Duration 5 Days 30 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy and manage a Cisco Firepower NGIPS in their network environment. Security administrators Security consultants Network administrators System engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe the components of Cisco Firepower Threat Defense and the managed device registration process Detail Next-Generation Firewalls (NGFW) traffic control and configure the Cisco Firepower system for network discovery Implement access control policies and describe access control policy advanced features Configure security intelligences features and the Advanced Malware Protection (AMP) for Networks implementation procedure for file control and advanced malware protection Implement and manage intrusion and network analysis policies for NGIPS inspection Describe and demonstrate the detailed analysis techniques and reporting features provided by the Cisco Firepower Management Center Integrate the Cisco Firepower Management Center with an external logging destination Describe and demonstrate the external alerting options available to Cisco Firepower Management Center and configure a correlation policy Describe key Cisco Firepower Management Center software update and user account management features Identify commonly misconfigured settings within the Cisco Firepower Management Center and use basic commands to troubleshoot a Cisco Firepower Threat Defense device This course shows you how to deploy and use Cisco Firepower© Next-Generation Intrusion Prevention System (NGIPS). This hands-on course gives you the knowledge and skills to use the platform features and includes firewall security concepts, platform architecture and key features; in-depth event analysis including detection of network-based malware and file type, NGIPS tuning and configuration including application control, security intelligence, firewall, and network-based malware and file controls; Snort© rules language; file and malware inspection, security intelligence, and network analysis policy configuration designed to detect traffic patterns; configuration and deployment of correlation policies to take action based on events detected; troubleshooting; system and user administration tasks, and more. This course helps you prepare to take the exam, Securing Networks with Cisco Firepower (300-710 SNCF), which leads to CCNP Security and Cisco Certified Specialist ? Network Security Firepower certifications. The 300-710 SNCF exam has a second preparation course as well, Cisco© Securing Networks with Cisco© Firepower Next Generation Firewall (SSNGFW). You can take these courses in any order. Course Outline Cisco Firepower Threat Defense Overview Cisco Firepower NGFW Device Configuration Cisco Firepower NGFW Traffic Control Cisco Firepower Discovery Implementing Access Control Policies Security Intelligence File Control and Advanced Malware Protection Next-Generation Intrusion Prevention Systems Network Analysis Policies Detailed Analysis Techniques Cisco Firepower Platform Integration Alerting and Correlation Policies Performing System Administration Troubleshooting Cisco Firepower
Employees, managers and directors should all have a good understanding of the threat posed by cyber-attacks and the importance of guarding against data breaches. This short course will explain why cyber attacks and data breaches happen and provide practical advice on how to set up effective defences.
Description: This Certified Penetration Testing Consultant (CPTC) - Complete Video Course covers everything you need to know about becoming a Certified Penetration Testing Consultant. In this course you will learn about packet capturing, Layer 2 attacks, Layer 3 attacks on Cisco-based infrastructures, pivoting and relays, IPv6 attacks, VPN attacks, defeating SSL, and IDS/IPS evasion. By taking this course, you will become a cyber security professional with the ability to plan, manage and perform a penetration test. The designation 'Consultant' is related to the depth and breadth of understanding required to manage a project involving multiple team members, manage the client's expectations and deliver an audit of security controls that is thorough, well documented and ethically sound. If you are an IT network administrator and interested in conducting Penetration tests against large network infrastructures, such as large corporate networks, then taking this course will help you to get more skilled. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Penetration Testing Consultant (CPTC) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Penetration Testing Consultant (CPTC) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Packet Capturing Packet Capturing 00:38:00 Layer 2 Attacks Layer 2 Attacks 00:59:00 Layer 3 Attacks on Cisco Based Infrastructures Layer 3 Attacks on Cisco Based Infrastructures 01:09:00 Pivoting and Relays Pivoting and Relays 00:20:00 IPv6 Attacks IPv6 Attacks 00:49:00 VPN Attacks VPN Attacks 00:38:00 Defeating SSL Defeating SSL 00:48:00 IDS/IPS Evasion IDS/IPS Evasion 01:11:00 Mock Exam Mock Exam- Certified Penetration Testing Consultant (CPTC) - Complete Video Course 00:20:00 Final Exam Final Exam- Certified Penetration Testing Consultant (CPTC) - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Tired of watching your bank balance play