• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2993 Courses

Red Hat system administration

5.0(3)

By Systems & Network Training

Red Hat training course description This three day hands on course provides a comprehensive coverage of core Linux administration tasks on Red Hat Linux. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. Red Hat training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals Duration 3 days Red Hat training course contents Managing software Package Concepts, RPM, rpm Commands, Yum, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and editing files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Administering the system Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring basic networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Securing your systems Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

Red Hat system administration
Delivered in Internationally or OnlineFlexible Dates
£3,497

ICA Professional Postgraduate Diploma in Financial Crime Compliance (FCC)

By International Compliance Association

ICA Professional Postgraduate Diploma in Financial Crime Compliance (FCC) Course This leadership programme has been designed to sharpen the strategic skills of senior practitioners and those aspiring to hold the highest anti-money laundering/financial crime position within a firm. This expert qualification offers: Specialist knowledge - the highest level in the field Strategic thinking - helps your leadership ambitions Innovation - explores new ideas, best practice, and future developments from a global perspective Fellowship of ICA - become automatically eligible for the highest grade of membership Networking - grow with other like-minded, senior professionals. With a focus on anti-money laundering, managing fraud and anti-bribery, and corruption, this qualification has helped hundreds of senior financial crime compliance professionals from all over the world unlock career growth opportunities. This course is awarded in association with Alliance Manchester Business School, the University of Manchester. How will the course be delivered This course is delivered online with materials delivered for you to study in your own time and at your own pace. There will be eight 3-hour virtual masterclasses over four weekends and seven live virtual classrooms spread over the duration of the course. Upon successful completion of the course, course materials and assessment, you will be awarded the ICA Professional Postgraduate Diploma in Financial Crime Compliance (FCC). This qualification is awarded in association with Alliance Manchester Business School, the University of Manchester. Assessment This course will be assessed via: The production of 8 x 1000-1500 word masterclass commentaries: these are summaries of the key learning points outlined in the masterclasses and its impact on your own practice, which forms the reflective journal. A three hour competency-based interview, using information describing your career to date and other evidence you wish to submit to map your knowledge, skills and experience against the National Occupational Standards The syllabus covers a variety of key issues relevant at a senior level and is designed to provide an insight into risks and potential hurdles faced by your organisation. The syllabus is delivered by an exclusive series of high-profile masterclasses covering relevant topics. Standards, research and assessment Financial crime risks: science or art? Ethics, corporate governance & responsibility Managing the internal AML enemy Cyber security: threats to the organisation FinTech and financial crime compliance Fraud and internal threat Risk based approach: too busy or too afraid Sanctions: a changing landscape.

ICA Professional Postgraduate Diploma in Financial Crime Compliance (FCC)
Delivered Online On Demand12 months
£8,000

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Fri 5 Sep 2025 - Legacy marketing around Hospice UK's national campaign

By Hospice Income Generation Network

Sharing & Networking - Legacy marketing plans around Hospice UK's national campaign Session aimed at legacy fundraisers and marketers THIS SESSION WON'T BE RECORDED

Fri 5 Sep 2025 - Legacy marketing around Hospice UK's national campaign
Delivered Online
FREE

Diploma in Tourism and Hospitality Management - Level 5 (Pathway to a BA(Hons)Degree))

4.0(2)

By London School Of Business And Research

The objective of Level 5 Diploma in Tourism and Hospitality Management qualification (accredited by Othm) is to enable learners' development as managers within the tourism and hospitality industry, with a lifelong-learning orientation. This Diploma in Tourism and Hospitality Management - Level 5 enables learners to critically apply contemporary knowledge and theories to the management of complex problems. Successful completion of this qualification will equip learners with the specialist skills and technical terminology to develop their management skills and to progress to further study or employment. Program Overview: Diploma in Tourism and Hospitality Management - Level 5 Key Highlights of Diploma in Tourism and Hospitality Management - Level 5 are: Program Duration: 9 Months (Can be Fast tracked) Program Credits: 120 Designed for working Professionals Format: Online No Written Exam. The Assessment is done via Submission of Assignment Tutor Assist available Dedicated Student Success Manager Timely Doubt Resolution Regular Networking Events with Industry Professionals Direct entry into Final Year of a three-year UK Bachelor's degree LSBR Alumni Status No Cost EMI Option Who is this course for? Working Professionals, A-Level / Level 4 / Year 1 of a three-year UK Bachelor's degree holders or learners who are looking for Career Progression and a formal undergraduate qualification leading to award of degrees in future.

Diploma in Tourism and Hospitality Management - Level 5 (Pathway to a BA(Hons)Degree))
Delivered Online On Demand
£1,199

AWS Certified Cloud Practitioner CLF-C01: Exam and Beyond

By Packt

In this course, you will learn everything a candidate needs to excel in the AWS Certificate Practitioner exam CLF-C01 . This course contains a practice test along with the solutions to make sure how to clear the exam by analyzing each of the options and putting your knowledge into practice.

AWS Certified Cloud Practitioner CLF-C01: Exam and Beyond
Delivered Online On Demand13 hours 34 minutes
£67.99

Leadership & Management (2 days)

5.0(6)

By Switch Direction

Leadership and Management Training; Introductory Management Training; ; Ipswich; Suffolk; Switch Direction; Dan Cocksedge

Leadership & Management (2 days)
Delivered In-PersonJoin Waitlist
£432

CompTIA A+ (220-1002) Tech Course

4.8(9)

By Skill Up

Boost your tech skills with our CompTIA A+ (220-1002) course! Master essential concepts for success in IT. Enroll now for comprehensive training!

