Duration 5 Days 30 CPD hours This course is intended for This course is intended for Administrator, Database Administrator, Security Specialist, and Systems Administrator. Overview Upon successful completion of this course, students will be able to Enumerate Oracle auditing solutions to monitor database security requirements, Implement Oracle Audit Vault and Database Firewall, Configure Oracle Audit Vault and Database Firewall, Explain Oracle Compliance Framework, and Configure basic Compliance Framework rules. In the Oracle Database Security: Detective Controls course, students learn how they can use Oracle Database administration auditing features to meet the compliance requirements of their organization. IntroductionUsing Unified AuditUsing Fine-Grained AuditIntroduction to Oracle Audit Vault and Database Firewall (AVDF)Planning the Oracle Audit Vault and Database Firewall ImplementationInstalling the Audit Vault ServerConfiguring the Audit Vault ServerConfiguring Oracle AVDF and Deploying the Audit Vault AgentNetworking and Oracle AVDFInstalling a Database FirewallConfiguring Oracle AVDF and Deploying Database FirewallUsing Host MonitoringConfiguring High AvailabilityCreating Custom Collection Plug-insManaging the Audit Vault ServerManaging the Database FirewallsOverview of the Auditing and Reporting FeaturesPerforming Administrative TasksCreating Audit Policies for Oracle DatabasesCreating Database Firewall PoliciesOracle AVDF ReportsManaging Entitlements Additional course details: Nexus Humans Oracle Database Security - Detective Controls training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database Security - Detective Controls course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Develop for experienced IT Professionals familiar with Citrix Virtual Apps and Desktops 7.1x in an on-premises environment. Potential students include administrators, engineers, and architects designing or deploying Citrix Virtual Apps and Desktops workloads on Microsoft Azure. Overview Prepare the Azure environment for secure integration with Citrix Virtual Apps and Desktops Deploy and manage Virtual Delivery Agent machines in Microsoft Azure using Machine Creation Services Integrate Citrix Cloud and Citrix Virtual Apps and Desktops with Microsoft Azure Active Directory Design Machine Catalogs and virtual machines on Microsoft Azure Resource Manager Provide remote access with Citrix StoreFront and Citrix Gateway on Microsoft Azur Students learn to deploy and manage the Citrix Virtual Apps and Desktops apps and desktops in Microsoft Azure. Students gain the skills to plan the machine catalog and virtual machine design based in Microsoft?s public cloud and get hands-on practice deploying those machines using Machine Creation Services. Students will also learn about additional Azure considerations including maintenance and power management which are critical in a cloud environment. For remote access, students will learn to configure Citrix StoreFront and Citrix Gateway on the Azure platform. This course focuses on Microsoft Azure as a Citrix Cloud resource location however concepts are relevant to both Citrix Cloud and fully managed Citrix Virtual Apps and Desktops sites. Citrix Virtual Apps and Desktops on Azure Overview Defining IAAS Citrix Virtual Apps and Desktops Azure Deployment Models Azure Fundamentals Review Azure Management Azure Locations Citrix Virtual Apps and Desktops Integration with Azure Active Directory Active Directory Basics Active Directory Usage Connecting On-premises Active Directory to Azure Azure Role Based Access Control Connecting to Microsoft Azure Azure Connectivity Cloud Connectors in Azure Creating Citrix Virtual Apps and Desktops Host Connections to Azure Deploying Apps and Desktops using Machine Creation Services Master Image Preparation Machine Creation Services in Azure Considerations for Deploying onto Azure Providing Access to End Users StoreFront Locations Citrix ADC Locations Multiple Citrix Virtual Apps and Desktops Zones in Azure Regions Maintaining Infrastructure and VDAs in Microsoft Azure Maintaining Infrastructure Maintaining Resources Power Management Plan for a Successful POC Planning your next steps
ð Unlock the Power of Cloud Storage with Our 'Introduction to Amazon S3 Essentials' Course! ð Are you ready to dive into the world of cloud storage and harness the unparalleled potential of Amazon S3? Look no further! Our comprehensive online course is your gateway to mastering the fundamentals of Amazon S3, designed to empower beginners and enthusiasts alike. ð What You'll Learn: Foundation of Amazon S3: Gain a solid understanding of Amazon Simple Storage Service (S3) and its core functionalities. Setting Up & Configuration: Learn step-by-step how to create buckets, set permissions, and configure storage options effectively. Data Management: Master the art of storing, retrieving, and organizing data efficiently in Amazon S3. Security & Compliance: Understand best practices for securing your data and complying with industry standards. Integration & Automation: