CompTIA Security+ Certification is one of our best selling and most popular course. The CompTIA Security+ Certification is organised into 10 modules and includes everything you need to become successful in this profession. To make this course more accessible for you, we have designed it for both part-time and full-time students. You can study at your own pace or become an expert in just 17 hours! If you require support, our experienced tutors are always available to help you throughout the comprehensive syllabus of this course and answer all your queries through email. Why choose this course Earn an e-certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Benefit from instant feedback through mock exams and multiple-choice assessments Get 24/7 help or advice from our email and live chat teams Full Tutor Support on Weekdays Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Mock exams Multiple-choice assessment Certification After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for £9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for £15.99, which will reach your doorsteps by post. Who Is This Course For? This course is ideal for IT professionals, network administrators, and cybersecurity beginners seeking a foundational security certification. It’s also suitable for help desk technicians, system admins, and military personnel transitioning into cybersecurity roles. No prior security experience is required, but basic IT knowledge (e.g., CompTIA Network+) is beneficial. Career Path Cybersecurity Analyst – £35,000 - £55,000 Network Security Engineer – £40,000 - £70,000 Security Consultant – £45,000 - £80,000 IT Auditor – £40,000 - £65,000 Systems Administrator (Security Focus) – £30,000 - £60,000
Description: Learn to use the open source software operating system with the Ubuntu Linux for Beginners course. Ubuntu is a free and open source operating system and Linux distribution based on Debian. Ubuntu is the most popular Linux distro or software distribution package. The course will familiarize you with the operating system. You will learn to work with Ubuntu Linux. The system of installing and optimizing the operating system for the better results will be discussed in the course. You will explore the techniques of installing Ubuntu along with your primary operating system. You will also learn how to move on to the more advanced commands and how to manage users, permissions, and groups. Apart from the installation and optimization, the course shows you Ubuntu Linux developer tools and the shows the strategies of hosting your own web server. Finally, the course introduces you with Linux Network Administration Tools. By the end of the course, you will be able to use the operating system confidently. Assessment: This course does not involve any MCQ test. Students need to answer assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Once the answers are submitted, the instructor will check and assess the work. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Ubuntu Linux for Beginners is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Ubuntu Linux for Beginners is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Ubuntu Linux for Beginners THE COMPANY BEHIND UBUNTU 00:15:00 DOMAIN NAME SYSTEM ON UBUNTU 00:15:00 DDNS Changes 00:30:00 UFW ON UBUNTU 00:30:00 UFW FEATURES 00:15:00 MAIL SERVER ON UBUNTU Part 1 00:30:00 MAIL SERVER ON UBUNTU Part 2 00:15:00 KERBEROS AND FEDERATION SERVICES ON UBUNTU 00:30:00 WORKING WITH WEB SERVERS ON UBUNTU 00:15:00 WORKING WITH DATABASE SERVERS ON UBUNTU 00:15:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Duration 5 Days 30 CPD hours This course is intended for Security engineer Network engineer Network designer Network administrator Systems engineer Consulting systems engineer Technical solutions architect Network manager Cisco integrators and partners Overview After taking this course, you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW) Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco© CCNP© Security and CCIE© Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower© Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch© Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. Describing Information Security Concepts* Information Security Overview Assets, Vulnerabilities, and Countermeasures Managing Risk Vulnerability Assessment Understanding Common Vulnerability Scoring System (CVSS) Describing Common TCP/IP Attacks* Legacy TCP/IP Vulnerabilities IP Vulnerabilities Internet Control Message Protocol (ICMP) Vulnerabilities TCP Vulnerabilities User Datagram Protocol (UDP) Vulnerabilities Attack Surface and Attack Vectors Reconnaissance Attacks Access Attacks Man-in-the-Middle Attacks