Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Discover the benefits of our EnergyEdge course focusing on prospect maturation. Enroll now to advance your knowledge in the energy industry.
About this Virtual Instructor Led Training (VILT) This 5 half-day Virtual Instructor Led Training (VILT) course covers carbon capture and geological storage of carbon dioxide. Burning fossil fuels for energy is a major source of carbon dioxide emissions to the atmosphere. Most anthropogenic (man-made) carbon dioxide is emitted by coal-fired or gas-fired power plants, and significant quantities of carbon dioxide are emitted through the production and separation of carbon dioxide-rich natural gas and industries such as cement, iron and steel. Carbon Capture Utilization and Storage, or CCUS, involves the long-term storage of captured carbon dioxide emissions in subsurface geologic formations. This VILT course covers all aspects of CCUS including transport, storage and monitoring, economics and community engagement. It explores in detail the challenges of the current technology of geological storage, monitoring and verification including examples from working projects around the world. Many of these technologies are commonly employed by the petroleum industry. Successful deployment of CCUS will also require economic incentives, appropriate regulation, clarity on liability issues and acceptance by the community. These aspects of CCUS, and the corresponding opportunities for appropriately skilled organisations and individuals also will be discussed. Course Content at a Glance Context for CCS/CCUS as An Emissions-reduction Measure Principles of Geological Storage Finding Geological Storage Sites Stationary Sources of Carbon Dioxide for Capture Carbon Dioxide Capture Technologies Compression and Transport of Carbon Dioxide Economics of CCS/CCUS Community, Safety, Legal & Regulatory Issues Risk Assessment Training Objectives Upon completion of this VILT course, participants will be able to: Identify the need for Carbon Capture and Storage (CCS) Outline the key steps in the Carbon Capture and Storage process Distinguish between reservoir rocks and sealing rocks Describe the importance of permeability and porosity to storing carbon dioxide Contrast the geological structures and trapping mechanisms for storing carbon dioxide Describe the changes in geologically stored carbon dioxide over time Outline the monitoring techniques employed to ensure the carbon dioxide is safely stored Appreciate the industrial applications of carbon dioxide capture Recognize the scale of industry required for transporting and storing carbon dioxide Describe economic considerations for CCS/CCUS Outline the economic and environmental opportunities and challenges with using carbon dioxide injection in a range of applications Explain the challenges of regulatory frameworks and public acceptance in a CCS/CCUS project Identify potential risks of a CCS/CCUS project Outline the risk assessment and management process Target Audience This VILT course is ideally suited for a technical audience - geoscientists, petroleum and chemical engineers - as well as for economists, regulators, legal staff and managers wishing to learn more about the details of both the technical, regulatory and socio-economic aspects of carbon capture and storage. Participants should have: Experience with oil and gas, coal or other energy projects Basic understanding of the energy industry Course Level Intermediate Trainer Your first expert course leader spent 18 years in the Petroleum Industry before joining academia, in both technical and managerial roles with Shell, Arco and Vico. He has received numerous awards, including Distinguished Service, Honorary member and Special Commendation awards from the American Association of Petroleum Geologist (AAPG) and was AAPG's International Vice-President and recently chairman of AAPG's House of Delegates (the Associations Parliamentary body). He is an SPE Distinguished Lecturer (DL) and has served as DL for several other professional organisations, including, AAPG, IPA and PESA. He is currently a Professor of Petroleum Geology and Engineering at the Australian School of Petroleum, University of Adelaide. He holds the South Australia State Chair in Carbon Capture & Storage (CCS) and is also presently Distinguished Scientist of the Cooperative Research Centre for Greenhouse Gas Technologies (CO2CRC), having served earlier as the Storage Program Manager and Chief Scientist. Your second expert course leader has a wide and deep knowledge of major capture technologies: solvent, membrane and adsorption based technologies and has developed pathways for retrofitting CO2 capture and storage (CCS) to fossil fuel-based power plants. He has been actively engaged in Post-combustion capture project management and demonstration projects in Victoria's Latrobe Valley on CO2 capture and hydrogen production, and on CO2 capture using membrane contactor technology. He has led various feasibility studies for the Asian Development Bank on CO2 Capture at Indian Oil Corporation's refineries, for JPOWER on hydrogen production from Victorian brown coal and for Kawasaki on incorporation of CCS in hydrogen production from fossil fuel. He has authored multiple peer reviewed journal articles, co-authored various confidential reports on CO2 capture, utilization and hydrogen production and utility, and has presented his work at various conferences, symposiums and seminars. He has a PhD in Chemical Engineering from Monash University Australia and a Master of Technology in Process Engineering from Indian Institute of Technology Delhi India. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
Enhance your clinical expertise with our "Extended Clinical Skills Training" course. Designed for healthcare professionals, this course provides practical skills and knowledge for extended clinical procedures and interventions.
