COBOL training course description A hands on training course providing an introduction to COBOL. What will you learn Write COBOL programs Debug COBOL programs Examine existing code and determine its function. COBOL training course details Who will benefit: Programmers working with COBOL. Prerequisites: None although experience in another high level language would be useful. A 10 day version of this course would be more applicable for those new to programming. Duration 5 days COBOL training course contents Introduction to COBOL Compilation, linkage editor. Compile errors, compiler options. Divisions, syntax and format, COBOL character set, program structure. COBOL statement structure COBOL words, format of statements. Divisions Identification entries, Environment entries, Data division: FD, record descriptions, hierarchy and level numbers, description-string entry. File and Working-Storage Sections Literals, figurative constants, redefines clause, data representation, Usage clause, synchronization, sign clause. Procedure Division File status codes; Open, Read, Write, Close, Stop, Goback; Accept, display; Move, Justified, data name qualification, reference modification. Perform statement Out-of-line, With test ... Until, ... Times, in-line statement; Go to statement. Program design Design techniques, design considerations, procedure names, program structure. Printing Printed output, Write, advancing option, editing characters; Initialize. Condition testing Conditional statements: IF, class, sign and relation conditions, condition-name conditionals, Set, compound conditions, logical operators. Evaluate, Continue. Arithmetic Rounded option, On Size Error option, Add, Subtract, Multiply, Divide, Compute. Non-sequential files File access modes, Select. Indexed and relative files. Open, Close, creating / reading sequential access files, Write, Read, Invalid key clause, reading, writing / updating Random access files, Rewrite, Delete, Start. Declarative routines Clauses. Subroutines Call, Using clause - calling program/called program, Linkage Section, returning control. Table handling Subscripted tables: One/two/three dimensional tables, Perform, variable length tables. Indexed tables: Set, using an index; Search. Copy code: Copy, Suppress, Replacing. Data Manipulation Inspect, String, Unstring. COBOL/370 LE/370 and Intrinsic Functions.
Advanced Junos SP Routing course description This is designed to provide students with detailed coverage of OSPF, IS-IS, BGP, and routing policy. Students will gain experience in configuring, monitoring, and troubleshooting the Junos operating system and in monitoring device and protocol operations. This course uses Juniper Networks vMX Series Routers for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. What will you learn Describe and configure OSPF area types and operations. Configure and monitor IS-IS. Describe basic BGP operation. Explain the causes for route instability. Describe how to troubleshoot routing policy. Explain the default behaviour of damping on links. Advanced Junos SP Routing course details Who will benefit: Network staff working with Junos at layer 3. Prerequisites: Junos Intermediate Routing Duration 5 days Advanced Junos SP Routing course contents OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication Lab: OSPF Multi-Area Networks Chapter 3: OSPF Areas Review of OSPF Areas Stub Area Operation and Configuration NSSA Operation and Configuration Route Summarization Lab: OSPF Route Summarization OSPF Case Studies and Solutions Virtual Links OSPF Multiarea Adjacencies External Reachability Lab: Advanced OSPF Options and Routing Policy Troubleshooting OSPF Troubleshooting OSPF Lab: OSPF Troubleshooting IS-IS Overview of IS-IS IS-IS PDUs Neighbors and Adjacencies Configuring and Monitoring IS-IS Lab: IS-IS Configuration and Monitoring Advanced IS-IS Operations and Configuration Options IS-IS Operations IS-IS Configuration Options IS-IS Routing Policy Lab: Advanced IS-IS Configuration Options and Routing Policy Multilevel IS-IS Networks Level 1 and Level 2 Operations Multilevel Configuration Lab: Configuring a Multilevel IS-IS Network Troubleshooting IS-IS Troubleshooting IS-IS Lab: IS-IS Troubleshooting BGP Review of BGP BGP Operations BGP Path Selection Options Configuration Options Lab: BGP and BGP Attributes BGP Attributes and Policy - Part1 BGP Policy Next Hop Origin and MED AS Path Lab: BGP Attributes - Next Hop, Origin, MED, and AS Path Attributes and Policy - Part2 Local Preference Communities Lab: BGP Attributes - Local Preference and Communities Route Reflection and Confederations Route Reflection Operation Configuration and Routing Knowledge BGP Confederations Lab: Scaling BGP BGP Route Damping Route Flap and Damping Overview Route Damping Parameters Configuring and Monitoring Route Damping Lab: BGP Route Damping Troubleshooting BGP Troubleshooting BGP Lab: BGP Troubleshooting Troubleshooting Policy Troubleshooting Policy Lab: Policy Troubleshooting
