Embark on a transformative journey with the 'CompTIA CySA+ Cybersecurity Analyst Course,' designed to fortify the digital frontiers of business. This comprehensive training program begins with an immersive introduction to the cybersecurity realm, setting the stage for a deep dive into the sophisticated world of threat data and intelligence. With an emphasis on real-world application, participants will gain invaluable insights into organizational security, developing the acumen to anticipate, identify, and neutralize digital threats. Mastery over vulnerability assessment tools and mitigation strategies forms the bedrock of this curriculum, providing learners with a robust skill set pivotal for the modern cybersecurity landscape. Learning Outcomes Interpret threat data to reinforce organizational security frameworks. Assess vulnerabilities using state-of-the-art tools and methodologies. Apply best practices for ensuring software and hardware assurance. Analyze security solutions for robust infrastructure management. Implement and manage incident response protocols to address potential compromises effectively. Why choose this CompTIA CySA+ Cybersecurity Analyst Course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the CompTIA CySA+ Cybersecurity Analyst Course Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this CompTIA CySA+ Cybersecurity Analyst Course for? Individuals aiming to specialize in cybersecurity analysis. IT professionals seeking to broaden their cybersecurity knowledge. Organizational staff responsible for managing digital security risks. Security consultants requiring up-to-date threat intelligence expertise. System administrators looking to implement enhanced security measures. Career path Cybersecurity Analyst - £25,000 to £60,000 Vulnerability Analyst - £30,000 to £65,000 Security Operations Centre (SOC) Analyst - £32,000 to £70,000 Incident Responder - £27,000 to £68,000 Digital Forensics Specialist - £35,000 to £75,000 Information Security Consultant - £40,000 to £80,000 Prerequisites This CompTIA CySA+ Cybersecurity Analyst Course does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA CySA+ Cybersecurity Analyst Course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Section 01: Introduction Introduction 00:02:00 All about the Exam 00:08:00 What's New on the CompTIA CySA+ Exam? 00:05:00 Meet the Instructors 00:02:00 Thinking like the Enemy 00:09:00 Section 02: The Importance of Threat Data and Intelligence Intelligence Sources and Confidence Levels 00:08:00 Threat Indicators and Actors 00:08:00 Threat Trends 00:07:00 Intelligence Cycle and ISACs 00:06:00 Section 03: Threat Intelligence in Support of Organizational Security Attack Frameworks 00:06:00 Threat Research 00:11:00 Threat Modeling and Intelligence Sharing 00:06:00 Section 04: Vulnerability Assessment Tools Vulnerability Identification 00:07:00 Scanning Parameters and Criteria 00:09:00 Scanning Special Considerations 00:06:00 Validation 00:03:00 Remediation and Mitigation 00:08:00 Inhibitors to Remediation 00:07:00 Section 05: Threats and Vulnerabilities Associated with Specialized Technology Web Applications Scanners, Part 1 00:10:00 Web Applications Scanners, Part 2 00:05:00 Scanning 00:06:00 Configuring and Executing Scans 00:08:00 Vulnerability Scanning 00:10:00 Reverse Engineering 00:08:00 Enumeration 00:06:00 Wireless Assessment Tools 00:08:00 Cloud Assessment Tools 00:04:00 Section 06: Threats and Vulnerabilities Associated with Specialized Technology Mobile and IoT 00:10:00 Embedded and Firmware Systems (RTOS, SoC, and FPGA) 00:09:00 Access and Vehicles Risk 00:08:00 Automation and Control Risk 00:10:00 Section 07: Threats and Vulnerabilities Associated with Operating in the Cloud Cloud Models 00:07:00 Remote Service Invocation (FaaS, IaC, API) 00:10:00 Cloud Vulnerabilities 00:06:00 Section 08: Mitigating Controls for Attacks and Software Vulnerabilities Injection and Overflow Attacks 00:09:00 Authentication Attacks 00:07:00 Exploits 00:08:00 Application Vulnerabilities, Part 1 00:08:00 Application Vulnerabilities, Part 2 00:07:00 Section 09: Security Solutions for Infrastructure Management Network Architecture and Asset Management 00:09:00 Protecting Your Territory 00:05:00 Identity and Access Management 00:11:00 Encryption and Active Defense 00:08:00 Section 10: Software Assurance Best Practices Platforms 00:07:00 SOA and DevSecOps 00:09:00 Secure Software Development 00:08:00 Best Coding Practices 00:04:00 Section 11: Hardware Assurance Best Practices Trusted Hardware 00:10:00 Hardware Encryption 00:04:00 Hardware Security 00:08:00 Section 12: Data Analysis in Security Monitoring Activities Data Analytics 00:10:00 Endpoint Security 00:08:00 Recon Results, Part 1 00:13:00 Recon Results, Part 2 00:05:00 Impact Analysis 00:05:00 Collective Tools 00:09:00 Query Writing 00:07:00 E-mail Analysis, Part 1 00:10:00 E-mail Analysis, Part 2 00:08:00 Section 13: Implement Configuration Changes to Existing Controls to Improve Security Permissions 00:09:00 Firewalls 00:08:00 Intrusion Prevention Rules 00:05:00 DLP and Endpoint Detection 00:05:00 Section 14: The Importance of Proactive Threat Hunting Threat Hunting and the Hypothesis 00:06:00 Threat Hunting Process 00:07:00 Results and Benefits 00:05:00 Section 15: Compare and Contrast Automation Concepts and Technologies Workflow and Scripting 00:07:00 API and Malware Signature Creation 00:08:00 Threat Feeds and Machine Learning 00:06:00 Protocols, Standards, and Software Engineering 00:05:00 Section 16: The Importance of the Incident Response Process IR Roles and Responsibilities 00:08:00 IR Active Preparation 00:10:00 Section 17: Appropriate Incident Response Procedures Incident Response Process 00:07:00 Section 18: Analyze Potential Indicators of Compromise Network Symptoms 00:04:00 Host