close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

IT Support and Solution Training

Online Instructor-led (2 days)

Classroom (2 days)

Online Self-paced (16 hours)

MacOS Mojave Troubleshooting and Support Training​ Course Outline

Module 1: Installation and Configuration

  • Introduction
  • Features in macOs Mojave
  • macOS Requirements before Installation
  • Installing macOS Mojave
  • Clean Install a New Shiny Version
    • Compatibility of Existing Mac with macOS Mojave
    • macOS Mojave Bootable USB Installer Drive
    • Backing Up All the Data
  • Steps to Install a New Shiny Version
  • Upgrading Mac
  • Using Setup Assistant for Initial Configuration
  • Recovery in macOS Mojave and Installing Software Updates

Module 2: Manage Users

  • Introduction
  • Overview of User Accounts
  • Add and Remove User Accounts
  • Recovering User Name/Account Name
  • Changing the User Password
  • Reset User Password
  • Using Home Folders

Module 3: Security

  • New Security Features in macOS Mojave
  • Exploring the Keychain
  • Using the Keychain
  • Reset and Change User Passwords

Module 4: File Systems

  • Introduction
  • Hard Disks, Partitions, and Volumes
  • APFS File System and Disk Management
  • Partitioning and Erasing with Disk Utility
  • Data Migration in Target Disk Mode
  • Data Encryption with FileVault
  • MacOS Permissions Models
  • Modification of Permissions

Module 5: Data Management

  • Archiving Files and Folders
  • Revealing Hidden Files and Folders
  • Navigating the File System
  • Exploring and Navigating the Library Folders
  • Understanding Metadata
  • Using Siri and Spotlight
  • Time Machine Solution
  • Backing up and Restoring Data
  • Storing Data with the Time Machine

Module 6: Applications and Processes

  • Installing and Uninstalling Applications
  • Troubleshoot Application Issues
  • Launching Services
  • Quicklook
  • Saving Documents with iCloud Drive
  • Continuity and Universal Clipboard
  • Optimising Storage with macOS Mojave

Module 7: Network Configuration

  • Configuring Basic Network Settings
  • Configuring Proxy Servers
  • Configuring VPN Settings
  • Troubleshooting Network Issues

Module 8: Network Services

  • Using Mail Services
  • Using Mail Services: Send and Reply
  • Using Mail Services: Organise and Search
  • Using Exchange
  • Accessing Network File Servers
  • Screen Sharing Services
  • Using and Navigating the Firewall

Module 9: Managing the Boot Process

  • MacOS Recovery Tools
  • MacOS Recovery Utilities
  • Troubleshooting with Console and Terminal
  • Firmware with the Boot Process
  • Start-up for the Troubleshooting of the Boot Process

Module 10: Binding macOS to Active Directory

  • macOS in the Microsoft Windows Active Directory Environment
  • Configuring the Network
  • Active Directory Domain
  • Binding a Mac to the Domain

Module 11: Troubleshooting Integration Issues

  • Troubleshooting macOS
  • Troubleshooting in the Microsoft Windows Active Directory Environment
  • Common Troubleshooting Issues

Module 12: Deployment

  • Create macOS Images in a Corporate Network
  • Maintain macOS Images in a Corporate Network
  • Deploy macOS Images in a Corporate

Module 13: Remote Management

  • Apple Remote Desktop
  • Remotely Manage macOS
  • Generating Detailed Reports
  • Deploying Software
  • Remote Assistance

Module 14: Mobile Device Management

  • MDM Management of macOS
  • Working of the MDM Protocol

 

Show moredown

Who should attend this MacOS Mojave Troubleshooting and Support Training?

MacOS Mojave Troubleshooting and Support Training Course is designed for a variety of professionals who want to learn how to troubleshoot and support MacOS Mojave systems. The following professionals can benefit from attending this course:

  • IT Support Technicians
  • Help Desk Professionals
  • System Administrators
  • Technical Support Engineers
  • Mac Administrators
  • Desktop Support Specialists
  • IT Managers overseeing Mac environments

Prerequisites of the MacOS Mojave Troubleshooting and Support Training

There are no formal prerequisites for this MacOS Mojave Troubleshooting and Support Training Course. However, a basic understanding of MacOS and some prior experience with troubleshooting and supporting computer systems will be beneficial.

macOS Mojave Troubleshooting and Support Training​ Course Overview

macOS Mojave is the major release of macOS, Apple's desktop OS for its lineup of computer devices. Apple continues to derive its core OS from Unix while adding new features to expand the existing framework of services. This macOS Mojave Troubleshooting and Support course is designed to provide knowledge of comprehensive and extensive knowledge of macOS to participants.

In this course, delegates will learn about keychain, hard disks, partitions, and volumes. Delegates will get an understanding of macOS permissions models, APFS file system, and disk management. In addition, delegates will also learn how to configure the network, proxy, and VPN settings.

During this 2-day course, delegates will be introduced to macOS recovery tools and utilities. Delegates will gain comprehensive knowledge of how to create, maintain, and deploy macOS images in a corporate network. Furthermore, they will learn how to troubleshoot in the Microsoft Windows Active Directory Environment. Post completion of this course, delegates will be able to manage macOS remotely.

Show moredown

What’s included in this MacOS Mojave Troubleshooting and Support Training?

  • World-Class Training Sessions from Experienced Instructors           
  • MacOS Mojave Troubleshooting and Support Training Certificate         
  • Digital Delegate Pack

Show moredown

Online Instructor-led (1 days)

Classroom (1 days)

Online Self-paced (8 hours)

VPN Training​ Course Outline

Introduction to VPN

  • Define VPN
  • VPN Building Blocks
  • VPN Technologies, Topology, and Protocols
  • VPN vs Mobile IP

Exploring VPN Architectures

  • VPN Requirements and Architectures
  • Security-Based and Layer-Based VPN Architectures
  • Remote Access and Extranet VPNs

Introduction to VPN Security

  • What is Network Security?
  • Internet Architecture
  • Security Issues Connecting to the Internet
  • Generic Secure Channel
  • Cryptography
  • Shared Key and Public Key Cryptography
  • Digital Signatures
  • Message Authentication Codes

VPN Tunneling Protocols

  • PPTP
  • L2TP
  • L2F
  • IPsec
  • MPLS

Introduction to Point-to-Point Protocol (PPP)

  • The Basis for L2 VPN Protocols
  • Wire Authentication Protocols
  • Backend Authentication Servers
  • Configuration of Network Protocols

Layer Two VPN Protocols

  • Layer Two Forwarding (L2F)
  • Point-to-Point Tunneling Protocol (PPTP)
  • Layer Two Tunneling Protocol (L2TP)

IP Security Protocol (IPsec)

  • IPsec and VPNs
  • Authentication Header (AH), Encapsulating Security Payload (ESP), and Internet Key Exchange (IKE)
  • Issues with Remote Access
  • L2TP with IPsec
  • IPsec Implementation

Authentication and Access Control in VPN

  • PPP Authentication
  • RADIUS and Kerberos
  • VPNs Authentication
  • Access Control Policy, Rules, Lists, and Policy Management
  • Access Control in VPNs

Public Key Infrastructure (PKI) and VPNs

  • Architecture of PKI
  • Digital Certificate Formats
  • Certificate Management System and Protocols
  • Certificate Use in VPNs

VPN Network and Service Management

  • Network Management Architecture and Protocols
  • VPN Service Management
  • Service Level Agreement
  • Network Operations Centres (NOCs)
  • Redundancy and Load-Balancing

Show moredown

Who should attend this VPN Training?

VPN Training Course is designed for professionals who want to gain skills in understanding, setting up, and managing Virtual Private Networks (VPNs). The following professionals can benefit from attending this course:

Module 1: Introduction to VPN

  • What is VPN?
  • How Does a VPN Work?
  • Benefits of a VPN Connection
  • Why Use VPN Connection?

