• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

211 Courses

Learning Computer and Internet Level 2

4.9(27)

By Apex Learning

Course Overview: About 87% of global consumers use at least one computer or device to access the internet daily. Mastering the essentials of computer and the internet is crucial in today’s digital age. The Learning Computer and Internet Level 2 course provides an in-depth exploration of computer systems, internet functionalities, and software applications, offering you the knowledge to navigate the digital world with ease. This course covers a wide range of computer-related topics, from fundamental operating systems and hardware to advanced concepts like cybersecurity and data protection. With engaging, interactive content, you’ll gain practical skills and insights that enhance your computer proficiency and digital competence. Embark on an enlightening journey through the digital landscape. Enrol in Learning Computer and Internet Level 2 today and elevate your computer skills to thrive in a connected world! Key Features of the Course: FREE Learning Computer and Internet Level 2 CPD-accredited certificate Get a free student ID card with Learning Computer and Internet Level 2 training (£10 applicable for international delivery) Lifetime access to the Learning Computer and Internet Level 2 course materials The Learning Computer and Internet Level 2 program comes with 24/7 tutor support Get instant access to this Learning Computer and Internet Level 2 course Learn Learning Computer and Internet Level 2 training from anywhere in the world The Learning Computer and Internet Level 2 training is affordable and simple to understand The Learning Computer and Internet Level 2 training is entirely online Who is This Course For? This course is designed for individuals seeking to build upon foundational knowledge of computer and the internet. Whether a student, professional, or enthusiast, this course will elevate your proficiency. Learning Outcome Grasp the intricacies of various operating systems and their configurations. Understand the diverse range of applications and their functionalities. Navigate through storage solutions, network components, and software tools. Comprehend the concept of licensing and its implications. Become adept in word processing, spreadsheets, and creating presentations. Learn the terminologies of networking, ensuring smooth connectivity. Safeguard yourself online and understand the fundamentals of digital security. Acquire skills to use browsers, e-mails, and collaborative platforms effectively. Why Enrol in This Course: Enrolling in "Learning Computer and Internet Level 2" is your gateway to a world of opportunities and possibilities. You will develop essential skills in high demand across various industries, making you a valuable asset in the job market. Our course is top-reviewed, recently updated to reflect the latest trends, and aligns with the evolving digital landscape, ensuring you stay ahead in the digital race. Requirements: Enrolling in this Learning Computer and Internet Level 2 course requires a basic understanding of computer usage. No prior technical knowledge is needed, making it accessible to beginners and those looking to refresh their skills. Career Path: Upon completing this Learning Computer and Internet Level 2 course, you'll be well-equipped to pursue various professions in the digital domain. Here are seven course-related professions in the UK, along with their average salaries: IT Support Specialist: £25,000 - £40,000 per year Data Entry Clerk: £18,000 - £25,000 per year Digital Marketing Assistant: £20,000 - £30,000 per year Office Administrator: £18,000 - £25,000 per year Cybersecurity Analyst: £30,000 - £50,000 per year Web Developer: £25,000 - £45,000 per year Database Administrator: £30,000 - £50,000 per year Certification: Upon completing the Learning Computer and Internet Level 2 course, learners will be awarded a CPD certificate, validating their enhanced knowledge of computer and the Internet. Course Curriculum 6 sections • 81 lectures • 22:23:00 total length •What is an Operating System: 00:48:00 •Configuring the Operating System: 00:06:00 •What is an Application: 00:10:00 •Using Control Panel: 00:18:00 •Hardware and Peripherals: 00:07:00 •Storage: 00:12:00 •Connectivity Devices: 00:05:00 •Network Components: 00:09:00 •Software and Concepts: 00:11:00 •Licensing: 00:06:00 •Using Software: 00:07:00 •Software Tools: 00:10:00 •Software: 00:14:00 •Hardware, Devices, and Peripherals: 00:05:00 •Backup and Restore: 00:03:00 •Application Features: 01:21:00 •Working with Word Processing: 00:44:00 •Working with Spreadsheets: 00:49:00 •Making a Presentation: 01:08:00 •Databases: 00:34:00 •Collaboration: 00:03:00 •Course Introduction: 00:02:00 •Web Browsers: 00:46:00 •Networking Terminology: 00:35:00 •E-mail: 00:38:00 •Communicating in the Modern World: 00:14:00 •Protecting Yourself: 00:15:00 •Web Searching: 00:31:00 •Protecting Yourself: 00:31:00 •Identify Components of a Personal Computer IPU: 00:08:00 •Sign In to Windows 8: 00:07:00 •Signing In to Windows 8 and Managing Tiles: 00:08:00 •Navigate the Start Screen: 00:18:00 •Using the Account ID Menu: 00:02:00 •Access and Identify the Charms: 00:03:00 •Viewing the Charms: 00:02:00 •Modern Apps and Common Navigation Features: 00:03:00 •Navigating a Modern App: 00:07:00 •Multitasking with Apps: 00:05:00 •Working with Multiple Apps: 00:05:00 •Navigate the Desktop IPU: 00:07:00 •Navigating The desktop: 00:07:00 •Manage Files and Folders with File Explorer IPU: 00:09:00 •Managing Files and Folders: 00:15:00 •Elements of a Desktop Window: 00:12:00 •Working with the Elements of a Desktop Window: 00:10:00 •Creating and Modifying Files with Wordpad: 00:14:00 •Printing a Document: 00:05:00 •Navigate Internet Explorer 10: 00:08:00 •Navigating Internet Explorer 10: 00:09:00 •Browse the Web: 00:12:00 •Using Internet Explorer and Share: 00:08:00 •Customize the Start Screen: 00:07:00 •Creating Groups on the Start Screen: 00:03:00 •Changing PC Setting: 00:07:00 •Customize the Desktop IPU: 00:09:00 •Personalizing the Desktop: 00:11:00 •Set Privacy Levels and Passwords: 00:05:00 •Changing Your Password: 00:05:00 •Use Windows Defender IPU: 00:05:00 •Changing Windows Defender Settings: 00:06:00 •Store and Share Files with SkyDrive: 00:03:00 •What Makes Windows 10 Different?: 00:14:00 •Primary Feature Overview: 00:14:00 •Navigating and Using Windows 10: 00:36:00 •Course Overview: 00:13:00 •Types of Security Threats: 00:29:00 •Social Engineering: 00:30:00 •Identity Theft: 00:29:00 •Data Classification: 00:28:00 •Types of Classifications: 00:18:00 •Protecting Your Digital Information: 00:45:00 •Password Management: 00:13:00 •Malware: 00:17:00 •Software Detection: 00:28:00 •Security from End-to-End: 00:26:00 •Secure E-mail Use: 00:21:00 •Secure Web Browsing: 00:29:00 •Piracy: 00:16:00 •Security Policies: 00:18:00 •Moving Forward: 00:12:00