hide and seek every month? This course is your ticket to understanding how money can work smarter while you work... well, less. Passive Income Mastery – Build Financial Security is designed to guide you through the world of income streams that don’t require constant effort. Whether you're earning while you sleep or sipping tea while your investments hum along quietly, this course will shed light on how to build that steady financial cushion without falling for overhyped promises or risky schemes. Learn the frameworks, income models, and digital opportunities that people often whisper about but rarely understand properly. With clear, concise lessons, you’ll explore how to lay the groundwork for dependable income sources with minimal fuss and maximum common sense. If you’ve ever wondered how others seem to stay ahead financially without clocking in overtime, this course brings those answers home—neatly packed in an online format that respects your time and intelligence. Learning Outcomes: Understand the difference between recurring and residual income Identify the various types of recurring and residual income streams Develop strategies to build passive income streams Learn how to leverage time and resources to maximise passive income potential Achieve financial security through passive income The Passive Income Mastery course is designed to provide learners with a comprehensive understanding of how to build passive income streams and achieve financial freedom. Through six modules, learners will gain an understanding of the difference between recurring and residual income, the various types of income streams available, and the strategies for building wealth through passive income. Upon completing this course, learners will be equipped with the tools and knowledge to develop their own passive income streams and achieve financial security. With expert guidance and a comprehensive curriculum, this course is the key to unlocking your financial potential. Passive Income Mastery - Build Financial Security Course Curriculum Passive Income Masterclass Build Financial Security - Preview Section 01: What Are Recurring Income Streams Section 02: What is Residual Income Section 03: Types of Recurring Income Section 04: Types of Residual Income Section 05: Relationship Between Recurring, Residual and Passive Income Section 06: Building Wealth Strategies Passive Income Masterclass Build Financial Security - Review How is the course assessed? Upon completing an online module, you will immediately be given access to a specifically crafted MCQ test. For each test, the pass mark will be set to 60%. Exam & Retakes: It is to inform our learners that the initial exam for this online course is provided at no additional cost. In the event of needing a retake, a nominal fee of £9.99 will be applicable. Certification Upon successful completion of the assessment procedure, learners can obtain their certification by placing an order and remitting a fee of __ GBP. £9 for PDF Certificate and £15 for the Hardcopy Certificate within the UK ( An additional £10 postal charge will be applicable for international delivery). CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals looking to supplement their income Entrepreneurs seeking to build passive income streams Those interested in achieving financial freedom Individuals who want to learn how to leverage their time and resources Anyone who wants to gain a comprehensive understanding of passive income Career path Entrepreneur Real estate investor Affiliate marketer Stock trader Content creator £20,000 - £150,000+ (depending on career path and experience) Certificates Certificate of completion Digital certificate - £9 You can apply for a CPD Accredited PDF Certificate at the cost of £9. Certificate of completion Hard copy certificate - £15 Hard copy can be sent to you via post at the expense of £15.
Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in designing and implementing DevOps processes or in passing the Microsoft Azure DevOps Solutions certification exam. This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms Prerequisites Successful learners will have prior knowledge and understanding of: Cloud computing concepts, including an understanding of PaaS, SaaS, and IaaS implementations. Both Azure administration and Azure development with proven expertise in at least one of these areas. Version control, Agile software development, and core software development principles. It would be helpful to have experience in an organization that delivers software. AZ-104T00 - Microsoft Azure Administrator AZ-204T00: Developing Solutions for Microsoft Azure 1 - Introduction to DevOps What is DevOps? Explore the DevOps journey Identify transformation teams Explore shared goals and define timelines 2 - Choose the right project Explore greenfield and brownfield projects Decide when to use greenfield and brownfield projects Decide when to use systems of record versus systems of engagement Identify groups to minimize initial resistance Identify project metrics and key performance indicators (KPIs) 3 - Describe team structures Explore agile development practices Explore principles of agile development Define organization structure for agile practices Explore ideal DevOps team members Enable in-team and cross-team collaboration Select tools