain Controllers 00:33:00 Implementing Account Security 00:48:00 Auditing AD DS 00:26:00 Configuring Managed Service Accounts 00:14:00 Working with Complex AD DS Infrastructures Overview of Advanced AD DS Deployments 00:20:00 Deploying a Distributed AD DS Environment 00:45:00 Overview of AD DS Replication 00:12:00 Configuring AD DS Sites 00:38:00 Implementing Group Policy Overview of Group Policy 00:39:00 Creating and Configuring GPOs 00:56:00 Monitoring and Troubleshooting Group Policy 00:18:00 Security Management Using Group Policy 00:54:00 Managing User Environments 00:22:00 Understanding Microsoft Azure AD and Directory Synchronization Planning Directory Synchronization 00:24:00 Implementing Azure AD Connect 00:12:00 Managing Identities with Directory Synchronization 00:14:00 Monitoring and Recovering AD DS Monitoring AD DS 00:27:00 Database Management 00:07:00 Backup and Recovery in AD DS 00:21:00 Implementing Active Directory Certificate Services Overview of Public Key Infrastructure and AD CS 00:17:00 Deploying Certificate Authority Hierarchy 00:19:00 Administering Certificate Authorities 00:13:00 Deploying and Managing Certificates 00:26:00 Managing Revocation and Distribution 00:07:00 Configuring Certificate Recovery 00:08:00 Implementing Active Directory Federation Services (AD FS) Overview of AD FS 00:17:00 Planning and Deploying AD FS 00:35:00 Overview of Web Application Proxy 00:08:00 Implementing Active Directory Rights Management Services Overview of AD RMS 00:14:00 Deploying AD RMS 00:14:00 Protecting Content with AD RMS 00:09:00 Introduction to Attacks, Breaches, and Detection Understanding Types of Attacks FREE 00:33:00 Detecting Security Breaches 00:06:00 Using Sysinternals Tools 00:30:00 Protecting Users and Workstations User Rights and Privileges 01:28:00 Working with Computer and Service Accounts 00:19:00 Protecting User Credentials 00:20:00 Using Privileged Access Workstations 00:12:00 Managing Administrative Access Understanding and Deploying JEA 00:32:00 Using Enhanced Security Administrative Environments (ESAE) Forests 00:12:00 Using Microsoft Identity Manager 00:08:00 Using JIT Administration and PAM 00:16:00 Configuring Anti-Malware and Patch Management Configuring and Managing Windows Defender 00:18:00 Restricting Software 00:28:00 Using Device Guard 00:12:00 Patch Management with WSUS 00:29:00 Auditing and Advanced Threat Analytics Configuring Auditing for Windows Server 2016 00:21:00 Advanced Auditing and Management 00:42:00 Deploying and Configuring ATA 00:15:00 Deploying and Configuring Operations Management Suite 00:07:00 Securing the Infrastructure Secure the Virtualization Infrastructure 00:15:00 Deploying Security Baselines 00:20:00 Deploying Nano Server 00:08:00 Configuring Data Protection Planning and Implementing File Encryption 00:29:00 Planning and Implementing BitLocker 00:32:00 Advanced File Server Management Using File Server Resource Manager 00:58:00 Implementing Classification and File Management Tasks 00:16:00 Working with Dynamic Access Control 00:39:00 Securing the Network Infrastructure Using the Windows Firewall with Advanced Security 00:33:00 Datacenter Firewall 00:08:00 Utilizing IP Security 00:29:00 Configuring Advanced DNS Settings 00:42:00 Monitoring Network Traffic 00:09:00 Securing SMB Traffic 00:07:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Windows Server 2016 Complete Video Training
Delivered Online On Demand48 hours
£22

Network Security Level 2

4.9(27)