Learning Computer and Internet Level 2
Delivered Online On Demand23 hours
£9.99

Perfect Parenting Skills Training

By iStudy UK

Raise your Child the best way you possibly can Raising healthy children sounds pretty simple: Good nutrition and 60 minutes of physical activity a day protects kids from obesity, diabetes, and a host of chronic diseases later in life. However it is more complicated than that. So learn how to effectively raise your child in a healthy way with this useful course. These days though, health-conscious parents have to compete against any number of unhealthy temptations. One hour of physical activity a day may seem like a lot. But those 60 minutes can happen in short bursts throughout the day. This ensure that your child is active and having healthy exercise regularly. Different parents support their kids' physical activity in different ways. What matters most is that your kids know how much you value and support their active pursuits. So learn all you can with this course and keep your children healthy and active. Make yourself a better by keeping an eye on your children's activity and whether they are living a healthy life. Course Highlights Perfect Parenting Skills Training is an award winning and the best selling course that has been given the CPD Certification & IAO accreditation. It is the most suitable course anyone looking to work in this or relevant sector. It is considered one of the perfect courses in the UK that can help students/learners to get familiar with the topic and gain necessary skills to perform well in this field. We have packed Perfect Parenting Skills Training into several modules for teaching you everything you need to become successful in this profession. To provide you ease of access, this course is designed for both part-time and full-time students. You can become accredited in just 20/30 hours and it is also possible to study at your own pace. We have experienced tutors who will help you throughout the comprehensive syllabus of this course and answer all your queries through email. For further clarification, you will be able to recognize your qualification by checking the validity from our dedicated website. Why You Should Choose Perfect Parenting Skills Training Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? Perfect Parenting Skills Training is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our Perfect Parenting Skills Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. Module 1: Raising Children Raising Children Who Succeed FREE 01:00:00 How Do We Define Success? FREE 01:00:00 What The Children Don't Need 01:00:00 What They Do Need 01:00:00 The Legacy of Books 01:00:00 The Power of Role Models 01:00:00 Teaching Social Skills 01:00:00 Money, Money, Money 01:00:00 Module 2: Child Psychology The Basics On Nurturing Your Child 00:30:00 Build Your Child's Self Esteem 01:00:00 Catch The Good And Not Always The Bad 01:00:00 Demonstrate The Love Is Unconditional 01:00:00 Make Rules And Be Consistent 01:00:00 Make Special Time For Your Child 00:30:00 Always Set An Example 01:00:00 Don't Dominate A Conversation 00:30:00 Learn To Be A Good Communicator 01:00:00 An Unnourished Child has A Long Road Ahead 00:30:00 Module 3: Social Behavior Training The Three Modes of Management FREE 01:00:00 What Are Gentle Measures? FREE 01:00:00 There Must be Authority 01:00:00 Gentle Punishment Of Disobedience 01:00:00 The Philosophy of Punishment Action 01:00:00 Rewarding Obedience 01:00:00 The Art of Training Delivery 01:00:00 Methods Exemplified 03:00:00 Della and The Dolls 01:00:00 The Child With The Parent 01:00:00 The Parent With The Child 01:00:00 Difference Between Commendation and Encouragement 01:00:00 Faults of Immaturity 01:00:00 Activities for kids Early Learning 01:00:00 The Role of Imagination in Children`s development 01:00:00 Truth and Falsehood 01:00:00 Judgement and Reasoning 01:00:00 Wishes and Requests 01:00:00 Children`s Questions 01:00:00 The Use of Money 01:00:00 Corporal Punishment 01:00:00 Gratitude in Children 01:00:00 Religious Training 01:00:00 Conclusion 00:15:00 Module 4: Child Safety Online Introduction to Child Safety 00:30:00 Warning Signs 01:00:00 Parental Monitoring 00:30:00 Monitoring and Protection Software 01:00:00 Tips to Avoid Sexual Predators 00:30:00 The Truth About Online Content 00:30:00 Identity Theft 00:30:00 Spyware And Malware 01:00:00 The Children's Online Privacy Protection Act (COPPA) 00:30:00 Privacy Policy 00:15:00 Social Networking Safety 01:00:00 Additional Rules For Child Safety Online 01:00:00 Warnings For Children Online 00:15:00 Additional Tips For Parents 01:00:00 Module 5: Healthy Lifestyle for Children Strong Kids Basics FREE 00:30:00 Child Obesity Is A Serious Issue FREE 00:30:00 The Benefits Of An Active Lifestyle 00:30:00 Shut Off The TV And Video Games 01:00:00 Outdoor Activities For Your Kids 00:30:00 Keep An Eye On Nutrition 01:00:00 Final Exam Mock Exam-Perfect Parenting Skills Training 00:30:00 Mock Exam Final Exam-Perfect Parenting Skills Training 00:30:00