Module 2: VPN Protocols

  • What is a VPN Protocol?
  • OpenVPN
  • IPSec/IKEv2
  • WireGuard
  • SSTP
  • L2TP/IPSec
  • PPTP

Module 3: Planning for VPN

  • VPN Setup Requirements
  • What Type of VPN to Create?
  • VPN Planning Advisor
  • Completing VPN Planning Work Sheets

Module 4: Configure VPN

  • Configure VPN Connections with New Connection Wizard
  • Configure VPN Security Policies
  • Configure a Secure VPN Connection
  • Configure a Manual Connection
  • Configure a Dynamic Connection
  • Configure VPN Packet Rules
  • Configure Traffic Flow Confidentiality
  • Configure Extended Sequence Number
  • Configure Differences for IKEv2
  • Start a VPN Connection

Module 5: Managing VPN

  • Setting Default Attributes for Your Connections
  • Resetting Connections in Error State
  • Viewing Error Information
  • Viewing Attributes of Active Connections
  • Viewing the VPN Server Trace
  • Viewing VPN Server Job Logs
  • Viewing Attributes of Security Associations
  • Stopping a VPN Connection
  • Deleting VPN Configuration Objects

Module 6: Troubleshoot VPN

  • Overview of VPN Troubleshooting
  • Common VPN Configuration Errors and Fix Them
  • Troubleshooting VPN with the QIPFILTER Journal
  • Troubleshooting VPN with the QVPN Journal
  • Troubleshooting VPN with the VPN Job Logs
  • Troubleshooting VPN With Communications Trace

.

VPN Training​ Course Overview

Virtual Private Network (VPN) is a term used to define a communication network that uses combinations of technologies for securing a connection tunnelled through an untrusted or unsecured network. VPN is called ‘virtual’ because it depends on the virtual connections use, which is a temporary connection without any real physical presence. This VPN Training side signed to provide knowledge on the complete working of VPN and its technologies.

In this VPN Training course, delegates will gain knowledge of PPTP, L2F, L2TP, and MPLS as VPN tunnelling protocols. Delegates will get an understanding of the Public key infrastructure (PKI) concept and its integration into VPN solutions. In addition, they will learn about security-based and layer-based VPN architectures.

During this 1-day training, delegates will be introduced to concepts like authentication header (AH), encapsulating security payload (ESP), and internet key exchange (IKE). They will acquire knowledge of network management architecture and protocols. Post completion of this training, delegates will be familiarised with the concept of redundancy and load-balancing.

Show moredown

What’s included in this VPN Training?

  • World-Class Training Sessions from Experienced Instructors           
  • VPN Training Certificate         
  • Digital Delegate Pack

Show moredown

Online Instructor-led (1 days)

Classroom (1 days)

Online Self-paced (8 hours)

Samba Server Training​ Course Outline

Module 1: Introduction to Samba

  • What is Samba?
  • Common Internet File System
  • Connect to a CIFS File Share
  • Distribution-Specific Package Installation

Module 2: Installing Samba on a Unix System

  • Bundled Versions
  • Downloading the Samba Distribution
  • Configuring Samba
  • Compiling and Installing Samba
  • Enabling SWAT
  • Basic Samba Configuration File
  • Firewall Configuration
  • Starting the Samba Daemons
  • Testing the Samba Daemons

Module 3: Configure Windows Client

  • Windows Networking Basics
  • Install and Configure Samba Share with Windows and CentOS

Module 4: Samba Configuration File

  • Overview of Samba Configuration File
  • Special Sections
  • Configuration Options
  • Server Configuration
  • Disk Share Configuration
  • Networking Options with Samba
  • Virtual Servers
  • Logging Configuration Options

Module 5: Authentication and Authorisation

  • Authentication
  • Authorisation

Module 6: Advanced Disk Shares

  • Filesystem Differences
  • File Permissions and Attributes on MS-DOS and Unix
  • Windows NT/2000/XP ACLs
  • Name Mangling and Case
  • Locks and Oplocks
  • Connection Scripts
  • Microsoft Distributed Filesystems
  • Working with NIS

Module 7: Printing

  • Sending Print Jobs to Samba
  • Printing to Windows Printers

Module 8: Name Resolution and Browsing

  • Name Resolution
  • Browsing

Module 9: Troubleshooting Samba

  • Tool Box
  • Fault Tree

Show moredown

Who should attend this Samba Server Training?

Samba Server Training Course is designed for a variety of professionals who want to learn how to set up and manage Samba servers. The following professionals can benefit from attending this course:

  • Network Administrators
  • System Administrators
  • IT Managers
  • Linux Administrators
  • IT Support Technicians
  • Network Engineers
  • Server Administrators
  • IT Consultants

Prerequisites of the Samba Server Training

There are no formal Samba Server Training Course. However, a basic understanding of networking and some prior experience with using computers will be beneficial.

Samba Server Training​ Course Overview

Samba is an open-source software suite that runs on Unix/Linux based platforms. Samba can communicate with Windows clients like a native application. It provides this service by employing the Common Internet File System (CIFS). This Samba Server Training is designed to provide knowledge about the working of Samba.

In this Samba Server Training, delegates will get an understanding of how to install Samba and enable SWAT (Samba Web Administration Tool). Delegates will learn to create a PDF printer and manage Windows print drivers. In addition, delegates will learn how to configure Samba PDC and BDC. They will also be introduced to accounts, authentication, and authorisation.

During this 1-day training course, delegates will become familiarised with Samba and CUPS, queue lists, and tdb files. They will be introduced to name resolution and network browsing. Post completion of this training, delegates will be able to troubleshoot name services, network addresses and NetBIOS names.

Show moredown

What’s included in this Samba Server Training?

  • World-Class Training Sessions from Experienced Instructors           
  • Samba Server Training Certificate         
  • Digital Delegate Pack

Show moredown

Online Instructor-led (1 days)

Classroom (1 days)

Online Self-paced (8 hours)

NGINX Training​ Course Outline

Module 1: Introduction to NGINX

  • Installation
  • Installing NGINX Plus
  • Verifying Your Installation
  • Key Files, Directories, and Commands
  • Serving Static Content
  • Graceful Reload

Module 2: High-Performance Load Balancing

  • HTTP, TCP, UDP Load Balancing
  • Load-Balancing Methods
  • Sticky Cookie, Sticky Learn, and Sticky Routing with NGINX Plus
  • Connection Draining with NGINX Plus
  • Passive and Active Health Checks

Module 3: Traffic Management

  • A/B Testing
  • Using the GeoIP Module and Database
  • Restricting Access Based on Country
  • Finding the Original Client
  • Limiting Connections, Rate, and Bandwidth

Module 4: Massively Scalable Content Caching

  • Introduction
  • Caching Zones and Locking
  • Caching Hash Keys
  • Cache Bypass and Performance
  • Cache Purging with NGINX Plus

Module 5: Programmability and Automation

  • NGINX Plus API
  • Using the Key-Value Store with NGINX Plus
  • Extending NGINX with a Common Programming Language
  • Automating Configurations with Consul Templating

Module 6: Security Controls

  • Access Based on IP Address
  • Allowing Cross-Origin Resource Sharing
  • Upstream Encryption
  • Securing a Location
  • Generating a Secure Link with a Secret
  • HTTPS Redirects
  • Redirecting to HTTPS Where SSL/TLS Is Terminated Before NGINX
  • HTTP Strict Transport Security
  • NGINX Plus Dynamic Application Layer DDoS Mitigation

Module 7: Sophisticated Media Streaming

  • Serving MP4 and FLV
  • Streaming with HLS with NGINX Plus
  • Streaming with HDS with NGINX Plus
  • Bandwidth Limits with NGINX Plus

Module 8: Cloud Deployments

  • Auto-Provisioning on AWS
  • Routing to NGINX Nodes Without an AWS ELB
  • Deploying from the AWS Marketplace
  • Deploying to Google Compute Engine
  • Creating a Google App Engine Proxy

Module 9: Containers/Microservices

  • Using NGINX as an API Gateway
  • Using DNS SRV Records with NGINX Plus
  • Creating an NGINX Dockerfile
  • Building an NGINX Plus Docker Image
  • Kubernetes Ingress Controller
  • Prometheus Exporter Module

Module 10: Debugging and Troubleshooting

  • Configuring Access and Error Logs
  • Forwarding to Syslog
  • Request Tracing
  • OpenTracing for NGINX

Module 11: Performance Tuning

  • Automating Tests with Load Drivers
  • Keeping Connections Open to Clients and Upstream
  • Buffering Responses and Access Logs
  • OS Tuning

Module 12: NGINX Controller

  • Setup Overview
  • Connecting NGINX Plus with Controller
  • Driving NGINX Controller with the API
  • Enable WAF Through Controller App Security

 

Show moredown

Who should attend this NGINX Training Course?

This NGINX Training Course is designed to equip participants with the skills and knowledge necessary to effectively deploy, configure, and manage the NGINX web server and reverse proxy server. This course can benefit the following professionals:

  • Network Engineers
  • System Administrators
  • Web Developers
  • DevOps Engineers
  • Information Technology (IT) Security Professionals
  • Software Engineers
  • Web Hosting Providers

Prerequisites of the NGINX Training Course

There are no formal prerequisites for this NGINX Training Course. However, a basic understanding of network security, web server management, and cybersecurity would be beneficial for the delegates.   

