• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

291 Courses

Java Crossover Course for Coders

4.6(12)

By PCWorkshops

Java CrossOver Course for Coders 1-Day, 11am - 6pm Online, Instructor-led, Interactive, Practical Java Basics to coders who are converting to Java from a different coding language. You do not need much time to learn the syntax of Java, because you have done similar work in other programming languages Hands-on, Practical Course, Instructor-led Course. Online with Gotomeeting.com 1 day, from 11am - 6pm. In classroom at on request only. Locations Java CrossOver Course description Overview of Java: This course covers Java Object-Oriented Programming (OOP) principles. Java Data Types and using Variables in Java: Here we learn to code using data types and variables of different data types: Primitives; Characters; Boolean; Variables and variable scope; String class; Type conversion and casting. Java Operators and Expressions: What are operators and how to use them; Arithmetic operators; Relational operators; Assignment operator; Logical operators; Increment and decrement operators. Decision Making: The Java Syntax for the If-statement; If,else; If,else if,else; Nested if; Switch Statements; Using Loops: For loops, while loops, do while, Enhanced for loop; Nesting loops; break, continue; The return statement. Arrays: Working with arrays, 2-d arrays, iterating arrays. Using the for-each loop with Arrays Lists: Working with lists. Lists vs Arrays. Files,streams with Java: Open, Read and Write to CSV Files, txt files and bin files. Exception Handling: Fundamentals of exception handling; Exception types; Using try and catch; Multiple catch clauses; Nested try statements; Throw and throws; The finally blocks Introduction to Classes and Objects: Creating a Class; Creating an Object; Using an Object; Adding Instance variables; Controlling accessibility; Naming conventions for class members. Class Constructors; Parameterized Constructors; Inheritance. Abstraction. Interfaces and implementing interfaces. Override. Polymorphism. The dot operator, this keyword, the static keywords, the super keyword. Using Methods: Introduction of methods; Creating a Method in class; Calling a Method; Returning value from a Method; Adding a Method that takes parameters; More in Methods and Classes: Overloading methods; Overloading Constructors; Using objects as parameters; Returning objects; Recursion; Access control : private, public and protected; The final keyword. What is included PCWorkshops Course Certificate on completion Java Course Notes Java Code Examples Practical Java Course exercises, Java Course Revision work After the course: 1-Hour personalised online revision session Book the Java CrossOver Course About us Our experienced trainers are award winners. More about us FAQ's Client Comments

Java Crossover Course for Coders
Delivered In-PersonFlexible Dates
FREE

Java Fundamentals Course

4.6(12)

By PCWorkshops

Java basics course. General Java syntax and principles of object-oriented programming. Level: Start from scratch; this is the course for a beginner. Java from basics to fully functional. Our Style: Instructor-led Course, very practical with hands-on practice. Small groups up to 4 people. Trainers are professional developers and subject matter experts.

Java Fundamentals Course
Delivered Online & In-PersonFlexible Dates
FREE

CCNA - 200-301 with Ben Jacobson

By Packt

This course is for networking enthusiasts who want to get ahead in their networking career by passing the new 200-301 Cisco Certified Network Associate (CCNA) exam. The course covers all the topics required for the certification, such as network fundamentals, network access, IP connectivity, IP services, and security fundamentals.

CCNA - 200-301 with Ben Jacobson
Delivered Online On Demand18 hours 40 minutes
£29.99

