• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

105 Windows Server courses

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations

4.3(43)

By John Academy

Description: This CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations will help you to understand the anatomy of cyber-attacks. You will gain the skills needed to serve your organizations before, during, and after a breach. A CyberSec First Responder is the first line of defence against cyber-attacks. You will be able to prepare to analyze threats, design secure computing and network environments, proactively defend networks and respond/investigate cybersecurity incidents. It covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a computer security incident response team (CSIRT), and more. So, learn to assess and respond to security threats and operating systems and network security analysis platform by taking this course. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Overview of Wireless Communications Identify the Importance of Risk Management FREE 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:22:00 Integrate Documentation into Risk Management 00:14:00 Analyzing the Threat Landscape Classify Threats and Threat Profiles 00:07:00 Perform Ongoing Threat Research 00:12:00 Resources that Aid in Research of Threats 00:03:00 Analyzing Recon Threats to Computing and Network Environments Implement Threat Modeling 00:09:00 Assess the Impact of Reconnaissance Incidents 00:10:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:10:00 Assessing the impact of Social Engineering 00:07:00 Assessing the Impact of Phishing 00:03:00 Analyzing Attacks on Computing and Network Environments Assess the Impact of System Hacking Attacks 00:10:00 Cracking Passwords Using a Password File 00:08:00 Assess the Impact of Web Based Attacks 00:11:00 Assessing the Impact of Web-Based Threats 00:03:00 Assess the Impact of Malware 00:08:00 Malware Detection and Removal 00:05:00 Assess the Impact of Hijacking and Impersonation Attacks 00:13:00 Assess the Impact of DoS Incidents 00:09:00 Assessing the Impact of DoS Attacks 00:04:00 Assess the Impact of Threats to Mobile Security 00:08:00 Assess the Impact of Threats to Cloud Security 00:10:00 Analyzing Post-Attack Techniques Assess Command and Control Techniques 00:08:00 Assessing Command and Control Techniques 00:10:00 Assess Persistence Techniques 00:05:00 Detecting Rootkits 00:03:00 Assess Lateral Movement and Pivoting Techniques 00:13:00 Assess Data Exfiltration Techniques 00:04:00 Steganography 00:03:00 Assess Anti Forensics Techniques 00:09:00 Assessing Anti-Forensics 00:03:00 Evaluating the Organization's Security Posture Conduct Vulnerability Assessments 00:16:00 Perform a Vulnerability Scan with Nessus 00:07:00 Perform a Vulnerability Scan with MBSA 00:05:00 Conduct Penetration Tests on Network Assets 00:18:00 Follow Up on Penetration Testing 00:06:00 Collecting Cyber security Intelligence Deploy a Security Intelligence Collection and Analysis Platform 00:19:00 Collect Data from Network Based Intelligence Sources 00:15:00 Collecting Network-Based Security Intelligence 00:07:00 Collect Data from Host Based Intelligence Sources 00:13:00 Collecting Host-Based Security Intelligence 00:15:00 Parsing Log files 00:03:00 Analyzing Log Data Use Common Tools to Analyze Logs 00:22:00 Analyzing Linux Logs for Security Intelligence 00:08:00 Use SIEM Tools for Analysis 00:07:00 Incorporating SIEMs into Security Intelligence Analysis 00:18:00 Parse Log Files with Regular Expressions 00:25:00 Performing Active Asset and Network Analysis Analyze Incidents with Windows-Based Tools 00:17:00 Windows-Based Incident Analysis Tools 00:19:00 Analyze Incidents with Linux Based Tools 00:05:00 Linux-Based Incident Analysis Tools 00:07:00 Analyze Malware 00:11:00 Analyzing Malware 00:03:00 Analyze Indicators of Compromise 00:20:00 Analyzing Indicators of Compromise 00:15:00 Responding to Cyber security Incidents Deploy an Incident Handling and Response Architecture 00:22:00 Mitigate Incidents 00:16:00 Hardening Windows Servers 00:14:00 DNS Filtering 00:05:00 Blacklisting and Whitelisting 00:09:00 Prepare for Forensic Investigation as a CSIRT 00:03:00 Investigating Cyber security Incidents Apply a Forensic Investigation Plan 00:10:00 Securely Collect and Analyze Electronic Evidence 00:08:00 Securely Collecting Electronic Evidence 00:05:00 Analyzing Forensic Evidence 00:07:00 Follow Up on the Results of an Investigation 00:04:00 Mock Exam Mock Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations 00:20:00 Final Exam Final Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations
Delivered Online On Demand12 hours 7 minutes
£24