Explore integration possibilities and automate processes for seamless functionality. ð¡ Why Choose Our Course? Expert Guidance: Led by industry experts with extensive experience in cloud computing and Amazon S3. Practical Approach: Hands-on exercises and real-life examples to reinforce learning. Flexible Learning: Study at your own pace, accessible 24/7 from anywhere in the world. Updated Content: Stay current with the latest trends, tips, and techniques in Amazon S3. ð Who Is This Course For? Newcomers to Cloud Computing: Perfect for beginners looking to understand the basics of Amazon S3. IT Professionals: Enhance your skill set and advance your career in cloud technology. Developers & Entrepreneurs: Learn how to optimize Amazon S3 for your projects or business. ð Enroll Today and Take Your First Step Towards Mastery! ð Invest in your future with our 'Introduction to Amazon S3 Essentials' course and gain the expertise to navigate the world of cloud storage confidently. ð Don't miss this opportunity! Enroll now and unlock the potential of Amazon S3! ð Course Curriculum Basic Overview 00:00 Pricing 00:00 Set Up 00:00 File Storage 00:00 File Interface-Filezilla 00:00 File Interface-Cloudberry 00:00 File Delivery 00:00 File Backup 00:00 File Backup- Part-2 00:00 File Sharing 00:00 Cloud Transfers 00:00 Zapier Connection - Part 1 - Dropbox 00:00 Zapier Connection - Part 2 - Google Drive 00:00 Hosting Multimedia on S3 00:00 Using a Multimedia Interface on S3 00:00 Should I Host Multimedia on S3 00:00 File Protection 00:00 Tracking Bandwidth 00:00 Embedding Amazon S3 Video to Static HTML 00:00 Conclusion 00:00 Advanced Overview 00:00 Create and Configure a Bucket 00:00 Add A Bucket Policy 00:00 Uploading and Testing 00:00 Using Your Own Domain 00:00 Custom Domain Configuration - Part 1 00:00 Custom Domain Configuration - Part 2 - Bucket Configuration 00:00 Custom Domain Configuration - Part 3 00:00 Custom Domain Configuration - Part 4 - Domain Offsite 00:00 Custom Domain Configuration-Part 5 - Alias 00:00 Custom Domain Configuration - Part 6 - Testing 00:00 WordPress Installation - Part 1 00:00 WordPress Installation - Part 2 00:00 WordPress Backup to S3 00:00 WordPress Media Offload to S3 00:00 Serving Website Images From Amazon S3 00:00 Embedding Media Into WordPress 00:00 Embedding S3 Video Into WordPress with HTML 00:00 Securing Downloads In S3 and WordPress 00:00 Conclusion 00:00
If you’re a beginner bag maker, this Retreat is perfect for you. A whole weekend to immerse yourself in fabrics, stabiliser, professional techniques and tips to boost your confidence and your skills. Hopefully, there’ll be a lot of chat and laughter too! **This retreat is a little different from many others in that making a bag isn’t the point of the weekend, although you will indeed make one. The focus is on learning new transferable techniques and skills that you will be able to use on so many bags you make in the future. We have our own ‘Retreat Suite’ of rooms, including a spacious, light and airy sewing room which is equipped with a display screen so everyone can easily see demonstrations from a working viewpoint. We also have our own bathroom and kitchen facilities. If you wish, you are free to continue work after dinner and until as late (or early!) as you like. You will need to bring your own sewing machine, fabric scissors and any other favourite sewing tools, but everything else is provided. Come and join us in the exclusive Facebook group Bag Makers Retreat at https://www.facebook.com/groups/bagmakersretreat/ for all the latest retreat info, chat, gossip and more, plus a chance to meet other like-minded folks. If you have dietary requirements, please tell me before you book, so I can be sure we can meet your needs. All meal main courses are included in the retreat fee, as are Saturday and Sunday lunches and breakfasts. Starters, desserts and drinks with meals are not included but the meals are so huge you probably won’t want starters and desserts anyway!! Tea and coffee is available whenever you need, but you do have to make it yourself! If you’d like to stay an extra night or two, maybe to arrive on Thursday or leave on Monday if you have a long drive, let me know and I’ll check availability with our host. If you’d prefer to travel by train, we are happy to ferry you to and from the station, just ask. Please aim to arrive no later than 2pm as we have a lot of pattern cutting and fabric choosing to get through on Friday! Friday The fun starts here as you arrive at your weekend home-from-home – a beautifully refurbished, 4-star 18th century coaching inn with all the comforts you would expect. You’ll have time to settle into your own delightfully comfortable en-suite room which has all the anticipated little luxuries, before an introductory get-together with me and your companions in the sewing room at 2pm. You’ll be given your own copy of the bag pattern, which is very beginner- and domestic machine-friendly but which will incorporate a lot of features and techniques that are also in much more complex designs, making