• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

114 Basic Security Training (BST) courses delivered Online

VMware vRealize Automation SaltStack SecOps: Deploy and Manage [V8.6]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security administrators who are responsible for using SaltStack SecOps to manage the security operations in their enterprise Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of SaltStack Config and SaltStack SecOps Integrate SaltStack Config with directory services. Configure roles and permissions for users and groups to manage and use SaltStack SecOps Use targeting to ensure that the jobs run on the correct minion systems Use remote execution modules to install the packages, transfer files, manage services, and manage users on minion systems Manage configuration control on the minion systems with states, pillars, requisites, and declarations Use Jinja and YAML code to manage the minion systems with the state files Enforce the desired state across minion systems automatically Use SaltStack SecOps to update the compliance and vulnerability content libraries Use SaltStack SecOps to enforce compliance and remediation on the infrastructure with industry standards Use SaltStack SecOps to provide automated vulnerability scanning and remediation on your infrastructure This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in using VMware vRealize© Automation SaltStack© SecOps. SaltStack SecOps allows you to scan your system for compliance against security benchmarks, detect system vulnerabilities, and remediate your results. This course enables you to create the SaltStack SecOps custom compliance libraries and use SaltStack SecOps. In addition, this course provides you with the fundamentals of how to use VMware vRealize© Automation SaltStack© Config to install software and manage system configurations. Course Introduction Introductions and course logistics Course objectives SaltStack Config Architecture Identify the SaltStack Config deployment types Identify the components of SaltStack Config Describe the role of each SaltStack Config component SaltStack Config Security Describe local user authentication Describe LDAP and Active Directory authentication Describe the roles and permissions in vRealize Automation for SaltStack Config Describe the roles and permissions in SaltStack Config Describe the SecOps permissions in SaltStack Config Describe the advanced permissions available in SaltStack Config Targeting Minions Describe targeting and its importance Target minions by minion ID Target minions by glob Target minions by regular expressions Target minions by lists Target minions by compound matching Target minions by complex logical matching Remote Execution and Job Management Describe remote execution and its importance Describe functions and arguments Create and manage jobs Use the Activities dashboard Configuration Control Through States, Pillars, Requisites, and Declarations Define the SaltStack states Describe file management in SaltStack Config Create the SaltStack state files Identify the components of a SaltStack state Describe pillar data and the uses of pillar data Configure pillar data on the SaltStack Config master server Use pillar data in variables in the state files Describe the difference between IDs and names in the state files Use the correct execution order Use requisites in the state files Using Jinja and YAML Describe the SaltStack Config renderer system Use YAML in the state files Use Jinja in the state files Use Jinja conditionals, lists, and loops Using SaltStack SecOps Comply Describe the SaltStack SecOps Comply architecture Describe CIS and DISA STIG benchmarks Describe the SaltStack SecOps Comply security library Describe the remediation differences between SaltStack SecOps and VMware Carbon Black© Create and manage the policies Create and manage the custom checks Run assessments on the minion systems Use SaltStack SecOps to remediate the noncompliant systems Manage the SaltStack SecOps Comply configuration options Manage the benchmark content ingestion Using SaltStack SecOps Protect Describe Common Vulnerabilities and Exposures (CVEs) Use the Protect dashboard Create and manage the policies Update the vulnerability library Run the vulnerability scans Remediate the vulnerabilities Manage the vulnerability exemptions

