• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1 Certified Cyber Professional (CCP) courses in Birmingham

Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them.

Cyber Safe
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£30

Online Options

Show all 153

CertNexus Certified CyberSec First Responder (CFR-410)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) Lesson 1: Assessing Cybersecurity Risk Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management Lesson 2: Analyzing the Threat Landscape Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering Lesson 4: Analyzing Attacks on Computing and Network Environments Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques Lesson 6: Assessing the Organization's Security Posture Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing Lesson 7: Collecting Cybersecurity Intelligence Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources Lesson 8: Analyzing Log Data Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis Lesson 9: Performing Active Asset and Network Analysis Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise Lesson 10: Responding to Cybersecurity Incidents Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation Lesson 11: Investigating Cybersecurity Incidents Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation Additional course details: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified CyberSec First Responder (CFR-410)
Delivered OnlineFlexible Dates
£3,495

Cisco Cyber Ops Security Bundle with 5 Exams

By Hudson

This course bundle is ideal for anyone looking to launch their Cisco networking career, specifically in Cisco cyber ops and security. It consists of one Cisco Certified Technician (CCT) certification in Routing and Switching, one Cisco Certified Network Associate (CCNA) certification, one Cisco Certified CyberOps Associate certification, and one Cisco Certified Networking Professional (CCNP) certifications, specialising in Cisco security. Although there are no formal prerequisites to enrol on the CCNA, or CCNP certification courses and sit the exams, learners should have a good foundation knowledge in networking. The Cisco Certified Technician Routing and Switching (CCT Routing and Switching) certification focuses on the skills required for onsite support and maintenance of Cisco routers, switches, and operating environments. It’s a great starting point if you’re new to Cisco networking. Technicians in this area must be able to identify Cisco router and switch models, accessories, cabling, and interfaces; understand the Cisco IOS Software operating modes and identify commonly found software; and be able to use the Cisco Command Line Interface (CLI) to connect and service products. Achieving CCT Routing and Switching certification is considered the best foundation for supporting other Cisco devices and systems. Earning the CCNA is usually the first ‘major’ certification step in preparing for a career in Cisco networking technologies. To earn your CCNA certification, you only need to pass one exam – which covers a broad range of fundamentals for IT careers, based on the latest networking technologies. The Cisco Certified CyberOps Associate certification program validates the day-today, tactical knowledge and skills that Security Operations Center (SOC) teams need to detect and respond to cyber security threats. The certification validates the fundamentals needed for associate-level job roles, with one exam and one training course to help you prepare. The exam and training cover knowledge and skills related to security concepts, security monitoring, host-based analysis, network intrusion analysis, and security policies and procedures. From a recognized provider of security solutions and certifications, the CyberOps Associate certification and training program is your pathway to a career in cyber security operations. The CCNP Security certification is designed to help you prove your skills in the ever-changing landscape of security technologies. The program prepares you for today’s professional-level job roles in security technologies. One of the industry’s most respected certifications, CCNP validates the core knowledge you need while providing the flexibility to choose a focus area. To earn your CCNP Security, you must pass two exams: a core exam and a concentration exam of your choice. This course bundle includes the core exam and concentration exam. The core exam’s focus is ‘Securing Networks with Cisco Firepower Technologies‘ – Cisco CCNP Security SNCF (Exam 300-710).

Cisco Cyber Ops Security Bundle with 5 Exams
Delivered Online On Demand
£1,395

Network and Cyber Security Traineeship Program with Career Support & Money Back Guarantee

4.7(26)