Perfect Parenting Skills Training
Delivered Online On Demand3 days
£25

VEEAM-VMCE Availability Suite v10.0: Configuration and Management

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v10 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to their own environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Install and configure Veeam Availability Suite into their environment, ensuring data is protected effectively. Adapt with an organization's evolving technical, business and regulatory needs. Ensure recovery is possible, effective, efficient, secure and compliant with business and legal requirements. Provide visibility of the business data assets, and produce effective reports and dashboards to monitor performance and risks. Conduct basic troubleshooting and analysis of their Veeam Availability Suite environment. This three-day, technical deep dive Veeam© Availability Suite? v10: Configuration and Management training course is focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v10 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios Building Backup Capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including NAS Backup jobs. Explore different tools and methods, such as BitLooker? and Deduplication, to maximize environment performance Global Settings and their usage to prevent production performance bottlenecks, encrypt network traffic data and control network jurisdiction Restoring from Backup Identify and describe the different restore tools and their features. Ensure you have the confidence to use the correct restore tool at the right time Using Secure Restore to prevent the restoration of malware Disaster recovery from backup, respond accordingly to a variety of real-world recovery scenarios Backup Copy Jobs Simple vs Advanced Backup Copy Jobs, how to create and modify them using best practices to ensure efficient recovery Utilizing tape jobs, how to create and modify Replication Identify and describe the options available for replication, the use cases and impacts of using Create, modify and delete replication jobs, outline considerations to ensure success Failover Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica, respond accordingly to a variety of real-world recovery scenarios Advanced Repository Capabilities Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Ensure scalability by integrating off-site S3 storage Ensure compatibility with existing deduplication appliances Testing Backup and Replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure Veeam DataLabs? and setup sandbox environments based on backup, replicas and storage snapshots Using Veeam DataLabs Staged Restore to manage and comply with General Data Protection Regulation (GDPR) legislation before releasing restores to production Veeam Backup Enterprise Manager Manage multiple Veeam Backup & Replication? installations from a single web console, maintaining a view of your entire virtual environment, ensuring data protection of ROBO and Enterprise environments. Create user and group roles, delegate workloads whilst maintaining data control Enable encryption password loss protection, helping to restore encrypted data in case of lost or forgotten encryption passwords Veeam ONE Monitor your Virtual, Physical and Cloud environments with Veeam ONE? and assess the different views available Configure Veeam ONE for your specific technical and business requirements, describe the alarm options available and how to customize their usage Set up, use and customize Veeam ONE Reporter, creating the reports and dashboards you require technically and for the business Support Locate, migrate or restore backup configuration Identify and locate appropriate support resources Troubleshooting methodology to identify, isolate and remediate support issues Additional course details: Nexus Humans VEEAM-VMCE Availability Suite v10.0: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VEEAM-VMCE Availability Suite v10.0: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VEEAM-VMCE Availability Suite v10.0: Configuration and Management
Delivered OnlineFlexible Dates
Price on Enquiry

Internet of Things (IoT)

4.9(27)

