This course is about learning to use your digital SLR camera with confidence and skill. Explore aperture, shutter speed and megapixels through to white balance, ISO ratings, histograms and much more! With a blend of technical tuition, demonstration, practical assignments and group discussion, you will discover how to unlock your camera’s full potential and take better pictures. If you don’t have a digital SLR we can often provide one for you – please select from dropdown at time of booking. You can also use your interchangeable or fixed lens system, mirrorless or rangefinder camera on this course. Bridge cameras without interchangeable lenses can be used too, but please note that they may not allow the full range of camera controls. Computer experience is beneficial. Day 1: Features of your Digital SLR camera. Areas covered include aperture, shutter speed and megapixels through to white balance, ISO ratings, histograms and all the rest. There will be time to ask questions and demonstrate the advantages of each feature, getting to grips with the “how’s” and “why’s” We will put into practise all the features that have been discussed and demonstrated in session one on a walk around town with your cameras. We will come back to the gallery, learn a little about methods of downloading and viewing photographs, and explore some basic Photoshop tools. Day 2: Exercises, Assignments and Review Question time. There will be a few formal exercises set up to practise on and time to discuss the elements learned in day one. We will also discuss in more detail the more compositional aspects of photography, and prepare for the afternoons’ assignment. You will carry out your assignments outside the gallery and be given a time to return with your completed assignments. Assignment presentations, troubleshooting and review. The last half will involve editing and viewing the photographs, open discussions and asking any final questions. Courses are subject to minimum enrolment. Please register early, within five days of the start date, to reduce the likelihood of course cancellation. Please read our cancellation policy before booking. Students, anyone over the age of 65, and those in receipt of any form of benefits can claim the concessionary price, offering a 10% discount on the full course price. Valid proof of eligibility must be produced on the first day of the course. Please use the code CONCESSION when prompted at checkout.
Are you fascinated by the inner workings of computers and the ever-evolving world of technology? Are you seeking an exciting career path combining your passion for computer maintenance, cybersecurity, and cutting-edge advancements? Look no further! Our comprehensive "Computer Maintenance, PAT & Cyber Security" bundle will equip you with the skills and knowledge needed to thrive in this rapidly growing industry. The need for skilled computer maintenance professionals has never been greater in today's digital landscape. By joining our Computer Maintenance course, you'll gain valuable knowledge and practical skills to set you apart from the competition. Whether you aspire to work in IT helpdesk support, computer repair services, network administration, or cybersecurity, this course covers all the essential aspects to kick-start your career. Learning Outcomes: Develop expertise in building and configuring computers, enabling you to provide comprehensive computer maintenance services. Acquire advanced knowledge of network security, encryption, and cybersecurity principles, empowering you to protect networks and data from cyber threats. Master computer vision using C++ and OpenCV with GPU support, equipping you to work on cutting-edge projects like computer vision and augmented reality. Gain proficiency in troubleshooting Windows 10 issues, enhancing your skills as an IT helpdesk technician and enabling you to resolve complex software problems through our Computer Maintenance course. Obtain certification in Portable Appliance Testing (PAT), enabling you to ensure electrical safety in workplaces and comply with industry regulations. Our comprehensive computer maintenance course bundle is designed to equip you with the skills and knowledge necessary to excel in these in-demand fields. With a focus on practical learning and real-world applications, this bundle offers a unique opportunity to build a strong foundation and open doors to exciting career prospects. Computer Maintenance, PAT & Cyber Security Bundle Curriculum are: Building Your Own Computer Computer Networks Security from Scratch to Advanced Computer Vision By Using C++ and OpenCV with GPU support Advance Windows 10 Troubleshooting for IT HelpDesk Portable Appliance Testing (PAT) Internet of Things Cyber Security Awareness Training Encryption Take advantage of this incredible opportunity to enhance your skills and embark on a rewarding career in computer maintenance, PAT, and cyber security. Enrol now and take the first step towards a future filled with exciting opportunities and job prospects in this fast-paced and ever-evolving industry. CPD 80 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Computer Maintenance course is for: Aspiring computer maintenance professionals. IT helpdesk technicians. Individuals are interested in cybersecurity. Tech enthusiasts. Professionals in the electrical industry. Career path Our Computer Maintenance course will prepare you for a range of careers, including: Computer Maintenance Technician (£20K-£25K) Network Security Analyst (£30K-£45K) IT Helpdesk Technician (£20K-£30K) Cybersecurity Specialist (£40K-£70K+) Computer Vision Engineer (£40K-£60K) Electrical Safety Inspector (£25K-£35K) Certificates Certificate Of Completion Digital certificate - Included Certificate Of Completion Hard copy certificate - Included You will get a complimentary Hard Copy Certificate.