Symptoms 00:08:00 Application Symptoms 00:04:00 Section 19: Utilize Basic Digital Forensics Techniques Digital Forensics 00:10:00 Seizure and Acquisitions 00:05:00 Forensics Acquisition Tools 00:09:00 Mobile, Virtualization, and Cloud 00:06:00 Forensics Analysis, Part 1 00:04:00 Forensics Analysis, Part 2 00:08:00 Packet Capture 00:12:00 Section 20: The Importance of Data Privacy and Protection Data Privacy and Security 00:06:00 Nontechnical Controls 00:09:00 Technical Controls 00:08:00 Section 21: Security Concepts in Support of Organizational Risk Mitigation Business Impact Analysis 00:05:00 Risk Identification 00:05:00 Risk Calculation and Communication 00:06:00 Training 00:04:00 Supply Chain Assessment 00:04:00 Section 22: The Importance of Frameworks, Policies, Procedures, and Controls Frameworks 00:13:00 Policies and Procedures 00:05:00 Controls and Procedures 00:08:00 Verification 00:06:00 Assignment Assignment - CompTIA CySA+ Cybersecurity Analyst Course 00:00:00
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, and Business Process Owners/Team Leads/Power Users. Overview This course will prepare you to:Describe tasks performed by a typical SAP Access Control userDiscuss Harmonization topics as they relate to SAP Access ControlExplain how SAP GRC helps you to address business challengesIdentify authorization risks in typical business processesDescribe the Segregation of Duties Risk Management ProcessDescribe and configure functionality and features for SAP Access Control 10.1Use the SAP Access Control 10.1 application to analyze and manage risk, design and manage roles, and provision and manage usersDescribe the SAP Access Control 10.1 architecture and landscape, SAP Access Control Repository, and Object Level SecurityDescribe the Periodic Access Review processPlan for and manage emergency accessDiscuss the reporting frameworkConfigure workflows, including multi-stage multi-path (MSMP) workflows and BRF+Describe how the different applications of the SAP GRC Solution integrate with each otherDiscuss key steps in the SAP Access Control implementation process In this course, students gain hands-on configuration and implementation experience of SAP Access Control 10.1, as well as important concepts they will need to know in order to prepare for implementation and ongoing access risk prevention. Introduction to SAP Access Control Discussing Business Challenges and Solutions Using SAP Access Control Architecture, Security, and Authorizations Describing the System Architecture Describing Security and Authorizations Shared Configuration Settings Configuring Shared GRC Settings Configuring Shared SAP Access Control Settings Authorization Risks and the Segregation of Duties (SoD) Management Process Identifying Authorization Risks Managing Risk by Segregating Duties SAP Access Control Repository Synchronizing Objects into the Repository Scheduling and Viewing Background Jobs Risk Analysis Maintaining Shared Master Data Configuring and Maintaining the Rule Set Configuring and Using Audit Trail Tracking Using the Risk Analysis Framework Remediating Risks Mitigating Risks Mitigating Multiple Risks at One Time Business Rule Framework Creating Rules in the Business Rule Framework (BRF) Defining Business Rules Multi-Stage, Multi-Path (MSMP) Workflow Describing Multi-Stage, Multi-Path (MSMP) Workflow Maintaining MSMP Workflow Building MSMP Workflow User Provisioning Configuring User Provisioning Settings Configuring Access Request Forms Requesting Access Preparing Roles and Owner Data for MSMP Workflow Creating Simplified Access Requests Reviewing Search Request Results SAP Fiori User Experience (UX) for GRC Describing SAP Fiori UX Role Design and Management Configuring Role Management Configuring Role Methodology Configuring Role Search Attributes Planning for Technical Role Definition Planning for Business Role Definition Consolidating Roles Through Role Mining Performing Role Mass Maintenance Operations Emergency Access Management Describing Emergency Access Management Planning for Emergency Access Monitoring Emergency Access Periodic Access Review Process Planning Periodic Review Monitoring Periodic Review Reports and Custom Fields Use the Reporting Framework SAP Access Control Implementation Using the SAP Access Control Implementation Process Designing the SAP Access Control Solution Planning Upgrade and Migration Configuring SAP Access Control Implementing the SAP Access Control solution Optimizing the SAP Access Control Suite Additional course details: Nexus Humans GRC300 SAP Access Control Implementation and Configuration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the GRC300 SAP Access Control Implementation and Configuration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4.375 Days 26.25 CPD hours This course is intended for This course provides a jump start on learning material that relates to the CMMC program, and to the planned Certified Professional (CP) certification in particular. It discusses the CMMC program, the current CMMC Model, and other CMMC materials as they exist today. The course may be of interest to individuals who wish to pursue the CMMC-CP certification when it is released. It may also be useful to stakeholders in organizations who will be involved in CMMC assessments, and who wish to gain a general understanding of the program and its requirements for their business planning purposes Overview In this course, you will examine the current CMMC model (Version 1.02), framework, context, and application within the DoD, as well as the expectations and requirements that will be imposed upon organizations that do business with the DoD. It will also help you to identify threats to cybersecurity and privacy within an IoT ecosystem and implement appropriate countermeasures. You will gain the skills to: · Identify