• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

521 Courses

Microsoft Office 2013 Access Advanced - Complete Video Course

4.3(43)

By John Academy

Description: Nowadays data management is absolutely crucial, and there's not much room for error. If you've already taken the basic Microsoft Access 2013 course, or know your way around the program already, then you're ready for this advanced level of Microsoft Access 2013. This Microsoft Office 2013 Access Advanced - Complete Video Course covers advanced functions and features of Access 2013. You will learn about implementing advanced form design, using data validation and using macros to improve user interfacer design. You will also learn how to use advanced database management, distribute and secure a database and manage switchboards. If you want to take your Microsoft Access 2013 skills to the next level, you'll learn how to use this program's advanced features to build a fully functional database from scratch. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Microsoft Office 2013 Access Advanced - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Microsoft Office 2013 Access Advanced - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Implementing Advanced Form Design Add Controls to Forms FREE 00:22:00 Create Subforms 00:03:00 Organize Information with Tabs Pages 00:05:00 Enhance Navigation of Forms 00:06:00 Apply Conditional Formatting 00:05:00 Using Data Validation Field and Record Validation 00:23:00 Form Validation 00:08:00 Using Macros to Improve User Interface Design Create a Macro 00:17:00 Restrict Records Using a Condition 00:05:00 Validate Data Using a Macro 00:06:00 Automate Data Entry Using a Macro 00:06:00 Convert a Macro to VBA 00:05:00 Using Advanced Database Management Link Tables to External Data Sources 00:05:00 Manage a Database 00:07:00 Determine Object Dependency 00:05:00 Document a Database 00:05:00 Analyze the Performance of a Database 00:05:00 Distributing and Securing a Database Splitting a Database for Multiple User Access 00:05:00 Implement Security 00:09:00 Set Passwords 00:07:00 Convert an Access Database to an ACCDE File999 00:07:00 Analyze the Performance of a Database 00:04:00 Managing Switchboards Create a Database Switchboard 00:07:00 Modify a Database Switchboard 00:04:00 Set Startup Options 00:06:00 Mock Exam Mock Exam- Microsoft Office 2013 Access Advanced - Complete Video Course 00:20:00 Final Exam Final Exam- Microsoft Office 2013 Access Advanced - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Microsoft Office 2013 Access Advanced - Complete Video Course
Delivered Online On Demand3 hours 47 minutes
£21

Software Security Testing

By Packt

Learn how to perform security audits, penetration testing, and code auditing for modern software in the web/cloud, mobile, and desktop. This course will help you master industry standards and enable you to carry out professional assessments to secure technologies as well as communicate risks to high-level executives, management, and technical staff.