Enhance your expertise in HV/MV power system design and protection coordination with EnergyEdge's virtual instructor-led training. Join now!
Enhance your expertise in HV/MV power system design and protection coordination with EnergyEdge's virtual instructor-led training. Join now!
Description This Cisco CCENT/CCNA Interconnecting Cisco Networking Devices Part 1 (ICND1) Training is the exam associated with the Cisco Certified Entry Network Technician certification and a tangible first step, second being ICND2, in achieving the Cisco Certified Network Associate certification. This Cisco CCENT/CCNA Interconnecting Cisco Networking Devices Part 1 (ICND1) Training will prepare you for this exam. This exam stands to test your knowledge and skills required to successfully install, operate, and troubleshoot a small branch office network. The exam includes topics on networking fundamentals; connecting to a WAN; basic security and wireless concepts; routing and switching fundamentals; the TCP/IP and OSI models; IP addressing; WAN technologies; operating and configuring IOS devices; configuring RIPv2, static and default routing; implementing NAT and DHCP; and configuring simple networks. This course provides the foundational understanding of network Layers 1-3 that are applicable to core routing and switching plus other advanced technologies. All configuration commands are introduced through examples and supported with lab exercises. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our Cisco CCENT/CCNA Interconnecting Cisco Networking Devices Part 1 (ICND1) Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Building a Simple Network Networking Functions FREE 00:20:00 Understanding the Host-to-Host Communications Model 00:22:00 Introducing LANs 00:17:00 Introduction to the IOS 00:32:00 Starting a Switch 00:11:00 Understanding Ethernet and Switch Operation 00:27:00 Troubleshooting Common Switch Media Issues 00:16:00 Perform Switch Startup 00:29:00 Troubleshooting Switch Media Issues 00:09:00 Command Line Help 00:06:00 Establishing Internet Connectivity Understanding the TCPIP Internet Layer 00:31:00 Understanding IP Addressing and Subnets 00:41:00 Understanding the TCPIP Transport Layer 00:24:00 Exploring the Functions of Routing 00:22:00 Configuring a Cisco Router 00:19:00 Exploring the Packet Delivery Process 00:24:00 Enabling Static Routing 00:18:00 Managing Traffic Using ACLs 00:18:00 Enabling Internet Connectivity 00:50:00 Performing Initial Router Setup Media Issues 00:15:00 Connecting to the Internet 00:24:00 Life of a Packet 00:11:00 Managing Network Device Security Securing Administrative Access 00:33:00 Implementing Device Hardening 00:47:00 Implementing Traffic Filtering with ACLs 00:32:00 Ethernet the Security of the Intial Configuration Part 1 00:15:00 Ethernet the Security of the Intial Configuration Part 2 00:22:00 Device Hardening 00:31:00 Filtering Traffic with ACLs 00:12:00 Configuring SSH 00:10:00 Configuring NTP 00:06:00 AAA 00:14:00 DHCP Snooping 00:08:00 Building a Medium-Sized Network Implementing VLANs and Trunks 00:30:00 Routing Between VLANs 00:12:00 Using a Cisco Network Device as a DHCP Server 00:16:00 Introducing WAN Technologies 00:15:00 Introducing Dynamic Routing Protocols 00:32:00 Implementing OSPF 00:40:00 Configuring Expanded Switch Networks 00:24:00 Configuring DHCP Server 00:13:00 Implementing OSPF 00:40:00 Troubleshooting OSPF 00:04:00 Implementing RIPv2 00:12:00 Introducing IPv6 Introducing Basic IPv6 00:23:00 Understanding IPv6 00:11:00 Configuring IPv6 Routing 00:11:00 IPv6 Addresses 00:17:00 Configure and Verify IPv6 Routing 00:20:00 IPv6 ACL 00:11:00 IPv6 RIP 00:16:00 Mock Exam Mock Exam- Cisco CCENT/CCNA Interconnecting Cisco Networking Devices