risks within the defense supply chain and the established standards for managing them. · Describe how the CMMC model ensures compliance with federal acquisition regulations. · Identify responsibilities of the CMMC Certified Professional, including appropriate ethics and behavior. · Identify regulated information and establish the Certification and Assessment scope boundaries for evaluating the systems that protect that regulated information. · Evaluate OSC readiness and determine the objective evidence you intend to present to the assessor. · Use the NIST 800-171A and CMMC Assessment Guide to assess objective evidence for processes and practices. · Implement and evaluate practices required to meet CMMC maturity level 1. · Implement and evaluate processes and practices required to meet CMMC maturity level 2. · Implement and evaluate processes and practices required to meet CMMC maturity level 3. · Identify processes and practices required to meet CMMC maturity levels 4 and 5. · Work through the logistics of a CMMC assessment, including planning for and conducting the assessment, as well as any follow-up processes, such as remediation and adjudication. The Cybersecurity Maturity Model Certification (CMMC), managed by the CMMC Accreditation Body (CMMC-AB), is a program through which an organization's cybersecurity program is measured by their initial and ongoing compliance with applicable cybersecurity practices as well as their integration of corresponding policies and plans into their overall business operations. By Fiscal Year 2026, all organizations providing products or services to the United States Department of Defense (DoD) must obtain at least a Maturity Level 1 certification under this program. Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses Against Threats Ensuring Compliance through CMMC Topic A: Identify Limitations of Self-Certification Topic B: Identify Benefits of CMMC Topic C: Describe the CMMC Model Architecture Performing the General Responsibilities of a CMMC CP Topic A: Identify Responsibilities of the CMMC CP Topic B: Demonstrate Appropriate Ethics and Behavior Identifying and Scoping Regulated Information Topic A: Identify Regulated Information Topic B: Establish the Certification and Assessment Scope Boundaries Initiating the Assessment Process Topic A: Evaluate Readiness Topic B: Determine Objective Evidence Assessing Objective Evidence Topic A: Assess the Practices Using the CMMC Assessment Guides Topic B: Assess the Processes Using the CMMC Assessment Guide Level 3 Implementing and Evaluating CMMC Level 1 TTopic A: Maturity Level 1 Domains and Practices Topic B: Determine Scope Boundaries at Maturity Level 1 Topic C: Perform a Maturity Level 1 Gap Analysis Topic D: Perform a Maturity Level 1 Evidence Validation Implementing and Evaluating CMMC Levels 2 and 3 Topic A: Process Maturity Requirements for CMMC Levels 2 and 3 Topic B: Maturity Level 2 Practices Topic C: Maturity Level 3 Practices Identifying CMMC Levels 4 and 5 Topic A: Maturity Level 4 Processes and Practices Topic B: Maturity Level 5 Processes and Practices Working Through a CMMC Assessment Topic A: Define the Assessment Logistics Topic B: Resolve Assessment Related Issues Appendix A: Additional Documentation the CP Should Study
Duration 5 Days 30 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy Cisco ASR 9000 Series routers in their network environment. The primary audience for this course includes: System engineers Technical support personnel Channel partners, resellers Overview After taking this course, you should be able to: List and describe the major features and benefits of a Cisco ASR 9000 Series router List and describe the major features and benefits of the Cisco 64-Bit IOS XR operating system Understand data flow through the Cisco ASR 9000 Series router Configure Cisco ASR 9000, back out of configuration changes, and restore older versions of the configuration Install the Cisco IOS XR 64-Bit Software operating system, package information envelopes, and software maintenance updates Enable multicast routing on a Cisco ASR 9900 Series router Configure Layer 3 VPN services Configure Ethernet link bundles Configure local Ethernet Line (E-Line) Layer 2 VPN (L2VPN) Configure Ethernet over Multiprotocol Label Switching (EoMPLS) E-Line L2VPN Configure EoMPLS with pseudowire backup Configure local Ethernet LAN(E-LAN) L2VPN Describe Virtual Private LAN Service (VPLS) L2VPN Describe VPLS with Border Gateway Protocol (BGP) autodiscovery Configure service-based Connectivity Fault Management (CFM) Configure Layer 2 multicast features Describe basic QoS implementation Describe how to configure and verify network Virtualization (nV) on the ASR 9000 series The Cisco Aggregation Services Router 9000 Series Essentials (ASR9KE) v6.0 course introduces you to the features and functions of the Cisco© Aggregation Services Router (ASR) 9000 Series platforms. Through a combination of lecture and hands-on labs, you will gain an understanding of all major aspects of the platform, including hardware, Layer 2 and Layer 3 services, routing protocols including Segment Routing, Layer 2 and Layer 3 multicast, Quality of Service (QoS) features, and network virtualization. The course investigates Cisco Internetworking Operating System (IOS) XR 64-Bit Linux-based feature parity in the environment, as well as how to install Cisco IOS© XR 64-Bit software packages. Cisco ASR 9000 Series Hardware Examining the Cisco ASR 9000 Series Chassis Examining the Cisco ASR 9000 Series Architecture Examining the Route Switch Processor/ Route Processor (RSP/RP) Functions and Fabric Architecture Examining the Cisco ASR 9000 Series Line Card Examining the Cisco ASR 9000 Power Subsystems Cisco IOS XR 64-Bit Software Architecture and Linux Fundamentals Cisco IOS XR 64-Bit Software