Objective-C programming training course description A hands on introduction that will allow you to master Objective-C and start using it to write powerful native applications for even the newest Macs and iOS devices! Using The step-by-step approach, will let you get comfortable with Objective-C's unique capabilities and Apple's Xcode 5 development environment. Make the most of Objective-C objects and messaging. Work effectively with design patterns, collections, blocks, foundation classes, threading, Git and a whole lot more. Every session builds on what you've already learned, giving a rock-solid foundation for real-world success! What will you learn Use Xcode 5. Declare classes, instance variables, properties, methods, and actions. Use arrays, dictionaries, and sets. Expand and extend classes with protocols, delegates, categories, and extensions. Use Apple's powerful classes and frameworks. Objective-C programming training course details Who will benefit: Developers wanting to learn Objective-C. Prerequisites: Software development fundamentals. Duration 5 days Objective-C programming training course contents PART 1: GETTING STARTED WITH OBJECTIVE-C The Developer Program: Objective-C, enrolling as an Apple Developer, setting up the development environment, Xcode. Your first project. OO programming with Objective-C: OO projects, Frameworks, classes and instances, encapsulation, accessors, Inheritance. OO features in Objective-C: Messages, methods, working with id, nesting messages, method signatures and parameters. allocating and initializing objects. Using Xcode: Xcode, source code control, git and Xcode, Using a Remote Repository. Compiler Directives: Projects, Compiler Directives, Prefix headers, main.m, .h files. PART 2: OBJECTIVE-C BASICS Messaging in a Testbed App: Setting Up the Testbed Apps, Adding a Text Field and Connecting It to Your Code, Sending a Message to the Text Field, Reviewing the Message Syntax. Declaring a Class in an Interface File: Context, Creating an Instance Variable with id, What Happens When Execution Stops, dynamic binding, Creating an Instance Variable for with the Class Name and with a Superclass Name, instance variable visibility. Properties in an Interface File: Interface Variables vs Properties, Declared Properties, Using Attributes. Implementing Properties. @synthesize, @dynamic. Methods in an Interface File: Methods in a Class, class and instance methods, Method declaration, returning complex data structures from Methods. Actions in an Interface File: Actions, Actions in OS X and iOS, disconnecting actions. Routing messages with selectors: Receiver and selector objects in messages, Objective-C Runtime, SEL and @selector (), performSelector, NSInvocation, testing whether an Instance can respond to a selector. Building on the Foundation: The Foundation Framework, Foundation Classes, Foundation Paradigms and Policies; Mutability, class clusters, notifications. Defining a Class in Implementation Files: Projects, dynamic typing, creating a new App, implementing a method, expanding Classses with init Methods. Organizing Data with Collections: Collecting Objects, Property Lists, Runtime, comparing the Collection Classes, Creating a Collection, Objective-C Literal Syntax, Enumerating collections, Testing Membership in a Collection, Accessing an Object in a Collection. Managing Memory and Runtime Objects: Managing objects in memory, managing reference counts manually and with ARC, variable qualifiers, variable autorelease. PART 3: EXPANDING AND EXTENDING CLASSES Protocols and Delegates: Subclassing, Protocols, Delegates, Looking Deeper Inside Protocols. Categories and Extensions: Comparing categories and protocols, categories vs subclasses, working with categories, class extensions, informal protocols. Associative References and Fast Enumeration: Objective-C 2.0 Time-Saving Features, Extending Classes by Adding Instance Variables (Sort of), Using Fast Enumeration. Blocks: Revisiting Blocks, Callbacks, Blocks, Exploring Blocks in Cocoa, Cocoa Blocks and Memory. PART 4: BEYOND THE BASICS Handling Exceptions and Errors: Exception and Error classes: NSException, NSError, Identifying exceptions, throwing exceptions, catching exceptions. Queues and Threading: Getting Started with Concurrency, Introducing Queues, Dispatch Sources, Using Dispatch Queues. Working with the Debugger: Logging Information, Console Logs, NSLog, Smart Breakpoints, enhancing breakpoints with messages. Using Xcode Debug Gauges for Analysis: Debug Gauges, Monitoing CPU and memory utilization, monitoring energy, Using Instruments. PART 5: OPTIONAL TOPICS C Syntax Summary: Data Types, Control Structures. Apps, Packages, and Bundles: Project Bundles, lproj Files, Asset Catalogs, plist Files, Precompiled Header Files (.pch). Archiving and Packaging Apps for Development and Testing: Archiving.