By Apex Learning

**Don't Spend More; Spend Smarter** Boost Your Career with Apex Learning and Get Noticed By Recruiters in this Hiring Season! Get Hard Copy + PDF Certificates + Transcript + Student ID Card worth £160 as a Gift - Enrol Now Give a compliment to your career and take it to the next level. This Internet of Things (IoT) will provide you with the essential knowledge to shine in your professional career. Whether you want to develop skills for your next job or elevate skills for your next promotion, this Internet of Things (IoT) will help you keep ahead of the pack. The Internet of Things (IoT) incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your expertise and essential knowledge, which will assist you in reaching your goal. Further, this Internet of Things (IoT) will add extra value to your resume to stand out to potential employers. Throughout the programme, it stresses how to improve your competency as a person in your chosen field while also outlining essential career insights in this job sector. Consequently, you'll sharpen your knowledge and skills; on the other hand, see a clearer picture of your career growth in future. By the end of the Internet of Things (IoT), you can equip yourself with the essentials to keep you afloat in the competition. Along with this Internet of Things (IoT) course, you will get 10 premium courses, an original Hardcopy, 11 PDF Certificates (Main Course + Additional Courses) Student ID card as gifts. This Internet of Things (IoT) Bundle Consists of the following Premium courses: Course 01: Internet of Things Course 02: Internet of Things Hacking Course 03: Automation Course 04: Learning Computers and Internet Level 2 Course 05: AWS Essentials Course 06: Encryption Course 07: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 08: CompTIA Networking - Level 4 Course 09: Network Security Level 2 Course 10: Cyber Security Incident Handling and Incident Response Course 11: Data Center Training Essentials: General Introduction So, enrol now to advance your career! Benefits you'll get choosing Apex Learning for this Internet of Things (IoT): Pay once and get lifetime access to 11 CPD courses Free e-Learning App for engaging reading materials & helpful assistance Certificates, student ID for the title course included in a one-time fee Free up your time - don't waste time and money travelling for classes Accessible, informative modules designed by expert instructors Learn at your ease - anytime, from anywhere Study the course from your computer, tablet or mobile device CPD accredited course - improve the chance of gaining professional skills How will I get my Certificate? After successfully completing the course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) Curriculum of Internet of Things (IoT) Bundle Course 01: Internet of Things Course Agenda Unit 01: Introduction Unit 02: Raspberry Pi Installation Unit 03: Getting Around Raspberry Pi Unit 04: Raspberry Pi GPIO Output Unit 05: Output from Raspberry Pi Unit 06: Inputs to Raspberry Pi Unit 07: Sensor Interfacing Unit 08: Interfacing of I2C Based BMP180 Sensor with Raspberry Pi Unit 09: Internet of Things with Microsoft Azure Unit 10: IoT with Thingspeak Unit 11: Learn a new platform, Adafruit IO Unit 12: IOT Security Course 02: Internet of Things Hacking Module 01: IoT Part 1 Module 02: IoT Part 2 Module 03: IoT Hacking Tools and Technique Module 04: IoT Hacking Tools and Technique Part 2 Module 05: IoT Scenario Part 1 Module 06: IoT Scenario Part 2 Module 07: Smart Devices Module 08: AWS Basics Course 03: Automation Module 01: Introduction Module 02: Overview of Automation Concepts and Tools Module 03: Common Automation Workflows and Campaigns Module 04: Build Your First Workflow from Scratch Course 04: Cloud Computing / CompTIA Cloud+ (CV0-002) Section 01: What You Need to Know Section 02: Introducing the Cloud Section 03: System Requirements for Cloud Deployments Section 04: Cloud Storage Section 05: Cloud Compute Section 06: Cloud Networking Section 07: Cloud Security Section 08: Migrating to the Cloud Section 09: Maintaining Cloud Solutions Section 10: Troubleshooting Cloud Solutions Course 05: AWS Essentials Section 01: AWS Foundations and Services Section 02: AWS Security and Costs Course 06: Encryption Section 01: Introduction Section 02: Basics of Common Encryption Section 03: Technical Aspects of Encryption Section 04: AES Basic Tech Demo Section 05: File and System Encryption Section 06: Conclusion Course 07: Basics Blockchain Section 01: Introduction Section 02: Underlying technologies of Blockchain Section 03: Advantages of Blockchain Section 04: How Blockchain works Section 05: Types of blockchain and bitcoin Section 06: Libra [Facebook's cryptocurrency] Section 07: Ethereum [The revolution in Blockchain technology] Section 08: Forming Blockchain Solutions Course 08: Cisco ASA Firewall Training Lecture 01: Common Network Security Terms Lecture 02: Confidentiality, Integrity, Availability. Lecture 03: Security Concepts & Terms Lecture 04: Intro to Firewall Technologies Lecture 05: About Cisco ASA Firewall Lecture 06: Install Cisco ASAv Firewall in GNS3 Lecture 07: Install ASA 9 Cluster, Security Context enable in GNS3. Lecture 08: Install Cisco ASAv Firewall on EVE-NG Lecture 09: Install Cisco ASAv Firewall on VMWare Workstation. Lecture 10: Cisco ASA Firewall Basic Configuration Commands. Lecture 11: Device Management Cisco ASA Console Lecture 12: Device Management Cisco ASA Telnet Lecture 13: Device Management Cisco ASA SSH Lecture 14: Device Management Cisco ASA ASDM Lecture 15: Device Management Cisco ASA TFTP Lecture 16: Device Management Cisco ASA FTP Lecture 17: Security Levels and Zoning in Cisco ASA Lecture 18: Introduction to Routing & Static Routing Lecture 19: Network Route Configuration in Cisco ASA Lecture 20: Host Route Configuration in Cisco ASA Lecture 21: Default Route Configuration in Cisco ASA Lecture 22: Floating Static Route Configuration in ASA Lecture 23: IP SLA (Service Level Agreement) in ASA Lecture 24: Dynamic Routing Protocol RIP version 2 Lecture 25: Dynamic Routing Protocol EIGRP Configuration Lecture 26: Dynamic Routing Protocol OSPF Configuration Lecture 27: Routing Protocols Redistribution Lecture 28: Implement Access Control Lists in ASA Lecture 29: Configure & Verify Extended ACLs in ASA Lecture 30: Configure & Verify Infrastructure ACLs Lecture 31: Configure & Verify Time-Based ACLs Lecture 32: Configure & Verify Standard ACLs Lecture 33: Configure & Verify Object Groups ACLs Lecture 34: Configure & Verify DHCP Server in ASA Lecture 35: Configure & Verify DHCP Relay in ASA Lecture 36: Introduction & Theory of NAT and PAT ASA Lecture 37: Creating Lab Topology for NAT & PAT Lecture 38: Static NAT in Cisco ASA Lecture 39: Static PAT in Cisco ASA Lecture 40: Dynamic NAT in Cisco ASA Lecture 41: Dynamic PAT in Cisco ASA Lecture 42: Identity NAT in Cisco ASA Lecture 43: Policy NAT in Cisco ASA Lecture 44: Modular Policy Framework (MPF) Lecture 45: Transparent Firewall Lecture 46: ASDM Walkthrough Lecture 47: Security Contexts (Multi-Contexts) Lecture 48: Redundancy, HA, Active/Standby Failover Lecture 49: Packet Capture in Cisco ASA Firewall Lecture 50: Packet Tracer in Cisco ASA Firewall Lecture 51: Syslog Logging in Cisco ASA Firewall Lecture 52: Introduction and Concept of Cryptography & Terminologies Lecture 53: Introduction & Concept of Symmetric & Asymmetric Encryption Lecture 54: Introduction and Concept of Cryptography Hash (SHA, MD5) Lecture 55: Introduction and Concept of Virtual Private Network VPN Lecture 56: Introduction and Concept of IPSec Protocols Features Lecture 57: Introduction and Concept of Diffie-Hellman (DH) And Much More... Course 09: Network Security Level 2 Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security Course 10: Cyber Security Level 3 Module 01: Getting Started Module 02: Cyber security Fundamentals Module 03:Types of Malware Module 04: Cyber Security Breaches Module 05: Types of Cyber Attacks Module 06: Prevention Tips Module 07: Mobile Protection Module 08: Social Network Security Module 09: Prevention Software Module 10: Critical Cyber Threats Module 11: Defense Against Hackers Module 12: Closing Course 11: Data Center Training Essentials: General Introduction Module 01: Data Center Introduction Module 02: Data Center Reliability Module 03: Data Center Equipment Module 04: Data Center White Space Module 05: Data Center Support Spaces Module 06: Data Center Security, Safety, Networks and IT CPD 120 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Internet of Things (IoT) bundle. Persons with similar professions can also refresh or strengthen their skills by enrolling in this course. Students can take this course to gather professional knowledge besides their study or for the future. Requirements Our Internet of Things (IoT) is fully compatible with PC's, Mac's, laptops, tablets and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones, so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course; it can be studied in your own time at your own pace. Career path Having this various expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (Internet of Things) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

Internet of Things (IoT)
Delivered Online On Demand
£53

Learn Ethical Hacking From A-Z: Beginner To Expert

4.9(27)