Fundamentals Cisco ASR 9000 IOS XR 64-Bit vs. 32-Bit Exploring Linux Fundamentals Cisco IOS XR 64-Bit Software Installation Examining Resource Allocations and Media Mappings Migrating to Cisco IOS XR 64-Bit Software Performing Disaster Recovery Installing Software Packages Cisco IOS XR 64-Bit Software Configuration Basics Configuring Cisco IOS XR 64-Bit Basic Operations Cisco IOS XR 64-Bit Initial Configuration Reviewing the Configuration Cisco IOS XR 64-Bit Software Routing Protocols Exploring Intermediate System to Intermediate System (IS-IS) Exploring OSPF Exploring BGP Exploring Routing Protocol for LLN Multicast Routing Exploring Multicast Routing Exploring Protocol Independent Multicast (PIM) Cisco Multiprotocol Label Switching Examining the MPLS Forwarding Infrastructure Implementing the MPLS Label Distribution Protocol (LDP) Cisco IOS XR 64-Bit Segment Routing Segment Routing Concepts Interior Gateway Protocol Segment Routing (IGP SR) Control Plane Overview Prefix and Adjacency Segment IDs (SIDs) SR IS-IS Multi-Level and OSPF Multi-Area IS-IS SR Configuration and Verification OSPF SR Configuration and Verification Layer 3 VPNs Examining L3VPNs Exploring L3VPN Control and Data Flow Configuring L3VPNs Verifying the L3VPN Operation Cisco ASR 9000 Layer 2 Architecture Examining Carrier Ethernet and Flexible Ethernet Edge Comparing Layer 2 and Layer 3 VPNs Examining the ASR 9000 Layer 2 Infrastructure and Ethernet Flow Points (EFPs) Layers 2 and 3 Coexistence and VLAN Tag Manipulation Exploring the Layer 2 Network Infrastructure Point-to-Point Layer 2 Services Point-to-Point Alternating Current-Alternating Current (AC-AC) and Attachment Circuit Redundancy Point-to-Point AC-Pseudowire (PW) Cross-Connect Examining Pseudowire Redundancy and Resiliency Layer 2 Multicast Examining the Cisco ASR 9000 Series Multicast Implementing Multicast Quality of Service QoS Basics and the Modular QoS CLI (MQC) Mode Layer 2 QoS Example
Duration 3 Days 18 CPD hours This course is intended for This course is intended for: DevOps engineers DevOps architects Operations engineers System administrators Developers Overview In this course, you will learn to: Use DevOps best practices to develop, deliver, and maintain applications and services at high velocity on AWS List the advantages, roles and responsibilities of small autonomous DevOps teams Design and implement an infrastructure on AWS that supports DevOps development projects Leverage AWS Cloud9 to write, run and debug your code Deploy various environments with AWS CloudFormation Host secure, highly scalable, and private Git repositories with AWS CodeCommit Integrate Git repositories into CI/CD pipelines Automate build, test, and packaging code with AWS CodeBuild Securely store and leverage Docker images and integrate them into your CI/CD pipelines Build CI/CD pipelines to deploy applications on Amazon EC2, serverless applications, and container-based applications Implement common deployment strategies such as 'all at once,' 'rolling,' and 'blue/green' Integrate testing and security into CI/CD pipelines Monitor applications and environments using AWS tools and technologies DevOps Engineering on AWS teaches you how to use the combination of DevOps cultural philosophies, practices, and tools to increase your organization?s ability to develop, deliver, and maintain applications and services at high velocity on AWS. This course covers Continuous Integration (CI), Continuous Delivery (CD), infrastructure as code, microservices, monitoring and logging, and communication and collaboration. Hands-on labs give you experience building and deploying AWS CloudFormation templates and CI/CD pipelines that build and deploy applications on Amazon Elastic Compute Cloud (Amazon EC2), serverless applications, and container-based applications. Labs for multi-pipeline workflows and pipelines that deploy to multiple environments are also included. Module 0: Course overview Course objective Suggested prerequisites Course overview breakdown Module 1: Introduction to DevOps What is DevOps? The Amazon journey to DevOps Foundations for DevOps Module 2: Infrastructure automation Introduction to Infrastructure Automation Diving into the AWS CloudFormation template Modifying an AWS CloudFormation template Demonstration: AWS CloudFormation template structure, parameters, stacks, updates, importing resources, and drift detection Module 3: AWS toolkits Configuring the AWS CLI AWS Software Development Kits (AWS SDKs) AWS SAM CLI AWS Cloud Development Kit (AWS CDK) AWS Cloud9 Demonstration: AWS CLI and AWS CDK Hands-on lab: Using AWS CloudFormation to provision and manage a basic infrastructure Module 4: Continuous integration and continuous delivery (CI/CD) with development tools CI/CD Pipeline and Dev Tools Demonstration: CI/CD pipeline displaying some actions from AWS CodeCommit, AWS CodeBuild, AWS CodeDeploy and AWS CodePipeline Hands-on lab: Deploying an application to an EC2 fleet using AWS CodeDeploy AWS CodePipeline Demonstration: AWS integration with Jenkins Hands-on lab: Automating code deployments using AWS CodePipeline Module 5: Introduction to Microservices Introduction to Microservices Module 6: DevOps and containers Deploying applications with Docker Amazon Elastic Container Service and AWS Fargate Amazon Elastic Container Registry and Amazon Elastic Kubernetes service Demonstration: CI/CD pipeline deployment in a containerized application Module 7: DevOps and serverless computing AWS Lambda and AWS Fargate AWS Serverless Application Repository and AWS SAM AWS Step Functions Demonstration: AWS Lambda and characteristics Demonstration: AWS SAM quick start in AWS Cloud9 Hands-on lab: Deploying a serverless application using AWS Serverless Application Model (AWS SAM) and a CI/CD Pipeline Module 8: Deployment strategies