Complete Visual BASIC training course description A hands-on introduction to programming in Visual BASIC V6. What will you learn Build Visual BASIC applications. Build simple components. Debug Visual BASIC programs. Examine existing code and determine its function. Complete Visual BASIC training course details Who will benefit: Anyone wishing to program in Visual BASIC. Prerequisites: None although experience in another high level language would be useful. Duration 5 days Complete Visual BASIC training course contents Application development using VB VB features. VB editions, VB terminology. Working in the Development Environment. Event-Driven Programming. Creating a program in VB. Project and executable files. VB reference materials. Visual Basic fundamentals Objects. Controlling objects. Introduction to forms. Introduction to controls. Basic controls. Working with code and forms Modules. Working with code. Interacting with the user. Working with code statements. Managing forms. Variables and procedures Introduction to variables and constants. Working with Procedures and Functions. Controlling program execution Common VB functions. Comparison and relational operators. Conditional structures. Looping structures. Debugging Error types. Debugging logic errors in VB. Working with controls Control types. Standard controls. Advanced standard controls. ActiveX controls. Insertable controls. Data access using the ADO data control Overview of ActiveX Data Objects. VB data access features. Relational database concepts. Using the ADO data Control to access data. SQL. Manipulating data. Using the data form wizard. Input validation Field-Level validation. The masked edit control. Form-Level validation. Form events used when validating data. Error trapping Trapping run time errors. Error handling overview. Enabling an error trap. Errors and the calling chain. In line error handling. Enhancing the User Interface Menus. Status bars. Toolbars. Drag and Drop Overview of Drag and Drop. Mouse events Drag and Drop basics. More about controls Using control arrays. Using the controls collection. Working with object variables. Collections. Finishing touches User Interface design principles. Distributing an application. Creating a default project.
Course Description Get instant knowledge from this bite-sized HR Audit: Part 2 course. This course is very short and you can complete it within a very short time. In this HR Audit: Part 2 course you will get fundamental ideas of human resource auditing, the key understanding of UK internal audit standards, HR audit interviews and so on. Enrol in this course today and start your instant first step towards learning about employee training and development process. Learn faster for instant implementation. Learning outcome Familiarise with employee training and development process Understand UK internal audit standards Deepen your understanding of reporting HR audit outcome Learn about HR audit interviews How Much Do Auditors Earn? Senior - £67,000(Appx.) Average - £40,000(Appx.) Starting - £24,000(Appx.) Requirement Our HR Audit: Part 2 is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. HR Audit: Part 2 Module 01: Employee Training and Development Process 00:19:00 Module 02: HR Audit Interviews 00:22:00 Module 03: Reporting HR Audit Outcome 00:23:00 Module 04: UK Internal Audit Standards 00:24:00 Assignment Assignment - HR Audit: Part 2 00:00:00
Description: The Diploma in IT Security (Malware) is designed to provide the skills and knowledge applied to computers and networks. In this course you will learn the most important aspects of IT Security. The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. You will learn how Virus, worm, Trojan and backdoor based attacks are performed in a simulated/test environment in an ethical way. This course will help you to mitigate these attacks using the recommended solution at the end of relevant module. So, if you aspire to be in this highly regarded profession, then you are welcome to join course. Who is the course for? Individuals looking to expand their knowledge of different IT Security principals. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. PDF certificate's turnaround time is 24 hours and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path: The Diploma in IT Security (Malware) is a useful qualification to possess, and would be beneficial for the following careers: Security analyst Security consultant Security software developer. Computer Fundamentals Basic Computer Terms 00:15:00 Advanced Terms 00:15:00 Networking Basics 00:15:00 Basic Internet Concepts 00:30:00 Internet Security 00:30:00 Computers in the Workplace 00:15:00 Tele-Commuting 00:15:00 The Electronic World 00:15:00 Ergonomics 00:15:00 Safety and the Environment 00:15:00 Being Proactive 00:15:00 Identifying Yourself 00:15:00 Protecting your Data 00:15:00 Understanding Malware 00:15:00 Protecting Against Malware 00:15:00 Malware Protection Why You Need To Worry About 'Malware' 01:00:00 Viruses 01:00:00 Spyware/Adware 01:00:00 Safety & Security at the Browser Level 01:00:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 Glossary of Terms 01:00:00 Refer A Friend Refer A Friend 00:00:00 Mock Exam Mock Exam-Diploma in IT Security (Malware) 00:20:00 Final Exam Final Exam-Diploma in IT Security (Malware) 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Duration 3 Days 18 CPD hours This course is intended for Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks. Overview Deploy the appropriate operation mode for your network. Use the GUI and CLI for administration. Identify the characteristics of the Fortinet security fabric. Control network access to configured networks using firewall policies. Apply port forwarding, source NAT, and destination NAT. Authenticate users using firewall policies. Understand encryption functions and certificates. Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies. Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites. Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports. Fight hacking and denial of service (DoS). Defend against data leaks by identifying files with sensitive data, and block them from leaving your private network. Offer an SSL VPN for secure access to your private network. Implement a dial-up IPsec VPN tunnel between FortiGate and FortiClient. Collect and interpret log entries. In this three-day course, you will learn how to use basic FortiGate features, including security profiles. Course Outline Module 1. Introduction to FortiGate and the Security Fabric Module 2. Firewall Policies Module 3. Network Address Translation (NAT) Module 4. Firewall Authentication Module 5. Logging and Monitoring Module 6. Certificate Operations Module 7. Web Filtering Module 8. Application Control Module 9. Antivirus Module 10. Intrusion Prevention and Denial of Service Module 11. SSL VPN Module 12. Dial-Up IPsec VPN Module 13. Data Leak Prevention (DLP)
Duration 5 Days 30 CPD hours This course is intended for Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff Overview The Palo Alto Networks Firewall 10.2 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo Alto Networks next-generation firewalls Configure and manage Security and NAT policies to enable approved traffic to and from zones Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs Monitor network traffic using the interactive web interface and firewall reports Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud. Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud.
