• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

957 Courses

CertNexus Certified Internet of Things Security Practitioner (CIoTSP) v1.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy. This course is also designed for students who are seeking the CertNexus Certified Internet of Things Security Practitioner (CIoTSP) certification and who want to prepare for Exam ITS-110. Overview This program will validate that the candidate has the knowledge, skills, and abilities to secure network environments for IoT devices, analyze vulnerabilities and determine reasonable controls against threats, and effectively monitor IoT devices and respond to incidents. This course is designed for practitioners who are seeking to demonstrate a vendor-neutral, cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem. Managing IoT Risks Map the IoT Attack Surface Build in Security by Design Securing Web and Cloud Interfaces Identify Threats to IoT Web and Cloud Interfaces Prevent Injection Flaws Prevent Session Management Flaws Prevent Cross-Site Scripting Flaws Prevent Cross-Site Request Forgery Flaws Prevent Unvalidated Redirects and Forwards Securing Data Use Cryptography Appropriately Protect Data in Motion Protect Data at Rest Protect Data in Use Controlling Access to IoT Resources Identify the Need to Protect IoT Implement Secure Authentication Implement Secure Authorization Implement Security Monitoring on IoT Systems Securing IoT Networks Ensure the Security of IP Networks Ensure the Security of Wireless Networks Ensure the Security of Mobile Networks Ensure the Security of IoT Edge Networks Ensuring Privacy Improve Data Collection to Reduce Privacy Concerns Protect Sensitive Data Dispose of Sensitive Data Managing Software and Firmware Risks Manage General Software Risks Manage Risks Related to Software Installation and Configuration Manage Risks Related to Software Patches and Updates Manage Risks Related to IoT Device Operating Systems and Firmware Promoting Physical Security Protect Local Memory and Storage Prevent Physical Port Access

CertNexus Certified Internet of Things Security Practitioner (CIoTSP) v1.0
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus Internet of Things for Business Professionals (IoTBIZ)

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for This 4-hour course is intended for business leads in project management, marketing and sales who are seeking to grow their organization through IoT technology solutions. This course prepares students for taking the CertNexus IoTBIZ Credential (IOZ-110). Overview This course and associated credential (IOZ-110) will validate your knowledge of IoT terminology and your ability to understand the components of IoT infrastructure, help you uncover challenges for consideration and understand the impact that IoT has on your organization. This includes being able to identify what IoT can do for your organization and the various business and technical challenges that you must address. The Internet of Things (IoT) allows organization to collect an extraordinary volume of data and new analysis tools can enable you to use this data to make well-informed decisions to be made quickly. But before you can successfully plan and implement an IoT solution, you must understand the various factors that will drive your decisions. Putting IoT systems into place can be a complicated proposition with unique considerations distinctly different from traditional IT solutions. This course will familiarize you with IoT components, understand the challenges that you may face, and make design decisions about your IoT projects. Course includes an exam voucher for the IoTBIZ exam (exam IOZ-110). Planning an IoT Implementation Defining IoT IoT Infrastructure Identify Benefits and Challenges of IoT Undertaking an IoT Project Identify Real World Applications for IoT The IoT Development Lifecycle Additional course details: Nexus Humans CertNexus Internet of Things for Business Professionals (IoTBIZ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Internet of Things for Business Professionals (IoTBIZ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Internet of Things for Business Professionals (IoTBIZ)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black Cloud Enterprise EDR