this an excellent springboard to any bag you want to make. Then you can wallow in the plentiful stash of fabrics to choose from, including some of my exclusive feature panel prints which aren’t available anywhere else. All the materials, interfacing, stabiliser, threads and bag hardware you need are supplied. As soon as you’re ready, you can start preparing and cutting out your pattern and some of the bag pieces so we can hit the ground running in the morning. After a superbly-cooked and substantial evening meal at around 6pm or so, you are welcome to continue working in the sewing room or to simply relax and chat there before bed. Saturday After an excellent breakfast, we can really start work adding to and adapting your bag pattern. You’ll work at your own pace from around 9am with no pressure – I want your weekend to be fun and not stressful! We will walk through the techniques together and I will be there the whole time to answer questions and troubleshoot any tricky bits. You’ll also have the chance to try sewing with faux leather , if you haven’t already, and we’ll explore ways and techniques to use and apply rivets. Refreshments are freely available all day and you can take a break whenever you wish. A light lunch (with homemade cake!!) is also provided and we’ll have a short break in the middle of the day. The rest of the day will be similar to Friday – sewing, dinner at 6ish and more sewing if you wish to before bed. Do feel free to have a walk or just sit outside for a breather if the weather is kind. Sunday How can it be Sunday already?? Breakfast over, we’ll get back to work. You will need to allow a few minutes to pack and check out of your room, as it has to be made ready for Monday’s guests. Apart from that, it’s uninterrupted sewing (with refreshments and lunch breaks!) until your bag is finished. We’ll be heading off for lunch at 12.30pm or so. We have the sewing room for the rest of the day. If you don’t quite get done, there’s absolutely no need to worry as you’ll easily be able to complete your bag at home. If you finish earlier feel free to head home whenever you’re ready. Amongst loads of other hints and tips, you’ll learn – Interfacings – what to use and not to use Using stabilisers – which is best and why How to create a zipped pocket the pro way Adding a recessed zipper main closure to almost any bag Installing hardware Incorporating a built-in key fob Installing a rectangular base Sewing the bag together and topstitching A sneaky way of getting your bag right-sides-out without ugly seams! An easy way to add a zipper pull without tools Working with different types of rivet machine Faux leather on a domestic machine You’ll have handouts on all the techniques to take home. And I hope you have a lot of fun and make new friends while you learn!! I never abandon my students at the end of the course so if you get stuck on anything at home, you are welcome to give me a shout on Messenger and we’ll sort out your problem together. The not-so-small print Book your place using the simple booking system below – just click on your choice of dates and go from there. The full price is £395.00. The deposit of £60 is non-refundable if you cancel but can, however, be credited towards a future retreat booked within the next 6 months. It is completely refundable if I or the venue cancel. The booking page only shows the Friday, but the course is running until Sunday. The balance of £335.00 is payable by approx 6 weeks before the retreat date and payment instructions will be sent to you in good time. Cancellations 4 weeks or less before the retreat date can only be refunded if someone on the waiting list can come instead. *Don’t worry that your booking confirmation may be headed Unicorn Studios – it’s just the site that I’ve run my booking system from for years… it’s not a scam!! *
Duration 3 Days 18 CPD hours Overview ?The OS X Sierra troubleshooting process?How to use OS X Sierra tools and resources to troubleshoot OS X Sierra?OS X Sierra features and functionality, including how to find more information about OS X Sierra?How to prepare for Apple Certified Support Professional (ACSP) 10.12 certification In this course students will receive an in-depth exploration of troubleshooting on OS X Sierra. Installation and Configuration Install OS X Sierra Setup and Configuration OS X Recovery OS X Software Updates User Accounts User Accounts User Home Folders System Security Keychain Management File Systems File Systems and Storage FileVault 2 Permissions and Sharing File System Troubleshooting SIP Data Management Hidden Items and Shortcuts System resources Metadata and Spotlight File Archives Time Machine Applications and Processes Application Installation Document Management Application Management and Troubleshooting Network Configuration Network Essentials Advanced Network Configuration Network Troubleshooting Network Services Network Services Host Sharing and Personal Firewall System Management Peripherals and Drivers Print and Scan System Troubleshooting Additional course details: Nexus Humans Sierra 101 - OS X Support Essentials 10.