Software Security Testing
Delivered Online On Demand7 hours 59 minutes
£149.99

Excel 2016 Advanced

By iStudy UK

If you are looking forward to advance your skills with Microsoft Excel 2016 and want to learn more advanced skills or want to learn the topics covered in this course in the 2016 interface, this Excel 2016 Advanced will be the perfect choice for you! Through the course you will gain the skills necessary to use pivot tables, audit and analyze worksheet data, utilize data tools, collaborate with others, and create and manage macros. Additionally, you will experiment with auditing formulas and error checking, use the What-If Analysis tools, learn the options for worksheet and workbook protection, review advanced use of PivotTables and PowerPivot add-in, work with Macros, use form controls, and ensure data integrity in your worksheets and workbooks. You will also learn about Excel's many collaboration features, as well as how to import and export data to and from your workbooks. What Will I Learn? Use Advanced IF Statements Use Advanced Lookup Functions Use Complex Logical and Text Functions Auditing Formulas Working with What-If Analysis Tools Protecting Worksheet and Workbook Use Advanced PivotTables and PowerPivot Tools Automate with Macros Work with Form Controls Ensure Data Integrity Collaborate in Excel Import and Export Data to a Text File Requirements Excel Introduction and Intermediate courses or equivalent experience. Who is the target audience? Students who want to expand their Excel knowledge. Introduction Introduction FREE 00:01:00 Using Advanced IF Statements Summarize Data with SUMIF FREE 00:04:00 Summarize Data with AVERAGIF 00:03:00 Summarize Data with COUNTIF 00:02:00 Using Advanced Lookup Functions Using VLOOKUP with TRUE to find an Approximate Match 00:04:00 Using HLOOKUP TRUE to find an Approximate Match 00:01:00 Using the Index Function 00:03:00 Using the Match Function 00:02:00 Creating a Combined Index and Match Formula 00:04:00 Comparing Two Lists with VLOOKUP 00:02:00 Comparing Two Lists with VLOOKUP and ISNA 00:04:00 Using Complex Logical and Text Functions Creating a Nested IF Function 00:03:00 Using the IFERROR Function 00:02:00 Using the LEN Function 00:02:00 Using the TRIM Function 00:01:00 Using the Substitute Function 00:02:00 Formula Auditing Showing Formulas 00:01:00 Tracing Cell Precedents and Dependents 00:03:00 Adding a watch Window 00:02:00 Error Checking 00:02:00 What-If Analysis Tools Using the Scenario Manager 00:03:00 Using Goal Seek 00:02:00 Analyzing with Data Tables 00:02:00 Worksheet and Workbook Protection Protection Overview 00:02:00 Excel File Password Encryption 00:03:00 Allowing Specific Worksheet Changes 00:01:00 Adding Protection to only Certain Cells in a Worksheet 00:03:00 Additional Protection Features 00:02:00 Advanced Use of PivotTables and PowerPivot Using the Pivot Tables Charts Wizard 00:02:00 Adding a Calculated Field 00:02:00 Adding a Caculated Item 00:02:00 Apply Conditional Formatting to a Pivot Table 00:03:00 Using Filters in the Pivot Table Fields Pane 00:02:00 Creating Filter Pages for a Pivot Table 00:01:00 Enabling a Power Pivot Add In 00:04:00 Automating with Macros What are Macros 00:03:00 Displaying the Developer Tab and Enabling Macros in Excel 00:03:00 Creating a Basic Formatting Macro 00:03:00 Running a Macro 00:02:00 Assigning a Macro to a Button 00:02:00 Creating a More Complex Macro 00:02:00 Viewing and Editing the VBA Code for an Existing Macro 00:03:00 Adding a Macro to the Quick Access Toolbar 00:02:00 Working with Form Controls What are Form Controls 00:02:00 Adding Spin Buttons and Check Boxes to a Spreadsheet 00:02:00 Adding a Combo Box to a Spreadsheet 00:02:00 Ensuring Data Integrity What is Data Validation 00:01:00 Restricting Data Entries to Whole Numbers 00:02:00 Data Validation Restricting Data Entry to a List 00:01:00 Data Validation Restricting Data Entry to a Date 00:01:00 Data Validation Restricting Data Entry to Different Text Lengths 00:01:00 Composing Input Messages 00:02:00 Composing Error Alters 00:02:00 Finding Invalid Data 00:02:00 Editing and Deleting Data Validation Rules 00:01:00 Collaborating in Excel Working with Comments 00:03:00 Printing Comments and Errors 00:02:00 Sharing a Workbook 00:03:00 Tracking Changes in a Workbook 00:03:00 Working with Versions 00:02:00 Sharing Files via Email 00:02:00 Importing and Exporting Data to a Text File Importing a Text File 00:03:00 Exporting a Text File 00:01:00 Conclusion Course Recap 00:01:00 Course Certification

Excel 2016 Advanced
Delivered Online On Demand2 hours 21 minutes
£25

BRCGS Environmental Monitoring (1 Day)

5.0(43)

By Ask Sonia Limited

Official BRCGS Product Safety Management course: Environmental Monitoring Delivered online (Zoom) by a live BRCGS Approved Training Partner. Exam and Certificate fee included in the price.