VMware vRealize Automation SaltStack SecOps: Deploy and Manage [V8.6]
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Kubernetes Security Specialist (CKS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security Professionals working with Kubernetes Clusters Container Orchestration Engineers DevOps Professionals Overview In this course, students will learn and practice essential Kubernetes concepts and tasks in the following sections: Cloud Security Fundamentals Cluster Hardening System Hardening Minimize Microservice Vulnerabilities Supply Chain Security Disaster Recovery Secure Back-up and Restore This class prepares students for the Certified Kubernetes Security Specialist (CKS) exam. Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stabilitywhile maximizing resource utilization for applications and services. By the conclusion of this hands-on, vendor agnostic training you will be equipped with a thorough understanding ofcloud security fundamentals, along with the knowledge, skills and abilities to secure a Kubernetes cluster, detect threats, and properly resolve a security catastrophe. This courseincludes hands-on instruction which develops skills and knowledge for securing container-based applications and Kubernetes platforms, during build, deployment, and runtime. We prioritizecovering all objectives and concepts necessary for passing the Certified Kubernetes Security Specialist (CKS) exam. You will be provided the components necessary to assemble your ownhigh availability Kubernetes environment and harden it for your security needs. Learning Your Environment Underlying Infrastructure Using Vim Tmux Cloud Security Primer Basic Principles Threat Analysis Approach CIS Benchmarks Securing your Kubernetes Cluster Kubernetes Architecture Pods and the Control Plane Kubernetes Security Concepts Install Kubernetes using kubeadm Configure Network Plugin Requirements Kubeadm Basic Cluster Installing Kubeadm Join Node to Cluster Kubeadm Token Manage Kubeadm Tokens Kubeadm Cluster Upgrade Securing the kube-apiserver Configuring the kube-apiserver Enable Audit Logging Falco Deploy Falco to Monitor System Calls Enable Pod Security Policies Encrypt Data at Rest Encryption Configuration Benchmark Cluster with Kube-Bench Kube-Bench Securing ETCD ETCD Isolation ETCD Disaster Recovery ETCD Snapshot and Restore Purge Kubernetes Purge Kubeadm 3Purge Kubeadm Image Scanning Container Essentials Secure Containers Creating a Docker Image Scanning with Trivy Trivy Snyk Security Manually Installing Kubernetes Kubernetes the Alta3 Way Deploy Kubernetes the Alta3 Way Validate your Kubernetes Installation Sonobuoy K8s Validation Test Kubectl (Optional) Kubectl get and sorting kubectl get kubectl describe Labels (Optional) Labels Labels and Selectors Annotations Insert an Annotation Securing your Application Scan a Running Container Tracee Security Contexts for Pods Understanding Security Contexts AppArmor Profiles AppArmor Isolate Container Kernels gVisor Pod Security Pod Security Policies Deploy a PSP Pod Security Standards Enable PSS Open Policy Agent (OPA) Admission Controller Create a LimitRange Open Policy Agent Policy as Code Deploy Gatekeeper User Administration Contexts Contexts Authentication and Authorization Role Based Access Control Role Based Access Control RBAC Distributing Access Service Accounts Limit Pod Service Accounts Securing Secrets Secrets Create and Consume Secrets Hashicorp Vault Deploy Vault Securing the Network Networking Plugins NetworkPolicy Deploy a NetworkPolicy mTLS Linkerd mTLS with istio istio Threat Detection Active Threat Analysis Host Intrusion Detection Deploy OSSEC Network Intrusion Detection Deploy Suricata Physical Intrusion Detection Disaster Recovery Harsh Reality of Security Deploy a Response Plan Kasten K10 Backups Deploy K10

Certified Kubernetes Security Specialist (CKS)
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Security Best Practices