Denial of Service and Distributed Denial of Service Attacks Reflection and Amplification Attacks Spoofing Attacks Dynamic Host Configuration Protocol (DHCP) Attacks Describing Common Network Application Attacks* Password Attacks Domain Name System (DNS)-Based Attacks DNS Tunneling Web-Based Attacks HTTP 302 Cushioning Command Injections SQL Injections Cross-Site Scripting and Request Forgery Email-Based Attacks Describing Common Endpoint Attacks* Buffer Overflow Malware Reconnaissance Attack Gaining Access and Control Gaining Access via Social Engineering Gaining Access via Web-Based Attacks Exploit Kits and Rootkits Privilege Escalation Post-Exploitation Phase Angler Exploit Kit Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Stateful Firewall Overview Security Intelligence Overview Threat Information Standardization Network-Based Malware Protection Overview Intrusion Prevention System (IPS) Overview Next Generation Firewall Overview Email Content Security Overview Web Content Security Overview Threat Analytic Systems Overview DNS Security Overview Authentication, Authorization, and Accounting Overview Identity and Access Management Overview Virtual Private Network Technology Overview Network Security Device Form Factors Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Network Address Translation Cisco ASA Interface Access Control Lists (ACLs) Cisco ASA Global ACLs Cisco ASA Advanced Access Policies Cisco ASA High Availability Overview Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Cisco Firepower NGFW Network Address Translation (NAT) Cisco Firepower NGFW Prefilter Policies Cisco Firepower NGFW Access Control Policies Cisco Firepower NGFW Security Intelligence Cisco Firepower NGFW Discovery Policies Cisco Firepower NGFW IPS Policies Cisco Firepower NGFW Malware and File Policies Deploying Email Content Security Cisco Email Content Security Overview Simple Mail Transfer Protocol (SMTP) Overview Email Pipeline Overview Public and Private Listeners Host Access Table Overview Recipient Access Table Overview Mail Policies Overview Protection Against Spam and Graymail Anti-virus and Anti-malware Protection Outbreak Filters Content Filters Data Loss Prevention Email Encryption Deploying Web Content Security Cisco Web Security Appliance (WSA) Overview Deployment Options Network Users Authentication Secure HTTP (HTTPS) Traffic Decryption Access Policies and Identification Profiles Acceptable Use Controls Settings Anti-Malware Protection Deploying Cisco Umbrella* Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Managing Cisco Umbrella Cisco Umbrella Investigate Overview and Concepts Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Keys in Cryptography Public Key Infrastructure Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps IPsec Static Virtual Tunnel Interface Dynamic Multipoint VPN Cisco IOS FlexVPN Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs Cisco IOS VTIs Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies Secure Sockets Layer (SSL) Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Cisco ASA Remote Access VPN Configuration Cisco Firepower NGFW Remote Access VPN Configuration Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Cisco Identity Services Engine Cisco TrustSec Describing 802.1X Authentication 802.1X and Extensible Authentication Protocol (EAP) EAP Methods Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications RADIUS Change of Authorization Configuring 802.1X Authentication Cisco Catalyst© Switch 802.1X Configuration Cisco Wireless LAN Controller (WLC) 802.1X Configuration Cisco Identity Services Engine (ISE) 802.1X Configuration Supplicant 802.1x Configuration Cisco Central Web Authentication Describing Endpoint Security Technologies* Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Application Whitelists and Blacklists Host-Based Malware Protection Sandboxing Overview File Integrity Checking Deploying Cisco Advanced Malware Protection (AMP) for Endpoints* Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Cisco AMP Device and File Trajectory Managing Cisco AMP for Endpoints Introducing Network Infrastructure Protection* Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Network Telemetry Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Deploying Control Plane Security Controls* Infrastructure ACLs Control Plane Policing Control Plane Protection Routing Protocol Security Deploying Layer 2 Data Plane Security Controls* Overview of Layer 2 Data Plane Security Controls Virtual LAN (VLAN)-Based Attacks Mitigation Sp