Part 1 (ICND1) Training 00:20:00 Final Exam Final Exam- Cisco CCENT/CCNA Interconnecting Cisco Networking Devices Part 1 (ICND1) Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Duration 5 Days 30 CPD hours This course is intended for The primary audiences for this course are the following: • Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview After successfully completing this course, you should be able to: Identify security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain SRX Series session management. Explain Junos ALG functions and when to use them. Describe policy logging on the SRX series device. Explain security policy scheduling. Describe application security theory. Explain application signature usage in AppID. Describe the AppTrack service. Describe the AppFW service. Describe the AppQoS service. Configure security policies using the AppSecure suite of services. Explain unified security policies. Describe IPS signatures. Configure an IPS policy using pre-defined templates. Describe how to update the IPS attack object database. Describe IPS rules and rule bases. Configure custom attack objects. Describe Junos Space and Security Director. Configure policy management using Security Director. Describe Security Director objects. Explain the different licensing options for Sky ATP List Sky ATP's features and benefits. Configure Sky ATP profiles and enroll an SRX Series device. Configure file scanning on Sky ATP. Configure Sky ATP to scan email Configure GeoIP on Sky ATP. Describe the JATP features and benefits List the JATP device options. Explain the JATP architecture. List 3rd party support options for JATP. Explain JATP SmartCore analytics processes. Describe Policy Enforcer configuration options. Describe Policy Enforcer integration with Sky ATP. Configure Policy Enforcer to block lateral malware movement. Explain Juniper Secure Analytics features and benefits. Describe JSA log collection. Describe JSA network flow collection. Describe the JSA Offense Management workspace. Explain the JSA Risk Manager features. Configure JSA to collect network and log collection. Explain the features of JIMS. Describe JIMS integration into the current AD network. Describe the Sky Enterprise service and how it can save resources. Explain the Sky Enterprise monitoring service. Explain the vSRX Series device benefits. Describe use cases for the vSRX. Explain the cSRX Series device benefits. Describe use cases for the cSRX. Describe SSL Proxy Concepts. Explain Forward and Reverse Proxy and the limitations of each. Configure both Forward and Reverse Proxy. This five-day course uses the Junos J-Web, CLI, Junos Space, and other user interfaces to introduce students to the concept of Juniper Connected Security. Chapter 1: Course Introduction Course Introduction Chapter 2: CLI Overview User Interface Options Command-Line Interface Initial Configuration Interface Configuration Lab 1: CLI Overview Chapter 3: Advanced Security Policy Session Management Junos ALGs Policy Scheduling Policy Logging Lab 2: Advanced Security Policy Chapter 4: Application Security Theory Application ID Application Signatures App Track App Firewall App QoS App QoE Chapter 5: Application Security Implementation AppTrack Implementation AppFW Implementation AppQos Implementation APBR Implementation Lab 3: Application Security Chapter 6: Intrusion Detection and Prevention IPS Overview IPS Policy Attack Objects IPS Configuration IPS Monitoring Lab 4: Implementing IPS Chapter 7: Security Director Overview Security Director Objects Security Director Policy Management Lab 5: Security Director Chapter 8: Sky ATP Implementation Architecture and Key Components Features and Benefits Configuration Compromised Hosts Command