By Apex Learning

Overview This comprehensive course on Learn Ethical Hacking From A-Z: Beginner To Expert will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Learn Ethical Hacking From A-Z: Beginner To Expert comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Learn Ethical Hacking From A-Z: Beginner To Expert. It is available to all students, of all academic backgrounds. Requirements Our Learn Ethical Hacking From A-Z: Beginner To Expert is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 17 sections • 105 lectures • 11:51:00 total length •Course Overview: 00:08:00 •About Your Instructors: 00:03:00 •Section Overview: 00:03:00 •Current Cybersecurity Market: 00:09:00 •The 3 Types of Hackers: 00:05:00 •The 4 Elements of Security: 00:04:00 •Ethical Hacker Terminology: 00:04:00 •Common Methods of Hacking: 00:08:00 •Cybersecurity & Ethical Hacking Overview: 00:03:00 •Ethical Hacking vs Penetration Testing: 00:06:00 •Job Opportunities in Cybersecurity: 00:01:00 •Who is This Course is For?: 00:01:00 •Networking Section Overview: 00:12:00 •How Data Travels Across The Internet: 00:02:00 •Understanding Ports and Protocols: 00:08:00 •Understanding IP Addresses: Public & Private: 00:02:00 •What Are Subnets?: 00:03:00 •The Average Network vs Remote Based: 00:06:00 •Hacking Lab Section Overview: 00:09:00 •Understanding Virtual Machines: 00:03:00 •Setup Your Kali Linux Machine: 00:10:00 •VN Setup & Testing Vulnerable Systems: 00:23:00 •Linux+Python+Bash+Powershell Section Overview: 00:06:00 •Linux Basics: 00:11:00 •Working With Directories & Moving Files: 00:03:00 •Installing & Updating Application Files: 00:02:00 •Linux Text Editors: 00:04:00 •Searching For Files: 00:02:00 •Bash Scripting Basics: 00:09:00 •Python Basics: 00:11:00 •Remaining Anonymous Section Overview: 00:06:00 •TOR Browser Overview: 00:06:00 •Anonsurf Overview: 00:03:00 •Changing Mac Addresses: 00:03:00 •Using a Virtual Private Network/Server (VPN, VPS): 00:04:00 •WiFi Hacking Section Overview: 00:06:00 •WiFi Hacking System Setup: 00:09:00 •WEP Hacking Attack #1: 00:09:00 •WEP Hacking Attack #2: 00:04:00 •WPA/WPA2 Hacking: 00:10:00 •Reconnaissance Section Overview: 00:04:00 •Passive Recon vs Active Recon: 00:01:00 •Recon-ng Overview: 00:15:00 •Whois Enumeration: 00:02:00 •DNS Enumeration Overview: 00:02:00 •Netcraft.com DNS Information: 00:03:00 •Google Hacking: 00:05:00 •Shodan.io Overview: 00:02:00 •Securityheaders.com (Analyze HTTPS Headers of website): 00:02:00 •Ssllabs.com/ssltest (Look for SSL issues on website): 00:02:00 •Pastebin.com (Sensitive Information): 00:01:00 •NMAP Port Scanning (Discover open ports, OS, Services, Vulnerabilities, etc.): 00:15:00 •Netcat Overview + SMB/NFSEnumeration: 00:14:00 •Nikto & Sparta Web Application Scanner: 00:06:00 •SMPT Enumeration + Nessus/Openvas Scanners: 00:05:00 •Launching Attacks Overview: 00:10:00 •Analyzing Information Gathered: 00:04:00 •Taking Advantage of Telenet: 00:06:00 •Searching & Understanding Exploits: 00:06:00 •Copy Exploits From Searchsploit: 00:03:00 •Understanding Exploits: 00:04:00 •Launching Exploits: 00:24:00 •Brute Force Attacks: 00:07:00 •How To Crack Passwords: 00:04:00 •ARP Spoofing Overview: 00:21:00 •Introduction To Cryptography: 00:14:00 •Post Exploitation Section Overview: 00:03:00 •Privilege Escalation: 00:29:00 •Transferring Files in/out of Victim, Creating Custom Malware + Evading Antivirus: 00:27:00 •Installing a Keylogger: 00:03:00 •Installing a Backdoor: 00:07:00 •Website & Web Application Hacking Overview: 00:06:00 •Web Application Scanning: 00:08:00 •Directory Buster Hacking Tool: 00:03:00 •Nikto Web App Hacking Tool: 00:03:00 •SQLmap and SQL Ninja Overview: 00:01:00 •How To Execute Brute Force Attacks: 00:13:00 •Using Command Injection: 00:03:00 •Malicious File Upload: 00:10:00 •Local & Remote File Inclusion: 00:10:00 •SQL Injection Overview: 00:19:00 •Using Cross Site Request Forgery: 00:11:00 •Cross Site Scripting Overview: 00:12:00 •Mobile Phone Hacking Section Overview: 00:11:00 •Mobile Attack Vectors: 00:02:00 •Mobile Hacking Using URLs: 00:02:00 •Jail Breaking and Rooting Considerations: 00:01:00 •Privacy Issues (Geo Location): 00:01:00 •Mobile Phone Data Security: 00:02:00 •Getting Your Name Out There Section Overview: 00:02:00 •Building A Brand: 00:09:00 •Personal Branding: 00:13:00 •Setup Your Website and Blog: 00:11:00 •Writing a Book: 00:10:00 •Starting a Podcast: 00:08:00 •Networking Overview: 00:06:00 •Making Money Section Overview: 00:02:00 •Bug Bounty Programs: 00:04:00 •How To Start Freelancing: 00:11:00 •How To Start Client Consulting: 00:09:00 •Potential Salary & Cybersecurity Roadmap: 00:10:00 •Books Recommendations: 00:03:00 •Places to Practice Hacking for Free: 00:03:00 •Resources - Learn Ethical Hacking From A-Z: Beginner To Expert: 00:00:00 •Assignment - Learn Ethical Hacking From A-Z: Beginner To Expert: 00:00:00

Learn Ethical Hacking From A-Z: Beginner To Expert
Delivered Online On Demand11 hours 51 minutes
£12

Veeam Certified Architect v11 (VMCE11-A)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. This includes Senior Engineers and Architects responsible for creating architectures for Veeam environments. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. Design and architect a Veeam solution in a real-world environment Describe best practices, review an existing infrastructure and assess business/project requirements Identify relevant infrastructure metrics and perform component (storage, CPU, memory) quantity sizing Provide implementation and testing guidelines in line with designs Innovatively address design challenges and pain points, matching appropriate Veeam Backup & Replication features with requirements Veeam Certified Architect is the highest level of Veeam technical certifications. Engineers who complete both Veeam Availability Suite v11: Configuration and Management and Veeam Backup & Replication V11: Architecture and Design programs (courses + exams) will be granted with the 'Veeam Certified Architect' (VMCA) title by Veeam. Introduction Veeam Availability Suite v11: Configuration and Management Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? Configuration backup Locate, migrate or restore backup configuration Introduction Veeam Backup & Replication v11: Architecture and Design Review the architecture principles Explore what a successful architecture looks like Review Veeam?s architecture methodology Discovery Analyze the existing environment Uncover relevant infrastructure metrics Uncover assumptions and risks Identify complexity in the environment Conceptual design Review scenario and data from discovery phase Identify logical groups of objects that will share resources based on requirements Create a set of detailed tables of business and technical requirements, constraints, assumptions and risks Review infrastructure data with each product component in mind Create high level design and data flow Logical design Match critical components and features of VBR with requirements Create logical groupings Determine location of components and relationship to logical grouping Aggregate totals of component resources needed per logical grouping Calculate component (storage, CPU, memory) quantity sizing Physical/tangible design Convert the logical design into a physical design Physical hardware sizing Create a list of physical Veeam backup components Implementation and Governance Review physical design and implantation plan Review Veeam deployment hardening Describe the architect?s obligations to the implementation team Provide guidance on implementation specifics that relate to the design Validation and Iteration Provide framework for how to test the design Further develop the design according to a modification scenario