AR-CPE-WS: Aruba ClearPass Essentials Workshop (Delivered by Fast Lane)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for network professionals who are looking to build their foundational knowledge of the ClearPass product portfolio This training combines the following classes into one five day workshop, preparing you for the ACCP certification: ACF-Aruba ClearPass Fundamentals IAC-Implementing Aruba ClearPass Overview Ability to setup ClearPass as a AAA server Demostrate Configuration Guest, Ongurad, Onboard and Profiling features Integrate with External AD Server Understand Monitoring and Reporting Demostrate Scaling and deployment of best practices It prepares participants with foundational skills in Network Access Control using the ClearPass product portfolio. This 5-day classroom session includes both modules and labs to teach participants about the major features of the ClearPass portfolio Intro to ClearPass BYOD High Level Overview Posture and Profiling Guest and Onboard ClearPass for AAA Policy Service Rules Authentication Authorization and Roles Enforcement Policy and Profiles Authentication and Security Concepts Authentication Types Servers Radius COA Active Directory Certificates Intro to NAD NAD Devices Adding NAD to ClearPass Network Device Groups Network Device Attributes Aruba Controller as NAD Aruba Switch Aruba Instant Monitoring and Troubleshooting Monitoring Troubleshooting Logging Policy Simulation ClearPass Insight Insight Dashboard Insight Reports Insight Alerts Insight Search Insight Administration Insight Replication Active Directory Adding AD as Auth Source Joining AD domain Using AD services External Authentication Multiple AD domains LDAP Static Host Lists SQL Database External Radius Server Guest Guest Account creation Web Login pages Guest Service configuration Self-registration pages Configuring NADS for Guest Guest Manager Deep Dive Web Login Deep Dive Sponsor Approval MAC Caching Onboard Intro to Onboard Basic Onboard Setup Onboard Deepdive Single SSID Onboarding Dual SSID Onboarding Profiling Intro to Profiling Endpoint Analysis Deep Dive Posture Intro to Posture Posture Deployment Options OnGuard Agent Health Collection OnGuard workflow 802.1x with Posture using Persistent/dissolvable agent OnGuard web LoginMonitoring and Updates Operation and Admin Users Operations Admin Users Clustering and Redundancy Clustering Redundancy LAB Licensing ClearPass Licensing Base License Applications Single Sign-On Deployment Options ClearPass Admin Login SSO Access Network SSO ASO-Auto-Sign On Configuration and Demo ClearPass Exchange Intro Examples General HTTP Palo Alto Firewall Configuration Case Study Objectives Discussion Advanced Labs Overview

AR-CPE-WS: Aruba ClearPass Essentials Workshop (Delivered by Fast Lane)
Delivered OnlineFlexible Dates
Price on Enquiry

Cyber Security Officer Training - Complete Video Course

4.3(43)

By John Academy

Description: The Cyber Security Officer Training - Complete Video Course course is designed for the people who want to work as a cybersecurity professional and want to increase their knowledge regarding the cybersecurity. The course is sectioned into several part or chapters. Each focuses on a particular topic that will help you to be an excellent cyber security officer. At first, the course shows you the basics of ethical hacking including protocols, Windows hacking, attacking web technologies, etc. in the Ethical Hacking section. Then you will know the advanced techniques of becoming an ethical hacker and know the procedures of getting certification for ethical hacking. Then in part named Penetration Testing Consultant (CPTC), you will be introduced to the concept of packet capturing, Layer 2 attacks, Layer 3 attacks on Cisco-based infrastructures, VPN attacks, etc. In the next course, you will learn the advanced features of penetration testing. After that, the course, you will know about the web application security, Security Leadership Process, how to be a security Sentinel, etc. Finally, you will know the techniques of vulnerability assessments so that you can prevent severe break-ins to your company. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Cyber Security Officer Training - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Cyber Security Officer Training - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Ethical Hacking Overview FREE 00:35:00 Reconnaissance 00:25:00 Protocols 01:25:00 Windows Hacking 01:19:00 Attacking Web Technologies 00:56:00 Pen Testing Wireless Networks 01:34:00 Professional Hacking Security Fundamentals FREE 00:51:00 Access Controls 00:33:00 Protocols 00:36:00 Cryptography 00:52:00 Why Vulnerability Assessments? 00:36:00 Vulnerability Tools of the Trade 00:10:00 Output Analysis and Reports 00:13:00 Reconnaisance, Enumeration and Scanning 00:51:00 Gaining Access 00:31:00 Maintaining Access 00:17:00 Covering Tracks 00:18:00 Malware 00:09:00 Buffer Overflows 00:22:00 Password Cracking 00:33:00 Penetration Testing I Packet Capturing 00:38:00 Layer 2 Attacks 00:59:00 Layer 3 Attacks on Cisco Based Infrastructures 01:09:00 Pivoting and Relays 00:20:00 IPv6 Attacks 00:49:00 VPN Attacks 00:38:00 Defeating SSL 00:48:00 IDS/IPS Evasion 01:11:00 Penetration Testing II Logistics of Pen Testing FREE 00:25:00 Linux Fundamentals 00:22:00 Information Gathering 00:38:00 Detecting Live Systems 00:34:00 Enumeration 00:25:00 Vulnerability Assessments 00:20:00 Malware Goes Undercover 00:28:00 Windows Hacking 00:39:00 Hacking UNIX/Linux 00:36:00 Advanced Exploitation Techniques 00:28:00 Pen Testing Wireless Networks 00:34:00 Networks, Sniffing and IDS 00:42:00 Injecting the Database 00:26:00 Attacking Web Technologies 00:30:00 Project Documentation 00:17:00 Web Application Security Web Application Security FREE 01:20:00 Secure SDLC 00:26:00 OWASP TOP 10 00:28:00 Risk Management 00:35:00 Threat Modeling 00:18:00 Authentication and Authorization Attacks 00:24:00 Session Management 00:35:00 Security Architecture 00:29:00 Input Validation and Data Sanitization 00:24:00 AJAX Security 00:05:00 Insecurity Code Discovery and Mitigation 00:39:00 Application Mapping 00:07:00 Cryptography 00:28:00 Testing Methodologies 00:31:00 Security Leadership Security Management FREE 00:58:00 Risk Management 00:35:00 Encryption 00:31:00 Information Security - Access Control Concepts 00:31:00 Incident Handling and Evidence 01:01:00 Operations Security 00:48:00 Knowing Network Security 01:12:00 Security Sentinel Basic Security FREE 00:17:00 User Awareness 00:27:00 Implementing Countermeasures 00:09:00 Certified Security Sentinel 00:16:00 Using the Internet at Work 00:23:00 Accessing the Company's Network Through Your Assigned Computer 00:19:00 Accessing the Corporate Network Remotely 00:09:00 Social Engineering 00:13:00 Understanding and Manipulating our Target 00:16:00 Researching Our Target 00:11:00 Vulnerability Assessment Why Vulnerability Assessment FREE 00:46:00 Vulnerability Types 00:23:00 Assessing the Network 00:40:00 Assessing Web Servers & Applications 00:27:00 Assessing Remote & VPN Services 00:17:00 Vulnerability Assessment Tools of the Trade 00:15:00 Output Analysis 00:12:00 Mock Exam Mock Exam- Cyber Security Officer Training - Complete Video Course 00:30:00 Final Exam Final Exam- Cyber Security Officer Training - Complete Video Course 00:30:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Cyber Security Officer Training - Complete Video Course
Delivered Online On Demand46 hours
£22