NGINX Training​ Course Overview

NGINX is an open-source web server used for web serving, caching, media streaming, and more. NGINX is mainly used as a load balancer and reverse proxy to handle incoming traffic and divide it into slower upstream servers. Many organisations choose NGINX because it can manage many concurrent connections and power more of the Internet’s busy sites compared to any other server. Acquired necessary skills from this NGINX Training course will help learners to achieve higher job posts such as senior DevOps engineers, system administrators, etc.

Our 1-day NGINX Training course aims to provide delegates with a comprehensive knowledge of NGINX software. During this course, delegates will learn how to redirect to HTTPS where SSL/TLS is terminated before NGINX. They will also learn about the various essential topics such as load-balancing methods, caching hash keys, NGINX plus API, HTTPS redirects, streaming with HDS with NGINX plus, Kubernetes ingress controller, and many more. Our highly professional trainer with years of experience in teaching such courses will conduct this training course and help learners get a complete understanding of this NGINX software.

This training will also cover the following concepts:

  • Graceful reload
  • Traffic management
  • Security controls
  • Serving MP4 and FLV
  • Configuring access and error logs
  • Automating tests with load drivers
  • Connecting NGINX plus with controller

At the end of this NGINX Training course, delegates will be able to debug and troubleshoot with access logs, error logs, and request tracing effectively. They will also be able to deploy the google compute engine and create a google app engine proxy.

The Knowledge Academy also provides more such courses, including Snort Training, VPN Training, Apache Web Server Training, Samba Server Training, Cloudflare Training, which lies under IT Support and Solution Training, to help you develop essential skills to enhance your career opportunities in this field.

Show moredown

What’s included in this NGINX Training Course

  • World-Class Training Sessions from Experienced Instructors
  • NGINX Training Certificate
  • Digital Delegate Pack

Show moredown

Online Instructor-led (1 days)

Classroom (1 days)

Online Self-paced (8 hours)

Security Management, Planning, and Asset Protection Training Course Outline

Module 1: Security Management

  • What is Security Management?
  • Purpose of Security Management
  • Types of Security Management
  • Security Management Architecture
  • Security Management Principles
  • Important Facts About Security Management
    • Physical Security Management
    • Information Security Management

Module 2: Issues of Security Management

  • Strategic and Operation Management
  • Management of Risk
  • Crime Management and Prevention
  • Management Standards

Module 3: Planning Security Strategy  

  • Developing a Security Policy
  • Planning Physical Security
  • Planning System Security
  • Planning User Security
  • Planning Resource Security
  • Planning Network Security
  • Planning Advanced Program-to-Program Communication Security
  • Security Considerations for Internet Browsers
  • Planning TCP/IP Security
  • Planning Backup and Recovery of Security Information

Module 4: Implementing Security Strategy

  • Setting Up User Environment
  • Setting Up System-Level Security
  • Setting Up User Security
  • Implementing Resource Security
  • Setting Up Network Security
  • Setting Up TCP/IP Security

Module 5: Managing Security

  • Restricting Save and Restore Capability
  • Saving Security Information
  • Restoring Security Information
  • Managing Security Information
  • Configuring the System to Use Security Tools
  • Using Security Exit Programs
  • Managing Service Tools User ID
  • Protecting Against Computer Viruses
  • Checking for Objects That Do Not Have Public Authority of *EXCLUDE
  • Checking for Different Sources of Authority to Objects
  • Checking the Settings for Security-Related System Values and Network Attributes

Module 6: Monitoring Security 

  • Planning Security Auditing
  • Preventing and Detecting Security Exposures
  • Monitoring Access to Output and Job Queues
  • Monitoring Subsystem Descriptions
  • Monitoring Authority
  • Monitoring Security Messages
  • Avoiding Loss of Auditing Information
  • Managing the Audit Journal and Journal Receivers
  • Stopping the Audit Function
  • Using the History Log

Module 7: Threats to Assets 

  • Understanding Loss
  • Key Point Identification
  • Risk Analysis
  • Security Survey
  • Intellectual Property / Computer Security
  • Evacuation Planning

Module 8: Introduction to Asset Protection

  • What is Asset Protection?
  • How Does Asset Protection Work?
  • Asset Protection Strategies
  • Principals of Asset Protection

Module 9: Implementing Asset Protection Programme

  • Crisis Management Plans
  • Business Continuity Plans
  • Mutual Aid
  • Communication Strategies
  • Dealing with the Media

Show moredown

Who Should Attend the Security Management, Planning, and Asset Protection Training Course?

The Security Management, Planning, and Asset Protection Training Course is designed for professionals who are responsible for ensuring the safety and security of individuals, organisations, and valuable assets. This course will benefit the following professionals:

  • Security Managers
  • Facility Managers
  • Risk Managers
  • Asset Protection Specialists
  • Security Consultants
  • Operations Managers
  • Loss Prevention Managers
  • Corporate Security Officers

Prerequisites of the Security Management, Planning, and Asset Protection Training Course

There are no formal prerequisites to attend the Security Management, Planning, and Asset Protection Training Course.

Security Management, Planning, and Asset Protection Training Course Overview

Security management is safeguarding an organisation's resources, including computers, people, buildings, and other assets, against risks. Effective security management, personnel, and systems must integrate and support the business to securely secure essential assets without impeding business operations. This training session aims to combat these risks and establish guidelines, plans, and tactics to enhance their industry standing and capacity to handle critical security concerns. This training will enable them to carry out their management and oversight responsibilities under international asset protection and security planning standards. This obtained information will help them conduct their career profile to attain many more excellent designations and many other highly skilled job titles.

This 1-day Security Management, Planning, and Asset Protection Training course equip delegates with the attributes to effectively manage security management programmes and projects. Delegates will learn the best management practices and how to implement them. This course provides the delegates with the knowledge of how to analyse risk, quantify risk, identify essential assets, evaluate vulnerabilities, and establish suitable measures in pertinent plans to reduce risk and liability. This course is led by our highly skilled and professional instructor, who has years of teaching experience in this course.

Course Objectives

  • To gain knowledge of threats and risks to the organisation
  • To protect intellectual property in addition to physical assets
  • To document appropriate safeguards in security plans to mitigate liability
  • To implement best practices for security risk assessment and mitigation
  • To improve our ability to deal with any serious security issues
  • To learn about counter-measures for fraudulent activities, data protection, and cyber security

At the end of this training course, delegates will be able to manage a proactive professional security team and develop a protection policy to safeguard intellectual property and physical assets. They will also be able to combat these dangers and put standards, plans, and strategies into action.

Show moredown

What’s included in this Security Management, Planning, and Asset Protection Training Course?

  • World-Class Training Sessions from Experienced Instructors
  • Security Management, Planning, and Asset Protection Certificate
  • Digital Delegate Pack

Show moredown

Online Instructor-led (1 days)

Classroom (1 days)

Online Self-paced (8 hours)

Ubuntu Linux Server Administration Training Course Outline

Module 1: Introduction and Installation

  • Introduction
  • Preparing to Install
  • Installation Using Liver Server Installer and Debian-Installer
  • Advanced Installation
  • Kernel Crash Dump

Module 2: Package Management

  • Define Package Management
  • dpkg
  • Apt-Get and Aptitude
  • Automatic Updates
  • Configuration

Module 3: Overview of Networking

  • Network Configuration
  • TCP/IP
  • Dynamic Host Configuration Protocol (DHCP)
  • Data Plane Development Kit

Module 4: Introduction to DM-Multipath

  • Device Mapper Multipathing
  • Multipath Devices
  • Configuration File Blacklist & Exceptions
  • DM-Multipath Configuration File

Module 5: Introduction to DM-Multipath

  • OpenSSH Server
  • Puppet
  • Zentyal

Module 6: Network Authentication

  • OpenLDAP Server
  • Samba and LDAP
  • Kerberos
  • SSSD and Active Directory

Module 7: Exploring Domain Name Service (DNS)

  • Installation and Configuration
  • Troubleshooting

 

Show moredown

Who should attend this Ubuntu Linux Server Administration Training?

Ubuntu Linux Server Administration Training is designed for a variety of professionals who want to learn how to administer Ubuntu Linux servers. The following professionals can benefit from attending this course:

  • System Administrators
  • Network Administrators
  • IT Managers
  • Linux Administrators
  • Server Administrators
  • IT Support Technicians
  • DevOps Engineers
  • IT Consultants

Prerequisites of the Ubuntu Linux Server Administration Training

There are no formal prerequisites for this Ubuntu Linux Server Administration Training. However, a basic understanding of Linux and some prior experience with using computers will be beneficial.