Veeam Certified Architect v11 (VMCE11-A)
Delivered OnlineFlexible Dates
Price on Enquiry

CompTIA ITF+ (FCO-U61)

4.5(3)

By Studyhub UK

The CompTIA ITF+ (FCO-U61) course provides foundational knowledge and skills in IT fundamentals. It covers various aspects of computer usage, hardware, data storage, operating systems, network connectivity, security, troubleshooting, and software development. This course is designed to equip learners with a comprehensive understanding of IT concepts to prepare for entry-level IT roles. Learning Outcomes: Acquire an understanding of diverse computer uses in various scenarios. Gain insights into the components and operations of system hardware. Develop proficiency in managing device ports, peripherals, and mobile configurations. Enhance knowledge in data storage, file management, and application software usage. Master the essentials of network connectivity, IT security, and computer maintenance. Why buy this CompTIA ITF+ (FCO-U61)? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Certification After studying the course materials of the CompTIA ITF+ (FCO-U61) there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? Individuals starting their journey in the IT field. Students seeking foundational knowledge in computing. Career changers aiming to enter the IT sector. Aspiring IT professionals desiring a comprehensive understanding of computers. Individuals interested in acquiring a broad IT skill set. Prerequisites This CompTIA ITF+ (FCO-U61) does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA ITF+ (FCO-U61) was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path IT Support Specialist: £20,000 - £30,000 per annum Network Administrator: £25,000 - £40,000 per annum Systems Analyst: £30,000 - £50,000 per annum Database Administrator: £30,000 - £50,000 per annum Software Developer: £25,000 - £45,000 per annum Cybersecurity Analyst: £30,000 - £55,000 per annum Course Curriculum Section 01: How People Use Computers Introduction to IT Fundamentals 00:03:00 The Case for Computer Literacy 00:03:00 Features Common to Every Computing Device 00:02:00 Common General-Purpose Computing Devices 00:02:00 Networks of Computing Devices 00:04:00 Remotely-Accessed Computer Systems 00:04:00 Specialized Computer Systems 00:02:00 Specialty I/O Devices 00:01:00 Section 02: System Hardware CPUs 00:03:00 Passive and Active Cooling 00:03:00 RAM and Active Memory 00:05:00 Motherboards 00:03:00 Power Supplies 00:03:00 AMA - Ask Me Anything about System Hardware 00:07:00 Section 03: Device Ports and Peripherals Ports and Connectors 00:03:00 General Use I/O Devices 00:02:00 AMA - Ask Me Anything about I/O, Ports and Peripherals 00:07:00 Section 04: Data Storage and Sharing Basics of Binary 00:04:00 Storage Technologies 00:04:00 Mass Storage Variation 00:03:00 AMA - Ask Me Anything about Data Storage and Sharing 00:07:00 Section 05: Understanding Operating Systems Operating System Functions 00:04:00 Operating System Interfaces 00:05:00 AMA - Ask Me Anything about Understanding OS's 00:05:00 Section 06: Setting Up and Configuring a PC Preparing the Work Area 00:02:00 Setting up a Desktop PC 00:01:00 Completing PC Setup 00:04:00 AMA - Ask Me Anything about Setting up and Configuring a PC 00:09:00 Section 07: Setting Up and Configuring a Mobile Device Personalizing a Tablet 00:08:00 AMA - Ask Me Anything about Mobile Devices Part 1 00:07:00 AMA - Ask Me Anything about Mobile Devices Part 2 00:07:00 Section 08: Managing Files File Management Tools 00:02:00 File Manipulation 00:06:00 Backups 00:03:00 AMA - Ask Me Anything about Managing Files 00:08:00 Section 09: Using and Managing Application Software Walking Survey of Applications 00:03:00 Managing Applications 00:03:00 Applications and Extensions 00:04:00 AMA - Ask Me Anything about Working with Applications 00:07:00 Section 10: Configuring Network and Internet Connectivity Wi-Fi Setup 00:06:00 Going High Speed 00:03:00 Setting Up and Sharing Printers 00:05:00 AMA - Ask Me Anything about Networks and Internet Connectivity Part 1 00:07:00 AMA - Ask Me Anything about Networks and Internet Connectivity Part 2 00:05:00 Section 11: IT Security Threat Mitigation Physical Security 00:05:00 Dealing with Malware 00:03:00 Password Management 00:03:00 Clickworthy 00:03:00 Perils of Public Internet 00:02:00 AMA - Ask Me Anything about IT Threat Mitigation Part 1 00:07:00 AMA - Ask Me Anything about IT Threat Mitigation Part 2 00:08:00 Section 12: Computer Maintenance and Management Power Management 00:03:00 Cleaning and Maintaining Computers 00:03:00 Trash it or Stash it? 00:02:00 AMA - Ask Me Anything about Computer Maintenance and Management 00:11:00 Section 13: IT Troubleshooting Troubleshooting 00:03:00 AMA - Ask Me Anything about Troubleshooting Computers Part 1 00:10:00 AMA - Ask Me Anything about Troubleshooting Computers Part 2 00:11:00 Section 14: Understanding Databases Introduction to Databases 00:06:00 Database Details 00:06:00 AMA - Ask Me Anything about Databases 00:06:00 Section 15: Developing and Implementing Software Introduction to Programming 00:04:00 Programming with a PBJ Sandwich 00:08:00 AMA - Ask Me Anything about Programming 00:04:00