Continuous Deployment Deployments with AWS Services Module 9: Automated testing Introduction to testing Tests: Unit, integration, fault tolerance, load, and synthetic Product and service integrations Module 10: Security automation Introduction to DevSecOps Security of the Pipeline Security in the Pipeline Threat Detection Tools Demonstration: AWS Security Hub, Amazon GuardDuty, AWS Config, and Amazon Inspector Module 11: Configuration management Introduction to the configuration management process AWS services and tooling for configuration management Hands-on lab: Performing blue/green deployments with CI/CD pipelines and Amazon Elastic Container Service (Amazon ECS) Module 12: Observability Introduction to observability AWS tools to assist with observability Hands-on lab: Using AWS DevOps tools for CI/CD pipeline automations Module 13: Reference architecture (Optional module) Reference architectures Module 14: Course summary Components of DevOps practice CI/CD pipeline review AWS Certification
Duration 1 Days 6 CPD hours This course is intended for This course is intended for the following participants: Individuals planning to deploy applications and create application environments on Google Cloud Platform Developers, systems operations professionals, and solution architects getting started with Google Cloud Platform Executives and business decision makers evaluating the potential of Google Cloud Platform to address their business needs. Overview This course teaches participants the following skills: Identify Google Cloud counterparts for Azure IaaS, Azure PaaS, Azure SQL, Azure Blob Storage, Azure Application Insights, and Azure Data Lake Configure accounts, billing, projects, networks, subnets, firewalls, VMs, disks, auto scaling, load balancing,storage, databases, IAM, and more Manage and monitor applications Explain feature and pricing model differences This 1-day instructor led course introduces Azure professionals to the core capabilities of Google Cloud in the four technology pillars: networking, compute, storage, and database. It is designed for Azure system administrators, Solution Architects and SysOps Administrators familiar with Azure features and setup; and want to gain experience configuring Google Cloud products immediately. With presentations, demos, and hands-on labs, participants get details of similarities, differences, and initial how-tos quickly. Introducing Google Cloud Explain the advantages of Google Cloud. Define the components of Google's network infrastructure, including: Points of presence, data centers, regions, and zones. Understand the difference between Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS). Getting Started with Google Cloud Identify the purpose of projects on Google Cloud. Understand how Azure's resource hierarchy differs from Google Cloud's Understand the purpose of and use cases for Identity and Access Management. Understand how Azure AD differs from Google Cloud IAM. List the methods of interacting with Google Cloud. Launch a solution using Cloud Marketplace. Virtual Machines in the Cloud Identify the purpose and use cases for Google Compute Engine Understand the basics of networking in Google Cloud. Understand how Azure VPC differs from Google VPC. Understand the similarities and differences between Azure VM and Google Compute Engine. Understand how typical approaches to load-balancing in Google Cloud differ from those in Azure. Deploy applications using Google Compute Engine Storage in the Cloud Understand the purpose of and use cases for: Cloud Storage, Cloud SQL, Cloud Bigtable and Cloud Datastore. Understand how Azure Blob compares to Cloud Storage. Compare Google Cloud?s managed database services with Azure SQL. Learn how to choose among the various storage options on Google Cloud. Load data from Cloud Storage into BigQuery Containers in the Cloud Define the concept of a container and identify uses for containers. Identify the purpose of and use cases for Google Container Engine and Kubernetes. Understand how Azure Kubernetes Service differs from from Google Kubernetes Engine. Provision a Kubernetes cluster using Kubernetes Engine. Deploy and manage Docker containers using kubectl Applications in the Cloud Understand the purpose of and use cases for Google App Engine. Contrast the App Engine Standard environment with the App Engine Flexible environment. Understand how App Engine differs from Azure App Service. Understand the purpose of and use cases for Google Cloud Endpoints. Developing, Deploying and Monitoring in the Cloud Understand options for software developers to host their source code. Understand the purpose of template-based creation and management of resources. Understand how Google Cloud Deployment Manager differs from Azure Resource Manager. Understand the purpose of integrated monitoring, alerting, and debugging Understand how Google Monitoring differs from Azure Application Insights and Azure Log Analytics. Create a Deployment Manager deployment. Update a Deployment Manager deployment. View the load on a VM instance using Google Monitoring. Big Data and Machine Learning in the Cloud Understand the purpose of and use cases for the products and services in the Google Cloud big data and machine learning platforms. Understand how Google Cloud BigQuery differs from Azure Data Lake. Understand how Google Cloud Pub/Sub differs from Azure Event Hubs and Service Bus. Understand how Google Cloud?s machine-learning APIs differ from Azure's. Load data into BigQuery from Cloud Storage. Perform queries using BigQuery to gain insight into data Summary and Review Review the products that make up Google Cloud and remember how to choose among them Understand next steps for training and certification Understand, at a high level, the process of migrating from Azure to Google Cloud.
