Duration 5 Days 30 CPD hours This course is intended for Security engineer Network engineer Network designer Network administrator Systems engineer Consulting systems engineer Technical solutions architect Network manager Cisco integrators and partners Overview After taking this course, you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW) Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco© CCNP© Security and CCIE© Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower© Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch© Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. Describing Information Security Concepts* Information Security Overview Assets, Vulnerabilities, and Countermeasures Managing Risk Vulnerability Assessment Understanding Common Vulnerability Scoring System (CVSS) Describing Common TCP/IP Attacks* Legacy TCP/IP Vulnerabilities IP Vulnerabilities Internet Control Message Protocol (ICMP) Vulnerabilities TCP Vulnerabilities User Datagram Protocol (UDP) Vulnerabilities Attack Surface and Attack Vectors Reconnaissance Attacks Access Attacks Man-in-the-Middle Attacks Denial of Service and Distributed Denial of Service Attacks Reflection and Amplification Attacks Spoofing Attacks Dynamic Host Configuration Protocol (DHCP) Attacks Describing Common Network Application Attacks* Password Attacks Domain Name System (DNS)-Based Attacks DNS Tunneling Web-Based Attacks HTTP 302 Cushioning Command Injections SQL Injections Cross-Site Scripting and Request Forgery Email-Based Attacks Describing Common Endpoint Attacks* Buffer Overflow Malware Reconnaissance Attack Gaining Access and Control Gaining Access via Social Engineering Gaining Access via Web-Based Attacks Exploit Kits and Rootkits Privilege Escalation Post-Exploitation Phase Angler Exploit Kit Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Stateful Firewall Overview Security Intelligence Overview Threat Information Standardization Network-Based Malware Protection Overview Intrusion Prevention System (IPS) Overview Next Generation Firewall Overview Email Content Security Overview Web Content Security Overview Threat Analytic Systems Overview DNS Security Overview Authentication, Authorization, and Accounting Overview Identity and Access Management Overview Virtual Private Network Technology Overview Network Security Device Form Factors Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Network Address Translation Cisco ASA Interface Access Control Lists (ACLs) Cisco ASA Global ACLs Cisco ASA Advanced Access Policies Cisco ASA High Availability Overview Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Cisco Firepower NGFW Network Address Translation (NAT) Cisco Firepower NGFW Prefilter Policies Cisco Firepower NGFW Access Control Policies Cisco Firepower NGFW Security Intelligence Cisco Firepower NGFW Discovery Policies Cisco Firepower NGFW IPS Policies Cisco Firepower NGFW Malware and File Policies Deploying Email Content Security Cisco Email Content Security Overview Simple Mail Transfer Protocol (SMTP) Overview Email Pipeline Overview Public and Private Listeners Host Access Table Overview Recipient Access Table Overview Mail Policies Overview Protection Against Spam and Graymail Anti-virus and Anti-malware Protection Outbreak Filters Content Filters Data Loss Prevention Email Encryption Deploying Web Content Security Cisco Web Security Appliance (WSA) Overview Deployment Options Network Users Authentication Secure HTTP (HTTPS) Traffic Decryption Access Policies and Identification Profiles Acceptable Use Controls Settings Anti-Malware Protection Deploying Cisco Umbrella* Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Managing Cisco Umbrella Cisco Umbrella Investigate Overview and Concepts Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Keys in Cryptography Public Key Infrastructure Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps IPsec Static Virtual Tunnel Interface Dynamic Multipoint VPN Cisco IOS FlexVPN Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs Cisco IOS VTIs Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies Secure Sockets Layer (SSL) Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Cisco ASA Remote Access VPN Configuration Cisco Firepower NGFW Remote Access VPN Configuration Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Cisco Identity Services Engine Cisco TrustSec Describing 802.1X Authentication 802.1X and Extensible Authentication Protocol (EAP) EAP Methods Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications RADIUS Change of Authorization Configuring 802.1X Authentication Cisco Catalyst© Switch 802.1X Configuration Cisco Wireless LAN Controller (WLC) 802.1X Configuration Cisco Identity Services Engine (ISE) 802.1X Configuration