Ubuntu Linux Server Administration Training ​Course Overview

The Knowledge Academy’s Ubuntu Linux Server Administration Training is designed to provide knowledge of how to install and configure server applications on the Ubuntu system as per your requirements. Delegates will learn about the installation process using liver server installer and Debian-installer. Delegates will gain knowledge of package management covering dpkg, apt, and aptitude.

In this 1-day training, delegates will be equipped with the knowledge of networking that includes network configuration, TCP/IP, and DHCP (Dynamic Host Configuration Protocol). In addition, delegates will get to learn about device mapper multipathing. This course will teach delegates how to set DM-multipath and its troubleshooting.

During this Ubuntu Linux Server Administration Training, delegates will gain knowledge of OpenSSH server and OpenLDAP server. They will learn about the relationship between Samba and LDAP as well as Kerberos and LDAP. Domain name service, web servers, and LAMP applications are some other essential topics covered in this training. At the end of this training, delegates will become familiarised with the samba, virtualisations, clustering and VPN.

Show moredown

What’s included in this Ubuntu Linux Server Administration Training?

  • World-Class Training Sessions from Experienced Instructors           
  • Ubuntu Linux Server Administration Training Certificate         
  • Digital Delegate Pack

Show moredown

Online Instructor-led (1 days)

Classroom (1 days)

Online Self-paced (8 hours)

Nginx Web Server Administration Training Course Outline

Introduction and Installation of NGINX and NGINX Plus

Basic Functionality

  • Control NGINX Processes at Runtime
  • Create NGINX Plus and NGINX Configuration Files

Exploring Load Balancer

  • HTTP, TCP, and UDP Load Balancing
  • HTTP, TCP, and UDP Health Checks
  • Configure Dynamic Load Balancing with the NGINX Plus API
  • PROXY Protocol

Introduction to NGINX Content Caching and Web Server

Configuring NGINX Plus as a Web Server

  • Virtual Servers Setting Up
  • Locations Configuration
  • Working with Variables
  • Returning Specific Status Code
  • Rewriting URIs in Requests and HTTP Responses
  • Handling Errors

Serving Static Content

  • Overview of Root Directory and Index Files
  • Trying Several Options
  • Optimising Performance for Serving Content
    • Enabling sendfile, tcp_nopush, and tcp_nodelay
    • Optimising the Backlog Queue

Introduction to NGINX Reverse Proxy

  • Table of Contents
  • Introduction
  • Passing a Request to a Proxied Server
  • Passing Request Headers
  • Configuring Buffers
  • Choosing an Outgoing IP Address

Overview of Compression and Decompression

  • Enabling Compression and Decompression
  • Sending Compressed Files

Using NGINX and NGINX Plus as an Application Gateway

  • Basics of uWSGI and Django
  • Configuring NGINX and NGINX Plus for Use with uWSGI and Django

Show moredown

Who should attend this Nginx Web Server Administration Training?

Nginx Web Server Administration Training Course is designed for a variety of professionals who want to learn how to administer Nginx web servers. The following professionals can benefit from attending this course: 

  • System Administrators
  • Web Administrators
  • DevOps Engineers
  • IT Managers
  • Network Administrators
  • IT Support Technicians
  • Web Developers
  • IT Consultants

Prerequisites of the Nginx Web Server Administration Training

There are no formal prerequisites for this Nginx Web Server Administration Training Course. However, a basic understanding of Linux will be beneficial to the delegates.

Nginx Web Server Administration Training​ Course Overview

NGINX is open-source software for reverse proxying, media streaming, web serving, load balancing, etc. The NGINX goal was to create the fastest web server. It constantly beats Apache and other servers measuring web server performance. This NGINX Web Server Administration Training course is designed to provide knowledge of how to install NGINX and NGINX Plus.

The first part of this 1-day training course looks at the installation of NGINX and NGINX Plus. Delegates will learn how to create NGINX Plus and NGINX configuration files. In addition, delegates will gain knowledge of how to configure dynamic load balancing with the NGINX Plus API. PROXY Protocol is one of the essential topic covered under this course.

During this course, delegates will learn how to configure NGINX Plus as a web server. Furthermore, delegates will learn how to enable sendfile, tcp_nopush, and tcp_nodelay. Before course completion, delegates will get familiarised with compression and decompression. They will also be able to configure NGINX and NGINX Plus for use with uWSGI and Django.

Show moredown

What’s included in this Nginx Web Server Administration Training?

  • World-Class Training Sessions from Experienced Instructors           
  • Nginx Web Server Administration Training Certificate         
  • Digital Delegate Pack

Show moredown

Online Instructor-led (1 days)

Classroom (1 days)

Online Self-paced (8 hours)

Nagios System and Network Monitoring Training Course Outline

Module 1: Introduction to Nagios

  • What is Nagios Core?
  • How It Works?
  • Monitor Network Printer and Publicly Available Service

Module 2: Configuration Nagios

  • Configuration Overview
  • Main Configuration File Options
  • Object Configuration Overview
  • Object Definitions
  • CGI Configuration File Options
  • Configuring Authorisation for the CGIs

Module 3: Running Nagios

  • Verifying Nagios Core Configuration
  • Starting and Stopping Nagios Core

Module 4: Nagios Plugins

  • What are Plugins?
  • Plugins as an Abstraction Layer
  • Obtaining Plugins
  • Use of Plugin X
  • Plugin API

Module 5: Macros

  • Introduction to Macros
  • How Macros Work?
  • On-Demand Macros
  • On-Demand Group Macros
  • Custom Variable Macros
  • Macro Cleansing
  • Macros as Environment Variables
  • Standard Macros in Nagios

Module 6: Nagios Checks

  • Host
  • Service
  • Active
  • Passive

Module 7: State Types and Time Periods

  • Service and Host Check Retries
  • Soft and Hard States
  • Precedence in Time Periods
  • How Time Periods Work with Host and Service Checks?
  • Working of Time Periods with
    • Contact Notifications
    • Notification Escalations
    • Dependencies

Module 8: Security and Performance Tuning

  • Security Considerations
  • Enhanced CGI Security and Authentication
  • Tuning Nagios for Maximum Performance
  • Fast Startup Options
  • Large Installation Tweaks
  • Using the Nagiostats Utility
  • Graphing Nagios Performance Statistics

Show moredown

Who should attend this Nagios System and Network Monitoring Training?

Nagios System and Network Monitoring Training Course is designed for a variety of professionals who want to learn how to use Nagios to monitor systems and networks. The following professionals can benefit from attending this course:

  • System Administrators
  • Network Administrators
  • IT Managers
  • DevOps Engineers
  • IT Support Technicians
  • Monitoring Specialists
  • IT Consultants

Prerequisites of the Nagios System and Network Monitoring Training

There are no formal prerequisites for this Nagios System and Network Monitoring Training Course. However, a basic understanding of Linux or Unix will be beneficial for the delegates.

Nagios System and Network Monitoring Training​ Course Overview

Nagios is the popular open-source solution for system and network monitoring. It runs on Linux and can be configured to monitor network services continuously. Nagios provides monitoring of host resources and network services, and any service or device with address and can be contacted through TCP/IP. This Nagios System and Network Monitoring course is designed to provide knowledge of how to install and configure Nagios and standard plugins.

In this Nagios System and Network Monitoring course, delegates will learn how to install and test plugins and configure the web interface. Delegates will get an understanding of the basics of Nagios and Nagios configuration. In addition, delegates will learn how to monitor mail servers, FTP, and web servers.

During this 1-day training course, delegates will learn how to execute plugins through SSH. Furthermore, delegates will gain knowledge of SNMP, NET-SNMP, and SNMP-based plugins. By the completion of this training course, delegates will be able to write their plugins and determine file and directory sizes.  

Show moredown

What’s included in this Nagios System and Network Monitoring Training?