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Sierra 101 - OS X Support Essentials 10.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Cisco integrators, resellers, and partners Network administrators Security administrators Security consultants Systems engineers Technical support personnel Overview After taking this course, you should be able to: Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors. Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0 is a 3-day course that shows you how to deploy and use Cisco© AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. The course qualifies for 24 Cisco Continuing Education credits (CE) towards recertification.This class will help you:Learn how to deploy and manage Cisco AMP for EndpointsSucceed in today?s high-demand security operations roles Course Outline This course will cover the following topics: Introducing to Cisco AMP Technologies Introducing AMP for Endpoints Overview and Architecture Navigating the Console Interface Using Cisco AMP for Endpoints Identifying Attacks Analyzing Malware Managing Outbreak Control Creating Endpoint Policies Working with AMP for Endpoint Groups Using Orbital for Endpoint Visibility Introducing AMP REST API Navigating Accounts
Duration 5 Days 30 CPD hours This course is intended for Horizon Cloud Service on Microsoft Azure administrators, system integrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants. Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of Horizon Cloud Service on Microsoft Azure Discuss the initial Microsoft Azure configurations required for the Horizon Cloud Service on Microsoft Azure deployment Discuss Horizon Cloud Service on Microsoft Azure networking concepts Discuss Horizon Cloud Service on Microsoft Azure AD requirements and integration best practices Determine steps and requirements to deploy or upgrade Horizon Cloud Service on Microsoft Azure Recognize Horizon Cloud Service console controls that are available for administrators Identify Horizon Cloud upgrade features and benefits List the steps and considerations to take when setting up a primary VM to be used as an assignable image Identify how to access desktops and application from Horizon Cloud Service on Microsoft Azure Discuss and create Remote Desktop Session Host Farms Explain power management options in the RDSH farm Create VDI desktop assignments and entitlements Manage assignable images on Horizon Cloud Service on Microsoft Azure Describe and Use Image management service for Horizon Cloud Service on Microsoft Azure Describe the integration of Dynamic Environment Manger with Horizon Cloud Service on Microsoft Azure Manage user personalization and application configurations using the Dynamic Environment Manager management console and application profiler Discuss the usage of App Volumes for Horizon Cloud Service on Microsoft Azure Discuss the integration of Workspace ONE Access with Horizon Cloud Service on Microsoft Azure Interpret scalability considerations for Horizon Cloud Service on Microsoft Azure Determine the process of deploying, configuring, and paring Horizon Cloud Connector into your pod's environment Apply troubleshooting techniques relevant to Horizon Cloud Service and Microsoft Azure Summarize the analytics and monitoring capabilities in Horizon Cloud Service on Microsoft Azure This five-day, hands-on training provides you with the knowledge, skills, and abilities to achieve competence in deploying and managing VMware Horizon© Cloud Service? on Microsoft Azure. This training increases your skills and competence in using the VMware Horizon© Cloud Administration Console and Microsoft Azure portal.Through a combination of hands-on labs and interactive lectures, you learn how to import and manage images for VDI and RDSH assignments. You also learn how to configure and use the Universal Broker function, VMware App Volumes?, Workspace ONE Access and VMware Dynamic Environment Manager? in the Horizon Cloud Service on Microsoft Azure deployment. Course Introduction Introduction and course logistics Course objectives Introduction to Horizon Cloud Service on Microsoft Azure Identify Horizon Cloud Service on Microsoft Azure features, benefits, and licensing options Interpret Horizon Cloud Service on Microsoft Azure architecture components to identify configuration prerequisite Interpret Horizon Cloud Service on Microsoft Azure deployment models Discuss the initial Microsoft Azure configurations required for the Horizon Cloud Service on Microsoft Azure deployment Microsoft Azure Networking Requirements Summarize Horizon Cloud connectivity considerations and tasks Discuss Horizon Cloud on Microsoft Azure networking concepts Identify ports required for local connections, remote connections, and endpoint operating system firewall rules Active Directory List the features and limitations of supported AD configurations Discuss Horizon Cloud Service on Microsoft Azure AD integration best practices Determine Horizon Cloud Service on Microsoft Azure AD requirements Deployment