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, cloud engineers, including security engineers, delivery and implementation engineers, professional services, and Cloud Center of Excellence (CCOE) Overview In this course, you will learn to: Design and implement a secure network infrastructure Design and implement compute security Design and implement a logging solution Currently, the average cost of a security breach can be upwards of $4 million. AWS Security Best Practices provides an overview of some of the industry best practices for using AWS security and control types. This course helps you understand your responsibilities while providing valuable guidelines for how to keep your workload safe and secure. You will learn how to secure your network infrastructure using sound design options. You will also learn how you can harden your compute resources and manage them securely. Finally, by understanding AWS monitoring and alerting, you can detect and alert on suspicious events to help you quickly begin the response process in the event of a potential compromise. Module 1: AWS Security Overview Shared responsibility model Customer challenges Frameworks and standards Establishing best practices Compliance in AWS Module 2: Securing the Network Flexible and secure Security inside the Amazon Virtual Private Cloud (Amazon VPC) Security services Third-party security solutions Module 3: Amazon EC2 Security Compute hardening Amazon Elastic Block Store (EBS) encryption Secure management and maintenance Detecting vulnerabilities Using AWS Marketplace Module 4: Monitoring and Alerting Logging network traffic Logging user and Application Programming Interface (API) traffic Visibility with Amazon CloudWatch Enhancing monitoring and alerting Verifying your AWS environment Additional course details: Nexus Humans AWS Security Best Practices training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Best Practices course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Security Best Practices
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec ProxySG 6.6 Advanced Administration (BCCPP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is for IT network or security professionals who have practical experience with the ProxySG in the field and wish to master the advanced network security of the ProxySG. Overview Solve common authentication and SSL issuesUnderstand the underlying architecture of SGOSMonitor and analyze ProxySG performanceUse policy tracing as a troubleshooting tool The ProxySG 6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of the ProxySG. Using Authentication Realms Describe the benefits of enabling authentication on the ProxySG Describe, at a high level, the ProxySG authentication architecture Understand the use of IWA realms, with both IWA Direct and IWA BCAAA connection methods Understanding Authentication Credentials Describe how NTLM and Kerberos authentication work in both IWA direct and IWA BCAAA deployments Configure the ProxySG to use Kerberos authentication Understanding Authentication Modes Describe authentication surrogates and authentication modes Describe ProxySG authentication in both explicit and transparent deployment mode Understanding HTTPS Describe key components of SSL encryption Describe how the SSL handshake works Describe some of the legal and security considerations related to use of the SSL proxy Managing SSL Traffic on the ProxySG Describe how the SSL proxy service handles SSL traffic Describe the standard keyrings that are installed by default on the ProxySG Identify the types of security certificates that the ProxySG uses Optimizing SSL Interception Performance Configure the ProxySG to process SSL traffic according to best practices for performance SGOS Architecture Identify key components of SGOS Explain the interaction among client workers and software workers in processing client requests Explain the significance of policy checkpoints Describe key characteristics of the SGOS storage subsystem Explain the caching behavior of the ProxySG Caching Architecture Describe the benefits of object caching on the ProxySG Explain the caching-related steps in a ProxySG transaction Identify and describe the HTTP request and response headers related to caching Describe, in general terms, how the ProxySG validates cached objects to ensure freshness Explain how the ProxySG uses cost-based deletion, popularity contests, and pipelining to improve object caching System Diagnostics Describe the use of the health monitor and health checks Explain the use of the event and access logs Describe the information available in advanced URLs and sysinfo files Describe the function of policy tracing and packet captures Introduction to Content Policy Language (CPL) Describe the fundamental concepts and purposes of ProxySG policy transactions Understand the relationship of layers, rules, conditions, properties, and triggers Describe the two types of actions in CPL Describe how to write, edit, and upload CPL code Using Policy Tracing for Troubleshooting Identify the two main types of ProxySG policy traces Describe the various sections of a policy trace result Configure a global and policy-driven trace Access and interpret policy trace results ProxySG Integration Identify other Symantec products that can be used as part of a complete security solution

Symantec ProxySG 6.6 Advanced Administration (BCCPP)
Delivered OnlineFlexible Dates
Price on Enquiry