  • World-Class Training Sessions from Experienced Instructors           
  • Nagios System and Network Monitoring Training Certificate          
  • Digital Delegate Pack

Show moredown

Online Instructor-led (1 days)

Classroom (1 days)

Online Self-paced (8 hours)

BIND DNS Administration Training Course Outline

Module 1: Domain Name System (DNS)

  • DNS Fundamentals
  • Domains and Domain Names
  • Zones
  • Authoritative Name Servers
  • Caching Name Servers
  • Name Servers in Multiple Roles

Module 2: BIND Resource Requirements

  • Hardware Requirements
  • CPU Requirements
  • Memory Requirements
  • Name Server-Intensive Environment Issues
  • Supported Platforms
  • Unsupported Platforms
  • Building BIND 9

Module 3: Name Server Configuration

  • Sample Configurations
  • Load Balancing
  • Name Server Operations
  • Plugins

Module 4: BIND 9 Configuration Reference

  • Configuration File
    • Elements
    • Grammar
  • Zone File
  • BIND Statistics

Module 5: DNSSEC

  • Zone Signing
  • Secure Delegation
  • DNSSEC Validation

Module 6: Advanced DNS Features

  • Notify
  • Dynamic Update
  • Incremental Zone Transfers (IXFR)
  • Split DNS
  • TSIG
  • TKEY
  • SIG(0)
  • Dynamic Trust Anchor Management
  • PKCS#11 (Cryptoki) Support
  • Dynamically Loadable Zones (DLZ)
  • Dynamic Database (DynDB)
  • Catalog Zones
  • IPv6 Support in BIND

Module 7: BIND Security Considerations

  • Access Control Lists
  • Chroot and Setuid
  • Dynamic Update Security

Module 8: Troubleshooting

  • Common Problems
  • Incrementing and Changing the Serial Number

Show moredown

Who should attend this BIND DNS Administration Training Course?

The BIND DNS Administration Training is a comprehensive program designed to equip participants with the skills and knowledge necessary to effectively manage and administer the Berkeley Internet Name Domain (BIND) Domain Name System (DNS) server. This training is perfect for individuals wanting to enhance their expertise in DNS management, configuration, and administration using the BIND software and the following professionals:

  • Network Administrators
  • System Administrators
  • DNS Administrators
  • Network and System Architects
  • Information Technology (IT) Managers
  • IT Support Personnel
  • Cybersecurity Professionals

Prerequisites of the BIND DNS Administration Training Course

There are no formal prerequisites for the BIND DNS Administration Training. However, a basic understanding of networking, system administration and DNS Servers can be beneficial.   

BIND DNS Administration Training Course Overview

BIND DNS Administration training is designed to provide a comprehensive knowledge of domain name system administration. This course will cover all the fundamentals of BIND and DNS. Delegates will learn about BIND resource requirements, including hardware, CPU, and memory requirements. Delegates shall gain a thorough understanding of load balancing and name server operations. This course covers a wide range of advanced DNS features.

In this 1-day training course, delegates will be equipped with the knowledge of how to configure DLZ (Dynamically Loadable Zones) and DynDB (Dynamic Database). Delegates will learn how to address match lists and configure file grammar. In addition, delegates will get an understanding of various types of resource records and when to use these.

During this training course, delegates will become familiarised with inverse mapping in IPv4, BIND master file extension, and MX records. This course extensively covers statistics counters comprising name server statistics counters, zone maintenance statistics counters, resolver statistics counters, etc. Post completion of this training, delegates will get a complete understanding of BIND 9 security considerations.

Show moredown

What’s included in this BIND DNS Administration Training Course

  • World-class Training Sessions from Experienced Instructors
  • BIND DNS Administration Training Certificate
  • Digital Delegate Pack

Show moredown

Online Instructor-led (1 days)

Classroom (1 days)

Online Self-paced (8 hours)

Introduction to Postfix Training​ Course Outline

 

Module 1: Postfix Basic Configuration

  • Introduction
  • Postfix Configuration Files
  • Domain Name to Use in Outbound Mail
  • What Domains to Receive Mail for
  • Clients
  • Destinations
  • Delivery Methods
  • Trouble to Report to the Postmaster
  • Proxy/NAT External Network Addresses
  • Postfix Logging
  • Running Postfix Daemon Processes Chrooted
  • Hostname
  • Domain Name
  • Network Addresses

Module 2: Postfix Architecture Overview

  • How Postfix Receives and Delivers Mail?
  • Postfix Behind the Scenes
  • Support Commands

Module 3: Postfix Address Rewriting

  • Purpose
  • Rewrite Message Headers or Not, or to Label as Invalid
  • Postfix Address Rewriting Overview
  • Address Rewriting When Mail is Received and Delivered
  • Address Rewriting with Remote Delivery
  • Address Rewriting with Local Delivery
  • Debugging Your Address Manipulations

Module 4: Virtual Domain Hosting

  • Canonical Versus Hosted Versus Other Domains
  • Local Files Versus Network Databases
  • Shared Domains, UNIX System Accounts
  • Postfix Virtual ALIAS Example: Separate Domains, UNIX System Accounts
  • Postfix Virtual MAILBOX Example: Separate Domains, Non-UNIX Accounts
  • Non-Postfix Mailbox Store: Separate Domains, Non-UNIX Accounts
  • Mail Forwarding Domains
  • Mailing Lists
  • Autoreplies

Module 5: Bottleneck Analysis

  • Introducing the qshape Tool
  • Trouble Shooting with qshape
  • Healthy Queue
  • Deferred Queue Full of Dictionary Attack Bounces
  • Congestion in the Active Queue
  • High Volume Destination Backlog
  • Postfix Queue Directories

Module 6: Content Inspection

  • Content Inspection Overview
  • Stopping Backscatter Mail
  • Built-in Content Inspection
  • After-Queue Content Filter
  • Before-Queue Content Filter
  • Before-Queue Milter Applications

Module 7: SMTP Relay and Access Control

  • Relay Control, Junk Mail Control, and Per-User Policies
  • Restrictions that Apply to all SMTP Mail
  • Getting Selective with SMTP Access Restriction Lists
  • Delayed Evaluation of SMTP Access Restriction Lists
  • use of smtpd_Recipient_Restrictions
  • SMTP Access Rule Testing

Module 8: Postfix Lookup Table Overview

  • Postfix Lookup Table Model
  • Postfix Lists Versus Tables
  • Preparing Postfix for LDAP or SQL Lookups
  • Maintaining Postfix Lookup Table Files
  • Updating Berkeley DB Files Safely
  • Postfix Lookup Table Types

Show moredown

Who should attend this Introduction to Postfix Training Course?

The Introduction to Postfix Training is a comprehensive program designed to provide participants with a foundational understanding of the Postfix mail server, an open-source software widely used for managing email communication within networks. The course is beneficial for the following professionals:

  • Network Administrators
  • Information Technology (IT) Managers
  • System Administrators
  • IT Support Personnel
  • Linux Experts
  • Email System Operators
  • Web Hosting Providers

Prerequisites of the Introduction to Postfix Training Course

There are no formal prerequisites for the Introduction to Postfix Training. However, a basic understanding of networking, email services and Postfix can be beneficial.   

Introduction to Postfix Training​ Course Overview

Postfix is a mail transfer agent (MTA) that mail servers use to route email. It has been adopted as the default MTA on Mac OS X. Postfix is also compatible with sendmail helping the existing programs and scripts to work continuously. This Introduction to Postfix Training course is designed to provide knowledge about the basic installation and configuration.

In this Introduction to Postfix Training, delegates will learn how to configure and administer files and trace message through Postfix. Delegates will also get an understanding of the Postfix queue and mail delivery. In addition, delegates will learn how to receive limits and rewrite addresses.

During this 1-day training course, delegates will gain knowledge of queue management, DNS, and email. Delegates will become familiarised with simple mailing lists and mailing-list managers. Post completion of this training, delegates will be able to configure Postfix for SASL and transport layer security and content filtering.

Show moredown

What’s included in this Introduction to Postfix Training Course

  • World-class Training Sessions from Experienced Instructors
  • Introduction to Postfix Training Certificate
  • Digital Delegate Pack

Show moredown

Online Instructor-led (1 days)

Classroom (1 days)

Online Self-paced (8 hours)

Snort Training Course Outline

Module 1: Introduction to Snort

  • Getting Started
  • Sniffer and Packet Logger Mode
  • Network Intrusion Detection System Mode
  • Packet Acquisition
  • Reading pcap Files
  • Basic Output
  • Tunnelling Protocol Support
  • Control Socket

Module 2: Configuring Snort

  • Includes
  • Preprocessors
  • Decoder and Preprocessor Rules
  • Event Processing
  • Performance Profiling
  • Output Modules
  • Host Attribute Table
  • Dynamic Modules
  • Reload a Snort Configuration
  • Multiple Configurations
  • Active Response

Module 3: Writing Snort Rules

  • Rules Headers
  • Rule Options
  • Payload and Non-Payload Detection Rule Options
  • Post-Detection Rule Options
  • Rule Thresholds
  • Writing Good Rules

Module 4: Dynamic Modules

  • Data Structures
  • Required Functions

Module 5: Snort Development

  • Submitting Patches
  • Snort Data Flow
  • Unified2 File Format
  • Buffer Dump Utility

Show moredown

Who should attend this Snort Training Course?