CompTIA ITF+ (FCO-U61)
Delivered Online On Demand4 hours 57 minutes
£10.99

Digital Functional Skills Entry Level 3 - Online Course and Exam

By Lead Academy

This Digital Functional Skills Entry Level 3 Course will set you up with the relevant digital skills and knowledge and provide you with a competitive advantage in your career, making you stand out from all other applicants and employees. Course Highlights Course Type: Online Learning Accreditation: NCFE Qualification: Nationally Recognised Qualification Study Materials: High-Quality E-Learning Study Materials Assessment: Externally Graded and Verified | Center-Based Online or Online Remote Exam Guided Learning: 55 hours Access: 1 Year Access Certificate: Certificate upon completion of the official exam (hard copy) Tutor Support: Tutor Support Available Customer Support: 24/7 live chat available Digital Functional Skills Entry Level 3 - Online Course This course is governed by Ofqual, and accredited by NCFE, making it a nationally recognised credential that will improve your CV while helping you stand out from the rest of the applicants.  Subject content of this course is based on theNational Standards for Digital Functional Skills to increase comparability across awarding organisations. This course will assist you in developing the skills needed to use electronic devices, manage and secure information, engage in online communication and transactions, use data protection tools, and edit a variety of digital media, including photographs, audio files, videos, etc.  Upon successful completion of this course, you will be equipped with the required digital skills to operate confidently, effectively and independently in education, work and everyday life. EXAM Booking & Results Details You can decide the exam date and place according to your convenience. Awarding Body On-Screen Exam in Centre Remote Online Exam – From Home Results NCFE Book within 24 Hours Book within 2 working days Get results in only 7 days *Offline examinations will be held at our Swindon and London centres. Please contact us for more information. The new assessment and result dates by NCFE is: (Only applicable if you are attending the exam in between the following assessment date). Delivery mode: On-screen and RI Assessment date to and from: 23/09/2024 – 1/11/2024 Results release: 8/11/2024 (Note that this only applies to the mentioned exam type and if you book the exam during the dates mentioned above. Also, this will not affect the schedule of the other exam types and results.) How This Course will work for you? Initial Assessment: Determines levels Diagnostic Assessment: Identifies skill gaps and produces an individual learning plan Learning Resources: Develop underpinning knowledge and fill skill gaps identified Progress Check: Assesses progress at the end of the module You will get useful resources that are designed to improve your essential skills, knowledge and understanding of the digital knowledge required to pass the assessments.  Our online learning portal is fully compatible with desktop, tablet and mobile devices and can be accessed from anywhere. Aims & Outcomes Develop a favourable attitude toward the usage of digital skills as well as increased confidence and fluency in their use Use your knowledge and abilities to accomplish tasks and activities in order to exhibit them Develop an appreciation of the importance of digital skills in the workplace and in regular day-to-day activities Recognise the value of digital skills in both the profession and in everyday life Acquire a foundation for further study, work, and life. Who should take this course? This Digital Functional Skills Entry Level 3 Course can be taken by: People of all ages (there is no age limit). Anyone willing to enhance their practical digital functional skills Anyone looking to meet the entry requirement of your desired university Anyone looking to secure an apprenticeship Anyone looking to improve their job outlook with an added expertise Entry Requirements Students or professionals of any age group hailing from any academic background can take this Digital Functional Skills Entry Level 3 Course to acquire practical skills in ICT; no prior knowledge, skills or qualifications are required to enrol.  About Official Exam, Assessment Students are required to undergo a wide range of interactive online assessments and exams in between lectures and at the end of each module to evaluate the knowledge and skills that they are learning. These interactive assessment sessions measure the number of skills and knowledge that you are absorbing after the completion of each module and evaluate your potential to demonstrate these digital skills practically. You can also keep track of your score and progress at the end of the module. Towards the end of the Digital Functional Skills Entry Level 3 Course, you will be required to undergo an onscreen/online exam that is externally set and graded. You can take the online exam at the designated exam center or remotely. Some assessment components for the skills and knowledge to be evaluated under the Content Document must be conducted online and on screens utilising digital devices. The assessments will be pass/fail in line with the other Functional Skills qualifications. Contact us for more information. Learners who achieve this qualification could progress to: Digital Functional Skills Level 1 Qualification Course Curriculum 1. Using Devices and Handling Information • Features of a device refers to examples such as the interface required (keyboard or touchscreen) or how a device functions (hand-held, wearable or wireless connectivity). Uses of a device refers to examples such as for making a phone or video call, or sending emails while away from a desk. • Applications refers to those for desktop, laptop and mobile devices. • Applying system settings refers to examples such as changing screen brightness, changing speaker volume, or connecting to a Wi-Fi network at work or home. • Navigating online content refers to using menus, hyperlinks and browser navigation controls such as back and forward buttons or bookmarks. • Internet searches refers to a specific and clearly defined piece of information or content that might be required in a work or real-life context. 2. Creating and Editing • Using a suitable application refers to understanding terminology and concepts relating to documents and media and associated applications, such as word-processed or presentations, with an understanding of the purpose of different applications and typical uses. • Combining different types of information for a given purpose refers to using text, graphics and images in a work or real-life or context, such as creating a poster or presentation for colleagues. 3. Communicating • Online communications refers to short, simple texts using email or other messaging applications. Other digital content refers to graphics, images and videos. • A video call refers to a one-to-one communication via live video. 4. Transacting • An online form refers to a single page form used to enter information such as registering for or requesting a service, or making an online purchase. • Personal details refers to name, address, telephone number, email address and payment details. • Data validation refers to automatic computer checks to ensure that data is entered correctly, such as password requirements or key fields that cannot be left blank. • Verification checks refers to a check carried out to ensure the user has entered their details accurately, such as following a link in an email received when setting up an online account. 5. Being Safe and Responsible Online • Understanding the need to stay safe online refers to examples such as being aware of risks associated with clicking on unknown links or phishing emails, being aware of the evolving nature of such risks, or knowing that devices may be hacked resulting in personal data being compromised or stolen. • Authentication methods to access devices refers to examples such as strong passwords, fingerprint, facial or voice recognition. • Minimising the effects of physical stresses refers to examples such as using an adjustable chair, not being too close or too far away from the screen/device and keyboard or mouse. • Benefits of using security software refers to examples such as preventing, detecting or removing viruses, malware and other threats. Recognised Accreditation This Course is Accredited by NCFE and Regulated by OFQUAL This Course is accredited by NCFE and regulated by Ofqual which is a nationally recognised qualification that will add value to your CV. It is an approved subject by Department for Education (DfE) that provides a foundation for progression to employment and further technical education. Certificate of Achievement Upon successful passing of the official exam, you will be awarded an Ofqual regulated nationally recognised NCFE Digital Functional Skills qualification at Entry Level 3.  FAQs Are there any prerequisites or eligibility criteria for taking the course? There are no prerequisites or eligibility criteria for taking this course. This certification is open to anyone who wants to enhance their digital skills and knowledge. When will I be able to access the course? You will be able to access the course as soon as you enroll. The course materials and resources will be available to you online 24/7, allowing you to study at your own pace and convenience. Is there any age limit for enrollment in this course? There is no age limit for enrollment in this course. Learners of all ages are welcome to join and benefit from the course materials and resources provided. What is the difference between NCFE and Edexcel? NCFE and Edexcel are both awarding bodies that provide qualifications, but there are some differences between them. NCFE is a national awarding organization in the UK, while Edexcel is a subsidiary of Pearson, a multinational education company. Additionally, NCFE focuses on vocational qualifications and skills-based learning, while Edexcel offers a wider range of academic and vocational qualifications. Can I access this course material offline, or do I need a continuous internet connection? To access the course material, you need internet access, and you won't be able to access it offline. If I encounter any technical issues, what kind of support is available? We have a very supportive and friendly customer support team, available for you to ask for any help or assistance with any technical issues you may encounter. They can be reached through email or phone, and will promptly address any concerns you have to ensure a smooth learning experience. Do I need to have any special software to access this course? No, you do not need any special software to access this course. All you need is a device with internet access and a web browser. The course materials are accessible online, making it convenient for you to learn from anywhere at any time. Do I need to visit the exam center for the exam, or can I give it from home? You can take the online exam at the designated exam center or remotely. What is the difference between DFSQ and Essential Digital Skills Qualifications (EDSQ)? The DFSQ qualification focuses specifically on digital skills for work, while the EDSQ qualification covers only the essential digital skills for everyday life. The Guided learning hours for DFSQ are 55 hours, and those for EDSQ are 50 hours. What will I learn in the Digital Functional Skills Entry Level 3 course? In the Digital Functional Skills Entry Level 3 course, you will learn foundational digital skills such as using basic digital devices, understanding file management, and communicating online. Additionally, you will gain knowledge on how to use common software applications and develop basic internet browsing skills.