Supplicant 802.1x Configuration Cisco Central Web Authentication Describing Endpoint Security Technologies* Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Application Whitelists and Blacklists Host-Based Malware Protection Sandboxing Overview File Integrity Checking Deploying Cisco Advanced Malware Protection (AMP) for Endpoints* Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Cisco AMP Device and File Trajectory Managing Cisco AMP for Endpoints Introducing Network Infrastructure Protection* Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Network Telemetry Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Deploying Control Plane Security Controls* Infrastructure ACLs Control Plane Policing Control Plane Protection Routing Protocol Security Deploying Layer 2 Data Plane Security Controls* Overview of Layer 2 Data Plane Security Controls Virtual LAN (VLAN)-Based Attacks Mitigation Sp
Overview of GCSE English Preparation Online In today’s competitive academic environment, mastering GCSE English is crucial for success. With over 5 million students sitting GCSE exams annually in the UK, the demand for effective English skills is higher than ever. Our GCSE English Preparation Online is designed to provide a comprehensive foundation in all aspects of the curriculum, ensuring that students are well-prepared for their exams. This course covers everything from the basics of grammar and sentence structure to the intricacies of academic writing. You’ll explore different sections of the Edexcel and Cambridge English exams, enhancing your reading, writing, listening, and speaking skills. Each module is tailored to help you avoid common mistakes, improve your grammar, and master the art of effective communication. Whether you’re a student aiming for top grades, a non-native speaker looking to improve your English, or an adult learner wishing to enhance your language skills, this course offers the tools and knowledge you need. Join us on this journey to excel in GCSE English and open doors to a brighter academic and professional future. Become proficient in GCSE English Preparation Online Course by grasping all the essential knowledge from our top-quality course step by step. Enrol now to ensure that your GCSE English Preparation Online Course mastery is not limited to only conceptual frameworks! This GCSE English Preparation Online Course will assist you in standing out from the crowd and being more efficient in your chosen area of expertise. Furthermore, if you require assistance with the GCSE English Preparation Online Course, we will provide experts who will support and guide you. So, add this GCSE English Preparation Online Course to your cart and boost your personal and career development. In this GCSE English Preparation Online Course, you will: Sharpen your skills to help you advance your career. Acquire a comprehensive understanding of various related topics and tips from industry experts. Learn in-demand knowledge and skills in high demand among UK employers, which will help to kickstart your GCSE English Preparation Online Course career. Enrolling in the GCSE English Preparation Online Course can assist you in getting into your desired career faster than you ever imagined. So, without further ado, start now! Details Perks of Learning with IOMH One-To-One Support from a Dedicated Tutor Throughout Your Course. Study Online - Whenever and Wherever You Want. Instant Digital/ PDF Certificate. 100% Money Back Guarantee. 12 Months Access. Process of Evaluation After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement Certificate of Completion - Digital / PDF Certificate After completing the GCSE English Preparation Online course, you can order your CPD Accredited Digital / PDF Certificate for £5.99. Certificate of Completion - Hard copy Certificate You can get the CPD Accredited Hard Copy Certificate for £12.99. Shipping Charges: Inside the UK: £3.99 International: £10.99 Who Is This Course for? This GCSE English Preparation Online is suitable for anyone aspiring to start a career in relevant field; even if you are new to this and have no prior knowledge, this course is going to be very easy for you to understand. On the other hand, if you are already working in this sector, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level. This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education. Requirements You don't need any educational qualification or experience to enrol in the GCSE English Preparation Online course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course. Career Path The certification and skills you get from this GCSE English Preparation Online Course can help you advance your career and gain expertise in several fields, allowing