Online Options

Show all 114

Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for anyone seeking CCNA certification. The course also provides foundational knowledge for all support technicians involved in the basic installation, operation, and verification of Cisco networks. The job roles best suited to the material in this course are: Entry-level network engineer Network administrator Network support technician Help desk technician Overview This course will help you: Learn the knowledge and skills to install, configure, and operate a small- to medium-sized network Gain a foundation in the essentials of networking, security, and automation Earn 30 CE credits toward recertification The Implementing and Administering Cisco Solutions (CCNA) v2.0 course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking. This course helps you prepare to take the 200-301 Cisco© Certified Network Associate (CCNA©) exam. By passing this one exam, you earn the CCNA certification. This course also earns you 30 Continuing Education (CE) credits towards recertification. Course Outline Exploring the Functions of Networking ? Lecture Introducing the Host-to-Host Communications Model ? Lecture Operating Cisco IOS Software ? Lecture Introducing LANs ? Lecture Exploring the TCP/IP Link Layer ? Lecture Starting a Switch ? Lecture Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets ? Lecture Explaining the TCP/IP Transport Layer and Application Layer ? Lecture Exploring the Functions of Routing ? Lecture Configuring a Cisco Router ? Lecture Exploring the Packet Delivery Process ? Lecture Troubleshooting a Simple Network ? Lecture Introducing Basic IPv6 ? Lecture Configuring Static Routing ? Lecture Implementing VLANs and Trunks ? Lecture Routing Between VLANs ? Lecture Introducing OSPF ? Lecture Building Redundant Switched Topologies ? Self-study Improving Redundant Switched Topologies with EtherChannel ? Lecture Exploring Layer 3 Redundancy ? Self-study Introducing WAN Technologies ? Self-study Explaining Basics of ACL ? Lecture Enabling Internet Connectivity ? Lecture Introducing QoS ? Self-study Explaining Wireless Fundamentals ? Self-study Introducing Architectures and Virtualization ? Self-study Explaining the Evolution of Intelligent Networks ? Lecture Introducing System Monitoring ? Lecture Managing Cisco Devices ? Lecture Examining the Security Threat Landscape ? Self-study Additional course details: Nexus Humans Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing and Administering Cisco Solutions v2.0 (CCNA)
Delivered Online + more
£4,195

AWS Security Essentials

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Security IT business-level professionals interested in cloud security practices Security professionals with minimal to no working knowledge of AWS Overview Assimilate Identify security benefits and responsibilities of using the AWS Cloud Describe the access control and management features of AWS Explain the available methods for providing encryption of data in transit and data at rest when storing your data in AWS. Describe how to secure network access to your AWS resources Determine which AWS services can be used for monitoring and incident response This course covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, you learn where you are responsible for implementing security in the AWS Cloud and what security-oriented services are available to you and why and how the security services can help meet the security needs of your organization. Prerequisites Working knowledge of IT security practices and infrastructure concepts, familiarity with cloud computing concepts 1 - Security on AWS Security design principles in the AWS Cloud AWS Shared Responsibility Model 2 - Security OF the Cloud AWS Global Infrastructure Data center security Compliance and governance 3 - Security IN the Cloud ? Part 1 Identity and access management Data protection essentials Lab 01 ? Introduction to security policies 4 - Security IN the Cloud ? Part 2 Securing your infrastructure Monitoring and detective controls Lab 02 ? Securing VPC resources with Security Groups 5 - Security IN the Cloud ? Part 3 DDoS mitigation Incident response essentials Lab 03 ? Remediating issues with AWS Config Conformance Packs 6 - Course Wrap Up AWS Well-Architected tool overview Next Steps Additional course details: Nexus Humans AWS Security Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Security Essentials
Delivered Online
£675