The Snort Training is a comprehensive program designed to provide participants with a thorough understanding of Snort, an open-source intrusion detection and prevention system. The course is beneficial for the following professionals:

  • Network Security Professionals
  • Security Analysts
  • System Administrators
  • Cybersecurity Specialists
  • Penetration Tester
  • Information Technology (IT) Managers
  • Ethical Hackers

Prerequisites of the Snort Training Course

There are no formal prerequisites for the Snort Training. However, a basic understanding of network security, information technology systems, and cybersecurity can be beneficial.   

Snort Training Course Overview

Snort is an open-source network intrusion detection system (IDS) that looks at network traffic in real-time and logs packets for performing a thorough analysis. It is useful for developers who are working on different types of system troubleshooting. Snort uses a rule-based language and performs protocol analysis. This Snort Training is designed to provide knowledge of how Snort works.

In this Snort Training, delegates will get a detailed understanding of standard alert output, packet acquisition, and snort memory statistics. Delegates will learn how to run snort as a daemon and configure signal value. In addition, delegates will gain knowledge of different preprocessors like SMTP, POP, IMAP, and FTP/Telnet pre-processor.

During this 1-day training, delegates will be introduced to general rule options, payload detection rule, non-payload detection, and post-detection rule options. Delegates will learn about how to write good rules, optimise rules, and test numerical values. Post completion of this training, delegates will gain knowledge of snort data flow, unified2 file format, and buffer dump utility.

Show moredown

What’s included in this Snort Training Course

  • World-class Training Sessions from Experienced Instructors
  • Snort Training Certificate
  • Digital Delegate Pack

Show moredown

Online Instructor-led (1 days)

Classroom (1 days)

Online Self-paced (8 hours)

Apache Web Server Training Course Outline

 

Module 1: Introduction to the Apache Web Server

  • Introduction to Apache
  • Configuration Directories
  • Website Directories
  • Httpd

Module 2: Basic Configuration

  • Httpd Conf File
  • Security
  • Performance
  • Modules
  • Listen
  • Mime
  • Error Handling

Module 3: Access Control

  • Introduction to Access Control
  • Directives
  • Directory Block
  • Directory Match
  • Location Block
  • If Module Block
  • Authenticated Access
  • Authentication Directives
  • Using an LDAP Authentication Source
  • Options Directive
  • Allow Override Directive
  • Directory Slash Directive

Module 4: Logging

  • Custom Logging
  • Log Format Directive
  • Custom Log Directive
  • String Format
  • ErrorLogFormat Directive

Module 5: Virtual Hosting

  • Multiple Sites
  • Name Based
  • IP Based

Module 6: Apache Proxy

  • Proxy Server
  • Forward Proxying
  • Proxy Pass
  • Proxy Pass Reverse

Module 7: Load Balancing

  • Introduction to Load Balancing
  • mod_proxy_balancer
  • Load Balancer Scheduler Algorithm
  • Load Balancing Methods
  • Request Counting
  • Weighted Traffic Counting Algorithm
  • Pending Request Counting Algorithm
  • Balancer Manager

Module 8: Indexing

  • Overview of Indexing
  • Index Options
  • Index Ignore
  • Fancy Indexing
  • Folders First
  • HTMLTable
  • Add Description
  • Add Icon
  • AddIconByType

Module 9: Rewriting

  • Rewrite Logging
  • Using Rewrite Within Virtual Hosts
  • Regular Expressions
  • Regex Back-Reference Availability
  • RewriteRule Basics
  • RewriteRule Flags
  • Rewrite Conditions
  • Time-Dependant Rewriting

Module 10: Apache SSL

  • Secure Socket Layer (SSL) for Apache
  • Steps to Configuring Key and Generating Certificate

Module 11: Apache and PHP

  • Apache with PHP
  • Loading PHP Module
  • Enable PHP in Apache

Module 12: Apache and Tomcat

  • Tomcat
  • Apache Vs Tomcat

Show moredown

Who should attend this Apache Web Server Training Course?

The Apache Web Server Training is a comprehensive program designed to equip participants with the skills and knowledge necessary to effectively deploy, configure, and manage the Apache HTTP Server, commonly known as the Apache Web Server. The training can be particularly useful for:

  • Web Administrators
  • System Administrators
  • Web Developers
  • Information Technology (IT) Managers
  • DevOps Engineers
  • Linux Administrators
  • Web Hosting Providers

Prerequisites of the Apache Web Server Training Course

There are no formal prerequisites for the Apache Web Server Training. However, a basic understanding of network security, Apache Web Server and cybersecurity can be beneficial.   

Apache Web Server Training​ Course Overview

The web server is a server which is responsible for accepting HTTP requests from web client and serving them HTTP responses. Apache web server is an open source web server creation, deployment and management software.  This course focuses on configuration directories and website directories. In this course delegates will gain an understanding of how to configure APACHE server directives and httpd .config file configuration. This course describes how to set up ROOT directories.  Delegates will acquire knowledge of access control including block directives, directory block, directory match, location block, if module block, authenticated access, authenticated directives, behavioural directives etc.

This course describes custom logging, logformat directive, custom log directive, string format syntax and Error log formatting. Delegates will gain an understanding of virtual hosting. They will also learn how to setup and secure CGI within apache web server. This Apache Web Server course explains how to create and configure proxy server. This course provides the information of load balancing apache web servers, indexing and rewriting. At the end of this course delegates will acquire knowledge of Apache SSL and Apache with PHP.

Show moredown

What’s included in this Apache Web Server Training Course

  • World-class Training Sessions from Experienced Instructors
  • Apache Web Server Training Certificate
  • Digital Delegate Pack

Show moredown

Online Instructor-led (1 days)

Classroom (1 days)

Online Self-paced (8 hours)

CloudFlare Training​ Course Outline

Module 1: Introduction to Cloudflare

  • Cloudflare Overview
  • Features of Cloudflare
  • Working of Cloudflare
  • Advantages of Cloudflare

Module 2: Setting Up a New Site

  • Initial Setup
  • Add a Site

Module 3: DNS

  • Introduction to DNS
  • Zone Setup
  • DNS Record
  • Exporting a Record

Module 4: Firewall Rules

  • What is a Firewall?
  • Firewall Rules Actions
  • WAF ML
  • Create a Firewall Rule
  • Manage Firewall Rule

Module 5: SSL

  • Create a Client Certificate
  • Enable mTLS
  • Revoke a Client Certificate
  • Review mTLS Rules 
  • SSL for SaaS
  • SSL/TSL Recommender

Module 6: Bot Management 

  • Bot Fight Mode
  • Bots
  • How Cloudflare Generates Bot Scores?
  • Bot Tags
  • JA3 Fingerprint
  • Challenge Solve Rate (CSR)
  • Cloudflare Bot Analytics
  • Bot Management for Enterprise Analytics

Module 7: Cloudflare Magic Transit

  • Magic Transit Overview
  • Probe Construction
  • Traffic Steering

Show moredown

Who should attend this CloudFlare Training Course?

The CloudFlare Training is a comprehensive course designed to provide participants with a thorough understanding of Cloudflare, a cloud-based platform that offers a range of services to enhance website performance, security, and reliability. The CloudFlare Training is particularly well-suited for:

  • Website Administrators
  • Web Developers
  • Information Technology Managers
  • Security Professionals
  • DevOps Engineers
  • Website Owners
  • Network Administrators

Prerequisites of the CloudFlare Training Course

There are no formal prerequisites for the CloudFlare Training. However, a basic understanding of network security, web development and cybersecurity can be beneficial.   

CloudFlare Training​ Course Overview

Cloudflare is a global network that ensures that everything you connect to the Internet is secure, private, fast, and dependable. It enhances site performance and reduces loading times by utilising their numerous data centres spread out across the globe. This training helps learners enhance the security profile of their websites while keeping cost and effort to a minimum. Studying this training will assist organisations in securing their Internet properties from harmful behaviour such as DDoS attacks, malicious bots, and other malicious intrusions. Individuals with extensive Cloudflare knowledge and skills will provide them more job opportunities with higher pay in globally recognised organisations. 

This 1-day Cloudflare Training course provides delegates with a thorough understanding of working with Cloudflare and Cloudflare security. During this training, delegates will learn about bot management practices that mitigate automated traffic in order to protect domains from bad bots. They will also learn about WAF Machine Learning (ML) which contains rules to improve the detection of harmful payloads. Our highly skilled and professional instructor, who has years of experience in teaching IT support and solution courses, will conduct this training.