By Apex Learning

Course Overview: Did you know 70% of organisations reported a cybersecurity breach last year? Network Security Level 2 is more than just a course; it invests in a safer digital future. This curriculum offers a meticulous journey, delving deeper into network security. From understanding the intricacies of Security and Risk Management to Security Operations, this course ensures comprehensive coverage. Whether you're keen on mastering Asset Security, seeking profound knowledge in Security Engineering, or aiming to understand the dynamics of Communication and Network Security, Identity and Access Management, Security Assessment and Testing, or Software Development Security, this course is tailored to equip you with the advanced knowledge necessary for the cybersecurity challenges of tomorrow. Take action now. Stay ahead of the curve, safeguard sensitive data, and become a beacon of trust in cybersecurity. Enrol today! Key Features of the Course: Awarded a CPD certificate upon completion. 24/7 Learning Assistance to ensure uninterrupted progress. Engaging learning materials designed by top industry experts. Who is This Course For? This Network Security Level 2 course is Ideal for professionals who have completed foundational courses in network security and are looking to further enhance their skills and knowledge. Learning Outcome Acquire an in-depth understanding of security protocols. Delve into Security and Risk Management. Understand the essence of Asset Security. Engineer robust security measures. Master Communication and Network Security. Manage Identity and Access effectively. Conduct Security Assessment and Testing proficiently. Implement efficient Security Operations. Secure software through development practices. Why Enrol in This Course: Stay ahead in the cybersecurity realm. This top-reviewed course, recently updated, is trending and empowers you with the skills to counteract the ever-evolving world of network threats. Requirements: Basic knowledge of network security principles. Completion of a foundational course in network security or equivalent experience. Career Path: Upon completion of this Network Security Level 2 course, professionals can explore numerous roles, such as: Security Analyst: £50,000 Network Security Engineer: £55,000 Cybersecurity Manager: £65,000 Security Consultant: £60,000 Information Security Officer: £58,000 Threat Intelligence Analyst: £53,000 Cybersecurity Architect: £62,000 Certification: Students will be awarded a CPD certificate upon successful completion, recognising their advanced Network Security Level 2 proficiency. FAQ What is Level 3 cyber security? Level 3 cyber security refers to a qualification or course that provides an advanced understanding of cybersecurity principles and practices. It is often designed for individuals with foundational cybersecurity knowledge who want to deepen their expertise. What are the 5 types of network security? The five types of network security are: Firewalls, which prevent unauthorised access to or from a private network; Antivirus and anti-malware software, which protect against malicious software; Intrusion Prevention Systems (IPS), which identify and prevent known threats; Virtual Private Networks (VPNs) which provide secure remote access; and Data Loss Prevention (DLP) prevents sensitive data from leaving the network. What is BTEC Level 2 cyber security? BTEC Level 2 cyber security is a qualification that provides an introduction to the principles and practices of cybersecurity. It is typically designed for individuals new to the field and seeking foundational knowledge. What is OCN NI Level 2 cybersecurity? OCN NI Level 2 cybersecurity is a qualification offered by the Open College Network Northern Ireland. It provides a foundational understanding of cybersecurity principles and practices and is designed for individuals new to the field. What is OCN Level 2 equivalent to? OCN Level 2 is equivalent to a GCSE grade A*-C or a Level 2 NVQ. An intermediate-level qualification provides a foundation in a specific subject area. What is OCN Level 2 qualification? OCN Level 2 qualification is an intermediate-level qualification that provides a foundational understanding of a specific subject area. It is typically designed for individuals who have completed basic education and seek to further their knowledge and skills. Course Curriculum 2 sections • 9 lectures • 02:12:00 total length •Security and Risk Management: 00:24:00 •Asset Security: 00:12:00 •Security Engineering: 00:15:00 •Communication and Network Security: 00:10:00 •Identity and Access Management: 00:10:00 •Security Assessment and Testing: 00:12:00 •Security Operations: 00:36:00 •Software Development Security: 00:13:00 •Assignment - Network Security Level 2: 00:00:00

Network Security Level 2
Delivered Online On Demand2 hours 12 minutes
£12

Cloud Computing / CompTIA Cloud+ (CV0-002)

4.9(27)