and processes for agile practices 4 - Choose the DevOps tools What is Azure DevOps? What is GitHub? Explore an authorization and access strategy Migrate or integrate existing work management tools Migrate or integrate existing test management tools Design a license management strategy 5 - Plan Agile with GitHub Projects and Azure Boards Link GitHub to Azure Boards Configure GitHub Projects Manage work with GitHub Project boards Customize Project views Collaborate using team discussions Agile Plan and Portfolio Management with Azure Boards 6 - Introduction to source control Explore DevOps foundational practices What is source control? Explore benefits of source control Explore best practices for source control 7 - Describe types of source control systems Understand centralized source control Understand distributed source control Explore Git and Team Foundation Version Control Examine and choose Git Understand objections to using Git Describe working with Git locally 8 - Work with Azure Repos and GitHub Migrate from TFVC to Git Use GIT-TFS Develop online with GitHub Codespaces 9 - Structure your Git Repo Explore monorepo versus multiple repos Implement a change log 10 - Manage Git branches and workflows Explore branch workflow types Explore feature branch workflow Explore Git branch model for continuous delivery Explore GitHub flow Explore fork workflow Version Control with Git in Azure Repos 11 - Collaborate with pull requests in Azure Repos Collaborate with pull requests Examine GitHub mobile for pull request approvals 12 - Identify technical debt Examine code quality Examine complexity and quality metrics Measure and manage technical debt Integrate other code quality tools Plan effective code reviews 13 - Explore Git hooks Implement Git hooks 14 - Plan foster inner source Explore foster inner source Implement the fork workflow Describe inner source with forks 15 - Manage Git repositories Work with large repositories Purge repository data Manage releases with GitHub Repos Automate release notes with GitHub 16 - Explore Azure Pipelines Explore the concept of pipelines in DevOps Describe Azure Pipelines Understand Azure Pipelines key terms 17 - Manage Azure Pipeline agents and pools Choose between Microsoft-hosted versus self-hosted agents Explore job types Explore predefined agent pool Understand typical situations for agent pools Communicate with Azure Pipelines Communicate to deploy to target servers Examine other considerations Describe security of agent pools Configure agent pools and understanding pipeline styles 18 - Describe pipelines and concurrency Understand parallel jobs Estimate parallel jobs Describe Azure Pipelines and open-source projects Explore Azure Pipelines and Visual Designer Describe Azure Pipelines and YAML 19 - Explore continuous integration Learn the four pillars of continuous integration Explore benefits of continuous integration Describe build properties Enable Continuous Integration with Azure Pipelines 20 - Implement a pipeline strategy Configure agent demands Implement multi-agent builds Explore source control types supported by Azure Pipelines 21 - Integrate with Azure Pipelines Describe the anatomy of a pipeline Understand the pipeline structure Detail templates Explore YAML resources Use multiple repositories in your pipeline 22 - Introduction to GitHub Actions What are Actions? Explore Actions flow Understand workflows Describe standard workflow syntax elements Explore events Explore jobs Explore runners Examine release and test an action 23 - Learn continuous integration with GitHub Actions Describe continuous integration with actions Examine environment variables Share artifacts between jobs Examine Workflow badges Describe best practices for creating actions Mark releases with Git tags Create encrypted secrets Use secrets in a workflow Implement GitHub Actions for CI/CD 24 - Design a container build strategy Examine structure of containers Work with Docker containers Understand Dockerfile core concepts Examine multi-stage dockerfiles Examine considerations for multiple stage builds Explore Azure container-related services Deploy Docker containers to Azure App Service web apps 25 - Introduction to continuous delivery Explore traditional IT development cycle What is continuous delivery? Move to continuous delivery Understand releases and deployments Understand release process versus release 26 - Create a release pipeline Describe Azure DevOps release pipeline capabilities Explore release pipelines Explore artifact sources Choose the appropriate artifact source Examine considerations for deployment to stages Explore build and release tasks Explore custom build and release tasks Explore release jobs Configure Pipelines as Code with YAML 27 - Explore release recommendations Understand the delivery cadence and three types of triggers Explore release approvals Explore release gates Use release gates to protect quality Control Deployments using Release Gates 28 - Provision and test environments Provision and configure target environments Configure automated integration and functional test automation Understand Shift-left Set up and run availability tests Explore Azure Load Testing Set up and run functional tests 29 - Manage and modularize tasks and templates Examine task groups Explore variables in release pipelines