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

CCNA training course description The Implementing and Administering Cisco Solutions (CCNA) course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. It also gives a foundation in network programmability, and software-defined networking What will you learn Install, configure, and operate a small to medium sized network Gain a foundation in the essentials of networking, security, and automation Prepare for the 200-301 CCNA exam, which earns CCNA certification CCNA training course details Who will benefit: Network support help desk technicians involved in the basic installation, operation, and verification of Cisco networks. Anyone seeking CCNA certification. Prerequisites: Introduction to Data communications & networking Duration 5 days CCNA training course content After taking this course, you should be able to: Identify the components of a computer network and describe their basic characteristics. Understand the model of host-to-host communication. Describe the Cisco IOS software. Describe LANs and the role of switches within LANs. Describe Ethernet and describe the operation of switches. Install a switch and perform the initial configuration. Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting. Describe the TCP/IP Transport and Application layers Explore functions of routing. Implement basic configuration on a Cisco router. Explain host-to-host comms across switches and routers. Identify and resolve common switched network issues and common problems associated with IPv4 addressing. Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity. Describe static routing. Describe, implement, and verify VLANs and trunks. Describe inter VLAN routing. Explain the basics of dynamic routing protocols and describe components and terms of OSPF. Explain how STP and RSTP work. Configure link aggregation using EtherChannel. Describe the purpose of Layer 3 redundancy protocols. Describe basic WAN and VPN concepts. Describe the operation of access control lists (ACLs) and their applications in the network. Configure Internet access using DHCP clients and explain and configure NAT on Cisco routers. Describe basic QoS concepts. Describe the concepts of wireless networks, which types of wireless networks can be built, and how to use Wireless LAN Controllers (WLCs). Describe network and device architectures, introduce virtualization, network programmability and SDN and describe smart network management solutions such as Cisco DNA Center™, SD-Access, and SD-WAN. Configure basic IOS system monitoring tools. Describe the management of Cisco devices. Describe the current security threat landscape. Describe threat defence technologies. Implement a basic security configuration of the device management plane. Implement basic steps to harden network devices. Detailed course outline Exploring the Functions of Networking. The Host-to-Host Communications Model. Operating Cisco IOS Software. Introducing LANs. Exploring the TCP/IP Link Layer. Starting a Switch. The TCP/IP IP layer, IPv4 Addressing, and Subnets. The TCP/IP Transport Layer and Application Layer. Exploring the Functions of Routing. Configuring a Cisco Router. Exploring the Packet Delivery Process. Troubleshooting a Simple Network. Introducing Basic IPv6. Configuring Static Routing. Implementing VLANs and Trunks. Routing Between VLANs. Introducing OSPF. Redundant Switched Topologies with EtherChannel. Explaining Basics of ACL. Enabling Internet Connectivity. Explaining the Evolution of Intelligent Networks. Introducing System Monitoring. Managing Cisco Devices. Securing Administrative Access. Implementing Device Hardening. Self-Study: Building Redundant Switched Topologies. Exploring Layer 3 Redundancy. Introducing WAN Technologies. Introducing QoS. Explaining Wireless Fundamentals. Introducing Architectures and Virtualization. Examining the Security Threat Landscape. Threat Defense Technologies.

CCNA
Delivered in Internationally or OnlineFlexible Dates
£2,797

Certified Cisco Networking for Beginners with Simulators and Exams

By Hudson

This course bundle is aimed at absolute beginners to IT who want to start a career in Cisco networking or just develop their skills in this area. The course assumes you have no technical knowledge of IT whatsoever. To understand Cisco networking and practice it at a technical level, you must first possess an understanding of basic IT literacy as well as certain technologies, which you will be taught through this course. Through this course, you will gain a series of globally recognised networking certifications from CompTIA and Cisco. You will also possess a set of networking skills you can apply to a vast range of IT job roles. From the beginning, we teach you about basic IT literacy, basic software features and functions, basic networking, operating systems, and basic security threats. From there, the course steps up a notch exploring these areas in more depth. As you progress through the various stages, your knowledge of networking will gradually begin to develop. The course bundle is comprised of five separate courses in total. Once of which is skills based only with no exam, and four certification courses with a final exam after each course. The final course being the Cisco Certified Networking Associate (CCNA). The first course (CompTIA IT Fundamentals) provides a soft introduction to basic IT terminology, concepts and technology. To help you grasp the concepts and develop the skills within the course, simulators are also included. These allow you to practice your networking skills learnt on the course. In the IT world, these simulators are otherwise known as ‘Live Labs’.