and Control File Scanning E-mail Scanning Geo IP Security Policy Integration Troubleshooting Lab 6: Sky ATP Implementation Chapter 9: Policy Enforcer Policy Enforcer Concepts Configuration Options Policy Enforcer Installation Lab 7: Policy Enforcer Chapter 10: JATP Overview Traffic Inspection Threat Detection Threat Analysis JATP Architecture Chapter 11: JATP Implementation Data Collectors Configure SmartCore Analytics Engine Log Ingestion Incident Management SRX Threat Prevention 3rd Party support for Threat Prevention Reporting Lab 8: JATP Chapter 12: Juniper Secure Analytics (JSA) JSA Overview Data Collection Log Analytics Threat Analytics Vulnerability Management Risk Management Lab 9: JSA Chapter 13: JIMS JIMS Overview JIMS Integration Lab 10: JIMS Chapter 14: vSRX and cSRX vSRX Overview vSRX Supported Features vSRX Use Cases cSRX Overview Lab 11: vSRX Installation Chapter 15: SSL Proxy SSL Proxy Overview SSL Concepts SSL Proxy Configurations Troubleshooting Lab 12: SSL Proxy Chapter 16: Cluster Concepts Chassis Cluster Concepts Chassis Cluster Operation Chapter 17: Chassis Cluster Implementation Chassis Cluster Configuration Chassis Cluster Advanced Options Lab 13: Chassis Cluster Implementation Chapter 18: Chassis Cluster Troubleshooting Chassis Cluster Case Studies Troubleshooting Examples Lab 14: Chassis Cluster Troubleshooting Additional course details: Nexus Humans JSEC - Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JSEC - Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for students who want to gain knowledge of basic networking components, TCP/IP, and related services Overview Upon successful completion of this course, students will be able to identify different types of networks, understand TCP/IP protocols, subnetting, name resolution, and configuring various related services This course will introduce students to different types of network environments, understand the processes involved with TCP/IP-based networking, and installing and configuring related services such as DHCP, DNS, Active Directory, and VPNs Basic Network Infrastructure Network Architecture Standards Local Area Networking Wide Area Networking Wireless Networking Connecting Network Devices OSI Model Networking Hardware Introduction to TCP/IP History of TCP/IP TCP/IP Terminology TCP/IP Components in Windows Architectural Overview of TCP/IP TCP/IP Protocol Suite Internet Layer Protocols Transport Layer Protocols IP Addressing IPv4 Addressing IPv6 Addressing Subnetting Subnetting for IPv4 Subnetting for IPv6 IP Routing IP Routing Overview IPv4 Routing Dynamic Host Configuration Protocol DHCP Overview How DHCP Works Windows-based DHCP DHCP Relay Agent Host Name Resolution TCP/IP Naming Schemes Name Resolution Process Domain Name System Overview The Domain Name System Name Resolution Name Server Roles Resource Records Zone Transfers Windows Support for DNS Active Directory Fundamentals DNS Server in Windows Active Directory Integration Windows Internet Name Service Introduction to WINS How WINS Works WINS Client and Server Configuration Virtual Private Networking Virtual Private Networking Overview VPN Protocols VPN Server Installation Troubleshooting TCP/IP Basic Steps Windows Troubleshooting Tools Troubleshooting IPv4 Additional course details: Nexus Humans Network Fundamentals and Implementing TCP/IP training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Network Fundamentals and Implementing TCP/IP course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
With this course, you will be a professional Linux administrator and be able to apply for Linux jobs. You will be able to prepare yourself for the EX-200 exam and become a Redhat Certified System Administrator (RHCSA - EX200).