Step into the captivating world of Functional Skills Maths Level 2, a course that transcends mere numbers. It's not just about equations; it's about empowering you to conquer challenges and infuse confidence into your every step. Imagine a world where percentages aren't daunting but doors opening to financial empowerment. Functional Skills Maths Level 2 equips learners with essential mathematical competencies. This course addresses real-world challenges, empowering individuals to navigate daily life, business, and further education with confidence. Proficiency in BODMAS, decimals, ratios, and more provides tangible benefits, fostering problem-solving and decision-making skills. Students gain a competitive edge in personal and professional spheres, improving their prospects and contributing to a numerically literate society. By mastering concepts like percentages and unitary methods, learners enhance their financial acumen, crucial for managing personal finances or pursuing business ventures. This course is a gateway to unlocking opportunities, and fostering a deeper understanding of mathematical applications in diverse contexts. The practical skills acquired are invaluable for achieving academic success, career advancement, and overall personal development. Learning Outcomes Apply rules of BODMAS for accurate mathematical simplification. Demonstrate proficiency in working with integers and directed numbers. Master calculations involving decimals, percentages, and scientific notation. Analyse and solve problems related to profit, loss, discount, and tax. Utilise unitary methods in practical applications and problem-solving scenarios. Understand and apply concepts of ratio, proportion, and fractions effectively. Successfully estimate and approximate numerical values in real-world situations. Comprehend the principles of factors, multiples, and their mathematical relationships. Apply mathematical skills to solve mock and final exam questions effectively. Who is this Award in Functional Skills Maths at QLS Level 2 Course For? Individuals seeking practical math skills for daily life. Students aiming for academic success and confidence in mathematics. Professionals looking to enhance their financial literacy. Entrepreneurs and business enthusiasts want sound mathematical foundations. Anyone wanting to improve problem-solving abilities through practical math. Why Choose This Award in Functional Skills Maths at QLS Level 2 Course Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Career Path Administrative roles: Administrative Assistant (£18,000 - £25,000 per year) Retail positions: Retail Manager (£20,000 - £45,000 per year) Finance sector: Junior Accountant (£20,000 - £30,000 per year) Business ownership: Small Business Owner (Earnings vary widely) Further studies: Access to higher-level math courses for specialised careers. Prerequisites This Functional Skills Maths - Level 2 is open to all, irrespective of prior qualifications. Enrolling is simple, and the course, created by experts, functions seamlessly on PCs, Macs, tablets, and smartphones. With accessibility from any location with a reliable internet connection, this course provides convenient learning options. Certification After finishing the course content, you'll encounter a written assignment test. Upon successful completion, you can acquire a PDF certificate for a fee of £4.99. If you prefer a physical copy, you can order an original hard copy for an extra £8. Endorsed Certificate of Achievement from the Quality Licence Scheme Learners will be able to achieve an endorsed certificate after completing the course as proof of their achievement. You can order the endorsed certificate for only £75 to be delivered to your home by post. For international students, there is an additional postage charge of £10. Endorsement The Quality Licence Scheme (QLS) has endorsed this course for its high-quality, non-regulated provision and training programmes. The QLS is a UK-based organisation that sets standards for non-regulated training and learning. This endorsement means that the course has been reviewed and approved by the QLS and meets the highest quality standards. Please Note: Studyhub is a Compliance Central approved resale partner for Quality Licence Scheme Endorsed courses. Course Curriculum Integers ( Directed Numbers) Lecture 1 Introduction 00:02:00 Lecture 2 Multiplying any digit number by 11, 22, and 33 00:09:00 Lecture 3 Integers and ordering of integers 00:06:00 Lecture 4 Addition and Subtractions of Integers 00:07:00 Lecture 5 Operations on Integers 00:04:00 Lecture 6 Multiplication and Division of Integers 00:04:00 Lecture 7 Powers of Integers (Exponents) 00:04:00 Factors and Multiples Lecture 8 Complete knowledge about factors and multiples 00:06:00 Lecture 9 Divisibility tests for 2,3,4,5,6 00:07:00 Lecture 10 Divisibility rules 7,8,9,10,11 00:06:00 Lecture 11 Prime Factorization 00:06:00 Lecture 12 Highest Common Factor HCF 00:10:00 Lecture 13 Least Common Multiple LCM 00:16:00 Lecture 14 Relation between LCM and HCF 00:04:00 Fractions Lecture 15 Classification of Fractions 00:04:00 Lecture 16 Convert mixed to improper and improper to mixed fractions 00:03:00 Lecture 17 Equivalent Fractions 00:04:00 Lecture 18 Comparing Fractions after converting to like fractions 00:09:00 Lecture 19 Reducing a fraction to lowest term 00:04:00 Lecture 20 Addition and