Certified Cisco Networking for Beginners with Simulators and Exams
Delivered Online On Demand
£1,395

Certified Cisco Networking for Beginners with Official Cisco Exams

By Hudson

This course bundle is aimed at absolute beginners to IT who want to start a career in Cisco networking or just develop their skills in this area. The course assumes you have no technical knowledge of IT whatsoever. To understand Cisco networking and practice it at a technical level, you must first possess an understanding of basic IT literacy as well as certain technologies, which you will be taught through this course. Through this course, you will gain a series of globally recognised networking certifications from CompTIA and Cisco. You will also possess a set of networking skills you can apply to a vast range of IT job roles. From the beginning, we teach you about basic IT literacy, basic software features and functions, basic networking, operating systems, and basic security threats. From there, the course steps up a notch exploring these areas in more depth. As you progress through the various stages, your knowledge of networking will gradually begin to develop. The course bundle is comprised of five separate courses in total. Once of which is skills based only with no exam, and four certification courses with a final exam after each course. The final course being the Cisco Certified Networking Associate (CCNA). The first course (CompTIA IT Fundamentals) provides a soft introduction to basic IT terminology, concepts and technology.

Certified Cisco Networking for Beginners with Official Cisco Exams
Delivered Online On Demand
£999

IP security foundation for engineers

5.0(3)

By Systems & Network Training

IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death… keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.

IP security foundation for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,497

Cyber Security Analyst - IT Job Ready Program + Career Support & Money Back Guarantee

4.5(3)

By Studyhub UK

The year is 2023. The world is a very different place than it was just a few years ago. Technology has advanced at an unprecedented pace, and with it, the threat of cyber attacks has grown exponentially. In this new world, cyber security is more important than ever. That's where cyber security analysts come in. These professionals are responsible for protecting computer systems and networks from attack. Our Cyber Security Analyst Training program provides comprehensive training in all aspects of cyber security, from basic security concepts to advanced penetration testing techniques. In addition to training, our program also provides career mentoring and support. We'll help you build your resume, practice your interview skills, and network with potential employers. We'll also be there to support you throughout your job search. We will help you to get a job, so you won't have to worry about a thing. Just gain knowledge and learn skills, getting you a job is our duty. Enrol today and take your career to the next level! If you're ready to start a career in cyber security, our program can help you get there. Our affordable tuition makes our program accessible to everyone. Our mission is simple: to be your trusted partner and assist you every step of the way until you land the job of your dreams. Why Choose Us Here's what makes our Cyber Security Analyst Training Program stand out from the crowd: Personalised Job Search Assistance: We're in this together! Our dedicated team will work tirelessly to support your entire job searching process. From crafting a standout resume to submitting it to top companies, we'll ensure you have a compelling application that gets noticed. Expertly Crafted CV: Your resume is your ticket to the interview room. Our professional resume writers will create a customised CV highlighting your unique skills and experiences. This will maximise your chances of standing out among the competition. Strategic Placement: We understand the power of casting a wide net. We'll strategically submit your CV to various platforms and networks, expanding your reach and connecting you with valuable opportunities that align with your career goals. One-On-One Consultation Sessions with Industry Experts: Gain invaluable insights and guidance from seasoned professionals who have thrived in the Cyber Security field. Our consultation sessions provide you with insider tips, tricks, and advice, empowering you to navigate the industry with confidence and expertise. Comprehensive Skill Development: Our program is designed to equip you with the most sought-after skills in the Cyber Security