VMware Tanzu Mission Control: Management and Operations 2022

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Operators and application owners who are responsible for deploying and managing policies for multiple Kubernetes clusters across on-premises and public cloud environments. Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Tanzu Mission Control architecture Configure user and group access Create access, image registry, network, security, quota, and custom policies Connect your on-premises vSphere with Tanzu Supervisor cluster to VMware Tanzu Mission Control Create, manage, and backup Tanzu Kubernetes clusters Perform cluster inspections Monitor and secure Kubernetes environments During this two-day course, you focus on using VMware Tanzu© Mission Control? to provision and manage Kubernetes clusters. The course covers how to apply access, image registry, network, security, quota, and custom policies to Kubernetes environments. For cluster provisioning and management, the course focuses on deploying, upgrading, backing up and monitoring Kubernetes clusters on VMware vSphere© with Tanzu. Given the abstractions of VMware Tanzu Mission Control, the learnings should be transferrable to public cloud. Introducing VMware Tanzu Mission Control VMware Tanzu Mission Control Accessing VMware Tanzu Mission Control VMware Cloud? services access control VMware Tanzu Mission Control architecture Cluster Management Attached clusters Management clusters Provisioned clusters Cluster inspections Data protection VMware Tanzu© Observability? by Wavefront VMware Tanzu© Service Mesh? Policy Management Policy management Access policies Image registry policies Network policies Security policies Quota policies Custom policies Policy insights Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Tanzu Mission Control: Management and Operations 2022 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Tanzu Mission Control: Management and Operations 2022 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Tanzu Mission Control: Management and Operations 2022
Delivered OnlineFlexible Dates
Price on Enquiry