By Academy for Health and Fitness

Earn up to 85k as a 'Cyber Security Analyst' or Your 100% Money Back Are you concerned about the rising threat of cybercrime? In the UK alone, cyberattacks cost businesses an estimated £3.1 billion annually, and the demand for skilled cybersecurity professionals is booming. With an average salary of £45,000, a career in cybersecurity offers promising opportunities for those seeking stability and growth. Are you looking to join the high-demand field of cyber security and earn a handsome salary? Our Network and Cyber Security Traineeship Program is here to guide you all the way until you get the job you want. This Network and Cyber Security Traineeship Program is your all-in-one solution to learn cyber security from scratch and also secure a job in this exciting industry. With our unique blend of comprehensive courses and career support, your dream job is within reach. We understand the challenges of transitioning into a new field, which is why our program is tailored to guide you every step of the way - from mastering core skills to landing your first job as a Cyber Security Analyst. By choosing our Cyber Security Job Guarantee Programme, you're not just gaining skills; you're gaining a lifelong career partner. Our mission is simple - to be your trusted partner every step of the way, from training to employment. In addition to teaching you the technical skills you need, we will also provide you with career mentoring and support. We will help you build your resume, prepare for interviews, and land your dream job. We also have partnerships with many companies that are hiring Programmers, so we can help you get your foot in the door. If you are not happy with our service, we also offer a 100% money-back guarantee. So what are you waiting for? Enrol in our Cyber Security Job Guarantee Programme today and start your journey to become successful in Cyber Security field! Why Choose Us? So, what sets us apart from other programs? Let's dive into the exceptional benefits you'll experience when you join our Certified Cyber Security Job Guarantee Programme: Personalised Guidance: We believe in the power of individual attention. Our experienced mentors will provide one-on-one counselling sessions tailored to your specific needs. Whether you're a beginner or have some Cyber Security experience, we will guide you towards honing your skills and developing a strong foundation in Cyber Security. One-On-One Consultation: Gain invaluable insights and guidance from seasoned professionals who have thrived in the Cyber Security field. Our consultation sessions provide you with insider tips, tricks, and advice, empowering you to navigate the industry with confidence and expertise. Extensive Job Opportunities: We have established partnerships with numerous companies actively seeking Certified Cyber Security Job Guarantee Programme. Through our network, we'll connect you with exclusive job openings that are not easily accessible elsewhere. Interview Preparation: No more stress over unexpected interview questions. We provide you with access to a comprehensive database of potential interview questions curated over years of industry experience. Walk into your interviews confident, well-prepared, and ready to impress. Courses we will provide once you enrol in the program: Course 01: Cyber Security Programming Course 02: Cyber Security Advanced Training Course 03: Cyber Security Incident Handling and Incident Response Course 04: IT Support Technician Course 05: General Data Protection Regulation (GDPR) & Cyber Security Management Course 06: CompTIA Security+ (SY0-601) Course 07: CompTIA A+ (220-1001) Course 08: CompTIA A+ (220-1002) Course 09: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 10: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 11: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 12: CompTIA Network+ Certification (N10-007) Course 13: Diploma in CompTIA Network+ Training at QLS Level 7 Course 14: CompTIA PenTest+ (Ethical Hacking) Course 15: Cisco ASA Firewall Training Course 16: Cryptography Course 17: IT Administration and Networking Course 18: IGCSE ICT: Network Essentials Course 19: Cyber Security Law Course 20: Cyber Security Awareness Training How Can We Offer Job Guarantees? HF Online provides consultancy, professional and educational services to many of the companies in the UK. During our intense exclusive training program, you will not just gain and complete the industry valuable certification but will gain industry experience as well, which is imperative to get your 1st job in the sector. The Network and Cyber Security Traineeship Program Programme is completed in 9 easy steps: Step 1: Enrol in the Programme Begin your exciting journey with us by enrolling in the Cyber Security Job Guarantee Programme. Complete your