sector. From mastering cutting-edge tools to honing your Cyber Security prowess, we'll ensure you have the knowledge and expertise to excel in any Cyber Security-driven environment. Ongoing Support: We understand that the journey to landing your dream job doesn't end with placement. That's why our commitment to your success extends well beyond your initial training. Our support team will be available to answer your questions, provide guidance, and assist you as you progress in your career. Here are the 6 courses we will provide once you enrol in the program: CompTIA CySA+ Cybersecurity Analyst (CS0-002) CompTIA Security+ (SY0-601) Linux Security and Hardening Web Application Penetration Testing Course Computer Networks Security from Scratch to Advanced Cyber Security Incident Handling and Incident Response These courses will help you to develop your knowledge and skills to become a successful Cyber Security Analyst. The Program is completed in 5 easy steps: Step 1 - Enrol in the program and start learning from the courses we provide After you enrol in this Cyber Security Analyst Training Program, you will get lifetime access to 6 premium courses related to Cyber Security. These courses will teach you the knowledge and skills required to become a successful Cyber Security Analyst. Our customer service team will help you and keep in contact with you every step of the way. Step 2 - Complete your courses and get certifications After learning from the courses, you must obtain certificates for each course. There will be exams for every course, and you have to pass them to get your certificate. To pass successfully, you must get 90% marks for the first course and 80% for the rest relevant courses. Once you pass the exams, you will receive hardcopy certificates. These certificates will prove that you're an expert in the subject. Step 3 - Get a consultation session from a professional Cyber Security Analyst Take your Cyber Security skills to new heights with a one-on-one consultation session led by a seasoned professional. Gain invaluable insights, expert tips, and tailored advice that will propel your career forward. Step 4 - Complete the CV and attend the interview Once you've successfully obtained the certifications, our team of professionals will build you a compelling CV and LinkedIn profile. With these powerful tools in hand, you'll be fully prepared to tackle job interviews confidently. Kickstart your Cyber Security Analyst career with a starting salary ranging from •30,000 to •50,000 annually. Step into the Cyber Security industry with the assurance of a promising future. Step 5 - We will not leave you until you get a job Our commitment to your success goes above and beyond. We won't stop until you land that dream job. With personalised support, expert guidance, and unwavering dedication, we'll be by your side until you secure the perfect opportunity. Your job search becomes our mission, ensuring you have the best chance at a successful career in Cyber Security. Don't miss out on this incredible opportunity to kickstart your cybersecurity career with our Cyber Security Analyst Training Program. With our unwavering support and guidance, you can confidently navigate the job market, land your dream job, and excel in your chosen field. Enrol today and join the ranks of successful cybersecurity professionals who have found their footing with Studyhub. Together, let's secure the future! CPD 100 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Cyber Security Analyst Training program is ideal for: Aspiring cybersecurity professionals seeking a comprehensive training program. Career changers looking to transition into the lucrative field of cybersecurity. Recent graduates aiming to kickstart their cybersecurity career with industry-relevant skills. IT professionals seeking to specialise in cybersecurity and enhance their job prospects. Individuals passionate about protecting digital assets and combating cyber threats. Requirements No experience required. Just enrol & start learning. Career path The cybersecurity industry in the UK offers a promising career path. With an increasing demand for skilled professionals, graduates of our program can pursue roles as Cyber Security Analysts, Penetration Testers, Incident Responders, and more. Companies across various sectors, including finance, healthcare, and government, are actively hiring in this field. Certificates CPD Accredited e-Certificate Digital certificate - Included CPD Accredited Framed (Hardcopy) Certificate Hard copy certificate - Included Enrolment Letter Digital certificate - Included Student ID Card Digital certificate - Included