Course Objectives

  • To attain an understanding of applying numerous defensive measures

  • To improve the security and performance of websites using the Cloudflare
  • To know about CSR scenarios that give an indication of the automated traffic
  • To enable SSL for increased performance and security through the certificate
  • To target specific patterns of known attack vectors and low false positive rate
  • To condense an existing website and route traffic through their infrastructure

After attending this training, delegates will be able to convert domain names into IP addresses and manage DNS records through DNS hosting. They will also be able to accept IP packets destined for the network, process them, and send them back to the origin infrastructure.

Show moredown

What’s included in this CloudFlare Training Course

  • World-class Training Sessions from Experienced Instructors
  • CloudFlare Training Certificate
  • Digital Delegate Pack

Show moredown

Online Instructor-led (1 days)

Classroom (1 days)

Online Self-paced (8 hours)

IT Fundamentals Training Course Outline

Module 1: Components of Computer Systems

  • What is a Computer?
  • Data Vs Information
  • Visual Overview
  • Types of Computers
  • Computer Systems
  • Operating Systems
  • Data Representation
  • Processing Hardware
  • Motherboard
  • Microprocessor
  • Cards

Module 2: Memory and Storage

  • Memory
  • Storage Media

Module 3: Input and Output

  • Input Devices
  • Output Devices
  • Monitor
  • Printer
  • Data Communication
  • Networks
  • Typical Networking Environment
  • Telecommunication
  • Internet
  • Security Threats
  • Computer Software
  • Systems Software
  • Types of Systems Software
  • Application Software
  • Types of Application Software

Module 4: Computing in the Cloud

  • Cloud Computing

Module 5: Communication and Networks

  • Introduction
  • Computer Networks
  • Goals of Networks
  • Communication Channels
  • Wired Channels
  • Wireless Channels
  • Transmission Technology
  • Network Configuration
  • Network Models
  • Network Topologies
  • Types of Networks

Show moredown

Who should attend this IT Fundamentals Training Course? 

The IT Fundamentals Training Course is designed for individuals seeking to establish a solid foundation in Information Technology (IT). This training is well-suited for a diverse range of participants, including:

  • Administrative Assistants
  • Customer Service Representatives
  • Retail Sales Associates
  • Small Business Entrepreneurs
  • Marketing Coordinators
  • Human Resources Assistants
  • Recent High School Graduates
  • Aspiring IT Support Technicians

Prerequisites of the IT Fundamentals Training   Course 

There are no specific prerequisites required for the IT Fundamentals Training Course. The training is designed to accommodate individuals with varying levels of technical proficiency.

IT Fundamentals Training Course Overview

The use of computers, storage, networking, and other physical devices, infrastructure, and processes to create, process, store, secure, and exchange all forms of electronic data are referred to as Information Technology (IT). IT is used in the area of corporate operations, as opposed to personal or recreational technology, and IT for business includes both computer technology and telecommunications. There is a wide array of IT careers which individuals can achieve with efficient knowledge and skills in Information Technology (IT), such as IT Directors, System Administrators, Application Managers, Software Engineers, IT Architects, etc. This training will provide knowledge to businesses for implementing IT services successfully to develop, process, analyse, exchange, store, and secure information.

In this 1-day IT Fundamentals Training course, delegates will gain in-depth knowledge about Information Technology (IT) systems and their role in converting data to organisational knowledge. They will learn about how the hardware and software of a computer system work together to process data and commands efficiently. Further, they will understand how to identify common software architectures, development techniques, and the relationship between software and its environment. Our highly skilled and expert trainer will conduct this training with years of experience in teaching Information Technology (IT) Training courses.

Course Objectives:

  • To compare the types of computers
  • To describe the components of a computer system
  • To examine data representation and the ASCII code
  • To learn about processing hardware
  • To define memory and storage
  • To describe input and output peripheral devices

After attending this training course, delegates will be able to create, analyse, and review reports, letters, project plans, presentations, and other professional communications. They will also be able to use Virtual Memory to enable them to run a programme as their computer had more RAM after using all the RAM.

Show moredown

What’s Included in this IT Fundamentals Training Course?

  • World-Class Training Sessions from Experienced Instructors
  • IT Fundamentals Certificate
  • Digital Delegate Pack

Show moredown

Online Instructor-led (1 days)

Classroom (1 days)

Online Self-paced (8 hours)

Computer Hardware Troubleshooting Masterclass Course Outline

Module 1: Introduction to Computer Hardware Troubleshooting

  • Importance of Hardware Troubleshooting Skills
  • Basic Computer Hardware Components
  • Common Hardware Problems
  • Troubleshooting Methodology
  • Safety Precautions and ESD Protection

Module 2: Understanding BIOS and Firmware

  • Role of BIOS in Computer Boot Process
  • Firmware Updates and Management
  • BIOS Settings and Configuration
  • Troubleshooting BIOS Errors
  • Recovering from Firmware Failures

Module 3: Hardware Diagnostics Tools and Software

  • Built-in Diagnostic Tools
  • Third-Party Diagnostic Software
  • Hardware Monitoring and Diagnostic Utilities
  • Remote Diagnostic Tools
  • Creating Hardware Diagnostic Bootable Media

Module 4: Troubleshooting CPU and Motherboard Issues

  • Symptoms of CPU and Motherboard Problems
  • Overheating and Cooling Solutions
  • RAM Compatibility and Issues
  • Dealing with BIOS Beep Codes
  • Replacing or Upgrading CPU and Motherboard

Module 5: Storage Device Troubleshooting

  • Identifying Storage Device Issues
  • Data Recovery and Backup Strategies
  • Troubleshooting Disk Errors
  • Replacing and Upgrading Storage Drives
  • RAID Configuration and Troubleshooting

Module 6: Graphics and Display Problems

  • Symptoms of Graphics Card Issues
  • Display Resolution and Graphics Driver Problems
  • Troubleshooting Multiple Monitor Setups
  • Diagnosing and Replacing Graphics Hardware
  • Overcoming Video Output Problems

Module 7: Peripheral and Connectivity Troubleshooting

  • Troubleshooting USB and Port Issues
  • Printers, Scanners, and Peripheral Problems
  • Network Connectivity Issues
  • Wi-Fi and Ethernet Troubleshooting
  • External Device Compatibility

Show moredown

Who should attend this Computer Hardware Troubleshooting Masterclass?

The Computer Hardware Troubleshooting Masterclass is tailored for individuals who want to develop expertise in diagnosing and resolving hardware-related issues in computer systems. This masterclass is ideal for:

  • Desktop Support Technicians
  • Laptop Repair Specialists
  • Network Administrators
  • PC Maintenance Engineers
  • Technical Customer Support Representatives
  • Hardware Test Engineers
  • IT Consultants
  • Hardware Sales Representatives

Prerequisites of the Computer Hardware Troubleshooting Masterclass 

There are no formal prerequisites for the Computer Hardware Troubleshooting Masterclass. However, a basic familiarity with computer hardware components and an understanding of computer systems will be beneficial.

Computer Hardware Troubleshooting Masterclass Course Overview

Hardware Troubleshooting is a process of evaluating, diagnosing, and finding operational or technical faults inside a hardware device or equipment. The goal of hardware troubleshooting is to fix physical and logical flaws and difficulties inside computer hardware. This training course will make the delegates understand the basic concept and structure of computer hardware and networking components. Excelling in this Computer Hardware Troubleshooting Masterclass will lead you to develop the technological skills to upgrade your troubleshooting expertise. The obtained information will conduct your acquired knowledge to attain many reputed designations such as computer programmers, mechanical engineers, network and computer systems administrators and many other highly paid job roles.

The Knowledge Academy’s 1-day Computer Hardware Troubleshooting Masterclass is designed to resolve computer hardware problems using a systematic approach. During this training course, delegates will be able to dive into the installation and configuration of the service packs and OS. Delegates will provide you with knowledge of desktop computer hardware.

It also accommodates the delegates with more interesting topics, such as:

  • Troubleshooting systems
  • Installation of OS
  • Device drivers: installation and configuration
  • Types of computer hardware
  • Solving multibay problems

At the end of this training course, delegates will get the expertise to install and configure the device drivers. Delegates will be able to solve power supply problems and complex drive problems. Our highly expert trainer with abundant knowledge has curated this training course to analyse software and hardware troubleshooting for the better efficiency of the organisation’s system.

Show moredown

What’s Included in this Computer Hardware Troubleshooting Masterclass?

