Duration 5 Days 30 CPD hours This course is intended for Security Professionals working with Kubernetes Clusters Container Orchestration Engineers DevOps Professionals Overview In this course, students will learn and practice essential Kubernetes concepts and tasks in the following sections: Cloud Security Fundamentals Cluster Hardening System Hardening Minimize Microservice Vulnerabilities Supply Chain Security Disaster Recovery Secure Back-up and Restore This class prepares students for the Certified Kubernetes Security Specialist (CKS) exam. Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stabilitywhile maximizing resource utilization for applications and services. By the conclusion of this hands-on, vendor agnostic training you will be equipped with a thorough understanding ofcloud security fundamentals, along with the knowledge, skills and abilities to secure a Kubernetes cluster, detect threats, and properly resolve a security catastrophe. This courseincludes hands-on instruction which develops skills and knowledge for securing container-based applications and Kubernetes platforms, during build, deployment, and runtime. We prioritizecovering all objectives and concepts necessary for passing the Certified Kubernetes Security Specialist (CKS) exam. You will be provided the components necessary to assemble your ownhigh availability Kubernetes environment and harden it for your security needs. Learning Your Environment Underlying Infrastructure Using Vim Tmux Cloud Security Primer Basic Principles Threat Analysis Approach CIS Benchmarks Securing your Kubernetes Cluster Kubernetes Architecture Pods and the Control Plane Kubernetes Security Concepts Install Kubernetes using kubeadm Configure Network Plugin Requirements Kubeadm Basic Cluster Installing Kubeadm Join Node to Cluster Kubeadm Token Manage Kubeadm Tokens Kubeadm Cluster Upgrade Securing the kube-apiserver Configuring the kube-apiserver Enable Audit Logging Falco Deploy Falco to Monitor System Calls Enable Pod Security Policies Encrypt Data at Rest Encryption Configuration Benchmark Cluster with Kube-Bench Kube-Bench Securing ETCD ETCD Isolation ETCD Disaster Recovery ETCD Snapshot and Restore Purge Kubernetes Purge Kubeadm 3Purge Kubeadm Image Scanning Container Essentials Secure Containers Creating a Docker Image Scanning with Trivy Trivy Snyk Security Manually Installing Kubernetes Kubernetes the Alta3 Way Deploy Kubernetes the Alta3 Way Validate your Kubernetes Installation Sonobuoy K8s Validation Test Kubectl (Optional) Kubectl get and sorting kubectl get kubectl describe Labels (Optional) Labels Labels and Selectors Annotations Insert an Annotation Securing your Application Scan a Running Container Tracee Security Contexts for Pods Understanding Security Contexts AppArmor Profiles AppArmor Isolate Container Kernels gVisor Pod Security Pod Security Policies Deploy a PSP Pod Security Standards Enable PSS Open Policy Agent (OPA) Admission Controller Create a LimitRange Open Policy Agent Policy as Code Deploy Gatekeeper User Administration Contexts Contexts Authentication and Authorization Role Based Access Control Role Based Access Control RBAC Distributing Access Service Accounts Limit Pod Service Accounts Securing Secrets Secrets Create and Consume Secrets Hashicorp Vault Deploy Vault Securing the Network Networking Plugins NetworkPolicy Deploy a NetworkPolicy mTLS Linkerd mTLS with istio istio Threat Detection Active Threat Analysis Host Intrusion Detection Deploy OSSEC Network Intrusion Detection Deploy Suricata Physical Intrusion Detection Disaster Recovery Harsh Reality of Security Deploy a Response Plan Kasten K10 Backups Deploy K10
Duration 5 Days 30 CPD hours This course is intended for The Microsoft Technology Associate (MTA) is Microsoft?s newest suite of technology certification exams that validate fundamental knowledge needed to begin building a career using Microsoft technologies. This program provides an appropriate entry point to a future career in technology and assumes some hands-on experience or training but does not assume on-the-job experience. Overview This five-day Training 2-Pack helps you prepare for Microsoft Technology Associate Exams 98-366 and 98-367, and build an understanding of these topics: Network Infrastructures, Network Hardware, Protocols and Services, Security Layers, Operating System Security, Network Security, Security Software. These courses leverage the same content as found in the Microsoft Official Academic Courses (MOAC) for these exams. Understand Network InfrastructuresUnderstand Network HardwareUnderstand Protocols and ServicesUnderstand Security LayersUnderstand Operating System SecurityUnderstand Network SecurityUnderstand Security Software UNDERSTANDING LOCAL AREA NETWORKINGDEFINING NETWORKS WITH THE OSI MODELUNDERSTANDING WIRED AND WIRELESS NETWORKSUNDERSTANDING INTERNET PROTOCOLIMPLEMENTING TCP/IP IN THE COMMAND LINEWORKING WITH NETWORKING SERVICESUNDERSTANDING WIDE AREA NETWORKSDEFINING NETWORK INFRASTRUCTURES AND NETWORK SECURITYUNDERSTANDING SECURITY LAYERSAUTHENTICATION, AUTHORIZATION, AND ACCOUNTINGUNDERSTANDING SECURITY POLICYUNDERSTANDING NETWORK SECURITYPROTECTING THE SERVER AND CLIENT
(5-7yrs) The syllabus is based on the ISTD grade however we do also incorporate an imaginative playful approach to the work to keep the Ballet fun. As well as using a range of music from the latest pop songs to great musical theatre songs (old and new!) JazzPops offers a range of dance throughout the term with a dash of some musical games TRIAL BOOKINGS: Of course you are welcome to watch the trial class but following the trial, WhizzDancers are expected to be independent in the room. TERM BOOKINGS: You are welcome to watch the first class but following this your WhizzDancer will be expected to go in the class independently. You will be expected to provide full uniform. Details will be sent following. We have lots of opportunities ahead for your WhizzDancer including exams and shows. We look forward to meeting them in the studio :) Upstairs Dance Studio Please bring: - Comfortable clothes to move in (no zips or demin) - No ballet shoes required for the trial Please contact info@whizzdance.com for more information on how to book your free trial.