you to apply for high-paying jobs in related sectors. Course Curriculum Module 01: Introduction to GCSE English Introduction to GCSE English 00:11:00 Module 02: Edexcel English Section A Part 01 Edexcel English Section A Part 01 00:16:00 Module 03: Edexcel English Section A Part 02 Edexcel English Section A Part 02 00:17:00 Module 04: Edexcel English Section B Edexcel English Section B 00:20:00 Module 05: Edexcel English Section C Edexcel English Section C 00:18:00 Module 06: Cambridge English Exercise 1-4 Cambridge English Exercise 1-4 00:22:00 Module 07: Cambridge English Exercise 5 Cambridge English Exercise 5 00:13:00 Module 08: Cambridge English Exercise 6 Cambridge English Exercise 6 00:13:00 Module 09: Basics of Grammar Part 01 Basics of Grammar Part 01 00:10:00 Module 10: Basics of Grammar Part 02 Basics of Grammar Part 02 00:10:00 Module 11: The Basics of Sentences The Basics of Sentences 00:09:00 Module 12: Structure of Sentences Structure of Sentences 00:10:00 Module 13: English Language Reading Part 01 English Language Reading Part 01 00:10:00 Module 14: English Language Reading Part 02 English Language Reading Part 02 00:14:00 Module 15: English Academic Writing Part 01 English Academic Writing Part 01 00:10:00 Module 16: English Academic Writing Part 02 English Academic Writing Part 02 00:12:00 Module 17: Punctuation and Capitalisation in Writing Punctuation and Capitalisation in Writing 00:12:00 Module 18: Most Common Mistakes and How to Avoid Them Most Common Mistakes and How to Avoid Them 00:13:00 Module 19: Cambridge English Listening Cambridge English Listening 00:11:00 Module 20: Cambridge English Speaking Cambridge English Speaking 00:11:00
Overview of Criminal Investigation Pursue a captivating and rewarding career in criminal investigation with our comprehensive course. In the United Kingdom, crime rates continuously challenge law enforcement agencies, heightening the demand for skilled criminal investigators. Our meticulously designed curriculum will equip you with the essential tools and knowledge to excel in this highly specialized field. From mastering advanced forensic techniques to exploring the complexities of criminal psychology, you'll gain a holistic understanding of the investigative process. Become a vital asset in the pursuit of justice, ensuring no stone is left unturned in uncovering the truth behind even the most complex cases. This Criminal Investigation course covers the following topics: Develop an understanding of various aspects of the criminal investigation. Gain knowledge on the collection, preservation, and analysis of physical evidence. Explore the various facets of criminology and criminal psychology. Understand the types of domestic investigations and victimology. Learn tracing, surveillance, and effective interrogation techniques. Delve into the details of the Criminal Justice System in England and Wales. Details Perks of Learning with IOMH One-To-One Support from a Dedicated Tutor Throughout Your Course. Study Online - Whenever and Wherever You Want. Instant Digital/ PDF Certificate. 100% Money Back Guarantee. 12 Months Access. Process of Evaluation After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement Certificate of Completion - Digital / PDF Certificate After completing the Criminal Investigation course, you can order your CPD Accredited Digital / PDF Certificate for £5.99. Certificate of Completion - Hard copy Certificate You can get the CPD Accredited Hard Copy Certificate for £12.99. Shipping Charges: Inside the UK: £3.99 International: £10.99 Who Is This Course for? This Criminal Investigation is suitable for anyone aspiring to start a career in relevant field; even if you are new to this and have no prior knowledge, this course is going to be very easy for you to understand. On the other hand, if you are already working in this sector, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level. This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education. Requirements You don't need any educational qualification or experience to enrol in the Criminal Investigation course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course. Career Path The certification and skills you get from this Criminal Investigation Course can help you advance your career and gain expertise in several fields, allowing you to apply for high-paying jobs in related sectors. Course Curriculum Module 01: Required Skills to Become a Criminal Investigator Required Skills to Become a Criminal Investigator 00:19:00 Module 02: An Introduction to a Private Detective An Introduction to a Private Detective 00:16:00 Module 03: Criminal Intelligence Criminal Intelligence 00:17:00 Module 04: Crime Scene Investigation Crime Scene