Digital Functional Skills Entry Level 3 - Online Course and Exam
Delivered Online On Demand1 hour
£149 to £355

JSEC - Junos Security

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audiences for this course are the following: • Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview After successfully completing this course, you should be able to: Identify security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain SRX Series session management. Explain Junos ALG functions and when to use them. Describe policy logging on the SRX series device. Explain security policy scheduling. Describe application security theory. Explain application signature usage in AppID. Describe the AppTrack service. Describe the AppFW service. Describe the AppQoS service. Configure security policies using the AppSecure suite of services. Explain unified security policies. Describe IPS signatures. Configure an IPS policy using pre-defined templates. Describe how to update the IPS attack object database. Describe IPS rules and rule bases. Configure custom attack objects. Describe Junos Space and Security Director. Configure policy management using Security Director. Describe Security Director objects. Explain the different licensing options for Sky ATP List Sky ATP's features and benefits. Configure Sky ATP profiles and enroll an SRX Series device. Configure file scanning on Sky ATP. Configure Sky ATP to scan email Configure GeoIP on Sky ATP. Describe the JATP features and benefits List the JATP device options. Explain the JATP architecture. List 3rd party support options for JATP. Explain JATP SmartCore analytics processes. Describe Policy Enforcer configuration options. Describe Policy Enforcer integration with Sky ATP. Configure Policy Enforcer to block lateral malware movement. Explain Juniper Secure Analytics features and benefits. Describe JSA log collection. Describe JSA network flow collection. Describe the JSA Offense Management workspace. Explain the JSA Risk Manager features. Configure JSA to collect network and log collection. Explain the features of JIMS. Describe JIMS integration into the current AD network. Describe the Sky Enterprise service and how it can save resources. Explain the Sky Enterprise monitoring service. Explain the vSRX Series device benefits. Describe use cases for the vSRX. Explain the cSRX Series device benefits. Describe use cases for the cSRX. Describe SSL Proxy Concepts. Explain Forward and Reverse Proxy and the limitations of each. Configure both Forward and Reverse Proxy. This five-day course uses the Junos J-Web, CLI, Junos Space, and other user interfaces to introduce students to the concept of Juniper Connected Security. Chapter 1: Course Introduction Course Introduction Chapter 2: CLI Overview User Interface Options Command-Line Interface Initial Configuration Interface Configuration Lab 1: CLI Overview Chapter 3: Advanced Security Policy Session Management Junos ALGs Policy Scheduling Policy Logging Lab 2: Advanced Security Policy Chapter 4: Application Security Theory Application ID Application Signatures App Track App Firewall App QoS App QoE Chapter 5: Application Security Implementation AppTrack Implementation AppFW Implementation AppQos Implementation APBR Implementation Lab 3: Application Security Chapter 6: Intrusion Detection and Prevention IPS Overview IPS Policy Attack Objects IPS Configuration IPS Monitoring Lab 4: Implementing IPS Chapter 7: Security Director Overview Security Director Objects Security Director Policy Management Lab 5: Security Director Chapter 8: Sky ATP Implementation Architecture and Key Components Features and Benefits Configuration Compromised Hosts Command and Control File Scanning E-mail Scanning Geo IP Security Policy Integration Troubleshooting Lab 6: Sky ATP Implementation Chapter 9: Policy Enforcer Policy Enforcer Concepts Configuration Options Policy Enforcer Installation Lab 7: Policy Enforcer Chapter 10: JATP Overview Traffic Inspection Threat Detection Threat Analysis JATP Architecture Chapter 11: JATP Implementation Data Collectors Configure SmartCore Analytics Engine Log Ingestion Incident Management SRX Threat Prevention 3rd Party support for Threat Prevention Reporting Lab 8: JATP Chapter 12: Juniper Secure Analytics (JSA) JSA Overview Data Collection Log Analytics Threat Analytics Vulnerability Management Risk Management Lab 9: JSA Chapter 13: JIMS JIMS Overview JIMS Integration Lab 10: JIMS Chapter 14: vSRX and cSRX vSRX Overview vSRX Supported Features vSRX Use Cases cSRX Overview Lab 11: vSRX Installation Chapter 15: SSL Proxy SSL Proxy Overview SSL Concepts SSL Proxy Configurations Troubleshooting Lab 12: SSL Proxy Chapter 16: Cluster Concepts Chassis Cluster Concepts Chassis Cluster Operation Chapter 17: Chassis Cluster Implementation Chassis Cluster Configuration Chassis Cluster Advanced Options Lab 13: Chassis Cluster Implementation Chapter 18: Chassis Cluster Troubleshooting Chassis Cluster Case Studies Troubleshooting Examples Lab 14: Chassis Cluster Troubleshooting Additional course details: Nexus Humans JSEC - Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JSEC - Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

JSEC - Junos Security
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)
Delivered OnlineFlexible Dates
Price on Enquiry