subtraction OF fractions 00:08:00 Lecture 21 Multiplication and division of fractions 00:11:00 Lecture 22 Word problems on fractions 00:16:00 Simplification Rule : BODMAS Lecture 23 BODMAS and rules to remove brackets 00:03:00 Lecture 24 Simplify expressions using BODMAS rules 00:05:00 Lecture 25 Simplify expressions involving fractions using BODMAS 00:07:00 Decimal numbers Lecture 26 Decimal numbers in relation to fractions 00:08:00 Lecture 27 Like and unlike Decimals 00:05:00 Lecture 28 Ordering of Decimal numbers 00:10:00 Lecture 29 Addition and subtraction of Decimal 00:07:00 Lecture 30 Multiplication of Decimal 00:03:00 Lecture 31 Division of Decimal 00:05:00 Rational Numbers Lecture 32 Rational number 00:02:00 Lecture 33 Representation of Rational Numbers on Number line 00:04:00 Lecture 34 Determining which fraction is terminating or non terminating 00:05:00 Lecture 35 shortcut method of writing decimal expansion of fraction to decimal 00:08:00 Approximation Lecture 36 Rounding to whole number 00:06:00 Lecture 37 Rounding to required number of decimals (1 d.p. ) 00:05:00 Lecture 38 rounding to significant digits 00:07:00 Lecture 39 Practice question on three methods of approximation 1 00:05:00 Estimation and Scientific Notation or Standard form Lecture 40 Estimation 00:05:00 Lecture 41 Scientific Notation 00:07:00 Lecture 42 Operation on numbers when they are in scientific notation 00:06:00 Percentage Lecture 43 Percentage to fraction and fraction to percentage 00:06:00 Lecture 44 Percentage of a quantity and conversation to decimal 00:06:00 Lecture 45 Expressing one quantity as percentage of another quantity 00:06:00 Lecture 46 Finding increase decrease percent 00:05:00 Lecture 47 Uses of percentages-Word Problems 00:09:00 Ratio and Proportion Lecture 48 Ratio- How to express as simple ratio 00:09:00 Lecture 49 How to compare Ratios 00:04:00 Lecture 50 Word problems on finding ratios 00:07:00 Lecture 51 To divide a given quantity into a given Ratio 00:11:00 Lecture 52 Proportion 00:04:00 Lecture 53 Practice problems on Proportion 00:06:00 Lecture 54 Continued proportion 00:06:00 Unitary Method and its Applications Lecture 55 Direct Variation ( or proportion) 00:04:00 Lecture 56 Problems based on Direct proportion 00:10:00 Lecture 57 Inverse Variation ( or proportion) 00:10:00 Lecture 58 Multiple Ratios 00:10:00 Profit , Loss, discount and Tax Lecture 59 Basics - Profit and Loss 00:04:00 Lecture 60 More practice problems on Profit & Loss 00:06:00 Lecture 61 Selling price formula and Problems 00:04:00 Lecture 62 Cost price formula and Problems 00:03:00 Lecture 63 Higher problems on Profit and Loss 00:08:00 Lecture 64 Basics - Discount.mp4 00:05:00 Lecture 65 Practice problems on Discount 00:04:00 Lecture 66 Tax 00:06:00 Mock Exam Mock Exam - Award in Functional Skills Maths at QLS Level 2 00:20:00 Final Exam Final Exam - Award in Functional Skills Maths at QLS Level 2 00:20:00 Order your QLS Endorsed Certificate Order your QLS Endorsed Certificate 00:00:00
Course Overview Gain an excellent understanding of power electronics and power systems by taking this Power Electronics for Electrical Engineering course. The Power Electronics for Electrical Engineering course will provide a thorough overview of power electronics fundamentals and their importance. Here, you will learn about the power electronics components and understand the working principle of rectifier circuits. Furthermore, you will learn about the design and implementation of AC and DC choppers and explore the fundamentals of inverters in power electronics. Learning Outcomes Identify the primary purpose of power electronics Understand how power electronics work Know about rectifiers and their operations Determine how AC and DC choppers work Gain insights into the inverter fundamentals and types Who is this course for? Anyone interested in improving their knowledge of electrical circuit analysis can take this Power Electronics for Electrical Engineering course. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path Power Electronics for Electrical Engineering course offers useful skills to possess and would be beneficial for any relevant profession or career such as: Electronics: Apprentice Electrician Electronics: Industrial Electricians Electronics: Commercial Electrician Electronics: Residential Electrician Electronics: Maintenance Electrician Auto Electrician Unit 1- Introduction to Power Electronics Components Module 1- Introduction to Power Electronics 00:13:00 Module 2- Uncontrolled Switches 00:17:00 Module 3- What is the Benefit of Diode 00:06:00 Module 4- Semi-Controlled Switches Part 1 00:09:00 Module 5- Semi-Controlled Switches Part 2 00:14:00 Module 6- Semi-Controlled Switches Part 3 00:05:00 Module 7- What is the Benefit of Thyristor 00:05:00 Module 8- Fully Controlled Switches Part 1 00:17:00 Module 9- Fully Controlled Switches Part 2 00:10:00 Module 10- Fully Controlled Switches Part 3 00:12:00 Unit 2- Fundamentals of Rectifier Circuits Module 1- Overview on Rectifiers 00:02:00 Module 2- Rectifier Definition 00:01:00 Module 3- Half Wave Uncontrolled Rectifier with R Load 00:21:00 Module 4- Example on Half Wave Uncontrolled Rectifier with R Load Part 1 00:06:00 Module 5- Example on Half Wave Uncontrolled Rectifier with R Load Part 2 00:07:00 Module 6- Half Wave Uncontrolled Rectifier with RL Load 00:10:00 Module 7- Derivation of the Discontinuous