Cyber Security Analyst - IT Job Ready Program + Career Support & Money Back Guarantee
Delivered Online On Demand12 weeks
£1,199

Complete CompTIA Certification Bundle (6 Courses, 6 Live Labs, 6 Exams)

By Hudson

The Computing Technology Industry Association (CompTIA) is the association representing the international technology community. Its goal is to provide a unified voice, global advocacy and leadership, and to advance industry growth through standards, professional competence, and education and business solutions. In order to most efficiently serve the industry and its members, CompTIA has developed specialized initiatives and programs dedicated to major areas within the IT industry. They include, convergence technology, e-commerce, IT training, software services, certification, public policy and workforce development. This bundle offers incredible value for money for anyone looking to get CompTIA certified. It includes 6 separate certification courses, spanning a variety of disciplines and technical fields from IT technician skills, to networking, and IT security, plus more!

Complete CompTIA Certification Bundle (6 Courses, 6 Live Labs, 6 Exams)
Delivered Online On Demand
£1,495

Cyber Security for Beginners with 5 Official CompTIA Exams and Simulators

By Hudson

If you’ve ever considered working within the cyber security industry, but felt you lacked the knowledge or skills to launch your career, this course might be what you’re looking for.

Cyber Security for Beginners with 5 Official CompTIA Exams and Simulators
Delivered Online On Demand
£1,395

Educators matching "Basic Security Training (BST)"

Show all 20
Empower UK Employment Training

empower uk employment training

5.0(1)

Bradford

Welcome to Empower UK Employment Training, where your professional growth is our mission. We are a leading provider of bespoke education, offering tailored courses designed to meet the unique needs of every learner. Our team of skilled counsellors are dedicated to providing expert career guidance, helping you navigate your career path with confidence. WE WORK WITH LEADING INTERNATIONAL BRANDS AND BUSINESSES At Empower UK, we understand the importance of continuous professional development. That’s why our courses are designed to not only equip you with the skills you need today but also to foster your long-term career progression. Join us at Empower UK Employment Training and take the next step in your professional journey. WHY CHOOSE US? INTERACTIVE LEARNING SESSIONS AND COURSE PLANS One of the greatest advantages of joining Empower UK’s courses is the opportunity for knowledge acquisition and skill enhancement. Our courses are rich sources of industry-relevant information, perfect for those seeking to upskill. As your career guides, we understand your needs. CPD PROGRESSION Our courses are designed to aid you in your continuous professional development. EFFORTLESS ELEARNING EXPERIENCE Empower UK offers an engaging and informative platform for all learners, new and seasoned, delivering valuable content that will refine your skills. It’s an excellent way to build relationships with your peers, increase your knowledge, and create awareness of your professional potential. OPTIMISED FOR ANY DEVICE Our innovative learning platform is designed with your convenience in mind. Whether you're using a mobile, laptop, or tablet, you can access our courses anytime, anywhere. It's a strategic approach to learning, tailored to your goals and flexible to your lifestyle. AUDIENCE ENGAGEMENT We believe in nurturing our learners, helping them to continually develop their skills and knowledge. ASK US ANY QUESTION This might seem straightforward, but we encourage our learners to ask questions anytime. This not only enriches your learning experience but also fosters a deeper connection with the Empower UK community. Dive into our engaging courses and start your journey towards career advancement today.

Course Gate

course gate

5.0(1)

London

Welcome to Course Gate, your gateway to a world of knowledge and opportunity. We are a leading online learning marketplace dedicated to empowering individuals and organisations with the skills they need to succeed in today's dynamic and competitive environment. -------------------------------------------------------------------------------- Our Mission Our mission is to make education accessible and enjoyable for everyone. We want to help you discover your passion, expand your knowledge, and grow your confidence. Whether you want to learn a new language, master software, or develop a hobby, we have the right course for you.  -------------------------------------------------------------------------------- Our Vision  At Course Gate, we envision a future where education knows no boundaries. Our goal is to eliminate the traditional barriers of time, location, and accessibility, empowering learners from diverse backgrounds to unlock their full potential. Through our innovative approach, we aim to revolutionise the learning experience by making top-quality education accessible to everyone, regardless of their location. -------------------------------------------------------------------------------- Why Choose Course Gate? When you opt for Course Gate, you're choosing excellence, convenience, and an unparalleled learning experience. Here's why learners and organisations worldwide trust us: * Unmatched Quality: We meticulously curate our courses, collaborating with industry-leading experts to provide the highest-quality, relevant, and up-to-date content. * Flexible Learning: Our platform enables you to learn at your own pace, fitting into your schedule. Whether you're a full-time professional, a stay-at-home parent, or a busy student. * 24/7 Customer Support: Our dedicated customer support team is available to assist you whenever you need help. * Accreditation & Endorsement: CPD accredited & UKRLP registered course provider in the UK. * Affordability: We believe education should be accessible to all. Course Gate provides competitive pricing and discounts, ensuring that the cost never becomes a barrier to your personal and professional development. So, what are you waiting for? Join the thousands of learners who have already chosen Course Gate as their trusted learning partner and unlock your full potential. --------------------------------------------------------------------------------