Investigation 00:17:00 Module 05: Collecting and Packaging Physical Evidence Collecting and Packaging Physical Evidence 00:42:00 Module 06: Fingerprints: Your Personal Signature Fingerprints: Your Personal Signature 00:39:00 Module 07: DNA Analysis DNA Analysis 00:35:00 Module 08: Criminology and Criminal Psychology Criminology and Criminal Psychology 00:13:00 Module 09: Violent Crimes and Cyber Criminology Violent Crimes and Cyber Criminology 00:14:00 Module 10: Business Theft and fraud Business Theft and fraud 00:12:00 Module 11: Domestic Investigation and Types Domestic Investigation and Types 00:15:00 Module 12: Victimology Victimology 00:11:00 Module 13: Dealing with Crime Dealing with Crime 00:10:00 Module 14: Tracing and Surveillance Techniques Tracing and Surveillance Techniques 00:13:00 Module 15: Effective Interrogation Techniques Effective Interrogation Techniques 00:14:00 Module 16: Basic Operations of Firearms Basic Operations of Firearms 00:10:00 Module 17: Firearms Examination Firearms Examination 01:21:00 Module 18: Forensic Psychology Forensic Psychology 00:12:00 Module 19: The Criminal Justice System in England and Wales The Criminal Justice System in England and Wales 00:13:00
Duration 3 Days 18 CPD hours This course is intended for This course is geared for experienced Scala developers who are new to the world of machine learning and are eager to expand their skillset. Professionals such as data engineers, data scientists, and software engineers who want to harness the power of machine learning in their Scala-based projects will greatly benefit from attending. Additionally, team leads and technical managers who oversee Scala development projects and want to integrate machine learning capabilities into their workflows can gain valuable insights from this course Overview Working in a hands-on learning environment led by our expert instructor you'll: Grasp the fundamentals of machine learning and its various categories, empowering you to make informed decisions about which techniques to apply in different situations. Master the use of Scala-specific tools and libraries, such as Breeze, Saddle, and DeepLearning.scala, allowing you to efficiently process, analyze, and visualize data for machine learning projects. Develop a strong understanding of supervised and unsupervised learning algorithms, enabling you to confidently choose the right approach for your data and effectively build predictive models Gain hands-on experience with neural networks and deep learning, equipping you with the know-how to create advanced applications in areas like natural language processing and image recognition. Explore the world of generative AI and learn how to utilize GPT-Scala for creative text generation tasks, broadening your skill set and making you a more versatile developer. Conquer the realm of scalable machine learning with Scala, learning the secrets to tackling large-scale data processing and analysis challenges with ease. Sharpen your skills in model evaluation, validation, and optimization, ensuring that your machine learning models perform reliably and effectively in any situation. Machine Learning Essentials for Scala Developers is a three-day course designed to provide a solid introduction to the world of machine learning using the Scala language. Throughout the hands-on course, you?ll explore a range of machine learning algorithms and techniques, from supervised and unsupervised learning to neural networks and deep learning, all specifically crafted for Scala developers. Our expert trainer will guide you through real-world, focused hands-on labs designed to help you apply the knowledge you gain in real-world scenarios, giving you the confidence to tackle machine learning challenges in your own projects. You'll dive into innovative tools and libraries such as Breeze, Saddle, DeepLearning.scala, GPT-Scala (and Generative AI with Scala), and TensorFlow-Scala. These cutting-edge resources will enable you to build and deploy machine learning models for a wide range of projects, including data analysis, natural language processing, image recognition and more. Upon completing this course, you'll have the skills required to tackle complex projects and confidently develop intelligent applications. You?ll be able to drive business outcomes, optimize processes, and contribute to innovative projects that leverage the power of data-driven insights and predictions. Introduction to Machine Learning and Scala Learning Outcome: Understand the fundamentals of machine learning and Scala's role in this domain. What is Machine Learning? Machine Learning with Scala: Advantages and Use Cases Supervised Learning in Scala Learn the basics of supervised learning and how to apply