registration and make a secure online payment. Remember, we offer a 14-day money-back guarantee if you're not completely satisfied. After you enrol in the Program, you will get lifetime access to 20 Premium Courses related to Cyber Security Job Guarantee Programme. These courses will teach you the knowledge and skills required to become successful in Cyber Security field. Our customer service team will help you and keep in contact with you every step of the way. So you won't have to worry about a thing! Step 2: Initial One-On-One Counselling Session Once enrolled, you will be paired with a dedicated career mentor. Schedule your first one-on-one session to discuss your career aspirations, skills, experience, and any areas for potential growth. This conversation will shape your learning and development path. Step 3 - Certification upon Course Completion After learning from the courses, you must obtain certificates for each course. There will be exams for every course, and you have to pass them to get your certificate. To pass successfully, you must get 90% marks. Once you pass the exams, you will receive hardcopy certificates. These certificates will prove that you're an expert in the subject. Step 4: CV Revamping Our team of professionals will build you a compelling CV and LinkedIn profile. We'll ensure it presents your skills and qualifications effectively and is tailored to the needs and expectations of the programming/development industry. With these powerful tools in hand, you'll be fully prepared to tackle job interviews confidently. Step 5: Building Network and Submitting CV We understand the power of casting a wide net. We'll strategically submit your CV to various platforms and networks, expanding your reach and connecting you with valuable opportunities that align with your career goals. We will also make connections with many high-profile individuals and companies through your LinkedIn profile. Step 6: Interview Preparation With your CV ready, we'll move on to interview preparation. Gain exclusive access to our database of potential interview questions. Through simulated interviews with your mentor, you'll practice your responses and receive valuable feedback to further refine your skills. Step 7: Securing Job Interviews Leveraging our partnerships with leading companies, we'll secure job interviews for you. We'll ensure you get the opportunity to showcase your skills to potential employers and get the dream job you want. Step 8: Post-Interview Support Post-interview, we'll provide a debriefing session to reflect on your performance and identify areas of improvement for future interviews if necessary. Remember, our commitment extends until you land your dream job. Step 9: Celebrate Your New Job! Once you've secured your dream job in Cyber Security, it's time to celebrate! However, our support doesn't end there. We'll provide you with ongoing career advice to ensure you continue to thrive in your new role. We're excited to accompany you on this journey to success. Enrol today, and let's get started! Your path to a successful career in Cyber Security field begins with us. CPD 1000 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Cyber Security Job Guarantee Programme Course is suitable for: Beginners with no prior programming experience who are looking to enter the world of coding. Intermediate programmers who wish to expand their skills and explore Cyber Security's extensive usage. IT professionals seeking to diversify their skill sets and stay relevant in today's tech-driven market. Data analysts and scientists who want to leverage Cyber Security's powerful libraries for their data processing needs. Students and recent graduates looking to enhance their employability in the thriving tech industry. Entrepreneurs who wish to understand and utilise Cyber Security to automate tasks and analyse data for their businesses. Anyone with a keen interest in Cyber Security and a desire to delve into its applications in diverse fields like web development, data science, machine learning, and more. Requirements No experience required. Just enrol & start learning. Career path Cyber Security Analyst: £35,000 - £85,000 annually Incident Response Specialist: £40,000 - £90,000 annually IT Support Technician: £25,000 - £55,000 annually GDPR Compliance Officer: £30,000 - £70,000 annually Cloud Security Architect: £50,000 - £120,000 annually Ethical Hacker/Penetration Tester: £35,000 - £95,000 annually Network Security Engineer: £40,000 - £100,000 annually Certificates CPD Accredited e-Certificate Digital certificate - Included CPD Accredited Framed (Hardcopy) Certificate Hard copy certificate - Included Enrolment Letter Digital certificate - Included QLS Endorsed Hard Copy Certificate Hard copy certificate - Included Student ID Card Digital certificate - Included