CNS-225: Deploy and Manage Citrix ADC 13.x with Traffic Management

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Built for IT Professionals working with Citrix ADC, with little to no previous ADC experience. Potential students include administrators, engineers, and architects interested in learning how to implement and manage Citrix ADC features using leading practices. Overview Understand the functionalities and capabilities of Citrix ADC How to obtain, install, and manage Citrix ADC licenses Comprehend basic ADC network architecture Understand how SSL is used to secure Citrix ADC Optimize the ADC system for traffic handling and management Build your Citrix ADC knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials-- platforms, architecture, licensing and functionality and also focuses on traffic management, including content switching, traffic optimization and global server load balancing (GSLB). You will learn about key ADC capabilities such as high availability, security and performance, and explore SSL offload, load balancing and monitoring. The traffic management curriculum will cover the AppExpert policy engine, the Rewrite and Responder features, and Content Switching. Module 1: Getting Started Introduction to Citrix ADC Feature and Platform Overview Deployment Options Architectural Overview Setup and Management Module 2: Basic Networking Networking Topology Citrix ADC Components Routing Access Control Lists Module 3: ADC Platforms Citrix ADC MPX Citrix ADC VPX Citrix ADC CPX Citrix ADC SDX Citrix ADC BLX Module 4: High Availability Citrix ADC High Availability High Availability Configuration Managing High Availability In Service Software Upgrade Troubleshooting High Availability Module 5: Load balancing Load Balancing Overview Load Balancing Methods and Monitors Load Balancing Traffic Types Load Balancing Protection Priority Load Balancing Load Balancing Troubleshooting Module 6: SSL Offloading SSL Overview SSL Configuration SSL Offload Troubleshooting SSL Offload SSL Vulnerabilities and Protections Module 7: Security Authentication, Authorization, and Auditing Configuring External Authentication Admin Partitions Module 8: Security Citrix ADC Logging Monitoring with SNMP Reporting and Diagnostics AppFlow Functions Citrix Application Delivery Management Troubleshooting Module 9: Advanced Policies Default Policy Overview Default Expression Syntax Policy Bindings AppExpert Additional Features Module 10: Rewrite Responder URL Transformation Rewrite Policies Responder Policies DNS Rewrite and Responder URL Transformation Module 11: Content Switching Content Switching Overview Content Switching Configuration Module 12: Optimization Citrix ADC Optimization Overview HTTP Compression Integrated Caching Front-End Optimization Module 13: Global Server Load Balancing GSLB Overview GSLB Architecture Content-Switching GSLB GSLB MEP and Monitoring Customizing GSLB

CNS-225: Deploy and Manage Citrix ADC 13.x with Traffic Management
Delivered OnlineFlexible Dates
Price on Enquiry

ICM-MXSA-CT-Installing and Configuring Meraki MX Security Appliances

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: IT Staff and Managers Network and systems personnel and engineers Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment. This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics. Overview Following completion of this course, students will understand, Install, Configure, monitor, and Troubleshoot the following: Navigate and Configure the dashboard Add MX/MR/MS/MV devices to the Dashboard Understand and Configure Configuration Templates Understand and Configure Group Policies Manage/Configure/Integrate Users and Radius Policies Configure, Monitor, and Troubleshoot MX Firewalls Troubleshoot devices and Connectivity This 3-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students will learn how to install and optimize Meraki MX Firewalls. Students will also learn how to configure the Meraki Dashboard Students will troubleshoot and configure the Meraki environment and learn how to diagnose and resolve user and Network issues that may arise. Introduction to Meraki The Meraki Mission Cisco Meraki: Bringing the Cloud to Enterprise Networks Cloud-Managed Networking Architecture Benefits of a Cloud-Based Solution The Meraki Full Stack: New and Unique Value Proposition Meraki Deployment ? How it works Why Customers Choose Meraki Meraki MS Switches Overview Meraki MX Security Appliances Overview Meraki SD-WAN Overview Meraki MR Wireless Access Points Overview Cisco Meraki Systems Manager Overview Cisco Meraki MV Vision Security Cameras Overview Meraki API Overview Meraki Licensing Enterprise Support Cisco Meraki Documentation Cloud Management with the Meraki Dashboard The Meraki Dashboard Dashboard: Organizational Structure Out-of-band Cloud Management Loss of Connectivity to the Cisco Meraki Cloud Meraki Dashboard Logins Create Dashboard Accounts and Organization MSP Logins - Manage Multiple Organizations Modify an Organization View Organizations Health Meraki Dashboard Best Practices Dashboard Search Meraki Help Organizational Wide Settings Configure Monitor Create and Manage Configuration Templates Network-Wide Settings Configure Meraki MX Security Benefits of a Cloud Managed Security Solution Threat Management Solution Advanced Security Licenses Reliable, Cost Effective Connectivity with Meraki SD-WAN Site-to-Site VPN (Auto VPN) High Availability and Path Redundancy Application-Aware Intelligent Path Control Traffic Monitoring and Analytics Integrating Active Directory Cisco Meraki MX Models and Features Configuring the Local Status Page Adding Appliance to Network Device Configuration Configuring the Warm Spare Feature Device Tags & Notes Configuring Addressing & VLANs DHCP Server Configuration and Options Meraki Firewall Configuration Meraki Site-to-Site VPN One Arm VPN Concentrator Configuration Meraki Client VPN Meraki Active Directory Integration Meraki Access Control Meraki Splash Page Configuration Configuring Access Policies Teleworker VPN/L3 Roaming