Course Overview This Workplace Communication Management course provides a well-rounded understanding of how communication functions within professional environments, equipping learners with the ability to navigate various workplace dynamics with clarity and confidence. From understanding the importance of stakeholder communication to overcoming barriers and developing interpersonal skills, this course is designed to enhance effectiveness across all levels of an organisation. Learners will explore the role of cultural influences, language use, and internal communication structures that impact workplace productivity and cohesion. By the end of the course, individuals will be equipped to handle communication responsibilities more effectively, contribute to a healthier work culture, and support organisational goals through better message delivery and reception. Whether working independently or as part of a team, learners will find the content applicable across a range of industries and roles, providing long-term benefits in managing workplace interactions and aligning communication with broader business objectives. Course Description This comprehensive course delves into the theory and application of workplace communication, with a focus on developing clear, consistent, and context-appropriate messaging. Learners will begin by examining the importance of internal communication and its influence on stakeholders. The course addresses barriers such as misinterpretation, cultural misunderstandings, and language inefficiencies, offering strategies to overcome them. Modules also cover the impact of organisational culture on communication, the use of professional language, and maintaining effective interpersonal relationships. Designed for those who wish to strengthen their communication capabilities in a structured environment, the course encourages reflective learning and the application of communication principles across varied workplace scenarios. Emphasis is placed on building mutual understanding and aligning communication efforts with organisational aims. Upon completion, learners will be able to foster clearer communication lines, improve workplace engagement, and manage communication challenges with increased confidence and awareness. Course Modules: Module 01: Information and Communication for Stakeholders Module 02: Communication & Barriers Module 03: Culture and Communication in the Workplace Module 04: Language and Effective Communication Module 05: Business Communication & Interpersonal Relationships Module 06: Communication Improvement at Workplace (See full curriculum) Who is this course for? Individuals seeking to build strong workplace communication skills. Professionals aiming to improve organisational communication and team engagement. Beginners with an interest in corporate communication and business relations. HR personnel, managers, and team leaders looking to foster better communication culture. Career Path Communication Officer Team Leader or Supervisor Human Resources Assistant Office Administrator Business Development Coordinator Internal Communications Specialist Customer Relationship Manager
Course Overview The Computer Maintenance, PAT & Cyber Security course offers a comprehensive introduction to the essential components of modern IT systems, combining core knowledge in hardware setup, system troubleshooting, and security protocols. Designed to build foundational understanding as well as introduce advanced cybersecurity concepts, this course equips learners with the confidence to navigate today’s digital infrastructure. From building a computer to understanding network vulnerabilities, learners will explore a variety of modules that address both traditional and emerging technologies, including IoT and encryption. By the end of the course, students will have developed the skills to identify risks, support device performance, and understand secure systems architecture—essential for any role in technology-focused sectors. Course Description This course blends key topics across computer hardware maintenance, PAT (Portable Appliance Testing), and cyber security to prepare learners for a well-rounded understanding of IT system management. The curriculum begins with assembling and configuring computers, progressing into network security and advanced Windows troubleshooting. Learners are introduced to essential software tools and coding applications like C++ with OpenCV, and gain insights into the Internet of Things and encryption principles. Additionally, the course includes training in cyber security awareness, addressing the latest threats and preventative frameworks. With clear instructional guidance and structured content delivery, the course is suitable for learners aiming to understand technical environments and the protocols behind secure computing. It is ideal for those seeking career progression