By Apex Learning

Overview Cloud computing has become the backbone of businesses and organisations across the globe. Our 'Cloud Computing / CompTIA Cloud+ (CV0-002)' course will equip you with the knowledge and skills needed to excel in this burgeoning industry. The demand for cloud computing professionals is soaring, with an estimated 61% of companies already using cloud-based applications. This dynamic field offers lucrative opportunities and a wide salary range, making it a wise career choice.  Cloud computing professionals are in high demand worldwide, and this course empowers you to join their ranks. With a focus on CompTIA Cloud+ (CV0-002), you'll gain a comprehensive understanding of cloud technologies, deployment models, security protocols, and much more.  This course is your ticket to your career in cloud computing. Enrol today! How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Cloud Computing / CompTIA Cloud+ (CV0-002). It is available to all students, of all academic backgrounds. Requirements Our Cloud Computing / CompTIA Cloud+ (CV0-002) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 11 sections • 100 lectures • 10:39:00 total length •Introduction to the Cloud: 00:04:00 •Cloud+ Exam Info: 00:08:00 •What Can Cloud+ Do For You?: 00:03:00 •Preparing for the Cloud+ Exam: 00:06:00 •Setting up Your Cloud Accounts: 00:06:00 •Defining the Cloud: 00:08:00 •Deployment Models: 00:05:00 •Public Cloud (Demo): 00:08:00 •Private Cloud (Demo): 00:06:00 •Community Cloud (Demo): 00:06:00 •Hybrid Cloud (Demo): 00:05:00 •Additional Models: 00:05:00 •Cloud Architectures: 00:06:00 •Capacity, Elasticity, and Support Agreements: 00:08:00 •Resource Balancing: 00:07:00 •Change Management: 00:07:00 •Deployment Exam Objectives Explained: 00:06:00 •Cloud Component Interactions, Part 1: 00:07:00 •Cloud Component Interaction, Part 2: 00:08:00 •Non-Cloud Component Interactions: 00:09:00 •Platforms and Applications: 00:05:00 •Baselines (Lab): 00:07:00 •Target Hosts: 00:05:00 •Existing Systems (Lab): 00:09:00 •Architecting for Elements and Targets (Demo): 00:07:00 •Selecting Deployment Tools (Demo): 00:07:00 •Executing a Deployment Plan (Demo): 00:09:00 •Evaluating Testing Plans: 00:05:00 •Testing Techniques: 00:05:00 •Analyzing Testing Results: 00:04:00 •Baseline Confirmation (Lab): 00:08:00 •Deployment Problem Resolution (Lab): 00:08:00 •Cloud Storage Types: 00:06:00 •Provisioning Storage: 00:06:00 •Storage Protection Capabilities: 00:09:00 •Storage Features: 00:06:00 •Access Protocols: 00:06:00 •Storage Management (Demo): 00:06:00 •Storage Security (Lab): 00:05:00 •Disaster Recovery Capabilities (Demo): 00:07:00 •Disaster Recovery Considerations: 00:05:00 •Business Continuity Plan (Lab): 00:07:00 •Compute Introduction: 00:06:00 •CPU Capabilities: 00:08:00 •Memory Requirements: 00:07:00 •Performance Considerations: 00:07:00 •Cost Considerations (Lab): 00:07:00 •Energy Savings: 00:05:00 •Dedicated vs. Shared Compute: 00:04:00 •High Availability and Disaster Recovery for Compute: 00:05:00 •Monitoring (Lab): 00:08:00 •Forecasting: 00:05:00 •Policies: 00:03:00 •Network Components (Demo): 00:09:00 •Network Protocols: 00:04:00 •Network Ports (Lab): 00:05:00 •Virtual Private Networks (VPNs): 00:08:00 •IDS/IPS: 00:07:00 •Segmentation: 00:09:00 •Network SLAs and Change Management: 00:04:00 •Networking in Different Models: 00:05:00 •Security Policies: 00:06:00 •Standards and Compliance (Demo): 00:05:00 •Identity, Authentication, and Authorization: 00:08:00 •Multi-Factor Authentication (Lab): 00:05:00 •Authorization (Lab): 00:08:00 •Encryption (Demo): 00:08:00 •Compute Security (Demo): 00:07:00 •Account Management (Lab): 00:07:00 •Segmentation (Lab): 00:05:00 •Security Tools (Demo): 00:07:00 •Security Services: 00:05:00 •Security Automation and Orchestration: 00:06:00 •Models and Security: 00:06:00 •Migration Types: 00:07:00 •Workload Management: 00:05:00 •Virtualizing Physical Systems: 00:06:00 •Migrating Security: 00:07:00 •Protocols and Services: 00:08:00 •Environmental Constraints: 00:07:00 •Planning Patch Management: 00:07:00 •Manual Patch Management: 00:04:00 •Automated Patch Management (Lab): 00:03:00 •Update Types: 00:08:00 •Automated Workflows (Lab): 00:07:00 •Backup Types (Lab): 00:10:00 •Backup Targets and Options: 00:07:00 •Maintenance Automation Techniques: 00:05:00 •Maintenance Automation Tasks: 00:07:00 •Provisioning and Deprovisioning: 00:07:00 •Application Life Cycle: 00:03:00 •Monitoring and Reporting (Lab): 00:07:00 •Monitoring Metrics: 00:06:00 •Troubleshooting Methodology: 00:08:00 •Troubleshooting Deployment: 00:07:00 •Troubleshooting Capacity: 00:08:00 •Troubleshooting Automation and Orchestration: 00:07:00 •Troubleshooting Connectivity: 00:10:00 •Troubleshooting Security: 00:09:00 •Resource - Cloud Computing / CompTIA Cloud+ (CV0-002): 00:00:00