Understand variable groups 30 - Automate inspection of health Automate inspection of health Explore events and notifications Explore service hooks Configure Azure DevOps notifications Configure GitHub notifications Explore how to measure quality of your release process Examine release notes and documentation Examine considerations for choosing release management tools Explore common release management tools 31 - Introduction to deployment patterns Explore microservices architecture Examine classical deployment patterns Understand modern deployment patterns 32 - Implement blue-green deployment and feature toggles What is blue-green deployment? Explore deployment slots Describe feature toggle maintenance 33 - Implement canary releases and dark launching Explore canary releases Examine Traffic Manager Understand dark launching 34 - Implement A/B testing and progressive exposure deployment What is A/B testing? Explore CI-CD with deployment rings 35 - Integrate with identity management systems Integrate GitHub with single sign-on (SSO) Explore service principals Explore Managed Identity 36 - Manage application configuration data Rethink application configuration data Explore separation of concerns Understand external configuration store patterns Examine Key-value pairs Examine App configuration feature management Integrate Azure Key Vault with Azure Pipelines Manage secrets, tokens and certificates Examine DevOps inner and outer loop Integrate Azure Key Vault with Azure DevOps Enable Dynamic Configuration and Feature Flags 37 - Explore infrastructure as code and configuration management Explore environment deployment Examine environment configuration Understand imperative versus declarative configuration Understand idempotent configuration 38 - Create Azure resources using Azure Resource Manager templates Why use Azure Resource Manager templates? Explore template components Manage dependencies Modularize templates Manage secrets in templates Deployments using Azure Bicep templates 39 - Create Azure resources by using Azure CLI What is Azure CLI? Work with Azure CLI 40 - Explore Azure Automation with DevOps Create automation accounts What is a runbook? Understand automation shared resources Explore runbook gallery Examine webhooks Explore source control integration Explore PowerShell workflows Create a workflow Examine checkpoint and parallel processing 41 - Implement Desired State Configuration (DSC) Understand configuration drift Explore Desired State Configuration (DSC) Explore Azure Automation State configuration (DSC) Examine DSC configuration file Explore hybrid management Implement DSC and Linux Automation on Azure 42 - Implement Bicep What is Bicep? Install Bicep Understand Bicep file structure and syntax 43 - Introduction to Secure DevOps Describe SQL injection attack Understand DevSecOps Explore Secure DevOps Pipeline Explore key validation points Explore continuous security validation Understand threat modeling 44 - Implement open-source software Explore how software is built What is open-source software Explore corporate concerns with open-source software components Explore common open-source licenses Examine license implications and ratings 45 - Software Composition Analysis Inspect and validate code bases for compliance Explore software composition analysis (SCA) Integrate Mend with Azure Pipelines Implement GitHub Dependabot alerts and security updates Integrate software composition analysis checks into pipelines Examine tools for assess package security and license rate Interpret alerts from scanner tools Implement security and compliance in an Azure Pipeline 46 - Static analyzers Explore SonarCloud Explore CodeQL in GitHub Manage technical debt with SonarCloud and Azure DevOps 47 - OWASP and Dynamic Analyzers Plan Implement OWASP Secure Coding Practices Explore OWASP ZAP penetration test Explore OWASP ZAP results and bugs 48 - Security Monitoring and Governance Implement pipeline security Explore Microsoft Defender for Cloud Examine Microsoft Defender for Cloud usage scenarios Explore Azure Policy Understand policies Explore initiatives Explore resource locks Explore Azure Blueprints Understand Microsoft Defender for Identity 49 - Explore package dependencies What is dependency management? Describe elements of a dependency management strategy Identify dependencies Understand source and package componentization Decompose your system Scan your codebase for dependencies 50 - Understand package management Explore packages Understand package feeds Explore package feed managers Explore common public package sources Explore self-hosted and SaaS based package sources Consume packages Publish packages Package management with Azure Artifacts 51 - Migrate consolidating and secure artifacts Identify existing artifact repositories Migrate and integrating artifact repositories Secure access to package feeds Examine roles Examine permissions Examine authentication 52 - Implement a versioning strategy Understand versioning of artifacts Explore semantic versioning Examine release views Promote packages Explore best practices for versioning 53 - Introduction to GitHub Packages Publish packages Install a package Delete and restore a package Explore package access control and visibility 54 - Implement tools to track usage and flow Understand the inner loop Explore