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of VMware Carbon Black Cloud Enterprise EDR Identify the architecture and data flows for VMware Carbon Black Cloud Enterprise EDR communication Perform searches across endpoint data to discover suspicious behavior Manage watchlists to augment the functionality of VMware Carbon Black Cloud Enterprise EDR Create custom watchlists to detect suspicious activity in your environment Describe the process for responding to alerts in VMware Carbon Black Cloud Enterprise EDR Discover malicious activity within VMware Carbon Black Cloud Enterprise EDR Describe the different response capabilities available from VMware Carbon Black Cloud This course teaches you how to use the VMware Carbon Black© Cloud Enterprise EDR? product and leverage its capabilities to configure and maintain the system according to your organization?s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Data Flows and Communication Hardware and software requirements Architecture Data flows Searching Data Creating searches Search operators Analyzing processes Analyzing binaries Advanced queries Managing Watchlists Subscribing Alerting Custom watchlists Alert Processing Alert creation Analyzing alert data Alert actions Threat Hunting in Enterprise EDR Cognitive Attack Loop Malicious behaviors Response Capabilities Using quarantine Using live response Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud Enterprise EDR training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud Enterprise EDR course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black Cloud Enterprise EDR
Delivered OnlineFlexible Dates
Price on Enquiry

Professional Certificate Course in Appraising Information Systems and Organisation Strategy in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

This course aims to provide learners with a comprehensive understanding of the impact of information systems on organizations and business firms. The course will explore the concept of competitive advantage and its dimensions and how strategic information systems can be used to achieve and sustain competitive advantage. Learners will also learn about the various types of information systems, their use in supporting business processes, and how to align IS strategy with business strategy. Additionally, the course will cover the impact of the internet on competitive advantage, Porter's Five Forces, and the Value Chain Analysis. After the successful completion of the course, you will be able to learn about the following, Organization and Information Systems and How Information Systems Impact Organizations and Business Firms? Competency, Competitive Advantage, its dimensions. Strategic Information System. Types of Information System Strategies. Management Information System and Competitive Advantage. The Internet's Impact on Competitive Advantage. Porter's Five Forces and Competitive Advantage. The Value Chain Analysis and Competitive Advantage. Information Systems Products and Services. Types of Information Systems to Support Business Processes. Alignment Between IS Strategy and Business Strategy. The People in Information Systems. This course will give learners an in-depth understanding of the relationship between information systems and organizations. The course will begin by exploring the concept of competitive advantage and its dimensions and how information systems can be used to achieve and sustain competitive advantage. Learners will learn about the different types of information systems strategies, including strategic information systems, management information systems, and the internet's impact on competitive advantage. This course will provide learners with an in-depth understanding of the relationship between information systems and organizations. The course will begin by exploring the concept of competitive advantage and its dimensions, and how information systems can be used to achieve and sustain competitive advantage. Learners will learn about the different types of information systems strategies, including strategic information systems, management information systems, and the internet's impact on competitive advantage. VIDEO - Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Appraising Information Systems and Organisation Strategy Self-paced pre-recorded learning content on this topic. Appraising Information Systems and Organisation Strategy Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience. Business Owners Entrepreneurs Managers and Executives IT Professionals Marketing Professionals Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in Appraising Information Systems and Organisation Strategy in London 2024
Delivered Online On Demand14 days
£41

Professional Certificate in Management Information System in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

The Professional Certificate in Management Information System aims to introduce the learner to the concepts in the management information system. The learner will be able to understand the nature of information, categorization of information for the decision making the purpose of the top management. Learning Outcomes After the successful completion of the certificate, the student will be able to know: Introduction - definitions Decision Making in Organisations The Nature of Information Decision Making and Information Management Information Systems Organisation Level & IS Deployment Strategic Information Systems Managerial Issues VIDEO - Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Management Information Systems Management Information System Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the knowledge of the learner in the field. This certificate is for very one eager to know more and gets updated on current ideas in the respective field. We recommend this certificate for the following audience. CEO, Director, Manager, Supervisor Strategy Manager Strategic System Developer Information Manager Organizational Knowledge Manager Average Completion Time 2 Weeks Accreditation 1 CPD Hour Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate in Management Information System in London 2024
Delivered Online On Demand14 days
£30

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints v6.0 (SSFAMP)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security administrators Security consultants Network administrators Systems engineers Technical support personnel Cisco integrators, resellers, and partners Overview Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection· Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations This course shows you how to deploy and use Cisco AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. Course Outline Introducing Cisco AMP Technologies Introducing AMP for Endpoints Overview and Architecture Navigating the Console Interface Using Cisco AMP for Endpoints Identifying Attacks Analyzing Malware Managing Outbreak Control Creating Endpoint Policies Working with AMP for Endpoint Groups Using Orbital for Endpoint Visibility Introducing AMP REST API Navigating Accounts