Cloud Computing / CompTIA Cloud+ (CV0-002)
Delivered Online On Demand10 hours 39 minutes
£12

CompTIA A+ (220-1001)

4.9(27)

By Apex Learning

Overview Having a foundational understanding of IT components is essential. Did you know that by 2023, an estimated 2.5 million new IT positions will be available globally? The CompTIA A+ (220-1001) course offers a comprehensive dive into the world of computer technology.  Designed to shape the professionals of tomorrow, this course meticulously covers the gamut of fundamental IT knowledge. Ranging from RAM technology to the vast world of cloud computing, the curriculum is structured to foster a comprehensive understanding. With modules such as 'Inside the PC' and 'Understanding Virtualization', learners will be adept at navigating the complex terrains of the modern IT environment. Ready to steer your career into the future of IT? Enrol now and become a part of the technological revolution! How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA A+ (220-1001). It is available to all students, of all academic backgrounds. Requirements Our CompTIA A+ (220-1001) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 24 sections • 132 lectures • 17:30:00 total length •CompTIA A+ 2019 Core 1 (220-1001) Course Introduction: 00:02:00 •What is the CompTIA A+?: 00:02:00 •Why Get A+ Certified?: 00:03:00 •What is on the CompTIA A+ Core 1 (220-1001) Exam?: 00:09:00 •How to Pass the A+ Exam: 00:04:00 •How to Use This Video Course: 00:03:00 •Tools of the Trade: 00:06:00 •Troubleshooting Theory: 00:10:00 •Primary PC Connections: 00:05:00 •External Connections: 00:11:00 •Inside the PC: 00:08:00 •What is a Computer?: 00:07:00 •What is a CPU?: 00:15:00 •CPU Speeds and Cores: 00:12:00 •Caching: 00:07:00 •CPU Sockets: 00:12:00 •Installing a CPU: 00:11:00 •Liquid Cooling: 00:04:00 •RAM Technology: 00:11:00 •RAM Capacity: 00:08:00 •RAM Features: 00:07:00 •Installing RAM: 00:07:00 •What is the BIOS?: 00:06:00 •POST: 00:09:00 •System Setup: 00:09:00 •Troubleshooting Firmware: 00:12:00 •Form Factors: 00:06:00 •Chipsets: 00:05:00 •Touring the Motherboard: 00:14:00 •Touring the Case: 00:07:00 •Installing a Motherboard: 00:09:00 •The Power Supply: 00:09:00 •Mounting a Power Supply: 00:05:00 •Choosing a Power Supply: 00:08:00 •Cooling Your PC: 00:11:00 •Troubleshooting Power Supplies: 00:09:00 •Troubleshooting Core Components: 00:14:00 •Introduction to Mass Storage: 00:13:00 •Magnetic Disk Drives: 00:08:00 •Solid State Drives: 00:08:00 •SCSI: 00:03:00 •Boot Order: 00:07:00 •New Installation - First Drive: 00:05:00 •RAID: 00:11:00 •Hardware RAID: 00:07:00 •Mass Storage Troubleshooting: 00:08:00 •Optical Media: 00:10:00 •USB Standards: 00:10:00 •Understanding USB: 00:11:00 •Configuring USB: 00:07:00 •Thunder and Lightning: 00:06:00 •Keyboards and Mice: 00:08:00 •Sight and Sound: 00:07:00 •Readers and Scanners: 00:08:00 •Using Expansion Cards: 00:08:00 •The Right PC for the Job: 00:13:00 •Monitor Technologies: 00:08:00 •LCD Breakdown: 00:04:00 •Graphics Cards and Connections: 00:13:00 •Installing a Graphics Card: 00:07:00 •Projectors: 00:05:00 •Troubleshooting Monitors: 00:06:00 •Introduction to Networking: 00:08:00 •Hubs vs. Switches: 00:05:00 •Hexadecimal: 00:07:00 •WANs and Routers: 00:09:00 •Cables and Connectors: 00:11:00 •Crimping Cables: 00:10:00 •Structured Cabling: 00:11:00 •Introduction to TCP/IP: 00:14:00 •Network IDs and Subnet Masks: 00:05:00 •Special IP Addresses: 00:09:00 •NAT: 00:07:00 •Dynamic IP Addressing: 00:10:00 •IPv6: 00:07:00 •Port Numbers: 00:12:00 •TCP, UDP, and ICMP: 00:06:00 •Understanding DNS: 00:09:00 •Working with DNS: 00:07:00 •Windows Naming: 00:08:00 •Routers: 00:12:00 •Basic Router Configuration: 00:12:00 •Advanced Router Configuration: 00:06:00 •VLANs: 00:07:00 •Network Troubleshooting: 00:05:00 •Wireless Network Hardware: 00:11:00 •Wi-Fi Standards: 00:10:00 •Basic WAP Setup: 00:11:00 •Connecting to a Wi-Fi Network: 00:09:00 •It's a Huge Mesh: 00:04:00 •Beyond Wi-Fi: 00:07:00 •Troubleshooting Wireless Connections: 00:07:00 •Beyond the LAN: 00:03:00 •Internet Tiers: 00:06:00 •Dial-up Connections: 00:08:00 •Broadband Connections: 00:10:00 •Firewalls and Servers: 00:06:00 •FTP: 00:07:00 •E-Mail: 00:08:00 •Proxy Servers: 00:06:00 •Virtual Private Networks (VPNs): 00:08:00 •Internet of Things (IoT): 00:04:00 •Understanding Virtualization: 00:10:00 •Your First Virtual Machine: 00:11:00 •Advanced Virtualization Setup: 00:10:00 •Cloud Computing: 00:08:00 •Cloud Ownership: 00:03:00 •Cloud-Based Applications: 00:06:00 •Laptop Features: 00:08:00 •Laptop Hardware Troubleshooting - The Tools: 00:05:00 •Laptop Hardware - Core Hardware: 00:04:00 •Laptop Hardware - CPU and Motherboard: 00:07:00 •Touring Your Laptop Display: 00:04:00 •What is a Mobile Device?: 00:09:00 •Mobile Connections: 00:10:00 •Touring Android: 00:10:00 •Touring iOS: 00:08:00 •Virtual Reality: 00:03:00 •Maintaining Mobile Devices: 00:11:00 •Mobile Devices and E-mail: 00:10:00 •Mobile Synchronization: 00:08:00 •Laser Printers: 00:13:00 •Inkjet Printers: 00:08:00 •Impact Printers: 00:04:00 •Thermal Printers: 00:04:00 •Installing a Local Printer: 00:14:00 •Sharing Printers: 00:08:00 •Installing Wireless and Cloud Printers: 00:10:00 •Troubleshooting Printers: 00:10:00 •3D Printing: 00:07:00 •Dealing with Threats: 00:07:00 •Assignment - CompTIA A+ (220-1001): 00:00:00

CompTIA A+ (220-1001)
Delivered Online On Demand17 hours 30 minutes
£12

CompTIA Security+ (SY0-601)

4.9(27)