or looking to explore new opportunities in IT security, maintenance, or systems analysis. Course Modules: Module 01: Building Your Own Computer Module 02: Computer Networks Security from Scratch to Advanced Module 03: Computer Vision By Using C++ and OpenCV with GPU support Module 04: Advance Windows 10 Troubleshooting for IT HelpDesk Module 05: Portable Appliance Testing (PAT) Module 06: Internet of Things Module 07: Cyber Security Awareness Training Module 08: Encryption (See full curriculum) Who is this course for? Individuals seeking to understand IT maintenance and cybersecurity principles. Professionals aiming to broaden their knowledge of system configuration and data protection. Beginners with an interest in computer technology and digital safety. Employers looking to upskill their IT or facilities staff in security and device compliance. Career Path IT Support Specialist Systems Administrator Network Security Analyst Cyber Security Consultant Electrical Safety Compliance Officer Technical Services Coordinator
Course Overview The Payroll Management Course provides a comprehensive introduction to the critical processes involved in managing employee compensation and workforce planning. Designed to equip learners with both theoretical knowledge and practical frameworks, this course explores essential aspects such as resourcing, talent management, job analysis, and employer branding. Through a structured learning experience, learners will develop an in-depth understanding of how effective payroll and talent strategies contribute to organisational success. Whether advancing within an existing role or preparing for a new career, participants will emerge with the confidence to manage payroll processes in alignment with broader human resource strategies. By the end of the course, learners will have a strong foundation to support organisational compliance, drive employee engagement, and contribute to business objectives through proficient payroll and resource planning. Course Description This Payroll Management Course delves into key areas vital to successful HR and payroll operations, from resourcing and talent management to performance evaluation and employer branding. Throughout the modules, learners will engage with topics such as talent planning, coaching and development, job analysis and design, and the identification of improvement opportunities within talent management systems. The course promotes a thorough understanding of how payroll intersects with broader human resources functions, providing learners with critical insights into creating effective workforce plans. Skills in workforce strategy, talent retention, and employer branding are emphasised, enabling participants to approach payroll management with a strategic and analytical mindset. Designed with clear progression and accessible learning materials, the course prepares learners to apply industry-relevant knowledge confidently in organisational settings, strengthening their professional development and career prospects. Course Modules Module 01: Introduction to Resourcing and Talent Management Module 02: Resourcing and Talent Planning Module 03: Talent Management and The Role of Recruiting Module 04: Coaching, Training and Development Module 05: Performance Management Module 06: Benefits of Talent Management Module 07: Planning Human Resources Module 08: Job Analysis and Design Module 09: Employer Branding Module 10: Improvement Opportunities of Talent Management System (See full curriculum) Who is this course for? Individuals seeking to build expertise in payroll and workforce planning. Professionals aiming to enhance their career prospects within human resources or payroll departments. Beginners with an interest in employee management and compensation processes. Business owners and managers wishing to strengthen their internal HR practices. Career Path Payroll Administrator HR Officer Talent Acquisition Specialist Workforce Planning Coordinator Human Resources Manager Compensation and Benefits Analyst Employer Branding Specialist HR Strategy Consultant