CompTIA A+ (220-1002) Tech Course
Delivered Online On Demand14 hours 51 minutes
£25

Diploma in Tourism and Hospitality Management - Level 6

4.0(2)

By London School Of Business And Research

The objective of Level 6 Diploma in Tourism and Hospitality Management qualification (accredited by Othm) is to develop learners' management knowledge and skills within the tourism and hospitality industry. Learners will critically evaluate contemporary knowledge and theories and use these to propose solutions to complex management problems. Successful completion of Level 6 Diploma in Tourism and Hospitality Management qualification will equip learners with the specialist skills and knowledge they need to plan and manage their work areas, to make effective decisions, and to adapt effectively to the needs of a range of tourism and hospitality organisations. Program Overview:Key Highlights of Level 6 Diploma in Tourism and Hospitality Management qualification are: Program Duration: 9 Months (Can be Fast tracked) Program Credits: 120 Designed for working Professionals Format: Online No Written Exam. The Assessment is done via Submission of Assignment Tutor Assist available Dedicated Student Success Manager Timely Doubt Resolution Regular Networking Events with Industry Professionals Become eligible to gain direct entry into relevant Master's degree programme LSBR Alumni Status No Cost EMI Option Who is this course for? Who is this Program For?Working Professionals, Level 5 / Year 2 of a three-year UK Bachelor's degree holders or learners who are looking for Career Progression and a formal undergraduate qualification leading to award of degrees in future.

Diploma in Tourism and Hospitality Management - Level 6
Delivered Online On Demand
£1,199

LinkedIn for Business Growth: Maximizing Opportunities

By Compete High

🚀 Unlock the Power of LinkedIn for Explosive Business Growth! 🚀   Are you ready to take your business to new heights? Dive into the world of professional networking and leverage the full potential of LinkedIn with our exclusive online course: 'LinkedIn for Business Growth: Maximizing Opportunities.'   🌐 Why LinkedIn? Because it's not just a platform; it's your gateway to a world of untapped opportunities!   📈 Maximize Your Reach: Discover the secrets to expanding your network and connecting with key decision-makers. Learn proven strategies to boost your visibility and turn connections into valuable business relationships.   🚀 Optimize Your Profile: Transform your LinkedIn profile into a magnetic, attention-grabbing asset. Craft a compelling headline, showcase your expertise, and create a powerful summary that speaks directly to your target audience.   💼 Generate Leads Like Never Before: Uncover the strategies that successful businesses use to generate high-quality leads on LinkedIn. From content creation to advanced search techniques, we've got you covered.   🔍 Master Advanced Features: Navigate LinkedIn's advanced features with ease. Whether it's utilizing Sales Navigator, creating engaging content, or leveraging LinkedIn Ads, this course empowers you to harness the platform's full potential.   📱 Mobile Mastery: Learn how to optimize your LinkedIn strategy for mobile users. With an increasing number of professionals accessing LinkedIn on the go, this course ensures you stay relevant and accessible.   📊 Data-Driven Success: Understand the analytics behind your LinkedIn efforts. Dive into metrics that matter and make informed decisions to continually refine and improve your business growth strategy.   🤝 Community Support: Join a vibrant community of like-minded business professionals. Share insights, seek advice, and collaborate with peers who are on the same journey towards LinkedIn mastery and business growth.   🔒 Don't miss out on this opportunity to propel your business forward! Enroll now in 'LinkedIn for Business Growth: Maximizing Opportunities' and position yourself for success in the ever-evolving landscape of professional networking.   🎁 Limited-Time Offer: Sign up today to receive exclusive bonuses and resources that will turbocharge your LinkedIn journey.   Ready to revolutionize your business growth on LinkedIn? Click 'Enroll Now' and embark on a transformative journey towards unprecedented success!   🚀 Your business growth starts with LinkedIn! 🚀 Course Curriculum Basic Overview 00:00 Pricing 00:00 LInkedIn As A Search Engine 00:00 Your LinkedIn Profile - Part 1 00:00 Your LinkedIn Profile - Part 2 00:00 Your LinkedIn Settings - Part 1 00:00 Your Linked In Settings - Part 2 00:00 Your Personalized LinkedIn URL 00:00 Your Company Page 00:00 Your Newsfeed 00:00 Importing Your Contacts 00:00 Making New Connections 00:00 Accepting Invitations 00:00 Managing Notifications 00:00 Posting Written Content 00:00 Posting Audio and Video 00:00 Your SSI Ranking 00:00 Participation in Groups 00:00 Creating Groups 00:00 Conclusion 00:00 Advanced Overview 00:00 Deciding On A Target Market 00:00 Upgrades and Categories - Part 1 00:00 Upgrades adn Categories - Part 2 00:00 Understanding and Using In-Mail 00:00 Attraction Vs. Cold Messaging 00:00 Who Viewed Your Profile 00:00 Optimizing Your Posts 00:00 Optimizing Your Engagement 00:00 Accepting New Requests - Part 1 00:00 Accepting New Requests - Part 2 00:00 Using Sales Navigator - Part 1 00:00 Using Sales Navigator - Part 2 00:00 Inviting New Connections - Part 1 00:00 Inviting New Connections - Part 2 00:00 Posting Company Branded Content 00:00 Posting Your Company's Job 00:00 How to Look for A Job On LinkedIn 00:00 How to Look for a Client On Linkedin 00:00 Conclusion 00:00

LinkedIn for Business Growth: Maximizing Opportunities
Delivered Online On Demand1 hour 8 minutes
£4.99