Description: Hacking becomes very common nowadays. If it comes about the company information, it is one of the most dangerous problems. An ethical hacker helps an organisation to protect their data and increases the security of a computer system. Therefore, the demand for a certified ethical hacker is increasing day by day. The Certified Ethical Hacking - Complete Video Training course will help to meet your need if you want to build a stable career in ethical hacking. The course is taught in two parts. One part deals with the basic knowledge of ethical hacking and helps you to be an ethical hacker while the second section prepares you for the Certified Professional Ethical Hacker (CPEH). The bundle video course teaches the fundamental concepts of ethical hacking including access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, reconnaissance, covering tracks, malware, buffer overflows, and password cracking, etc. You will also learn to implement the counter-response to protecting your information. In short, the Certified Ethical Hacking - Complete Video Training provides a complete guide to ethical hacking. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Ethical Hacking - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Ethical Hacking - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Overview Overview FREE 00:35:00 Reconnaissance Reconnaissance 00:25:00 Protocols Protocols 01:25:00 Windows Hacking Windows Hacking 01:19:00 Attacking Web Technologies Attacking Web Technologies 00:56:00 Pen Testing Wireless Networks Pen Testing Wireless Networks 01:34:00 Security Fundamentals Security Fundamentals FREE 00:51:00 Access Controls Access Controls 00:33:00 Protocols Protocols 00:36:00 Cryptography Cryptography 00:52:00 Why Vulnerability Assessments? Why Vulnerability Assessments? 00:36:00 Vulnerability Tools of the Trade Vulnerability Tools of the Trade 00:10:00 Output Analysis and Reports Output Analysis and Reports 00:13:00 Reconnaisance, Enumeration and Scanning Reconnaisance, Enumeration and Scanning 00:51:00 Gaining Access Gaining Access 00:31:00 Maintaining Access Maintaining Access 00:17:00 Covering Tracks Covering Tracks 00:18:00 Malware Malware 00:28:00 Buffer Overflows Buffer Overflows 00:22:00 Password Cracking Password Cracking 00:33:00 Mock Exam Mock Exam - Certified Ethical Hacking - Complete Video Training 00:20:00 Final Exam Final Exam - Certified Ethical Hacking - Complete Video Training 00:20:00 Order Your Certificates and TranscriptsOrder Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00
OOAD training course description A workshop course providing thorough practical knowledge of object oriented analysis and design methods. What will you learn Perform Systems Analysis with Object Oriented methods. Identify key classes and objects. Expand and refine OO problem domain models. Design Class hierarchies using inheritance and polymorphism. Design programs with Object Oriented methods. OOAD training course details Who will benefit: System analysts, designers, programmers and project managers. Prerequisites: It is desirable that delegates have experience of programming in C++/Java or some other OOP language. Duration 5 days OOAD training course contents What is OO? Classes, objects, messages, encapsulation, associations, inheritance, polymorphism, reusability. What is Systems Analysis and design? Data flow diagrams, structure diagrams. The OO approach. OOA The problem domain and object modelling. Identifying classes and objects. Generalisation and inheritance. Defining attributes and methods. OOD Refining the OOA results. Designing the User Interface. Designing the algorithms and data structures using objects. Designing the methods. OOP Prototyping. Implementing OOD with OOPs and OOPLs.