  • World-Class Training Sessions from Experienced Instructors
  • Computer Hardware Troubleshooting Certificate
  • Digital Delegate Pack

Show moredown

Online Instructor-led (1 days)

Classroom (1 days)

Online Self-paced (8 hours)

Introduction to Training Course Outline

Module 1: Introduction to Networking

  • What is Networking?
  • Importance of Networking
  • How Networking Works?
  • Communicating at a Distance
  • Computers Communicate Differently
  • Early Wide Area Store-and-Forward Networks
  • Packets and Routers
  • Addressing and Packets

Module 2: Network Architecture

  • Link Layer
  • Internetwork Layer (IP)
  • Transport Layer (TCP)
  • Application Layer
  • Stacking the Layers

Module 3: Link Layer

  • Sharing the Air
  • Courtesy and Coordination
  • Coordination in Other Link Layers

Module 4: Internetworking Layer (IP)

  • Internet Protocol (IP) Addresses
  • How Routers Determine the Routes?
  • When Things Get Worse and Better?
  • Determining Your Route
  • Getting an IP Address
  • Different Kind of Address Reuse
  • Global IP Address Allocation

Module 5: Domain Name System

  • Allocating Domain Names
  • Reading Domain Names

Module 6: Transport and Application Layer

  • Packet Headers
  • Packet Reassembly and Retransmission
  • Transport Layer in Operation
  • Application Clients and Servers
  • Server Applications and Ports
  • Client and Server Applications 
  • Application Layer Protocols
  • Exploring the HTTP Protocol
  • IMAP Protocol for Retrieving Mail
  • Flow Control
  • Writing Networked Applications

Module 7: Secure Transport Layer

  • Encrypting and Decrypting Data
  • Two Kinds of Secrets
  • Secure Sockets Layer (SSL)
  • Encrypting Web Browser Traffic
  • Certificates and Certificate Authorities

Module 8: OSI Model

  • OSI Model Overview
  • Physical Layer
  • Data Link Layer
  • Network Layer
  • Transport Layer
  • Session Layer
  • Presentation Layer
  • Application Layer
  • Difference Between OSI and TCP/IP Models
  • Link Layer (TCP/IP)
  • Internetwork Layer (TCP/IP)
  • Transport Layer (TCP/IP)
  • Application Layer (TCP/IP)

Show moredown

Who should attend this Introduction to Networking Training Course?

The Introduction to Networking Training Course is designed for individuals who are interested in gaining a foundational understanding of computer networking concepts and principles. A variety of professionals can benefit from this course, such as:

  • Cloud Administrators
  • Network Security Professionals
  • Cloud Architects
  • Cloud Specialists
  • Network Architects
  • Cybersecurity Professionals
  • System Administrators

Prerequisites of the Introduction to Networking Training Course

There are no formal prerequisites for this Introduction to Networking Training Course.

Introduction to Training Course Overview

Networking refers to the practice of connecting multiple devices together to allow them to communicate and share resources. It connects devices together using physical cables, wireless connections, or a combination of both for exchanging ideas. It is beneficial for building relationships and increasing business growth. Studying this training will help individuals to design, configure, and troubleshoot simple networks using industry-standard tools and protocols. This training enables organisations to efficiently share resources and communicate with each other to boost professionalism. Individuals with excellent networking skills will get tremendous job opportunities and claim desired earnings in high demand globally recognised organisations.

The Knowledge Academy’s 1-day Introduction to Networking Training course provides delegates with in-depth knowledge about networking and how to master it. During this training, they will learn how different layers of the network stack interact to support communication. They will also learn about how to encrypt and decrypt data and encrypt web browser traffic. This course will be led by our highly skilled and knowledgeable trainer, who has years of experience in teaching and will help delegates get a complete understanding of this course. 

Course Objectives

  • To learn about networking and its importance in modern communication
  • To understand the workings of different layers in network architecture
  • To learn Link Layer protocols for communication on the same network
  • To learn how IP is used for routing data between different networks
  • To learn about how encryption is used to secure data transmission
  • To learn about different layers of the OSI Model and their functions

At the end of this training, delegates will be able to identify the key components of a network, such as routers, packets, and addresses. They will also be able to contribute to the overall network performance. 

Show moredown

What’s included in this Introduction to Networking Training Course?

  • World-Class Training Sessions from Experienced Instructors
  • Introduction to Networking Training Certificate
  • Digital Delegate Pack

Show moredown

Online Instructor-led (1 days)

Classroom (1 days)

Online Self-paced (8 hours)

Boomi Training Course Outline

Module 1: Basics of Boomi 

  • Using the Boomi Flow Interface 
  • Terms and Concepts 
  • Building a Simple Web Application 
  • Boomi Flow and Boomi Integration 
  • Boomi Flow Multi-Cloud 
  • Boomi Flow Regions 

Module 2: Setting Up and Managing Flow 

  • Flows 
  • Pages 
  • Values 
  • Connectors 
  • Types 
  • Identity Providers 
  • Components 
  • Assets 
  • Organisations 
  • Tenants 
  • Environments 
  • Flow Library 
  • API Tool 
  • Importing and Exporting Flows 
  • Players 
  • Macros 
  • Dashboard 
  • Auditing 
  • Observability 

Module 3: Building and Publishing Flows 

  • Flow Canvas 
  • Map Elements 
  • Shared Elements 
  • Subflows 
  • Navigation 
  • Flow Properties 
  • Running a Flow 
  • Debugging a Flow 
  • Publishing a Flow 
  • Offline Flows 

Module 4: Attributes Reference 

  • Adding Attributes to a Component 
  • Using the Classes Attribute 
  • Container Attributes 
  • Component Attributes 
    • Charts  
    • Checkbox  
    • File Upload  
    • Image  
    • Input  
    • List  
    • Outcomes  
    • Rich Text  
    • Table  
    • Tiles  
    • Toggle  

Module 5: CSS Reference 

  • Using CSS to Customise a Flow 
  • Detecting the Correct CSS Style 
  • Boomi Flow Stylesheet Hierarchy 
  • Containers CSS 
  • Images CSS 
  • Navigation CSS 
  • Outcome and Buttons CSS 
  • Typography CSS 
  • Components CSS 

Show moredown

Who should attend this Boomi Training Course?

The Boomi Training Course is designed for individuals who want to learn how to use and implement the Boomi platform for integration and workflow automation. This course is beneficial for various professionals including:

  • Integration Developers
  • System Administrators
  • Application Architects
  • Data Managers
  • Solution Architects
  • Cloud Engineers
  • Supply Chain Managers
  • Data Integration Specialists

Prerequisites for the Boomi Training Course

There are no formal prerequisites for attending this Boomi Training Course.

Boomi Training Course Overview

Boomi is a versatile platform that offers a Flow Interface for building web applications and seamless integration capabilities. Its integration capabilities help organisations achieve enhanced operational efficiency, data accuracy, and improved collaboration. Boomi has the capacity to purge, modify, and enhance data, assuring correctness and consistency throughout the entire organisation. This training aims to provide learners with knowledge about how to become proficient in using Boomi's features, enabling them to drive process improvements and contribute to successful integration projects within their organisations. Pursuing this Boomi Training Course will help individuals get equipped with the necessary skills and techniques to enhance their career opportunities and ultimately increase their earnings.

This 1-day Boomi Training Course provides delegates with essential skills and techniques to navigate the Boomi Flow Interface, understand the fundamental terms and concepts, and build web applications. Delegates will learn about how to manage flows, pages, connectors, components, and assets. They will also become familiar with publishing flows, debugging, and utilising attributes and CSS customisation for enhanced application development. This course will be taught by our expert trainers, who have years of experience teaching these courses.

Course Objectives

  • To run and debug flows to identify and troubleshoot issues effectively
  • To configure flow properties to fine-tune the behaviour of a flow
  • To implement navigation mechanisms within a Flow to enhance user experience
  • To utilise the classes attribute to customise the appearance and behaviour of components
  • To understand the hierarchy of Boomi Flow Stylesheets and their organisation
  • To identify the correct CSS style for specific elements within a flow

After attending this training course, delegates will be able to utilise the Boomi platform to design and develop efficient web applications, integrate disparate systems seamlessly, and effectively manage flows, components, and connectors.

Show moredown

What’s included in this Boomi Training Course?

  • World-Class Training Sessions from Experienced Instructors
  • Boomi Training Certificate
  • Digital Delegate Pack

Show moredown

Not sure which course to choose?

Speak to a training expert for advice if you are unsure of what course is right for you. Give us a call on 01344203999 or Enquire.

IT Support and Solution Training FAQs

FAQ's

Prerequisites vary according to the course. Please see each course for details.
The Knowledge Academy is the Leading global training provider for IT Support and Solution Training.
The price for IT Support and Solution Training certification in the United Kingdom starts from £1995.

Why we're the go to training provider for you

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Trusted & Approved

We are accredited by PeopleCert on behalf of AXELOS

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on IT Support and Solution Training