By Apex Learning

Overview This comprehensive course on CompTIA Security+ (SY0-601) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Security+ (SY0-601) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA Security+ (SY0-601). It is available to all students, of all academic backgrounds. Requirements Our CompTIA Security+ (SY0-601) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 14 sections • 164 lectures • 20:35:00 total length •Introduction to CompTIA Security+ SY0-601: 00:03:00 •About the CompTIA Security+ SY0-601 Exam: 00:03:00 •Defining Risk: 00:08:00 •Threats and Vulnerabilities: 00:07:00 •Threat Intelligence: 00:11:00 •Risk Management Concepts: 00:07:00 •Security Controls: 00:09:00 •Risk Assessments and Treatments: 00:06:00 •Quantitative Risk Assessments: 00:07:00 •Qualitative Risk Assessments: 00:04:00 •Business Impact Analysis: 00:09:00 •Data Types and Roles: 00:11:00 •Security and the Information Life Cycle: 00:09:00 •Data Destruction: 00:06:00 •Personnel Risk and Policies: 00:10:00 •Third-Party Risk Management: 00:09:00 •Agreement Types: 00:07:00 •Exam Question Review: 00:02:00 •Wiping Disks with the dd Command Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Cryptography Basics: 00:16:00 •Data Protection: 00:09:00 •Cryptographic Methods: 00:07:00 •Symmetric Cryptosystems: 00:13:00 •Symmetric Block Modes: 00:08:00 •Asymmetric Cryptosystems: 00:13:00 •Diffie-Hellman: 00:07:00 •Hashing: 00:09:00 •Understanding Digital Certificates: 00:08:00 •Trust Models: 00:05:00 •Public Key Infrastructure: 00:04:00 •Certificate Types: 00:14:00 •Touring Certificates: 00:09:00 •Cryptographic Attacks: 00:05:00 •Password Cracking: 00:10:00 •Password Cracking Demo: 00:06:00 •Exam Question Review: 00:02:00 •SSH Public Key Authentication Lab: 00:09:00 •Ask Me Anything (AMA): 00:02:00 •Identification, Authentication, and Authorization: 00:08:00 •Enabling Multifactor Authentication: 00:05:00 •Authorization: 00:05:00 •Accounting: 00:05:00 •Authentication Methods: 00:14:00 •Access Control Schemes: 00:07:00 •Account Management: 00:13:00 •Network Authentication: 00:09:00 •Identity Management Systems: 00:06:00 •Exam Question Review: 00:02:00 •Creating LInux Users and Groups Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Touring the CLI: 00:16:00 •Shells: 00:06:00 •The Windows Command Line: 00:05:00 •Microsoft PowerShell: 00:13:00 •Linux Shells: 00:12:00 •Python Scripts: 00:07:00 •Windows Command-Line Tools: 00:16:00 •Linux Command-Line Tools: 00:10:00 •Network Scanners: 00:05:00 •Network Scanning with Nmap: 00:09:00 •Network Protocol Analyzers: 00:08:00 •Using Wireshark to Analyze Network Traffic: 00:09:00 •Using tcpdump to Analyze Network Traffic: 00:08:00 •Log Files: 00:09:00 •Centralized Logging: 00:09:00 •Configuring Linux Log Forwarding: 00:08:00 •Exam Question Review: 00:03:00 •Lunux Shell Script Lab: 00:07:00 •Nmap Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00 •Malware: 00:14:00 •Weak Configurations: 00:12:00 •Common Attacks: 00:09:00 •Driver and Overflow Attacks: 00:08:00 •Password Attacks: 00:08:00 •Bots and Botnets: 