Mac Integration Basics 10.15

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is ideal for users who need to replace a Windows computer with a Mac and for IT professionals who support Mac users. Overview Organizations are increasingly integrating Mac computers into Windows or other standards-based network environments. This course gives both users and the IT professionals who support them the skills necessary to make integration easy. This two day Mac Integration Basics course examines how to best use a Mac(s) in an organization that predominantly functions with a Microsoft Windows operating system and Windows Servers. Directory Services Connect a Mac to an Active Directory server Share Files Connect to file servers. Turn on personal file sharing. Configure Collaborative Services Manage Internet Accounts preferences. Connect to an Exchange Server. Connect Mail to non-Windows servers. Add accounts in Mail, Contacts, and Calendars. Secure a Mac Built-In Security features. Create strong passwords. Use two-factor authentication. Set a firmware password. Lock a Mac screen. Create user accounts. Disable automatic login. Protect start-up disk files. Ensure that the apps you download are safe. Provide network security. Printing Connect to a local printer. Connect to, share, and print from network printers. Move and Back Up Content Move content. Back up content. Run Windows on a Mac Run Windows natively or virtually. Microsoft Office for macOS. Cross-platform apps. Cross-platform files. Troubleshooting How to best troubleshoot macOS. Questions & Answers

Mac Integration Basics 10.15
Delivered OnlineFlexible Dates
Price on Enquiry

Mac Integration Basics

By Nexus Human

Duration 1 Days 6 CPD hours Companies are increasingly integrating Mac computers into Windows or other standards-based network environments. This Mac Integration Basics course examines how to best use a Mac(s) in an organization that predominantly functions with a Microsoft Windows operating system and Windows Servers. This course is also ideal for users who need to replace a Windows computer with a Mac and for IT professionals who support Mac users Directory Services Connecting a Mac to a Directory Server Using Network Account File Sharing Connecting to File Servers Turning on Personal File Sharing Email, Contacts, and Calendars Managing Internet Accounts Preferences Connecting to an Exchange Server Connecting Mail to Non-Windows Servers Adding Accounts in Mail, Contacts, and Calendars Security Built-in Security Features Creating Strong Passwords Using Two-factor Authentication Setting a Firmware Password Locking a Mac Screen Creating User Accounts Disabling Automatic Login Protecting Start-up Disk Files Ensuring that the Apps you Download are Safe Providing Network Security Printing Connecting to a Local Printer Setting up a Wireless Printer Sharing your Printer Setting up a Printer Shared by a Mac and a PC via SMB or CIFS Setting up an IP Printer Specifying Printer Features Printing from a Network Printer Instant Messaging iMessage Jabber Configuring Messages Adding Accounts Chatting on a local network with Bonjour Moving and Backing Up Content Moving Content Backing up Data with Time Machine Running Windows on a Mac Running Windows Natively or Virtually Using Office Using Cross-platform Apps Using Cross-platform Files

Mac Integration Basics
Delivered OnlineFlexible Dates
Price on Enquiry

Chef Essentials for Windows

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is geared toward development, engineering, and operations staff. Students in this class should have some familiarity and comfort with the following: 1. Writing code (of just about any flavor) in a text editor 2. Working on the command line 3. Basic system administration ? installing packages, configuring those packages, starting service Overview Get started with Chef by taking Chef Essentials. It?s a two-day instructor-led course that covers all the basics. You?ll learn what it means to turn infrastructure into code so that you can automate the configuration, deployment and management of your servers. You?ll also learn about Chef Architecture and the set of tools included in the Chef Development Kit (ChefDK). Each of the core units includes hands-on exercises that will give you confidence in your new skills. At the end of the course, you?ll come away with a repo and the skills to start automating your own infrastructure. You?ll learn what it means to turn infrastructure into code so that you can automate the configuration, deployment and management of your Windows servers. IntroductionResourcesCookbooksOhaiTemplatesLabWorkstation installationSigning up for Managed ChefThe Chef serverCommunity cookbooksManaging multiple nodesRolesSearchEnvironmentsFurther resources

Chef Essentials for Windows
Delivered OnlineFlexible Dates
Price on Enquiry

Apple - Mac OS X Server Essentials

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for help desk specialists, technical coordinators, and entrylevel system administrators who implement and maintain networks using OS X Server. Give technical coordinators and entry-level system administrators the skills, tools, and knowledge to implement and maintain a network that uses OS X Server. Learn how to install and configure OS X Server to provide network-based services. Installing and Configuring OS X Server Installation, initial configuration, server administration tools, and troubleshooting installation issues. Authenticating and Authorizing Accounts Creating and administering accounts, configuring service access controls (SACLs), configuring VPN service, and troubleshooting Using Open Directory Configuring Open Directory, single sign-on, backing up directory data, troubleshooting Open Directory. Managing Accounts Using Profile Manager to manage devices, troubleshooting Profile Manager. Implementing Deployment Solutions Configuring and troubleshooting NetBoot/Network Install to deploy OS X. Using File Sharing Configuring and troubleshooting Apple File Service, share points for Windows users, WebDAV access for mobile devices, providing Time Machine network backups. Managing Web Services Hosting multiple web sites on a single server. Using Collaborative Services Setting up and configuring wikis and blogs, providing iChat and iCal services to assist people working together, and configuring Address Book service to share contact information amongst multiple computers, providing mail services. Certification Students can take the OS X Server Essentials 10.7 exam - one of two exams required for Apple Certified Technical Coordinator (ACTC) 10.7 certification. Additional course details: Nexus Humans Apple - Mac OS X Server Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Apple - Mac OS X Server Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Apple - Mac OS X Server Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

Educators matching "Windows Server"

Show all 23