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints v6.0 (SSFAMP)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Cisco integrators, resellers, and partners Network administrators Security administrators Security consultants Systems engineers Technical support personnel Overview After taking this course, you should be able to: Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors. Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0 is a 3-day course that shows you how to deploy and use Cisco© AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. The course qualifies for 24 Cisco Continuing Education credits (CE) towards recertification.This class will help you:Learn how to deploy and manage Cisco AMP for EndpointsSucceed in today?s high-demand security operations roles Course Outline This course will cover the following topics: Introducing to Cisco AMP Technologies Introducing AMP for Endpoints Overview and Architecture Navigating the Console Interface Using Cisco AMP for Endpoints Identifying Attacks Analyzing Malware Managing Outbreak Control Creating Endpoint Policies Working with AMP for Endpoint Groups Using Orbital for Endpoint Visibility Introducing AMP REST API Navigating Accounts

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0
Delivered OnlineFlexible Dates
Price on Enquiry

BlackArch Linux: Ethical Hacking and Penetration Testing

4.8(9)

By Skill Up

Dive into the world of Ethical Hacking and Penetration Testing with BlackArch Linux. Master cybersecurity, vulnerability assessment, and network security.

BlackArch Linux: Ethical Hacking and Penetration Testing
Delivered Online On Demand7 hours 8 minutes
£25

ITIL Foundation

4.8(9)

By Skill Up

Want to learn how to deliver high-quality IT services that meet the needs of your business and customers? Then take the ITIL Foundation course.

ITIL Foundation
Delivered Online On Demand8 hours 29 minutes
£25

CCTE Check Point Troubleshooting Expert

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for security experts and Check Point resellers who desire to obtain the necessary knowledge required to perform more advanced troubleshooting skills while managing their security environments. Overview Understand how to use Check Point diagnostic tools to determine the status of a network. Understand how to use network packet analyzers and packet capturing tools to evaluate network traffic.Become familiar with more advanced Linux system commands. Obtain a deeper knowledge of the Security Management architecture. Understand how the Management database is structured and how objects are represented in the database. Understand key Security Management Server processes and their debugs. Understand how GuiDBedit operates. Understand how the kernel handles traffic and how to troubleshoot issues with chain modules. Understand how to use the two main procedures for debugging the Firewall kernel and how they differ. Recognize User mode processes and how to interpret their debugs. Discuss how to enable and use core dumps. Understand the processes and components used for policy installs and processing packets in Access Control policies. Understand how to troubleshoot and debug issues that may occur with App Control and URLF. Understand how to debug HTTPS Inspection-related issues. Understand how to troubleshoot and debug Content Awareness issues. Understand how IPS works and how to manage performance issues. Understand how to troubleshoot Anti-Bot and Antivirus. Recognize how to troubleshoot and debug Site-to-Site VPN related issues. Understand how to troubleshoot and debug Remote Access VPNs. Understand how troubleshoot Mobile Access VPN issues. Recognize how to use SecureXL features and commands to enable and disable accelerated traffic. Understand how the server hardware and operating system affects the performance of Security Gateways. Understand how to evaluate hardware configurations for optimal performance. Provide advanced troubleshooting skills to investigate and resolve more complex issues that may occur while managing your Check Point Security environment. Course Outline Advanced Troubleshooting Management Database and Processes Advanced Kernel Debugging User Mode Troubleshooting Advanced Access Control Understanding Threat Prevention Advanced VPN Troubleshooting Acceleration and Performance Tuning Additional course details: Nexus Humans CCTE Check Point Troubleshooting Expert training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCTE Check Point Troubleshooting Expert course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCTE Check Point Troubleshooting Expert
Delivered OnlineFlexible Dates
Price on Enquiry