Duration 3 Days 18 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview Describe the value of MPLS VPNs. Describe the differences between provider-provisioned VPNs and customer-provisioned VPNs. Describe the differences between Layer 2 VPNs and Layer 3 VPNs. List the provider-provisioned MPLS VPN features supported by the JUNOS software. Describe the roles of a CE device, PE router, and P router in a BGP Layer 3 VPN. Describe the format of the BGP routing information, including VPN-IPv4 addresses and route distinguishers. Describe the propagation of VPN routing information within an AS. List the BGP design constraints to enable Layer 3 VPNs within a provider network. Explain the operation of the Layer 3 VPN data plane within a provider network. Create a routing instance, assign interfaces to a routing instance, create routes in a routing instance, and import/export routes from a routing instance using route distinguishers/route targets. Describe the purpose of BGP extended communities, configure extended BGP extended communities, and use BGP extended communities. List the steps necessary for proper operation of a PE-CE dynamic routing protocol. List the troubleshooting and monitoring techniques for routing instances. Explain the difference between the bgp.l3vpn table and the inet.0 table of a routing instance. Monitor the operation of a CE-PE dynamic routing protocol. Explain the operation of a PE mulit-access interface in a Layer 3 VPN and list commands to modify that behavior. Describe ways to support communication between sites attached to a common PE router. Provision and troubleshoot hub-and-spoke Layer 3 VPNs, Describe the flow of control traffic and data traffic in a hub-and-spoke Layer 3 VPN. Describe QoS mechanisms available in L3VPNs. Configure L3VPN over GRE tunnels. Describe the RFC 4364 VPN options. Describe the carrier-of-carriers model. Configure the carrier-of-carriers and ''Option C'' configuration. Describe the flow of control and data traffic in a draft-rosen multicast VPN. Describe the configuration steps for establishing a draft-rosen multicast VPN. Monitor and verify the operation of draft-rosen multicast VPNs. Describe the flow of control traffic and data traffic in a next-generation multicast VPN. Describe the configuration steps for establishing a next-generation multicast VPN. Describe the configuration steps for establishing a next-generation multicast VPN. Monitor and verify the operation of next-generation multicast VPNs. This three-day course is designed to provide students with MPLS-based Layer 3 virtual private network (VPN) knowledge and configuration examples. Chapter 1: Course Introduction Course Introduction Chapter 2: MPLS VPNs MPLS VPNs Provider-Provisioned VPNs Chapter 3: Layer 3 VPNs Layer 3 VPN Terminology VPN-IPv4 Address Structure Operational Characteristics Chapter 4: Basic Layer 3 VPN Configuration Preliminary Steps PE Router Configuration Lab: Layer 3 VPN with Static and BGP Routing Chapter 5: Layer 3 VPN Scaling and Internet Access Scaling Layer 3 VPNs Public Internet Access Options Lab: LDP over RSVP Tunnels and Public Internet Access Chapter 6: Layer 3 VPNs ? Advanced Topics Exchanging Routes between Routing Instances Hub-and-Spoke Topologies Layer 3 VPN CoS Options Layer 3 VPN and GRE Tunneling Integration Layer 3 VPN and IPSec Integration Layer 3 VPN Egress Protection BGP prefix-independent convergence (PIC) edge for MPLS VPNs VRF Localization Provider Edge Link Protection Support for configuring more than 3 million L3VPN Labels Lab: GRE Tunneling Chapter 7: Interprovider Backbones for Layer 3 VPNs Hierarchical VPN Models Carrier-of-Carriers Model Option C Configuration Lab: Carrier of Carrier Layer 3 VPNs Chapter 8: Troubleshooting Layer 3 VPNs Working with Multiple Layers Troubleshooting Commands on a PE Device Multiaccess Interfaces in Layer 3 VPNs PE and CE-based Traceroutes Layer 3 VPN Monitoring Commands Lab: Troubleshooting Layer 3 VPNs Chapter 9: Draft Rosen Multicast VPNs Multicast Overview Draft Rosen MVPN Overvie Draft Rosen MVPN Operation Configuration Monitoring Chapter 10: Next Generation Multicast VPNs Multicast VPN Overview Next-Generation MVPN Operation Configuration Monitoring Internet Multicast Ingress Replication Internet Multicast Signaling and Data Plane Configuring MVPN Internet Multicast Monitoring MVPN Internet Multicast Lab: MVPN Internet Multicast