(5-8yrs) Using a range of music from the latest pop songs to great musical theatre songs (old and new!) JazzPops offers a range of dance throughout the term with a dash of some musical games. Combined with an introduction to Tap class, incorporating the work of the ISTD Primary Class along with some toe tapping and super fun stomping choreography! TRIAL BOOKINGS: Of course you are welcome to watch the trial class but following the trial, WhizzDancers are expected to be independent in the room. TERM BOOKINGS: You are welcome to watch the first class but following this your WhizzDancer will be expected to go in the class independently. You will be expected to provide full uniform. Details will be sent following. We have lots of opportunities ahead for your WhizzDancer including exams and shows. We look forward to meeting them in the studio :) Downstairs Dance Studio Please bring: - Comfortable clothes to move in (no zips or demin) - No ballet shoes required for the trial Please contact info@whizzdance.com for more information on how to book your free trial.
(5-8yrs) Using a range of music from the latest pop songs to great musical theatre songs (old and new!) JazzPops offers a range of dance throughout the term with a dash of some musical games. Combined with an introduction to Tap class, incorporating the work of the ISTD Primary Class along with some toe tapping and super fun stomping choreography! TRIAL BOOKINGS: Of course you are welcome to watch the trial class but following the trial, WhizzDancers are expected to be independent in the room. TERM BOOKINGS: You are welcome to watch the first class but following this your WhizzDancer will be expected to go in the class independently. You will be expected to provide full uniform. Details will be sent following. We have lots of opportunities ahead for your WhizzDancer including exams and shows. We look forward to meeting them in the studio :) Downstairs Dance Studio Please bring: - Comfortable clothes to move in (no zips or demin) - No ballet shoes required for the trial Please contact info@whizzdance.com for more information on how to book your free trial.
If your organisation manages contractors then your staff need to understand the health and safety issues. This course is the answer. The expert trainer will set out clearly the legal responsibilities of all relevant parties and explore the practical application of these responsibilities with the course participants. The course will then examine the issues associated with the planning of work to be contracted out and the evaluation, selection, control and monitoring of contractors engaged to undertake the work. Although the main focus is on health and safety, the course will also explain how health and safety issues need to be integrated into your organisation's functional management processes to ensure effective control of contractors. The course will consider all types of contracted activities, including construction and maintenance, cleaning, security, plant installation, etc. This programme will give participants: A clear understanding of the organisation's legal responsibilities for managing contractors The information they need to assess the competence of contractors A practical understanding of risk assessment principles and the transfer of risk to contractors A step-by-step guide to the key aspects of managing contractors in practice, covering:Planning of the workSelecting contractorsHandover prior to work commencementDuring the workReviewing the work on completion Practical guidance on the integration of health and safety controls into organisational procedures for contractor management 1 Introduction Who are contractors? Why manage contractors? Different types of contractors Costs of poor contractor performance 2 Overview of health and safety law and liability Health and safety law and statutory duties Relevance of civil and criminal law Enforcement and prosecution 3 Relevant legislation for controlling contractors Health and Safety at Work Act 1974 Management of Health and Safety at Work Regulations 1999 Construction (Design and Management) Regulations 1994 (as amended, 2007) Other relevant legislation Contract law 4 Managing contractors in practice Exercise - how well is it happening? The objectives Five step approachPlanning of the workSelecting contractorsHandover prior to work commencementDuring the workReviewing the work on completion 5 Planning the work Scope and extent Risk assessment Interface and other activities Who controls what? Contract arrangements 6 Selecting the right contractor(s) Locating contractor organisations Selection the right contractors Assessing contractor competence Approved lists/frameworks Tender process 7 Pre-work commencement Co-ordination and co-operation Exchange of information Contractor risk assessments and method statements Permits to work Case study exercise 8 During contract work Communication and liaison Supervision and inspection of the work Inspection and reporting procedures Security issues Facilities and access 9 Reviewing work on completion Why, what and how? Achieving continuous improvement in contractor performance 10 Questions, discussion and review