Current in R-L Load 00:08:00 Module 8- Freewheeling Diode (Commutation Diode) 00:03:00 Module 9- Half Wave R-L Load with FWD 00:09:00 Module 10- Difference Between Continuous and Discontinuous Mode in RL Load 00:07:00 Module 11- Half Wave RL Load with FWD Continuous Mode 00:06:00 Module 12- Example on Half Wave Rectifier with FWD 00:07:00 Module 13- Bridge Full Wave Uncontrolled Rectifier Part 1 00:07:00 Module 14- Bridge Full Wave Uncontrolled Rectifier Part 2 00:05:00 Module 15- Quick Revision on Bridge Full Wave Uncontrolled Rectifier 00:06:00 Module 16- Firing Angle 00:02:00 Module 17- Half Wave Controlled Rectifier R Load 00:05:00 Module 18- Half Wave Controlled Rectifier R-L Load 00:04:00 Module 19- Half Controlled R-L Load with FWD 00:06:00 Module 20- Example 1 00:07:00 Module 21- Example 2 00:08:00 Module 22- Example 3 00:13:00 Module 23- Example 4 00:09:00 Module 24- Example 5 00:05:00 Module 25- Fully Controlled Bridge Rectifier Part 1 00:06:00 Module 26- Fully Controlled Bridge Rectifier Part 2 00:06:00 Module 27- Quick Revision on Bridge Full Wave Controlled Rectifier 00:02:00 Module 28- Example 6 00:08:00 Module 29- Half Controlled Bridge Rectifier 00:08:00 Module 30- Half Controlled Bridge Rectifier with FWD 00:05:00 Module 31- Example 7 00:06:00 Module 32- Example 8 00:07:00 Module 33- Performance Parameters 00:04:00 Module 34- Power Factor 00:04:00 Unit 3- Fundamentals of AC Choppers Module 1- Introduction to AC Choppers 00:02:00 Module 2- Definition of AC Choppers 00:05:00 Module 3- Switching Techniques in AC Choppers 00:06:00 Module 4- Applications on AC Choppers 00:03:00 Module 5- Types of AC Choppers 00:02:00 Module 6- AC Chopper with R Load 00:14:00 Module 7- Example 1 on AC Chopper with R Load 00:06:00 Module 8- Example 2 on AC Chopper with R Load 00:04:00 Module 9- AC Chopper with L Load Part 1 00:13:00 Module 10- AC Chopper with L Load Part 2 00:06:00 Module 11- Example on AC Chopper with L Load 00:08:00 Module 12- AC Chopper with RL Series Load 00:20:00 Module 13- Example on AC Chopper with RL Series Load 00:07:00 Module 14- AC Chopper with RL Parallel Load 00:25:00 Module 15- Example on AC Chopper with RL Parallel Load 00:06:00 Module 16- AC Chopper with Pure Capacitive Load 00:14:00 Module 17- Example on AC Chopper with Pure Capacitive Load 00:04:00 Module 18- AC Chopper Loaded by Heavy Rectifier 00:06:00 Module 19- AC Chopper Loaded by an AC Motor with Sinusoidal Back Emf 00:12:00 Module 20- Example on AC Chopper Loaded by an AC Motor with Sinusoidal Back Emf 00:08:00 Module 21- Integral Cycle Control 00:11:00 Module 22- Example on Integral Cycle Control 00:04:00 Unit 4- Fundamentals of DC Choppers Module 1- Introduction to DC Choppers 00:02:00 Module 2- Definition and Application of DC Choppers 00:05:00 Module 3- Step down DC Chopper with R Load 00:12:00 Module 4- Example on Step Down DC Chopper with R Load 00:08:00 Module 5- Generation of Duty Cycle 00:09:00 Module 6- Switching Techniques 00:03:00 Module 7- Step Down DC Chopper with RLE Load Part 1 00:19:00 Module 8- Step Down DC Chopper with RLE Load Part 2 00:15:00 Module 9- Example 1 on Step Down DC Chopper with RLE Load 00:13:00 Module 10- Example 2 on Step Down DC Chopper with RLE Load 00:02:00 Module 11- Step Up DC Chopper with R or RL Load 00:09:00 Module 12- Step Up DC Chopper with RE Load 00:15:00 Module 13- Example on Step Up DC Chopper with RE Load 00:20:00 Module 14- Buck Regulator Part 1 00:16:00 Module 15- Buck Regulator Part 2 00:17:00 Module 16- Example on Buck Regulator 00:03:00 Module 17- Boost Regulator 00:23:00 Module 18- Example on Boost Regulator 00:06:00 Module 19- Buck Boost Converter 00:17:00 Module 20- Example on Buck-Boost Converter 00:05:00 Unit 5- Fundamentals of Inverters Module 1- Introduction to Inverters 00:02:00 Module 2- Definition of Inverters 00:04:00 Module 3- Importance and Applications of Inverters 00:08:00 Module 4- Single Phase Half Bridge R-Load 00:15:00 Module 5- Single Phase Half Bridge RL- Load 00:08:00 Module 6- Performance Parameters of an Inverter 00:05:00 Module 7- Example on Single Phase Half Bridge 00:10:00 Module 8- Single Phase Bridge Inverter R- Load 00:06:00 Module 9- Single Phase Bridge Inverter RL- Load 00:07:00 Module 10- Example on Single Phase Bridge Inverter 00:06:00 Module 11- Three Phase Inverters and Obtaining the Line Voltages 00:15:00 Module 12- Three Phase Inverters and Obtaining The Phase Voltages 00:17:00 Module 13- Example on Three Phase Inverters 00:16:00 Module 14- Single Pulse Width Modulation 00:13:00 Module 15- Multiple Pulse Width Modulation 00:13:00 Module 16- Example on Multiple Pulse Width Modulation 00:04:00 Module 17- Sinusoidal Pulse Width Modulation 00:16:00 Module 18- Industrial Inverter 00:03:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Unlock your career potential with the Microbiology Lab Technician Diploma. This comprehensive online course covers essential topics, including microbial diversity, laboratory safety, and clinical practices. Gain practical skills and theoretical knowledge to thrive in medical laboratory services. Enrol now to become a qualified microbiology lab technician!
Become a skilled Lab Technician with our Lab Technician Online Course. Master essential skills, laboratory techniques, and equipment operation to excel in medical lab services. Enrol now for hands-on training and earn a globally recognised CPD certificate!