Network and Cyber Security Traineeship Program with Career Support & Money Back Guarantee
Delivered Online On Demand3 hours
£1,999

EC-Council Certified Cybersecurity Technician (C|CT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. Course Outline Information Security Threats and Vulnerabilities Information Security Attacks Network Security Fundamentals Identification, Authentication, and Authorization Network Security Controls: Administrative Controls Network Security Controls: Physical Controls Network Security Controls: Technical Controls Network Security Assessment Techniques and Tools Application Security Virtualization and Cloud Computing Wireless Network Security Mobile Device Security Internet of Things (IoT) and Operational Technology (OT) Security Cryptography Data Security Network Troubleshooting Network Traffic Monitoring Network Log Monitoring and Analysis Incident Response Computer Forensics Business Continuity and Disaster Recovery Risk Management

EC-Council Certified Cybersecurity Technician (C|CT)
Delivered OnlineFlexible Dates
£3,495

CertNexus Certified Cyber Secure Coder (CSC-210)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for software developers, testers, and architects who design and develop software in various programming languages and platforms, including desktop, web, cloud, and mobile, and who want to improve their ability to deliver software that is of high quality, particularly regarding security and privacy. This course is also designed for students who are seeking the CertNexus Cyber Secure Coder (CSC) Exam CSC-210 certification Overview In this course, you will employ best practices in software development to develop secure software.You will: Identify the need for security in your software projects. Eliminate vulnerabilities within software. Use a Security by Design approach to design a secure architecture for your software. Implement common protections to protect users and data. Apply various testing methods to find and correct security defects in your software. Maintain deployed software to ensure ongoing security... The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle. This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development. Identifying the Need for Security in Your Software Projects Identify Security Requirements and Expectations Identify Factors That Undermine Software Security Find Vulnerabilities in Your Software Gather Intelligence on Vulnerabilities and Exploits Handling Vulnerabilities Handle Vulnerabilities Due to Software Defects and Misconfiguration Handle Vulnerabilities Due to Human Factors Handle Vulnerabilities Due to Process Shortcomings Designing for Security Apply General Principles for Secure Design Design Software to Counter Specific Threats Developing Secure Code Follow Best Practices for Secure Coding Prevent Platform Vulnerabilities Prevent Privacy Vulnerabilities Implementing Common Protections Limit Access Using Login and User Roles Protect Data in Transit and At Rest Implement Error Handling and Logging Protect Sensitive Data and Functions Protect Database Access Testing Software Security Perform Security Testing Analyze Code to find Security Problems Use Automated Testing Tools to Find Security Problems Maintaining Security in Deployed Software Monitor and Log Applications to Support Security Maintain Security after Deployment

CertNexus Certified Cyber Secure Coder (CSC-210)
Delivered OnlineFlexible Dates
£2,085

CompTIA PenTest+ (PenTest)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities. Target students who also need to offer practical recommendations for action to properly protect information systems and their contents will derive those skills from this course. This course is also designed for individuals who are preparing to take the CompTIA PenTest+ certification exam PT0-002, or who plan to use PenTest+ as the foundation for more advanced security certifications or career roles. Individuals seeking this certification should have three to four years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management. Overview After completing this course, you will be able to plan, conduct, analyze, and report on penetration tests, including the ability to: Plan and scope penetration tests. Conduct passive reconnaissance. Perform non-technical tests to gather information. Conductive active reconnaissance. Analyze vulnerabilities. Penetrate networks. Exploit host-based vulnerabilities. Test applications. Complete post-exploit tasks. Analyze and report pen test results. Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company. 1 - Outline Lesson 1: Scoping Organization/Customer Requirements Lesson 2: Defining the Rules of Engagement Lesson 3: Footprinting and Gathering Intelligence Lesson 4: Evaluating Human and Physical Vulnerabilities Lesson 5: Preparing the Vulnerability Scan Lesson 6: Scanning Logical Vulnerabilities Lesson 7: Analyzing Scanning Results Lesson 8: Avoiding Detection and Covering Tracks Lesson 9: Exploiting the LAN and Cloud Lesson 10: Testing Wireless Networks Lesson 11: Targeting Mobile Devices Lesson 12: Attacking Specialized Systems Lesson 13: Web Application-Based Attacks Lesson 14: Performing System Hacking Lesson 15: Scripting and Software Development Lesson 16: Leveraging the Attack: Pivot and Penetrate Lesson 17: Communicating During the PenTesting Process Lesson 18: Summarizing Report Components Lesson 19: Recommending Remediation Lesson 20: Performing Post-Report Delivery Activities Additional course details: Nexus Humans CompTIA Penetration Testing Certification (PenTest Plus) - (Exam PT0-002) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Penetration Testing Certification (PenTest Plus) - (Exam PT0-002) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA PenTest+ (PenTest)
Delivered OnlineFlexible Dates
£3,295