00:06:00 •Disk RAID Levels: 00:10:00 •Securing Hardware: 00:11:00 •Securing Endpoints: 00:09:00 •Exam Question Review: 00:02:00 •Linux Software RAID Lab: 00:08:00 •Ask Me Anything (AMA): 00:02:00 •The OSI Model: 00:13:00 •ARP Cache Poisoning: 00:09:00 •Other Layer 2 Attacks: 00:05:00 •Network Planning: 00:07:00 •Load Balancing: 00:06:00 •Securing Network Access: 00:06:00 •Honeypots: 00:06:00 •Firewalls: 00:11:00 •Proxy Servers: 00:06:00 •Network and Port Address Translation: 00:07:00 •IP Security (IPsec): 00:09:00 •Virtual Private Networks (VPNs): 00:10:00 •Intrusion Detection and Prevention Systems (IDS/IPS): 00:13:00 •Exam Question Review: 00:03:00 •Linux Snort IDS Lab: 00:07:00 •Ask Me Anything (AMA): 00:01:00 •Wi-Fi Encryption Standards: 00:10:00 •RFID, NFC, and Bluetooth: 00:07:00 •Wi-Fi Coverage and Performance: 00:08:00 •Wi-Fi Discovery and Attacks: 00:12:00 •Cracking WPA2: 00:10:00 •Wi-Fi Hardening: 00:11:00 •Exam Question Review: 00:02:00 •WPA2 Cracking Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Defining a Public Server: 00:01:00 •Common Attacks and Mitigations: 00:10:00 •Containers and Software-Defined Networking: 00:11:00 •Hypervisors and Virtual Machines: 00:08:00 •Cloud Deployment Models: 00:09:00 •Cloud Service Models: 00:08:00 •Securing the Cloud: 00:10:00 •Exam Question Review: 00:02:00 •Docker Container Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Embedded Systems: 00:13:00 •Industrial Control System (ICS): 00:07:00 •Internet of Things (IoT) Devices: 00:10:00 •Connecting to Dedicated and Mobile Systems: 00:11:00 •Security Constraints for Dedicated Systems: 00:05:00 •Mobile Device Deployment and Hardening: 00:11:00 •Exam Question Review: 00:03:00 •Smartphone Hardening Lab: 00:03:00 •Ask Me Anything (AMA): 00:02:00 •Physical Security Overview: 00:01:00 •Physical Security: 00:10:00 •Keylogger Demo: 00:05:00 •Environmental Controls: 00:05:00 •Exam Question Review: 00:02:00 •Physical Security Lab: 00:03:00 •Ask Me Anything (AMA): 00:03:00 •DNS Security: 00:05:00 •FTP Packet Capture: 00:03:00 •Secure Web and E-mail: 00:02:00 •Request Forgery Attacks: 00:05:00 •Cross-Site Scripting Attacks: 00:07:00 •Web Application Security: 01:20:00 •Web App Vulnerability Scanning: 00:06:00 •Exam Question Review: 00:03:00 •OWASP ZAP Web App Scan Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Testing Infrastructure Overview: 00:05:00 •Social Engineering: 00:06:00 •Social Engineering Attacks: 00:11:00 •Vulnerability Assessments: 00:09:00 •Penetration Testing: 00:10:00 •Security Assessment Tools: 00:12:00 •The Metasploit Framework: 00:08:00 •Exam Question Review: 00:02:00 •Hping3 Forged Packet Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Incident Response Overview: 00:03:00 •Incident Response Plans (IRPs): 00:06:00 •Threat Analysis and Mitigating Actions: 00:08:00 •Digital Forensics: 00:12:00 •Gathering Digital Evidence: 00:10:00 •Business Continuity and Alternate Sites: 00:06:00 •Data Backup: 00:10:00 •Exam Question Review: 00:01:00 •Autopsy Forensic Browser Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00