Azure Monitor and Log Analytics Examine Kusto Query Language (KQL) Explore Application Insights Implement Application Insights Monitor application performance with Application Insights 55 - Develop monitor and status dashboards Explore Azure Dashboards Examine view designer in Azure Monitor Explore Azure Monitor workbooks Explore Power BI Build your own custom application 56 - Share knowledge within teams Share acquired knowledge within development teams Integrate with Azure Boards Share team knowledge using Azure Project Wiki 57 - Design processes to automate application analytics Explore rapid responses and augmented search Integrate telemetry Examine monitoring tools and technologies 58 - Manage alerts, blameless retrospectives and a just culture Examine when get a notification Explore how to fix it Explore smart detection notifications Improve performance Understand server response time degradation Reduce meaningless and non-actionable alerts Examine blameless retrospective Develop a just culture
UNIX system administration training course description This five day hands on course provides a comprehensive coverage of core UNIX administration tasks. The course covers generic UNIX and is available for any UNIX distribution required. What will you learn Administer & configure UNIX systems. Maintain UNIX by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure UNIX system. Describe the organisation and implementation of the filesystem. UNIX system administration training course details Who will benefit: System administrators Network administrators. Prerequisites: UNIX fundamentals. Duration 5 days UNIX system administration training course contents Part 1 Exploring UNIX command-line tools Using a shell, shell configuration, environment variables, getting help, streams, redirection and pipes, processing text using filters, manipulating files, regular expressions, grep, sed. Managing software Package concepts, comparison of package formats, RPM, rpm commands, yum, dpkg, apt-cache, apt-get, dselect, aptitude, converting between package formats, dependencies and conflicts, startup script problems, shared libraries, library management, managing processes, the kernel: the first process, process lists, foreground & background processes, process priorities, killing processes. Configuring hardware Configuring firmware and hardware, RQs, I/O addresses, DMA addresses, Boot disks, coldplug and hotplug devices, configuring expansion cards and PCI cards, kernel modules, USB devices, UNIX USB crivers, configuring hard disks, partitioning systems, LVM, common layouts, creating partitions and filesystems, maintaining filesystem health, tuning, journals, checking filesystems, monitoring disk use, mounting and unmounting filesystems. Managing files File management commands, file naming and wildcards, file archiving, links, directory commands, file ownership and group, file access control, permissions, chmod, defaults, file attributes, disk quotas, enabling and setting quotas, locating files, the FHS. Booting UNIX and editing files Installing boot loaders, GRUB legacy, GRUB 2, alternative boot loaders, the boot process, boot messages, runlevels and the initialization process, runlevel functions, runlevel services, alternative boot systems, upstart, system. Part 2 Configuring the X window system Localization, configuring basic X features, X server options, methods of configuring X, X display information, X fonts, the X GUI login system, XDMCP server, using X for remote access, screen display settings, setting your time zone, your locale, configuring printing, conceptualizing the UNIX printing architecture, understanding PostScript and ghostscript, running a printing system, configuring CUPS, monitoring and controlling the print queue. Administering the system Managing users and groups, tuning user and system environments, using system log files, understanding syslogd, setting logging options, manually logging data, rotating l;og files, reviewing log file contents, maintaining the system time, UNIX time concepts, manually setting the time, using NTP, running jobs in the future, understanding the role of cron, creating system cron jobs, creating user cron jobs, using anacron, using at. Configuring basic networking TCP/IP, network hardware, network addresses, hostnames, network ports, configuring UNIX for a local network, configuring with DHCP, static IP address, configuring routing, using GUI configuration tools, ifup and ifdown, diagnosing network connections, testing connectivity, tracing a route, checking network status , examining network traffic, additional tools. Writing scripts, configuring email, and using databases The shell environment, aliases, shell configuration files, writing scripts, commands, variables, conditional expressions, loops, functions, managing email, choosing email software, securing your email server, managing data with SQL, picking a SQL package, understanding SQL basics, using MySQL. Securing your system Administering network security, super server restrictions, disabling unused servers, administering local security, securing passwords, limiting root access, setting login, process, SUID/SGID files, configuring SSH, using GPG, generating, importing and revoking keys, encrypting and decrypting data, signing messages and verifying signatures.