Certified Cloud Security Professional (CCSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CCSP is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration. Overview Upon completing this course, the participants will gain valuable knowledge and skills including the ability to: - Successfully pass the CCSP exam. - Understand the fundamentals of the cloud computing architecture framework. - Understand security challenges associated with different types of cloud services. - Identify and evaluate security risks for their organization?s cloud environments. - Select and implement appropriate controls to ensure secure implementation of cloud services. - Thoroughly understand the 6 essential core domains of the CCSP common body of knowledge: 1. Architectural Concepts & Design Requirements 2. Cloud Data Security 3. Cloud Platform & Infrastructure Security 4. Cloud Application Security 5. Operations 6. Legal & Compliance The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge. 1 - Architectural Concepts and Design Requirements Cloud Computing Concepts Cloud Reference Architecture Cloud Computing Security Concepts Design Principles of Secure Cloud Computing Trusted Cloud Services 2 - Cloud Data Security CSA (Cloud Security Alliance) Cloud Data Lifecycle Cloud Data Storage Architectures Data Security Strategies Data Discovery and Classification Technologies Protecting Privacy and PII (Personally Identifiable Information) Data Rights Management Data Retention, Deletion, and Archiving Policies Auditability, Traceability, and Accountability of Data Events 3 - Cloud Platform and Infrastructure Security Cloud Infrastructure Components Cloud Infrastructure Risks Designing and Planning Security Controls Disaster Recovery and Business Continuity Management 4 - Cloud Application Security The Need for Security Awareness and Training in application Security Cloud Software Assurance and Validation Verified Secure Software SDLC (Software Development Life Cycle) Process Secure SDLC Specifics of Cloud Application Architecture Secure IAM (Identity and Access Management) Solutions 5 - Operations Planning Process for the Data Center Design Installation and Configuration of Physical Infrastructure for Cloud Environment Running Physical Infrastructure for Cloud Environment Managing Physical Infrastructure for Cloud Environment Installation and Configuration of Logical Infrastructure for Cloud Environment Running Logical Infrastructure for Cloud Environment Managing Logical Infrastructure for Cloud Environment Compliance with Regulations and Controls Risk Assessment for Logical and Physical Infrastructure Collection, Acquisition, and Preservation of Digital Evidence Managing Communication with Stakeholders 6 - Legal and Compliance Legal Requirements and Unique Risks within the Cloud Environment Relevant Privacy and PII Laws and Regulations Audit Process, Methodologies, and Required Adaptions for a Cloud Environment Implications of Cloud to Enterprise Risk Management Outsourcing and Cloud Contract Design Vendor Management

Certified Cloud Security Professional (CCSP)
Delivered OnlineFlexible Dates
£4,549

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Certified Cyber Security Pathway with Career Guarantee

By NuYew Ltd

Accelerate Your Cyber Career: Fast-Track Program with Exams, TOTUM Card & 5-Year Support. Enrol Today! Study methodOnline Duration9 months · Self-paced Access to content5 years CertificationsCompTIA A+CompTIA Network+CompTIA Security+CompTIA IT Fundamentals CertificationCompTIA CySA+CompTIA PenTest+ Certificates Official CompTIA Certification - Free Additional info Exam(s) / assessment(s) is included in price Tutor is available to students TOTUM card included in price Job guarantee programme is included in this course Overview Learn the most in-demand digital skills in the world today with the Nuyew Tech Academy With the increase in cyberattacks and the number of new connected devices, the need for skilled cybersecurity professionals is growing at a rapid pace, and cybersecurity professionals must nurture their practical, hands-on skills. If you are looking for employment in cybersecurity, then this programme will provide you with an endorsement of your skills that is respected globally and industry-wide. Certifications CompTIA A+ CompTIA Network+ CompTIA Security+ CompTIA IT Fundamentals Certification CompTIA CySA+ CompTIA PenTest+ Awarded by CompTIA Description With a national shortage of Cyber Security Engineers, starting salaries of up to £25,000 per annum (average UK Salary £72,500) and amazing future employed and self-employed career prospects, take the next step today with our Fast Track Cyber Security Programme. What you can expect from our Fast Track Programme: World Class Education Energetic and unlimited 24/7 Student Support Real, tangible Career Outcomes 5 Years Career Support What our programme includes: Industry Recognised Qualifications CompTIA ITF+ (IT Fundamentals) CompTIA A+ CompTIA Network+ CompTIA Security+ CompTIA CySA+ OR CompTIA PenTest+ Exams Includes all Exams and Unlimited Re-Sits 5 Years Career Support Guarantee As part of our unique Support Guarantee, our Career Support Team will assist you with: CV writing Expert careers advice Interview preparation Identifying and applying for the best opportunities in your area As a student in the Nuyew Tech Academy you will also be given exclusive access to our AdvancedCareer Skills Academy which includes advanced courses on Employability, CV Preparation, Interview Skills and Technique and everything else you need to get ready for your new Career. Who is this course for? This course is open to anyone interested in pursuing a Career in Cyber Security. Our Foundation Level provides the flexibility for us to accommodate students with any level of previous knowledge and experience. Requirements This course is open to all and has no pre-requisites All you need is a passion for technology and a strong desire to succeed. Career path Our programme is designed to enable you to achieve an Entry Level/Helpdesk role during training (£18k-£24K) ensuring that you also have the vital work experience required to enter the Tech Industry at a higher level (Av Salary £72.5K). Our Career Support Guarantee gives you exclusive access to our dedicated Career Support Team and Advanced Career Skills Academy for 5 Years following Graduation. Certificates Official CompTIA Certification Hard copy certificate - Included We provide Official CompTIA Certificates for all courses included (ITF+, A+(2), Network+, Security+, CySA+ or PenTest+.