BRCGS Environmental Monitoring (1 Day)
Delivered OnlineFlexible Dates
£235

Complete C# programming

5.0(3)

By Systems & Network Training

Complete C# programming training course description This training course teaches developers the programming skills that are required for developers to create Windows applications using the C# language. Students review the basics of C# program structure, language syntax, and implementation details, and then consolidate their knowledge throughout the week as they build an application that incorporates several features of the .NET Framework. What will you learn Use the syntax and features of C#. Create and call methods, catch and handle exceptions, and describe the monitoring requirements of large-scale applications. Implement a typical desktop application. Create class, define and implement interfaces, and create and generic collections. Read and write data to/from files. Build a GUI using XAML. Complete C# programming training course details Who will benefit: Programmers wishing to learn C#. Prerequisites: Developers attending this course should already have gained some limited experience using C# to complete basic programming tasks. Duration 5 days Complete C# programming training course contents Review of C# Syntax Overview of Writing Applications using C#, Datatypes, Operators, and Expressions. C# Programming Language Constructs. Hands on Developing the Class Enrolment Application. Methods, exceptions and monitoring apps Creating and Invoking Methods. Creating Overloaded Methods and Using Optional and Output Parameters. Handling Exceptions. Monitoring Applications. Hands on Extending the Class Enrolment Application Functionality. Developing a graphical application Implementing Structs and Enums. Organizing Data into Collections. Handling Events. Hands on Writing the Grades Prototype Application. Classes and Type-safe collections Creating Classes. Defining and Implementing Interfaces. Implementing Type-safe Collections. Hands on Adding Data Validation and Type-safety to the Grades Application. Class hierarchy using Inheritance Class hierarchies. Extending .NET framework classes. Creating generic types. Hands on Refactoring common functionality into the User Class. Reading and writing local data Reading and Writing Files. Serializing and Deserializing Data. Performing I/O Using Streams. Hands on Generating the Grades Report. Accessing a Database Creating and using entity data models. Querying and updating data by using LINQ. Hands on Retrieving and modifying grade data. Accessing remote data Accessing data across the web and in the cloud. Hands on Modifying grade data in the Cloud. Designing the UI for a graphical applicatione Using XAML to design a User Interface. Binding controls to data. Styling a UI. Hands on Customizing Student Photographs and Styling the Application. Improving performance and responsiveness Implementing Multitasking by using tasks and Lambda Expressions. Performing operations asynchronously. Synchronizing concurrent data access. Hands on Improving the responsiveness and performance of the application. Integrating with unmanaged code Creating and using dynamic objects. Managing the Lifetime of objects and controlling unmanaged resources. Hands on Upgrading the grades report. Creating reusable types and assemblies Examining Object Metadata. Creating and Using Custom Attributes. Generating Managed Code. Versioning, Signing and Deploying Assemblies. Hands on Specifying the Data to Include in the Grades Report. Encrypting and Decrypting Data Implementing Symmetric Encryption. Implementing Asymmetric Encryption. Hands on Encrypting and Decrypting Grades Reports.

Complete C# programming
Delivered in Internationally or OnlineFlexible Dates
£3,697

CRISC Certified in Risk and Information Systems Control

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - a. Organizational Governance Organizational Strategy, Goals, and Objectives Organizational Structure, Roles, and Responsibilities Organizational Culture Policies and Standards Business Processes Organizational Assets GOVERNANCE - b. Risk Governance Enterprise Risk Management and Risk Management Framework Three Lines of Defense Risk Profile Risk Appetite and Risk Tolerance Legal, Regulatory, and Contractual Requirements Professional Ethics of Risk Management IT RISK ASSESSMENT - a. IT Risk Identification Risk Events (e.g., contributing conditions, loss result) Threat Modelling and Threat Landscape Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) Risk Scenario Development IT RISK ASSESSMENT - b. IT Risk Analysis and Evaluation Risk Assessment Concepts, Standards, and Frameworks Risk Register Risk Analysis Methodologies Business Impact Analysis Inherent and Residual Risk RISK RESPONSE AND REPORTING - a. Risk Response Risk Treatment / Risk Response Options Risk and Control Ownership Third-Party Risk Management Issue, Finding, and Exception Management Management of Emerging Risk RISK RESPONSE AND REPORTING - b. Control Design and Implementation Control Types, Standards, and Frameworks Control Design, Selection, and Analysis Control Implementation Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - c. Risk Monitoring and Reporting Risk Treatment Plans Data Collection, Aggregation, Analysis, and Validation Risk and Control Monitoring Techniques Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) Key Performance Indicators Key Risk Indicators (KRIs) Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - a. Information Technology Principles Enterprise Architecture IT Operations Management (e.g., change management, IT assets, problems, incidents) Project Management Disaster Recovery Management (DRM) Data Lifecycle Management System Development Life Cycle (SDLC) Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - b. Information Security Principles Information Security Concepts, Frameworks, and Standards Information Security Awareness Training Business Continuity Management Data Privacy and Data Protection Principles