it using Scala. Supervised Learning: Regression and Classification Linear Regression in Scala Logistic Regression in Scala Unsupervised Learning in Scala Understand unsupervised learning and how to apply it using Scala. Unsupervised Learning:Clustering and Dimensionality Reduction K-means Clustering in Scala Principal Component Analysis in Scala Neural Networks and Deep Learning in Scala Learning Outcome: Learn the basics of neural networks and deep learning with a focus on implementing them in Scala. Introduction to Neural Networks Feedforward Neural Networks in Scala Deep Learning and Convolutional Neural Networks Introduction to Generative AI and GPT in Scala Gain a basic understanding of generative AI and GPT, and how to utilize GPT-Scala for natural language tasks. Generative AI: Overview and Use Cases Introduction to GPT (Generative Pre-trained Transformer) GPT-Scala: A Library for GPT in Scala Reinforcement Learning in Scala Understand the basics of reinforcement learning and its implementation in Scala. Introduction to Reinforcement Learning Q-learning and Value Iteration Reinforcement Learning with Scala Time Series Analysis using Scala Learn time series analysis techniques and how to apply them in Scala. Introduction to Time Series Analysis Autoregressive Integrated Moving Average (ARIMA) Models Time Series Analysis in Scala Natural Language Processing (NLP) with Scala Gain an understanding of natural language processing techniques and their application in Scala. Introduction to NLP: Techniques and Applications Text Processing and Feature Extraction NLP Libraries and Tools for Scala Image Processing and Computer Vision with Scala Learn image processing techniques and computer vision concepts with a focus on implementing them in Scala. Introduction to Image Processing and Computer Vision Feature Extraction and Image Classification Image Processing Libraries for Scala Model Evaluation and Validation Understand the importance of model evaluation and validation, and how to apply these concepts using Scala. Model Evaluation Metrics Cross-Validation Techniques Model Selection and Tuning in Scala Scalable Machine Learning with Scala Learn how to handle large-scale machine learning problems using Scala. Challenges of Large-Scale Machine Learning Data Partitioning and Parallelization Distributed Machine Learning with Scala Machine Learning Deployment and Production Understand the process of deploying machine learning models into production using Scala. Deployment Challenges and Best Practices Model Serialization and Deserialization Monitoring and Updating Models in Production Ensemble Learning Techniques in Scala Discover ensemble learning techniques and their implementation in Scala. Introduction to Ensemble Learning Bagging and Boosting Techniques Implementing Ensemble Models in Scala Feature Engineering for Machine Learning in Scala Learn advanced feature engineering techniques to improve machine learning model performance in Scala. Importance of Feature Engineering in Machine Learning Feature Scaling and Normalization Techniques Handling Missing Data and Categorical Features Advanced Optimization Techniques for Machine Learning Understand advanced optimization techniques for machine learning models and their application in Scala. Gradient Descent and Variants Regularization Techniques (L1 and L2) Hyperparameter Tuning Strategies
Ensure compliance with GDPR UK regulations through our comprehensive training. Learn essential data protection strategies to safeguard personal information effectively.
Boost productivity with our Time Management course. Learn effective strategies to prioritize tasks, manage your schedule, and achieve more in less time.
Unlock the secrets to maximizing restaurant profits with our specialized course. Learn essential techniques for analyzing financial data, optimizing menu pricing, and reducing costs. Gain practical insights into effective marketing strategies, customer retention, and operational efficiency. Whether you're a restaurant owner, manager, or aspiring entrepreneur, this course equips you with the tools and strategies to boost profitability and achieve success in the competitive restaurant industry.
Ensure your classroom is a safe haven. Learn vital strategies in child safeguarding and protection, tailored specifically for teachers to protect every student.
Provide crucial support with our Crisis and Trauma Counselling course in Early Childhood. Learn effective strategies to help young children navigate challenging times.
This course will provide delegates involved in tackling the financial underpinning of corrupt behaviour with the knowledge, concepts and practices necessary to understand and mitigate illicit financial flows.