Certified Cyber Security Pathway with Career Guarantee
Delivered Online On Demand1 hour
£3,196

Certified Data Centre Expert (CDCE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional, who are involved in the design/build, renovation or relocation of a mission-critical data centre. Overview This 5-day course is designed to prepare participants to analyse a given business case and perform technical evaluation for a project plan and a set of designs for the implementation of a mission critical data centre. The course also engages participants in product evaluations and demonstrates how to select equipment and develop equipment test scripts (IET) and integrated performance and validation testing (IPVT). CDCE© builds upon knowledge gained in CDCP and CDCS courses. Participants who pass the exam will join the industry's elite data centre project design experts. CDCE© is the highest level training in the EPI Design and Build training track under the EPI Data Centre Training Framework. Participants must hold a valid CDCS certificate in order to be able to register for the CDCE class. CDCE© is the premier certification for data centre professionals in the data centre design/build and related fields. Data Centre Life Cycle Data centre lifecycle stages and phases Exercise: Stage/Phase/Milestone/Document mapping Design Preparation Creation of a SON ? Statement Of Need Technology review Conceptual sizing How to calculate for computer room space How to calculate facility space How to calculate incoming power Exercise: Conceptual sizing building and power Analysing capacity of existing facility Analysing investment options Site selection Permits and approvals Exercise: Site selection Conceptual design Budget and project timeline Business case preparation Project delivery structure Project management options Project manager and team Design Planning OSRA?Operational Systems Requirement Analysis TFRA?Technical Facilities Requirement Analysis Operations and maintenance review RFP?Request For Proposal process Vendor selection Design Development Project planning Design development PDR ? Preliminary Design Review Equipment selection FDR/V ? Final Design Review/Validation Exercise: Full design validation of power, cooling, floor plans, fire suppression Design freeze and LLTI Creation of construction documents BOM/BOQ ? Bill Of Material/Bill Of Quantity Exercise: Equipment selection Acquire Requirements of purchase orders Shipping terms FWT/FAT ? Factory Witness Test/Factory Acceptance Test Sequencing Incoming goods inspection and handling Asset management Construct Temporary essential services Erection of the building Permanent essential services Building inspection Snag list COF?Certificate Of Fitness Fit-Out Fit-Out Builders cleaning As-Built Drawings Test & Commissioning IET?Individual Equipment Test IPVT/IST?Integrated Performance Verification Test/Integrated Systems Test Common mistakes with IET/IPVT Deep cleaning Exercise: IET/IPVT scripting Hand-Over Facility hand-over requirements and documents PCC?Practical Completion Certificate DLP?Defect Liability Period Defect Management ICT Systems Installation ICT Systems Testing Hand-Over/DLP Expiry FCC?Final Completion Certificate Retirement Reasons and definitions of retirement Building the business case and project plan Sequencing Transfer of site Demolishing of site Legal matters FCC?Final Completion Certificate Exam: Certified Data Centre Expert (CDCE©) The CDCE© exam is in two parts: Part A is a 90-minute closed book exam, with 60 multiple-choice questions. For Part A, the candidate requires a minimum of 45 correct answers to pass the exam. Part B is a 90-minute closed book exam, with 25 open questions. For Part B the candidate needs to obtain a minimum of 75% to pass. Additional course details: Nexus Humans Certified Data Centre Expert (CDCE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Centre Expert (CDCE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Data Centre Expert (CDCE)
Delivered OnlineFlexible Dates
£3,500

Educators matching "Certified Cyber Professional (CCP)"

Show all 1