Duration 5 Days 30 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. This includes Senior Engineers and Architects responsible for creating architectures for Veeam environments. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. Design and architect a Veeam solution in a real-world environment Describe best practices, review an existing infrastructure and assess business/project requirements Identify relevant infrastructure metrics and perform component (storage, CPU, memory) quantity sizing Provide implementation and testing guidelines in line with designs Innovatively address design challenges and pain points, matching appropriate Veeam Backup & Replication features with requirements Veeam Certified Architect is the highest level of Veeam technical certifications. Engineers who complete both Veeam Availability Suite v11: Configuration and Management and Veeam Backup & Replication V11: Architecture and Design programs (courses + exams) will be granted with the 'Veeam Certified Architect' (VMCA) title by Veeam. Introduction Veeam Availability Suite v11: Configuration and Management Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? Configuration backup Locate, migrate or restore backup configuration Introduction Veeam Backup & Replication v11: Architecture and Design Review the architecture principles Explore what a successful architecture looks like Review Veeam?s architecture methodology Discovery Analyze the existing environment Uncover relevant infrastructure metrics Uncover assumptions and risks Identify complexity in the environment Conceptual design Review scenario and data from discovery phase Identify logical groups of objects that will share resources based on requirements Create a set of detailed tables of business and technical requirements, constraints, assumptions and risks Review infrastructure data with each product component in mind Create high level design and data flow Logical design Match critical components and features of VBR with requirements Create logical groupings Determine location of components and relationship to logical grouping Aggregate totals of component resources needed per logical grouping Calculate component (storage, CPU, memory) quantity sizing Physical/tangible design Convert the logical design into a physical design Physical hardware sizing Create a list of physical Veeam backup components Implementation and Governance Review physical design and implantation plan Review Veeam deployment hardening Describe the architect?s obligations to the implementation team Provide guidance on implementation specifics that relate to the design Validation and Iteration Provide framework for how to test the design Further develop the design according to a modification scenario
(9-10yrs) Ballet develops posture, strength, musicality and grace. Each dancer is unique and each body is unique and we teach the children to work within ones own body. Our Ballet classes include some set structured technical work from the Imperial Society of Teachers of Dance syllabus, along with some creative movement. All children have the opportunity to take ISTD Ballet exams when they are ready to be entered. TRIAL BOOKINGS: Of course you are welcome to watch the trial class but following the trial, WhizzDancers are expected to be independent in the room. TERM BOOKINGS: You are welcome to watch the first class but following this your WhizzDancer will be expected to go in the class independently. You will be expected to provide full uniform. Details will be sent following. We have lots of opportunities ahead for your WhizzDancer including exams and shows. We look forward to meeting them in the studio :) Upstairs Dance Studio Please bring: - Comfortable clothes to move in (no zips or demin) - A teddy - No ballet shoes required for the trial Please contact info@whizzdance.com for more information on how to book your free trial.