CRISC Certified in Risk and Information Systems Control
Delivered OnlineFlexible Dates
£2,037

Microsoft Access 2016 Advanced

4.3(43)

By John Academy

Description: Microsoft Access is the most popular database for Windows. It enables you to collect, organize, and report on data via a graphical interface. Templates provide pre-defined forms, reports and database designs - and Macros enable you to automate regular tasks. By this Microsoft Access 2016 Advanced explore the advanced Access features. Whether you are using Access for the first time, , or have been using it for years, this course will help you make the most of Access 2016's features and tools. So, if you are thinking to improve your knowledge in Microsoft Access 2016, you can join this course now. Learning Outcomes: Designing forms through adding and setting controls, creating subforms, using tab pages to organize information, improve navigation, formatting and applying conditional formatting Data, field, form and record validation Creating macros, restricting records using conditions, validate data, automate data entry and convert a macro to VBA in order to enhance user interface design Link tables to external data sources, manage database, determine object dependency, document database, and analyze database performance Allow multiple user access to database by splitting it, implement security, set passwords, convert Access database to ACCDE file, and add digital signatures Create and modify switchboards and startup options Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Microsoft Access 2016 Advanced is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Microsoft Access 2016 Advanced is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Implementing Advanced Form Design Add Controls to Forms 01:00:00 Set Form Controls 01:00:00 Create Subforms 00:30:00 Organize Information with Tab Pages 00:30:00 Enhance Navigation with Forms 00:30:00 Format a Form 01:00:00 Apply Conditional Formatting 00:30:00 Using Data Validation Field Validation 00:30:00 Form and Record Validation 00:30:00 Using Macros to Improve User Interface Design Create a Macro 01:00:00 Restrict Records Using a Condition 00:30:00 Validate Data Using a Macro 00:30:00 Automate Data Entry Using a Macro 00:30:00 Convert a Macro to VBA 00:30:00 Using Advanced Database Management Link Tables to External Data Sources 00:30:00 Manage a Database 00:30:00 Determine Object Dependency 00:30:00 Document a Database 00:30:00 Analyze the Performance of a Database 00:30:00 Distributing and Securing a Database Split a Database for Multiple User Access 00:30:00 Implement Security 00:30:00 Set Passwords 00:30:00 Convert an Access Database to an ACCDE File 00:30:00 Package a Database with a Digital Signature 00:30:00 Managing Switchboards Create a Database Switchboard 01:00:00 Modify a Database Switchboard 00:30:00 Set Startup Options 00:30:00 Activities Activities - Microsoft Access 2016 Advanced 00:00:00 Mock Exam Mock Exam- Microsoft Access 2016 Advanced 00:20:00 Final Exam Final Exam- Microsoft Access 2016 Advanced 00:20:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Microsoft Access 2016 Advanced
Delivered Online On Demand16 hours 40 minutes
£21