ICM-MXSA-CT-Installing and Configuring Meraki MX Security Appliances
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft SQL Server Bootcamp 2024

5.0(1)

By LearnDrive UK

Elevate your SQL skills with our Microsoft SQL Server Bootcamp 2024. Master SQL Server administration and development for data-driven decision-making and analysis.

Microsoft SQL Server Bootcamp 2024
Delivered Online On Demand1 hour
£5

CNS-227: Deploy and Manage Citrix ADC 13.x with Citrix Gateway

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Built for IT Professionals working with Citrix ADC and Gateway, with little or no previous Citrix networking experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC or Citrix Gateway environments. Overview Identify the functionality and capabilities of Citrix ADC and Citrix Gateway Explain basic Citrix ADC and Gateway network architecture Identify the steps and components to secure Citrix ADC Configure Authentication, Authorization, and Auditing Integrate Citrix Gateway with Citrix Virtual Apps, Citrix Virtual Desktops and other Citrix components Expand your Citrix networking knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials, including secure load balancing, high availability and operations management, and also focuses on Citrix Gateway. You will learn to deliver secure remote access to apps and desktops integrating Citrix Virtual Apps and Citrix Desktops with Citrix Gateway Getting Started Introduction to Citrix ADC Feature and Platform Overview Deployment Options Architectural Overview Setup and Management Basic Networking Networking Topology Citrix ADC Components Routing Access Control Lists ADC Platforms Citrix ADC MPX Citrix ADC VPX Citrix ADC CPX Citrix ADC SDX Citrix ADC BLX High Availability Citrix ADC High Availability High Availability Configuration Managing High Availability In Service Software Upgrade Troubleshooting High Availability Load balancing Load Balancing Overview Load Balancing Methods and Monitors Load Balancing Traffic Types Load Balancing Protection Priority Load Balancing Load Balancing Troubleshooting SSL Offloading SSL Overview SSL Configuration SSL Offload Troubleshooting SSL Offload SSL Vulnerabilities and Protections Security Authentication, Authorization, and Auditing Configuring External Authentication Admin Partitions Monitoring and Troubleshooting Citrix ADC Logging Monitoring with SNMP Reporting and Diagnostics AppFlow Functions Citrix Application Delivery Management Troubleshooting Citrix Gateway Introduction to Citrix Gateway Advantages and Utilities of Citrix Gateway Citrix Gateway Configuration Common Deployments AppExpert Expressions Introduction to AppExpert Policies Default Policies Explore Citrix ADC Gateway Policies Policy Bind Points Using AppExpert with Citrix Gateway Authentication, Authorization, and Secure Web Gateway Authentication and Authorization Multi-Factor Authentication nFactor Visualizer SAML authentication Managing Client Connections Introduction to Client Connections Session Policies and Profiles Pre and Post Authentication Policies Citrix Gateway Deployment Options Managing User Sessions Integration for Citrix Virtual Apps and Desktops Virtual Apps and Desktop Integration Citrix Gateway Integration Citrix Gateway WebFront ICA Proxy Clientless Access and Workspace App Access Fallback SmartControl and SmartAccess for ICA Configuring Citrix Gateway Working with Apps on Citrix Gateway RDP Proxy Portal Themes and EULA

CNS-227: Deploy and Manage Citrix ADC 13.x with Citrix Gateway
Delivered OnlineFlexible Dates
Price on Enquiry