Duration 5 Days 30 CPD hours This course is intended for Students who need to know how to implement and manage Cisco ASA 5500-X. Overview Upon successful completion of this course, students should be able to do the following:? Technology and features of the Cisco ASA? Cisco ASA product family? How ASAs protect network devices from attacks? Bootstrap the security appliance? Prepare the security appliance for configuration via the Cisco Adaptive Security Device Manager (ASDM)? Launch and navigate ASDM? Essential security appliance configuration using ASDM and the command-line interface (CLI)? Configure dynamic and static address translations? Configure access policy based on ACLs? Use object groups to simplify ACL complexity and maintenance? Use the Modular Policy Framework to provide unique policies to specific data flows? Handle advanced protocols with application inspection? Troubleshoot with syslog and tcp ping? Configure the ASA to work with Cisco Secure ACS 5.2 for RADIUS-based AAA of VPNs? Implement site-to-site IPsec VPN? Implement remote access IPsec and SSL VPNs using the Cisco AnyConnect 3.0 Secure Mobility Client? Work with the 5.x Legacy Cisco IPsec VPN client and Anyconnect VPN client? Deploy clientless SSL VPN access, including smart tunnels, plug-ins, and web-type ACLs? Configure access control policies to implement your security policy across all classes of VPN? Configure Active/Standby failover for both firewall and VPN high availability Student will gain the essential skills required to configure, maintain, and operate Cisco ASA 5500-X Series Adaptive Security Appliances based on ASA Software v9.x. Cisco ASA Essentials ? Lesson 1: Evaluating Cisco ASA Technologies ? Lesson 2: Identifying Cisco ASA Families Basic Connectivity and Device Management ? Lesson 1: Preparing the Cisco ASA for Network Integration ? Lesson 2: Managing Basic Cisco ASA Network Settings ? Lesson 3: Configuring Cisco ASA Device Management Features Network Integration ? Lesson 1: Configuring Cisco ASA NAT Features ? Lesson 2: Configuring Cisco ASA Basic Access Control Features Cisco ASA Policy Control ? Lesson 1: Cisco ASA Modular Policy Framework ? Lesson 2: Configuring Cisco ASA Connection Policy Cisco ASA VPN Architecture and Common Components ? Lesson 1: Implementing Profiles, Group Policies, and User Policies ? Lesson 2: Implementing PKI Services Cisco ASA Clientless Remote Access SSL VPN Solutions ? Lesson 1: Deploying Basic Clientless VPN Solutions ? Lesson 2: Deploying Advanced Application Access for Clientless SSL VPNs Cisco AnyConnect Remote Access SSL Solutions ? Lesson 1: Deploying a Basic Cisco AnyConnect Full-Tunnel SSL VPN Solution Cisco ASA Remote Access IPsec VPNs ? Lesson 1: Deploying Cisco Remote Access VPN Clients ? Lesson 2: Deploying Basic Cisco Remote Access IPsec VPN Solutions Cisco ASA Site-to-Site IPsec VPN Solutions ? Lesson 1: Deploying Basic Site-to-Site IPsec VPNs ? Lesson 2: Deploying Advanced Site-to-Site IPsec VPNs Cisco ASA High Availability and Virtualization ? Lesson 1: Configuring Cisco ASA Active/Standby High Availability Labs Lab 1: Prepare the ASA for Administration Lab 2: Fundamental ASA Configuration Lab 3: Network Address Translation (NAT) Lab 4: Basic Access Control Lab 5: Basic Protocol Inspection Lab 6: Licensing, ACS, and Public CA Lab 7: Basic Clientless SSL VPN Lab 8: Clientless SSL VPN - Thin Apps Lab 9: Basic AnyConnect Full Tunnel SSL VPN Lab 10: Remote Access IPSec VPN Lab 11: IPSec Site-to-Site VPN Lab 12: Active/Standby Failover
Where should management effort be directed? In controlling costs and ensuring proper engineering in live projects? - yes, of course, but true cost control comes by understanding, eliminating and minimising risk prior to a business committing any funds. This course studies the stages required for practical financial and business appraisals of projects and capital expenditure. This course has two primary objectives: To impart the knowledge and skills required to ensure as risk-free as possible expenditure of that scarce resource, cash - the investors', governments' or shareholders' money must not be squandered To improve the quality of the appraisal process in the widest sense - demonstrating how the process of project and capital expenditure appraisal can be used to dramatically improve cost control and deliver as risk-free as possible expenditure As a result of the course, participants will be able to: Understand the economics of appraisal Be in control of their projects from the start Understand the economics of their projects - and devise the most appropriate mode Carry out sensitivity analysis and identify risk Improve their methods of appraisal and approach Focus on the risk areas and take out risk and control costs before they over-run The benefits of attending this course will be demonstrable from day one. Thorough appraisals and risk assessment follow through to success in project management and detailed cost control and project management. 1 Introduction Why appraise? Taking risk out of investment The short- and long-term results of not appraising business expenditure 2 Developing an appraisal process The process - overall and stage-by-stage objectives Understand business and technical risks Manage resources and time Do you invest enough time and effort at this stage? Take out the risks - control costs before you are committed to contracts and action Checklists 3 Appraisal arithmetic Review of the arithmetic of appraisalThe time value of moneyThe effects of different interest or required ratesThe effects of inflation (or deflation) in prices and costs Understanding the economics of appraisal is essential 4 Appraisal measures Meaning and use of appraisal measures Identifying the most appropriate measures for your particular business Payback Discounted cash flow measures - NPV and IRR Other measures - FW, AW, Profitability Index The meaning of the measures and their application in practice 5 Cost benefit analysis The effect on decision-making of more intangible benefits Cost benefit analysis Ensuring costs are genuine Measuring intangible benefits Environmental issues Consideration of intangible benefits in the appraisal decision-making process 6 Developing appropriate models Developing models - examples of spreadsheet models and measures for many different situations Modelling investment opportunities - summarising outcomes Sensitivity analysis - identifying, quantifying and taking out risk 7 Developing an appraisal process The process - managing risk from the outset Using the process in risk management, negotiating and project management Take out risk by thoroughly knowing your project - developing your own process