Sage 50 (Updated v.29) Course Overview This updated Sage 50 (v.29) course offers a comprehensive guide to using the latest version of Sage 50 for accounting and financial management. Designed for learners at all levels, it covers essential functions such as setting up your company, managing invoices, reconciling accounts, and generating reports. With the focus on providing valuable insights into financial management software, this course helps learners develop the skills to manage and control financial data with efficiency. By the end of the course, learners will have a solid understanding of Sage 50’s features and be able to use it confidently in real-world applications. The course is ideal for professionals looking to expand their software skills or those pursuing a career in accounting or finance. Course Description In this updated Sage 50 (v.29) course, learners will delve into all aspects of the software, from installation and company setup to mastering functions like invoicing, payroll management, and producing detailed financial reports. Key topics include maintaining the chart of accounts, tracking expenses, and reconciling bank statements. Learners will also gain a thorough understanding of Sage 50's advanced features, including managing VAT returns and automating financial processes. This course offers an engaging experience where learners can explore the various capabilities of Sage 50, ensuring that they can apply their knowledge effectively in the workplace. Upon completion, learners will possess the expertise to confidently utilise Sage 50 for efficient financial management. Sage 50 (Updated v.29) Curriculum Module 01: Introduction to Sage 50 (Updated v.29) Module 02: Setting Up Your Company and Preferences Module 03: Managing Customers and Suppliers Module 04: Invoicing and Payments Management Module 05: Bank Reconciliation and VAT Returns Module 06: Producing Financial Reports Module 07: Advanced Features in Sage 50 Module 08: Troubleshooting and System Maintenance (See full curriculum) Who is this course for? Individuals seeking to enhance their accounting software knowledge. Professionals aiming to advance in finance or accounting roles. Beginners with an interest in accounting software and financial management. Business owners or administrators seeking to streamline financial processes. Career Path Accounts Assistant Financial Administrator Sage 50 Support Specialist Bookkeeper Payroll Officer Financial Analyst
Embarking on the CompTIA Security+ course is akin to unlocking a treasure trove of cybersecurity knowledge. Imagine standing at the forefront of digital security, equipped with the latest tools and techniques to safeguard information systems. This course, meticulously designed with fourteen comprehensive sections, offers an immersive journey from the basics of risk management to the complexities of securing dedicated systems. The curriculum is tailored to blend theoretical knowledge with real-world applications, ensuring learners grasp the essence of cybersecurity in today's technology-driven world. Whether it's understanding the nuances of cryptography or mastering the art of incident response, CompTIA Security+ is your gateway to becoming a cybersecurity connoisseur. Delving into this course, you'll navigate through a landscape where every section is a stepping stone to mastering security competencies. The course begins with an introduction to the fundamental principles of cybersecurity, setting the stage for more advanced topics like identity and account management, and securing wireless LANs. Each section is a meticulously crafted module, aimed at building a robust understanding of both the threats and the defenses in the cyber world. By the time you reach the final sections on secure protocols, applications, and testing infrastructure, you will have developed a holistic view of network security, ready to apply your knowledge in a variety of real-world scenarios. CompTIA Security+ is not just a course; it's a journey through the dynamic landscape of network security. As you progress from one section to another, you'll not only learn about securing individual systems and public servers but also about the importance of physical security in protecting digital assets. This course is a blend of theory and practicality, providing an in-depth understanding of the latest security tools and techniques. It's an opportunity to transform yourself into a sought-after professional in the cybersecurity domain, equipped with the knowledge to protect and defend against the ever-evolving cyber threats. Learning Outcomes Develop a comprehensive understanding of risk management strategies and their application in cybersecurity. Acquire proficiency in various cryptographic methods and their importance in securing data. Gain insights into effective identity and account management to enhance system security. Learn to utilize essential security tools for safeguarding individual and network systems. Master the skills to implement and manage security measures for both wired and wireless networks. Why buy this CompTIA Security+? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Certification After studying the course materials of the CompTIA Security+ there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? Individuals aiming to start a career in cybersecurity. IT professionals seeking to deepen their knowledge in network security. System administrators wanting to enhance their security skills. Students interested in acquiring a foundational understanding of cybersecurity principles. Professionals aiming to achieve the CompTIA Security+ certification for career advancement. Prerequisites This CompTIA Security+ does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA Security+ was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Cybersecurity Analyst: £30,000 - £60,000 annually Information Security Manager: £40,000 - £75,000 annually Network Security Engineer: £35,000 - £65,000 annually Security Consultant: £35,000 - £70,000 annually Systems Administrator (with security specialization): £25,000 - £50,000 annually IT Security Coordinator: £28,000 - £55,000 annually Course Curriculum Section 01: Introduction Introduction to CompTIA Security+ SY0-601 00:03:00 About the CompTIA Security+ SY0-601 Exam 00:03:00 Section 02: Risk Management Defining Risk 00:08:00 Threats and Vulnerabilities 00:07:00 Threat Intelligence 00:11:00 Risk Management Concepts 00:07:00 Security Controls 00:09:00 Risk Assessments and Treatments 00:06:00 Quantitative Risk Assessments 00:07:00 Qualitative Risk Assessments 00:04:00 Business Impact Analysis 00:05:00 Data Types and Roles 00:11:00 Security and the Information Life Cycle 00:09:00 Data Destruction 00:06:00 Personnel Risk and Policies 00:10:00 Third-Party Risk Management 00:09:00 Agreement Types 00:07:00 Exam Question Review 00:02:00 Wiping Disks with the dd Command Lab 00:06:00 Ask Me Anything (AMA) 00:02:00 Section 03: Cryptography Cryptography Basics 00:16:00 Data Protection 00:09:00 Cryptographic Methods 00:07:00 Symmetric Cryptosystems 00:13:00 Symmetric Block Modes 00:08:00 Asymmetric Cryptosystems 00:13:00 Diffie-Hellman 00:07:00 Hashing 00:09:00 Understanding Digital Certificates 00:08:00 Trust Models 00:05:00 Public Key Infrastructure 00:04:00 Certificate Types 00:14:00 Touring Certificates 00:09:00 Cryptographic Attacks 00:05:00 Password Cracking 00:10:00 Password Cracking Demo 00:06:00 Exam Question Review 00:02:00 SSH Public Key Authentication Lab 00:09:00 Ask Me Anything (AMA) 00:02:00 Section 04: Identity and Account Management Identification, Authentication, and Authorization 00:08:00 Enabling Multifactor Authentication 00:05:00 Authorization 00:05:00 Accounting 00:05:00 Authentication Methods 00:14:00 Access Control Schemes 00:07:00 Account Management 00:13:00 Network Authentication 00:09:00 Identity Management Systems 00:06:00 Exam Question Review 00:02:00 Creating LInux Users and Groups Lab 00:06:00 Ask Me Anything (AMA) 00:01:00 Section 05: Tools of the Trade Touring the CLI 00:16:00 Shells 00:06:00 The Windows Command Line 00:05:00 Microsoft PowerShell 00:13:00 Linux Shells 00:12:00 Python Scripts 00:06:00 Windows Command-Line Tools 00:16:00 Linux Command-Line Tools 00:10:00 Network Scanners 00:05:00 Network Scanning with Nmap 00:09:00 Network Protocol Analyzers 00:08:00 Using Wireshark to Analyze Network Traffic 00:09:00 Using tcpdump to Analyze Network Traffic 00:08:00 Log Files 00:09:00 Centralized Logging 00:09:00 Configuring Linux Log Forwarding 00:08:00 Exam Question Review 00:03:00 Lunux Shell Script Lab 00:07:00 Nmap Lab 00:05:00 Ask Me Anything (AMA) 00:02:00 Section 06: Securing Individual Systems Malware 00:14:00 Weak Configurations 00:12:00 Common Attacks 00:09:00 Driver and Overflow Attacks 00:08:00 Password Attacks 00:08:00 Bots and Botnets 00:06:00 Disk RAID Levels 00:10:00 Securing Hardware 00:11:00 Securing Endpoints 00:09:00 Exam Question Review 00:02:00 Linux Software RAID Lab 00:08:00 Ask Me Anything (AMA) 00:02:00 Section 07: The Basic LAN The OSI Model 00:13:00 ARP Cache Poisoning 00:09:00 Other Layer 2 Attacks 00:05:00 Network Planning 00:07:00 Load Balancing 00:06:00 Securing Network Access 00:06:00 Honeypots 00:06:00 Firewalls 00:08:00 Proxy Servers 00:06:00 Network and Port Address Translation 00:07:00 IP Security (IPsec) 00:09:00 Virtual Private Networks (VPNs) 00:10:00 Intrusion Detection and Prevention Systems (IDS/IPS) 00:13:00 Exam Question Review 00:03:00 Linux Snort IDS Lab 00:07:00 Ask Me Anything (AMA) 00:01:00 Section 08: Securing Wireless LANs Wi-Fi Encryption Standards 00:10:00 RFID, NFC, and Bluetooth 00:07:00 Wi-Fi Coverage and Performance 00:08:00 Wi-Fi Discovery and Attacks 00:12:00 Cracking WPA2 00:10:00 Wi-Fi Hardening 00:11:00 Exam Question Review 00:02:00 WPA2 Cracking Lab 00:06:00 Ask Me Anything (AMA) 00:01:00 Section 09: Securing Public Servers Defining a Public Server 00:01:00 Common Attacks and Mitigations 00:10:00 Containers and Software-Defined Networking 00:11:00 Hypervisors and Virtual Machines 