LPIC-1 training course description This five day hands on course provides a comprehensive coverage of core Linux administration tasks. The course covers generic Linux and is available for any Linux distribution required. It closely follows the LPIC curriculum allowing delegates to achieve the relevant certification if required. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. LPIC-1 training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals (LPI 010) Duration 5 days LPIC-1 training course contents Part I Exam 101 Exploring Linux Command-Line Tools Using a Shell, Shell Configuration, Environment Variables, Getting Help, Streams, Redirection and Pipes, Processing Text Using Filters, Manipulating files, Regular Expressions, grep,sed. Managing Software Package Concepts, Comparison of package formats, RPM, rpm Commands, Yum, Debian Packages, dpkg, apt-cache, apt-get, dselect, aptitude, Converting Between Package Formats, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring Hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing Files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and Editing Files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Part II Exam 102 265 Securing the X Window System Localization, Configuring Basic X Features, X Server Options, Methods of Configuring X, X Display Information, X Fonts, The X GUI Login System, XDMCP Server, Using X for Remote Access, Screen Display Settings, Setting Your Time Zone, Your Locale, Configuring Printing, Conceptualizing the Linux Printing Architecture, Understanding PostScript and Ghostscript, Running a Printing System, Configuring CUPS, Monitoring and Controlling the Print Queue. Administering the System Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring Basic Networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Writing Scripts, Configuring Email, and Using Databases The Shell Environment, Aliases, Shell Configuration Files, Writing Scripts, Commands, Variables, Conditional Expressions, Loops, Functions, Managing Email, Choosing Email Software, Securing Your Email Server, Managing Data with SQL, Picking a SQL Package, Understanding SQL Basics, Using MySQL Securing Your System Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures.
In today’s interconnected world, understanding the roots and risks of extremism is more crucial than ever. Our Extremism Awareness Training Course is designed to offer learners a thoughtful exploration of the ideologies, behaviours, and warning signs linked to radicalisation. By providing valuable insights into the factors that influence extremist thinking, this course aims to promote safer communities through informed vigilance. Delivered entirely online for maximum convenience, the course addresses key concepts with clarity and purpose. Whether you are enhancing your knowledge for personal growth or professional development, this training is an excellent way to stay informed and prepared. Straightforward, engaging, and accessible – it’s learning that genuinely makes a difference. Key Features CPD Accredited FREE PDF + Hardcopy certificate Fully online, interactive course Self-paced learning and laptop, tablet and smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases Course Curriculum Module 1: Introduction to Extremism and Terrorism Module 2: Factors Influencing Extremist Views Module 3: Radicalisation and Recruitment Processes Module 4: Recognising Signs of Radicalisation Module 5: Responding to Terrorism Incidents Module 6: Counter-Terrorism Measures in the UK Learning Outcomes: Analyse factors shaping extremist ideologies. Recognise indicators of potential radicalisation. Implement appropriate responses to terrorism incidents. Understand the UK's counter-terrorism measures. Evaluate the impact of radicalisation on communities. Foster a comprehensive awareness of terrorism prevention strategies. Accreditation This course is CPD Quality Standards (CPD QS) accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Certificate After completing this course, you will get a FREE Digital Certificate from Training Express. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Law enforcement professionals Security personnel Educators and school administrators Social workers and community leaders Government officials Journalists and media professionals Human resources personnel Concerned citizens and community members Career path Intelligence Analyst Counter-Terrorism Researcher Community Outreach Coordinator Policy Analyst (Security and Counter-Terrorism) Crisis Management Specialist Security Consultant Certificates Digital certificate Digital certificate - Included Once you've successfully completed your course, you will immediately be sent a FREE digital certificate. Hard copy certificate Hard copy certificate - Included Also, you can have your FREE printed certificate delivered by post (shipping cost £3.99 in the UK). For all international addresses outside of the United Kingdom, the delivery fee for a hardcopy certificate will be only £10. Our certifications have no expiry dates, although we do recommend that you renew them every 12 months.