and Upgrades Determine steps and requirements to deploy Horizon Cloud Service on Microsoft Azure Discuss the features and benefits of using multiple tenant subnets for desktops and RDSH Discuss the features and benefits of using Internal and External UAG Recognize Horizon Cloud Service console controls that are available for administrators Identify Horizon Cloud upgrade features and benefits Creating Images Outline the process and choices to set up primary VMs Identify the configuration choices for importing primary VMs List steps to install the user software on the primary VM Identify steps to convert a configured primary VM to an assignable image Access Desktops and Applications Use Horizon Client to access desktops and remote applications Compare the remote display protocols that are available for Horizon Cloud Remote Desktop Session Host Farms List the steps and considerations to take when creating an RDSH farm List the actions that can be performed on farms listed on the console?s Farms page List the actions to assign an application to a user or group List the prerequisites and steps to create an RDSH session assignment VDI Desktops Compare a dedicated assignment to floating assignment Outline steps to create a VDI desktop assignment Explain the entitlement of desktops Managing Assignable Images Describe and manage assignable images Describe and Use Image management service for Horizon Cloud Service on Microsoft Azure VMware Dynamic Environment Manager Identify the VMware Dynamic Environment Manager functional areas and their benefits Prepare an infrastructure for VMware Dynamic Environment Manager Outline the steps that are required to install and configure Dynamic Environment Manager components Manage user personalization and application configurations using the Dynamic Environment Manager management console and application profiler App Volumes for Horizon Cloud Service on Microsoft Azure Explain how App Volumes works with Horizon Cloud Service on Microsoft Azure Identify the features and benefits of App Volumes in Horizon Cloud Service on Microsoft Azure Identify the interface elements of App Volumes in Horizon Cloud Service on Microsoft Azure Install and configure App Volumes in Horizon Cloud Service on Microsoft Azure Workspace ONE Access Describe the benefits of integrating VMware Horizon Cloud service with Workspace ONE Access. Describe how a user obtains access to an entitled virtual desktop or application from the Intelligent Hub catalog. Describe the importance of binding directory with Workspace ONE Access and setting up custom user attribute synchronization. Describe the importance of configuring the Remote App Access Client in Workspace ONE Access. Summarize the steps of configuring the Access settings in Horizon Cloud control panel. Access an entitled Horizon virtual desktop or application in the Intelligent Hub catalog. Scalability Considerations Discuss the Horizon Cloud Service on Microsoft Azure scalability cost and settings Describe the usage of Universal Broker in Horizon Cloud Service on Microsoft Azure Horizon Cloud Connector Describe the features and benefits of Horizon Cloud Connector List the prerequisites and requirements to connect a Horizon pod with Horizon Cloud Connector Determine the process of deploying, configuring, and paring Horizon Cloud Connector into your pod?s environment Troubleshooting Horizon Cloud Service on Microsoft Azure Discuss Horizon Cloud Service on Microsoft Azure troubleshooting basics Discuss Horizon Cloud Service troubleshooting basics Summarize the analytics and monitoring capabilities in Horizon Cloud Service on Microsoft Azure
Course Overview Learn how to launch your very first podcast and boost your business, with this top trending course. The The Complete Podcasting Course is the ultimate guide to podcasting for beginners, designed by experienced professionals. Through 19 key modules, it will guide learners on how to record and launch a podcast successfully, how to use their podcast to grow their brand, and maximise listeners in no time. From the equipment required to get started, to how to edit your podcast with professional software, it covers everything you need to know. By the end of this course, you will have all the skills you need to create high-quality podcasts, as well as monetise and host them inexpensively on reliable platforms. This best selling The Complete Podcasting Course has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth The Complete Podcasting Course is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The The Complete Podcasting Course is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The The Complete Podcasting Course is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the The Complete Podcasting Course, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the The Complete Podcasting Course will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the The Complete Podcasting Course to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device. Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.