00:08:00 Cloud Deployment Models 00:09:00 Cloud Service Models 00:08:00 Securing the Cloud 00:10:00 Exam Question Review 00:02:00 Docker Container Lab 00:04:00 Ask Me Anything (AMA) 00:02:00 Section 10: Securing Dedicated Systems Embedded Systems 00:13:00 Industrial Control System (ICS) 00:07:00 Internet of Things (IoT) Devices 00:10:00 Connecting to Dedicated and Mobile Systems 00:11:00 Security Constraints for Dedicated Systems 00:05:00 Mobile Device Deployment and Hardening 00:11:00 Exam Question Review 00:03:00 Smartphone Hardening Lab 00:03:00 Ask Me Anything (AMA) 00:02:00 Section 11: Physical Security Physical Security Overview 00:01:00 Physical Security 00:10:00 Keylogger Demo 00:05:00 Environmental Controls 00:05:00 Exam Question Review 00:02:00 Physical Security Lab 00:03:00 Ask Me Anything (AMA) 00:03:00 Section 12: Secure Protocols and Applications DNS Security 00:05:00 FTP Packet Capture 00:03:00 Secure Web and E-mail 00:12:00 Request Forgery Attacks 00:05:00 Cross-Site Scripting Attacks 00:07:00 Web Application Security 00:08:00 Web App Vulnerability Scanning 00:06:00 Exam Question Review 00:03:00 OWASP ZAP Web App Scan Lab 00:04:00 Ask Me Anything (AMA) 00:02:00 Section 13: Testing Infrastructure Testing Infrastructure Overview 00:05:00 Social Engineering 00:06:00 Social Engineering Attacks 00:11:00 Vulnerability Assessments 00:09:00 Penetration Testing 00:10:00 Security Assessment Tools 00:12:00 The Metasploit Framework 00:08:00 Exam Question Review 00:02:00 Hping3 Forged Packet Lab 00:06:00 Ask Me Anything (AMA) 00:02:00 Section 14: Dealing with Incidents Incident Response Overview 00:03:00 Incident Response Plans (IRPs) 00:06:00 Threat Analysis and Mitigating Actions 00:08:00 Digital Forensics 00:10:00 Gathering Digital Evidence 00:10:00 Business Continuity and Alternate Sites 00:06:00 Data Backup 00:10:00 Exam Question Review 00:01:00 Autopsy Forensic Browser Lab 00:05:00 Ask Me Anything (AMA) 00:02:00 Assignment Assignment - CompTIA Security+ 00:00:00
Have you ever pondered over the intricacies of HR management and how an HR audit can revolutionise a business? How does the UK law govern the dynamics of employment, and how can compliance be ensured? Dive deep into these questions and more with our exclusive HR Audit (HR Management & Internal Audit) bundle dedicated to HR Management and Internal Audit. Within this comprehensive HR Audit (HR Management & Internal Audit) compilation, you'll embark on a thorough exploration of the nuances of the HR realm, ranging from the core competencies of HR Audit and Management, the delicate art of Employee Hiring and Termination, to mastering Performance Management at an advanced level. Get to grips with the complexities of Payroll Management, the intricacies of UK Employment Law, the precision needed for Internal Audit Skills, and the paramount importance of Compliance Management. The eight courses included in the bundle are: Course 01: Certificate in HR Audit Course 02: Internal Audit Skills Course 03: HR Management Course Course 04: Employee Hiring and Termination Training Course 05: Performance Management Level 3 Course 06: Payroll Management Course Course 07: UK Employment Law Course 08: Compliance Management Learning Outcomes: Understand the fundamental principles and methodologies of HR audit and its significance in the organisational structure. Acquire knowledge about the complete HR management lifecycle from recruitment to termination. Navigate UK Employment Law, ensuring adherence and compliance in every decision. Develop strategies for effective performance management, fostering productivity and growth. Master the elements of payroll management, guaranteeing accurate and timely compensations. Recognise the vital role of compliance in safeguarding the organisation's integrity and reputation. Certificate in HR Audit: Dive deep into the principles and methodologies specific to HR audits, offering insights to assess and boost organisational efficiency. Internal Audit Skills: Gain a comprehensive understanding of systematic evaluations, ensuring the organisation meets its objectives. HR Management Course: Explore the multifaceted world of HR, from recruitment strategies to fostering employee wellbeing. Employee Hiring and Termination Training: Master the crucial stages of the employee lifecycle, ensuring both entry and exit processes are seamless and effective. Performance Management Level 3: Delve deeper into systems and strategies designed to optimise employee output and foster continuous growth. Payroll Management Course: Understand the complexities of compensation, ensuring accurate, efficient, and compliant payroll processes. UK Employment Law: Navigate the intricate legal landscape