COME AND TRY OUR UK-WIDE AWARD-WINNING PRE-SCHOOL CHILDREN'S BALLET CLASS which includes fun learning storytime and so much dancing! Our tip toes class dance classes for babies twinkle toes ballet for 2 years old talent toes for pre-school and 3-year-olds all the way up to spinners for seven-year-old children. Classes are held on SATURDAYS at The Mick Jagger Centre in Dartford during term time. COMING SOON to Bexley and Sidcup. Miss Kristina will welcome you and your little one into a captivating world of educational movement and music. Kings with jewels sparkling in the light or a wizard flying into the night... Fairies twirl on their magic feet whilst the pirates move into retreat... With imaginations galore all that’s left is to explore as we enter the magical world of… tiny toes ballet!
Excel but different. Harness this most powerful tool but on a course tailored to your business and needs. Using case studies relevant to your business and often actual files your firm uses on a daily basis we embark on a voyage of discovery. This isn't a boring "watch what I do and copy" course. This is exciting, engaging, funny and enjoyable. Delegates will learn relevant skills but also, because of the delivery methods they will gain an increased enjoyment of using Excel and will retain and implement all of the material covered. They also have access to the trainer for an unlimited amount of time after the course to continue to grow their knowledge
Level 7 Diploma In Strategic Management & Leadership - Pathway To MBA Degree Level 7 Diploma in Strategic Management & Leadership (QCF) – 6 - 8 Months Credits: 120 Credits This Level 7 Diploma in Strategic Management and Leadership (QCF) leading to an MBA is designed to fit around work and personal commitments. World-class teaching is delivered via pre-recorded online lectures to enrich the learning experience. MSBM has perfected the art of delivering practical management education. Our practice-based approach focuses on addressing real-world business problems. We don’t just give you the theory; we ensure you learn how to apply it in your working life immediately, with case studies, webinars, business simulations, and 100% project-based. This programme is a Pathway to Master of Business Administration Degree. Course Details Assessment: Assignments The objective of the Level 7 Diploma in Strategic Management and Leadership qualification is to develop strategic management and leadership skills for managers who have the authority and personal attributes to translate organizational strategy into effective operational performance. This qualification reflects current practice in Strategic Management and Leadership and allows learners to develop and expand their high-level understanding of strategic management and leadership in the workplace. This qualification is suitable for mature learners with a background business industry. The qualification has a clear work-related emphasis on practical skills development alongside theoretical fundamentals. Successful completion of the Level 7 Diploma in Strategic Management and Leadership qualification will equip learners with the key skills and capabilities to become an effective strategic manager. The qualification also allows learners to progress into or within employment and/or continue their study towards an MBA with advanced standing. Accreditation All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. University Progression University Top-up On completion of this course, students have the opportunity to complete a Master degree programme from a range of UK universities. The top-up programme can be studied online or on campus. The top-up comprises the final 60 credits which consist of either a dissertation or a dissertation and one module. (The course tuition fee listed above does NOT include the top-up fees) University Progression Click here to see University routes and fee information for progression. Entry Requirements For entry onto the Level 7 Diploma in Strategic Management & Leadership leading to the Master of Business Administration qualification, learners must possess: An honours degree in related subject or UK level 6 diploma or equivalent overseas qualification i.e. Bachelors Degree or Higher National Diploma OR Mature learners (over 25) with at least 5 years of management experience if they do not possess the above qualification (this is reviewed on a case by case basis) Workshops Workshops are conducted by live webinars for online students. Classroom workshops are available if there is a local branch in your country. Speak our course advisors on this subject. Visa Requirements There is no Visa requirement for this programme.
Level 7 Diploma In Accounting & Finance - Pathway To MSc Accounting & Finance Degree Level 7 Diploma in Accounting & Finance (QCF) – 6 - 8 Months Credits: 120 Credits This qualification is designed for learners who wish to pursue a career in the financial services industry, professional accountancy, banking, and finance or management. The qualification equips learners with the essential skills and knowledge needed to pursue high-level careers in all types of organizations in the public and private sector and within industry and commerce, both in the UK and abroad. The Level 7 Diploma in Accounting and Finance qualification also provides learners with the opportunity to work toward a relevant master’s programme with advanced standing. This programme is a Pathway programme to MSc Accounting & Finance Degree Course Details Assessment: Assignments Objectives: contemporary and specialized approaches to accountancy and finance key practical, theoretical and empirical issues, and academic research the complexity of the ever-changing legal framework in which the financial sector operates the latest developments in accountancy and reporting required by local, national and European governments. Accreditation All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. University Progression University Top-up On completion of this course, students have the opportunity to complete a Master degree programme from a range of UK universities. The top-up programme can be studied online or on campus. The top-up comprises the final 60 credits which consist of either a dissertation or a dissertation and one module. (The course tuition fee listed above does NOT include the top-up fees) University Progression Click here to see University routes and fee information for progression. Entry Requirements For entry onto the Level 7 Diploma in Human Resource Management leading to the MA Human Resource Management qualification, learners must possess: An honours degree in related subject or UK level 6 diploma or equivalent overseas qualification i.e. Bachelors Degree or Higher National Diploma OR Mature learners (over 25) with at least 5 years of management experience if they do not possess the above qualification (this is reviewed on a case by case basis) Workshops Workshops are conducted by live webinars for all students. Visa Requirements There is no Visa requirement for this programme.