Duration 1 Days 6 CPD hours This course is intended for This course is designed for students who already have experience creating Modern SharePoint sites and populating them with content, who want to learn advanced features to extend SharePoint's capabilities, make information easier to find and manage, use SharePoint features to improve governance and compliance, and improve the security of information and services within the SharePoint environment. Overview Create a custom site template to reduce the time spent creating similarly configured SharePoint sites. Configure managed metadata, including custom term sets, content types, and metadata-based navigation. Control access through permissions. Improve overall security of sites, lists, libraries, folders, list items, and documents. Microsoft© SharePoint©, in conjunction with the Microsoft 365? productivity and office automation suite, provides tools to create and manage a corporate intranet, facilitate content sharing and collaboration, and enable users to create, access, store, and track documents and data in a central location. Users who already have experience as SharePoint site members and owners may be ready to move on to more advanced site-building tasks such as using custom site templates, custom themes, applying advanced permissions settings, improving security, and preparing sites to support governance and compliance. Advanced site builders may be ready to undertake more advanced site management tasks, working in conjunction with their SharePoint Administrator to create and use custom site templates, term sets and metadata, manage information governance and compliance, and get deeper into SharePoint security configuration. This course focuses on these advanced site-building and administration tasks. Prerequisites To ensure your success in this course, you should have SharePoint site user skills such as the ability to view and enter data in SharePoint lists and libraries, and to navigate a typical SharePoint site. You should also have intermediate site builder skills such as the ability to create a SharePoint site, apply a site template, populate sites with pages, create lists and libraries, and connect a site to a hub site. NOTE: This course was developed using Microsoft 365 Business Standard edition. If you opt to use one of the Enterprise editions, be sure to key the course activities before you deliver the class so you will be able to anticipate any differences that students might see with the edition you use. Lesson 1: Creating Custom Site Templates Topic A: Prepare a Site Script Topic B: Generate and Use a Custom Site Template Lesson 2: Managing Content Services Topic A: Plan and Configure Managed Metadata Topic B: Create and Manage Content Types Topic C: Use Managed Metadata for Navigation and Filtering Lesson 3: Controlling Access Through Permissions Topic A: Assign Permissions Topic B: Manage Permissions Inheritance Lesson 4: Improving Security Topic A: Manage Access at the Site Level Topic B: Manage Access at the Tenant Level
The Passive Income Mastery – Build Financial Security Course is for anyone who’s ever wondered if money really can work while you sleep. This course takes a straightforward approach to the principles, strategies, and digital avenues that can generate income with minimal day-to-day involvement. From dividend-focused planning to automated online models, it’s all laid out without fluff, fuss, or fancy promises—just solid guidance presented with a sense of clarity and a smirk where appropriate. Whether you’re exploring new income streams or trying to bring structure to ideas already in motion, this course offers a well-paced walkthrough that avoids overcomplication. You’ll discover smart methods to set up digital income routes, learn how they scale, and understand the trade-offs involved—because even passive income doesn’t grow on trees. If you're looking to make informed financial moves that don’t require a second inbox or a small fortune in startup costs, this is a good place to start ticking off your money goals—minus the clichés. Learning Outcomes: Understand the difference between recurring and residual income Identify the various types of recurring and residual income streams Develop strategies to build passive income streams Learn how to leverage time and resources to maximise passive income potential Achieve financial security through passive income The Passive Income Mastery course is designed to provide learners with a comprehensive understanding of how to build passive income streams and achieve financial freedom. Through six modules, learners will gain an understanding of the difference between recurring and residual income, the various types of income streams available, and the strategies for building wealth through passive income. Upon completing this course, learners will be equipped with the tools and knowledge to develop their own passive income streams and achieve financial security. With expert guidance and a comprehensive curriculum, this course is the key to unlocking your financial potential. â±â± Passive Income Mastery - Build Financial Security Course Curriculum Passive Income Masterclass Build Financial Security - Preview Section 01: What Are Recurring Income Streams Section 02: What is Residual Income Section 03: Types of Recurring Income Section 04: Types of Residual Income Section 05: Relationship Between Recurring, Residual and Passive Income Section 06: Building Wealth Strategies Passive Income Masterclass Build Financial Security - Review How is the course assessed? Upon completing an online module, you will immediately be given access to a specifically crafted MCQ test. For each test, the pass mark will be set to 60%. Exam & Retakes: It is to inform our learners that the initial exam for this online course is provided at no additional cost. In the event of needing a retake, a nominal fee of £9.99 will be applicable. Certification Upon successful completion of the assessment procedure, learners can obtain their certification by placing an order and remitting a fee of £9 for PDF Certificate and £15 for the Hardcopy Certificate within the UK ( An additional £10 postal charge will be applicable for international delivery). CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals looking to supplement their income Entrepreneurs seeking to build passive income streams Those interested in achieving financial freedom Individuals who want to learn how to leverage their time and resources Anyone who wants to gain a comprehensive understanding of passive income Career path Entrepreneur Real estate investor Affiliate marketer Stock trader Content creator £20,000 - £150,000+ (depending on career path and experience) Certificates Certificate of completion Digital certificate - £9 You can apply for a CPD Accredited PDF Certificate at the cost of £9. Certificate of completion Hard copy certificate - £15 Hard copy can be sent to you via post at the expense of £15.