55318: Advanced Automated Administration with Windows PowerShell

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for IT professionals who are experienced in general Windows Server and Windows Client administration. Students should have a foundational knowledge of Windows PowerShell, which they can obtain by taking course 10961C: Automating Administration with Windows PowerShell. In addition, this course provides scripting guidance for Microsoft Azure administrators and developers who support development environments and deployment processes. Overview After completing this course, you will be able to: Create advanced functions. Use Microsoft .NET Framework and REST API in Windows PowerShell. Handle script errors. Use XML, JSON, and custom formatted data. Manage Microsoft Azure resources Analyze and debug scripts Understand Windows PowerShell workflow. This course teaches students how to automate administrative tasks using PowerShell. Students will learn crucial scripting skills such as creating advanced functions, writing controller scripts, and handling script errors. Candidates will learn how to use PowerShell when working with Microsoft Azure, SQL Server, Active Directory, IIS, Windows PowerShell Workflow, .NET resources, the REST API and XML, CSV & JSON formatted data files.This course replaces retired Microsoft course 10962. Module 1: Creating advanced functions Lesson 1: Converting a command into an advanced function Lesson 2: Creating a script module Lesson 3: Defining parameter attributes and input validation Lesson 4: Writing functions that accept pipeline input Lesson 5: Producing complex pipeline output Lesson 6: Using comment-based Help Lesson 7: Using Whatif and Confirm parameters Module 2: Using Microsoft .NET Framework and REST API in Windows PowerShell Lesson 1: Using .NET Framework in PowerShell Lesson 2: Using REST API in PowerShell Module 3: Writing controller scripts Lesson 1: Understanding controller scripts Lesson 2: Writing controller scripts with a user interface Lesson 3: Writing controller scripts that create reports Module 4: Handling script errors Lesson 1: Understanding error handling Lesson 2: Handling errors in a script Module 5: Using XML, JSON, and custom-formatted data Lesson 1: Working with XML formatted data Lesson 2: Working with JSON formatted data Lesson 3: Working with custom-formatted data Module 6: Enhancing server management with Desired State Configuration and Just Enough Administration Lesson 1: Implementing Desired State Configuration Lesson 2: Implementing Just Enough Administration Module 7: Analyzing and debugging scripts Lesson 1: Debugging in Windows PowerShell Lesson 2: Analyzing and debugging an existing script Module 8: Understanding Windows PowerShell Workflow Lesson 1: Understanding Windows PowerShell Workflows Lesson 2: Running Windows PowerShell Workflows

55318: Advanced Automated Administration with Windows PowerShell
Delivered OnlineFlexible Dates
£1,785

Beginning ASP.NET

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is aimed at developers who want to build web applications using ASP.NET Core or developers who want to make a career building web applications using Microsoft technology. In the web world, the ability to build robust web applications is key. With the knowledge about ASP.NET Core MVC (that makes use of the Model-View-Controller architecture) that you will take away from this course, you will be prepared to meet this need. In today's age, it's important for you as a developer to possess the ability to separate the programming and business logic. This course covering ASP.NET Core 2 will help you develop this skillset. Setting the Stage Introduction to Web Applications Creating ASP.NET Core application Controllers Role of the Controller in ASP.NET MVC Applications Introduction to Routing Our First Controller Implementing our own IActionResult Adding Views Adding Models Passing Data from the Controller to the View Filters Writing a Custom Filter Views The View Engine and the Razor View Engine Working with Layout Generating HTML Partial View View Components Tag Helpers Models Introduction to Models Model Binding The Entity Framework Using the Entity Framework in ASP.NET MVC applications Database Migration Validation Introduction to Validation Client-Side and Server-Side Validation Server-side Validation Client-side Validation Implementation Routing Convention-Based Routing Attribute-Based Routing Route Attribute at the Controller Level Passing Routing Values in HTTP Action Verbs in the Controller Route Constraints Rest Buy Designing Rest Buy Creating the Entities for the Application Creating EF Context and Migration Adding Features, Testing, and Deployment Adding the Registration Feature Creating a Unit Test Upgrading Our Application to Bootstrap 4 Deploying Rest Buy to Azure Additional course details: Nexus Humans Beginning ASP.NET training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Beginning ASP.NET course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Beginning ASP.NET
Delivered OnlineFlexible Dates
Price on Enquiry

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997
1...678910...53