of UK employment, ensuring every decision is in line with current regulations. Compliance Management: Recognise and master the strategies to ensure your organisation always meets the necessary standards and regulations. CPD 80 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The target audience for the course is: HR professionals aspiring to upskill and expand their domain knowledge. Business owners aiming to streamline their HR and audit processes. Management students and graduates eyeing a career in this sector. Legal professionals looking to understand UK Employment Law in depth. Compliance officers are keen on integrating audits into their protocols. Requirements Without any formal requirements, you can delightfully enrol in this course. Career path This course will help you to pursue a range of career paths, such as: HR Auditor - £28K to £45K/year. HR Manager - £35K to £55K/year. Payroll Specialist - £25K to £38K/year. Employment Law Consultant - £40K to £60K/year. Performance Management Analyst - £30K to £48K/year. Compliance Officer - £30K to £52K/year. Certificates CPD Certificate Of Completion Digital certificate - Included 8 Digital Certificates Are Included With This Bundle CPD Quality Standard Hardcopy Certificate (FREE UK Delivery) Hard copy certificate - £9.99 Hardcopy Transcript - £9.99
Practice Nurse: Practice Nurse Course Online Nursing practice is a rapidly growing field in the healthcare industry, with nurses working in a variety of settings as members of multidisciplinary health care teams. The responsibilities of a Practice Nurse Course range from administration to medical treatment. This Practice Nurse: Practice Nurse Course will guide you through the healthcare framework and provide you with the knowledge you need to succeed. This exclusive Practice Nurse Course will provide you with a thorough overview of practice nursing. Through this Practice Nurse: Practice Nurse Course, you will understand the roles and responsibilities of a practising nurse. The Practice Nurse Course will teach you how to collect medical information, provide first aid, and perform other nursing duties. You will also understand the importance and role of nursing in a variety of social settings. Main Course : Practice Nurse Training Free Courses: Course 01: Diploma in Nurse Prescribing Course 02: Nursing & Prescribing Course 03: Nursery Nurse [ Note: Free PDF certificate as soon as completing the Practice Nurse Training course] Practice Nurse: Practice Nurse Course Online This Practice Nurse: Practice Nurse Course consists of 13 modules. Course curriculum of Practice Nurse Course Module 01: Introduction to Practice Nursing Module 02: Making the Transition from Hospital to Primary Care Module 03: Working Safely Module 04: Patient Focus Module 05: Team Working and Working with Other Professionals Module 06: Working with Vulnerable Groups Module 07: Carer Support Module 08: Safety, Infection Control & Hygiene Module 09: Diagnostic Testing Module 10: Medication Administration Module 11: Documentation and Informatics Module 12: Comfort and Sleep Module 13: Nursing, Healing, and Caring Assessment Method of Practice Nurse: Practice Nurse Course After completing Practice Nurse Course, you will get quizzes to assess your learning. You will do the later modules upon getting 60% marks on the quiz test. Apart from this, you do not need to sit for any other assessments. Certification of Practice Nurse: Practice Nurse Course After completing the Practice Nurse Course, you can instantly download your certificate for FREE. The hard copy of the certification will also be delivered to your doorstep via post, which will cost £13.99. Who is this course for? Practice Nurse: Practice Nurse Course Online This Practice Nurse: Practice Nurse Course is suitable for those interested in nursing or those already working in the relevant fields and want to polish their knowledge and skill. Requirements Practice Nurse: Practice Nurse Course Online To enrol in this Practice Nurse: Practice Nurse Course, students must fulfil the following requirements: Good Command over English language is mandatory to enrol in our Practice Nurse: Practice Nurse Course. Be energetic and self-motivated to complete our Practice Nurse: Practice Nurse Course. Basic computer Skill is required to complete our Practice Nurse: Practice Nurse Course. If you want to enrol in our Practice Nurse: Practice Nurse Course, you must be at least 15 years old. Career path Practice Nurse: Practice Nurse Course Online The knowledge you will gain through this course may lead you to a variety of career opportunities. Such as: - Nursing Assistant, Nursing Administrator, Nursing Home Manager, Nurse Midwife, Practice Nurse.