Overview This comprehensive course on CompTIA Security+ (SY0-401) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Security+ (SY0-401) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA Security+ (SY0-401). It is available to all students, of all academic backgrounds. Requirements Our CompTIA Security+ (SY0-401) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 10 sections • 41 lectures • 16:59:00 total length •The Information Security Cycle: 00:37:00 •Information Security Controls: 00:36:00 •Authentication Methods: 00:09:00 •Cryptography Fundamentals: 00:56:00 •Security Policy Fundamentals: 00:11:00 •Social Engineering: 00:32:00 •Malware: 00:25:00 •Software-Based Threats: 00:22:00 •Based Threats: 00:39:00 •Wireless Threats and Vulnerabilities: 00:43:00 •Physical Threats and Vulnerabilities: 00:09:00 •Manage Data Security: 00:47:00 •Manage Application Security: 00:55:00 •Manage Device and Host Security: 01:08:00 •Manage Mobile Security: 00:10:00 •Configure Security Parameters on Network Devices and Technologies: 00:49:00 •Network Design Elements and Components: 00:26:00 •Implement Networking Protocols and Services: 01:09:00 •Apply Secure Network Administration Principles: 00:12:00 •Secure Wireless Traffic: 00:31:00 •Access Control and Authentication Services: 00:43:00 •Implement Account Management Security Controls: 00:33:00 •Install a CA Hierarchy: 00:26:00 •Enroll Certificates: 00:13:00 •Secure Network Traffic by Using Certificates: 00:04:00 •Renew Certificates: 00:01:00 •Back Up and Restore Certificates and Private Keys: 00:06:00 •Revoke Certificates: 00:08:00 •Physical Security: 00:20:00 •Legal Compliance: 00:10:00 •Security Awareness and Training: 00:11:00 •Integrate Systems and Data with Third Parties: 00:09:00 •A Risk Analysis: 00:17:00 •Implement Vulnerability Assessment Tools and Techniques: 00:05:00 •Scan for Vulnerabilities: 00:27:00 •Mitigation and Deterrent Techniques: 00:19:00 •Respond to Security Incidents: 00:23:00 •Recover from a Security Incident: 00:10:00 •Business Continuity: 00:18:00 •Plan for Disaster Recovery: 00:17:00 •Execute DRPs and Procedures: 00:13:00
Duration 5 Days 30 CPD hours This course is intended for Senior system administrators who wish to learn more about troubleshooting. Have earned a Red Hat Certified System Administrator (RHCSA) or have similar experience. It is recommend that students have earned a Red Hat Certified Engineer (RHCE) or have similar experience. Overview As a result of attending this course, students should be able to leverage the software development life-cycle process to plan, create, test, and provision host systems within an organization. Students should be able to demonstrate the following skills: - Installation of Red Hat Satellite 6 - Software life-cycle management of software used to provision and maintain configured hosts within a controlled production environment This course enriches your skills by providing the tools and techniques that you need to successfully diagnose, and fix, a variety of potential issues. You will work through hands-on problems in various subsystems to diagnose and fix common issues. You will learn develop the skills to apply the scientific method to a structured form of troubleshooting. You will then apply this approach in troubleshooting various types of problems, including boot issues, hardware issues, storage issues, RPM issues, network issues, third-party application issues, security issues, and kernel issues. At the end of the course, you will be empowered to complete various comprehensive review labs to test your skills. 1 - INTRODUCTION TO TROUBLESHOOTING Describe a generalized strategy for troubleshooting. 2 - TAKE PROACTIVE STEPS TO PREVENT SMALL ISSUES Prevent small issues from becoming large problems by employing proactive system administration techniques. 3 - TROUBLESHOOT BOOT ISSUES Identify and resolve issues that can affect a system's ability to boot. 4 - IDENTIFY HARDWARE ISSUES Identify hardware problems that can affect a system?s ability to operate. 5 - TROUBLESHOOT STORAGE ISSUES Identify and fix issues related to storage. 6 - TROUBLESHOOT RPM ISSUES Identify and fix problems in, and using, the package management subsystem. 7 - TROUBLESHOOT NETWORK ISSUES Identify and resolve network connectivity issues. 8 - TROUBLESHOOT APPLICATION ISSUES Debug application issues. 9 - DEAL WITH SECURITY ISSUES Identify and fix issues related to security subsystems. 10 - TROUBLESHOOT KERNEL ISSUES Identify kernel issues and assist Red Hat Support in resolving kernel issues. 11 - RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING COMPREHENSIVE REVIEW Practice and demonstrate knowledge and skills learned in Red Hat Enterprise Linux Diagnostics and Troubleshooting.