CompTIA Security+ (SY0-601)
Delivered Online On Demand20 hours 35 minutes
£12

CompTIA Cloud+ (CV0-002)

4.5(3)

By Studyhub UK

Overview Uplift Your Career & Skill Up to Your Dream Job - Learning Simplified From Home! Kickstart your career & boost your employability by helping you discover your skills, talents and interests with our special CompTIA Cloud+ (CV0-002) Course. You'll create a pathway to your ideal job as this course is designed to uplift your career in the relevant industry. It provides professional training that employers are looking for in today's workplaces. The CompTIA Cloud+ (CV0-002) Course is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This CompTIA Cloud+ (CV0-002) Course has been designed by industry experts to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This CompTIA Cloud+ (CV0-002) Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into elementary modules, allowing our students to grasp each lesson quickly. At StudyHub, we don't just offer courses; we also provide a valuable teaching process. When you buy a course from StudyHub, you get unlimited Lifetime access with 24/7 dedicated tutor support. Why buy this CompTIA Cloud+ (CV0-002)? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the CompTIA Cloud+ (CV0-002) there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This CompTIA Cloud+ (CV0-002) course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skill. Prerequisites This CompTIA Cloud+ (CV0-002) does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA Cloud+ (CV0-002) was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This CompTIA Cloud+ (CV0-002) is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Section 01: What You Need to Know Introduction to the Cloud 00:04:00 Cloud+ Exam Info 00:08:00 What Can Cloud+ Do For You? 00:03:00 Preparing for the Cloud+ Exam 00:06:00 Section 02: Introducing the Cloud Setting up Your Cloud Accounts 00:06:00 Defining the Cloud 00:08:00 Deployment Models 00:05:00 Public Cloud (Demo) 00:08:00 Private Cloud (Demo) 00:06:00 Community Cloud (Demo) 00:06:00 Hybrid Cloud (Demo) 00:05:00 Additional Models 00:05:00 Cloud Architectures 00:06:00 Capacity, Elasticity, and Support Agreements 00:08:00 Resource Balancing 00:07:00 Change Management 00:07:00 Section 03: System Requirements for Cloud Deployments Deployment Exam Objectives Explained 00:06:00 Cloud Component Interactions, Part 1 00:07:00 Cloud Component Interaction, Part 2 00:08:00 Non-Cloud Component Interactions 00:09:00 Platforms and Applications 00:05:00 Baselines (Lab) 00:07:00 Target Hosts 00:05:00 Existing Systems (Lab) 00:09:00 Architecting for Elements and Targets (Demo) 00:07:00 Selecting Deployment Tools (Demo) 00:07:00 Executing a Deployment Plan (Demo) 00:09:00 Evaluating Testing Plans 00:05:00 Testing Techniques 00:05:00 Analyzing Testing Results 00:04:00 Baseline Confirmation (Lab) 00:08:00 Deployment Problem Resolution (Lab) 00:08:00 Section 04: Cloud Storage Cloud Storage Types 00:06:00 Provisioning Storage 00:06:00 Storage Protection Capabilities 00:09:00 Storage Features 00:06:00 Access Protocols 00:06:00 Storage Management (Demo) 00:06:00 Storage Security (Lab) 00:05:00 Disaster Recovery Capabilities (Demo) 00:07:00 Disaster Recovery Considerations 00:05:00 Business Continuity Plan (Lab) 00:07:00 Section 05: Cloud Compute Compute Introduction 00:06:00 CPU Capabilities 00:08:00 Memory Requirements 00:07:00 Performance Considerations 00:07:00 Cost Considerations (Lab) 00:07:00 Energy Savings 00:05:00 Dedicated vs. Shared Compute 00:04:00 High Availability and Disaster Recovery for Compute 00:05:00 Monitoring (Lab) 00:08:00 Forecasting 00:05:00 Policies 00:03:00 Section 06: Cloud Networking Network Components (Demo) 00:09:00 Network Protocols 00:04:00 Network Ports (Lab) 00:05:00 Virtual Private Networks (VPNs) 00:10:00 IDS/IPS 00:07:00 Segmentation 00:09:00 Network SLAs and Change Management 00:04:00 Networking in Different Models 00:05:00 Section 07: Cloud Security Security Policies 00:06:00 Standards and Compliance (Demo) 00:05:00 Identity, Authentication, and Authorization 00:08:00 Multi-Factor Authentication (Lab) 00:05:00 Authorization (Lab) 00:08:00 Encryption (Demo) 00:08:00 Compute Security (Demo) 00:07:00 Account Management (Lab) 00:07:00 Segmentation (Lab) 00:05:00 Security Tools (Demo) 00:07:00 Security Services 00:05:00 Security Automation and Orchestration 00:06:00 Models and Security 00:06:00 Section 08: Migrating to the Cloud Migration Types 00:07:00 Workload Management 00:05:00 Virtualizing Physical Systems 00:06:00 Migrating Security 00:07:00 Protocols and Services 00:08:00 Environmental Constraints 00:07:00 Section 09: Maintaining Cloud Solutions Planning Patch Management 00:07:00 Manual Patch Management 00:04:00 Automated Patch Management (Lab) 00:03:00 Update Types 00:08:00 Automated Workflows (Lab) 00:07:00 Backup Types (Lab) 00:10:00 Backup Targets and Options 00:07:00 Maintenance Automation Techniques 00:05:00 Maintenance Automation Tasks 00:07:00 Provisioning and Deprovisioning 00:07:00 Application Life Cycle 00:03:00 Monitoring and Reporting (Lab) 00:07:00 Monitoring Metrics 00:06:00 Section 10: Troubleshooting Cloud Solutions Troubleshooting Methodology 00:08:00 Troubleshooting Deployment 00:07:00 Troubleshooting Capacity 00:08:00 Troubleshooting Automation and Orchestration 00:07:00 Troubleshooting Connectivity 00:10:00 Troubleshooting Security 00:09:00 Assignment Assignment - CompTIA Cloud+ (CV0-002) 00:00:00

CompTIA Cloud+ (CV0-002)
Delivered Online On Demand10 hours 41 minutes
£10.99