• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

522 Certified in Cybersecurity (CC) courses delivered Online

Certified Vulnerability Assessor (CVA) - Complete Video Training

4.3(43)

By John Academy

Description: This Certified Vulnerability Assessor (CVA) - Complete Video Training covers everything you need to know about becoming a Certified Vulnerability Assessor. In this course you will learn about vulnerability types, assessing the network, assessing web servers & applications, assessing remote & VPN services, vulnerability assessment tools of the trade, and output analysis. The course will help you to understand the importance of vulnerability assessments by providing intricate knowledge and skills in the Vulnerability Assessment arena. The CVA course provides foundational knowledge of general VA tools as well as popular exploits an IT engineer should be familiar with. The Certified Vulnerability Assessor (CVA) - Complete Video Training is a fundamental cybersecurity certification course that focuses on vulnerability assessments. It focuses on foundational information such as the importance of a Vulnerability Assessment and how it can help an engineer prevent serious break-ins to your organization. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Vulnerability Assessor (CVA) - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Vulnerability Assessor (CVA) - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Why Vulnerability Assessment Why Vulnerability Assessment FREE 00:46:00 Vulnerability Types Vulnerability Types 00:23:00 Assessing the Network Assessing the Network 00:40:00 Assessing Web Servers & Applications Assessing Web Servers & Applications 00:27:00 Assessing Remote & VPN Services Assessing Remote & VPN Services 00:17:00 Vulnerability Assessment Tools of the Trade Vulnerability Assessment Tools of the Trade 00:15:00 Output Analysis Output Analysis 00:12:00 Mock Exam Mock Exam- Certified Vulnerability Assessor (CVA) - Complete Video Training 00:20:00 Final Exam Final Exam- Certified Vulnerability Assessor (CVA) - Complete Video Training 00:20:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Certified Vulnerability Assessor (CVA) - Complete Video Training
Delivered Online On Demand3 hours 40 minutes
£23

Security Officer Training

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career in the technology industry and learn from the

Security Officer Training
Delivered Online On Demand4 hours 41 minutes
£25

Security Threat Management

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career in the technology industry and learn from the

Security Threat Management
Delivered Online On Demand4 hours 59 minutes
£25

Security Supervisor

4.7(160)

By Janets

The Security Supervisor is a wonderful learning opportunity for anyone who has a passion for this topic and is interested in enjoying a long career in the relevant industry. It's also for anyone who is already working in this field and looking to brush up their knowledge and boost their career with an acknowledged certificate. This Security Supervisor consists of several modules that take around 3 hours to complete. The course is accompanied by instructional videos, helpful illustrations, how-to instructions and advice. The course is offered online at a very affordable price. That gives you the ability to study at your own pace in the comfort of your home. You can access the modules from anywhere and from any device. Why Choose this Course? Earn a digital Certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Benefit from instant feedback through mock exams and multiple-choice assessments Get 24/7 help or advice from our email and live chat teams Full tutor support on weekdays Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Mock exams Multiple-choice assessment Certificate of Achievement Endorsed Certificate of Achievement from the Quality Licence Scheme Once the course has been completed and the assessment has been passed, all students are entitled to receive an endorsed certificate. This will provide proof that you have completed your training objectives, and each endorsed certificate can be ordered and delivered to your address for only £99.00. Please note that overseas students may be charged an additional £10 for postage. CPD Certificate of Achievement from Janets Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Endorsement This course and/or training programme has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course and/or training programme is not regulated by Ofqual and is not an accredited qualification. Your training provider will be able to advise you on any further recognition, for example progression routes into further and/or higher education. For further information please visit the Learner FAQs on the Quality Licence Scheme website. Method of Assessment To successfully complete the course, students will have to take an automated multiple-choice exam. This exam will be online and you will need to score 60% or above to pass the course. After successfully passing the exam, you will be able to apply for Quality Licence Scheme endorsed certificate of achievement. To verify your enhanced skills in the subject, we recommend that you also complete the assignment questions. These can be completed at any time which is convenient for yourself and will be assessed by our in-house specialised tutors. Full feedback will then be given on your current performance, along with any further advice or support. Course Content Module 01: Introduction to Security Management Introduction to Security Management 00:33:00 Module 02: Organisational Security Management Organisational Security Management 00:27:00 Module 03: Security Risk Analysis and Risk Reduction Security Risk Analysis and Risk Reduction 00:26:00 Module 04: Physical and Information Security Protection Physical and Information Security Protection 00:37:00 Module 05: Business Resilience and Crisis Management Business Resilience and Crisis Management 00:19:00 Module 06: Cyber Security and Fraud Prevention Cyber Security and Fraud Prevention 00:26:00 Module 07: Security Investigations and Threat Awareness Security Investigations and Threat Awareness 00:25:00 Mock Exam Mock Exam - Security Supervisor 00:20:00 Final Exam Final Exam - Security Supervisor 00:20:00 Assignment Assignment - Security Supervisor 2 weeks, 1 day Order Your Certificate Order your Certificate QLS 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Security Supervisor
Delivered Online On Demand3 weeks
£25

Intelligence Analyst Certification

4.7(160)

By Janets

Register on the Intelligence Analyst certificate today and build the experience, skills and knowledge you need to enhance your development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a digital certificate as a proof of your course completion. The Intelligence Analyst certificate is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Intelligence Analyst certificate Receive a e-certificate upon successful completion of the course Get taught by experienced, expert instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certificate of Achievement Endorsed Certificate of Achievement from the Quality Licence Scheme Once the course has been completed and the assessment has been passed, all students are entitled to receive an endorsed certificate. This will provide proof that you have completed your training objectives, and each endorsed certificate can be ordered and delivered to your address for only £99. Please note that overseas students may be charged an additional £10 for postage. CPD Certificate of Achievement from Janets Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Endorsement This course and/or training programme has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course and/or training programme is not regulated by Ofqual and is not an accredited qualification. Your training provider will be able to advise you on any further recognition, for example progression routes into further and/or higher education. For further information please visit the Learner FAQs on the Quality Licence Scheme website. Method of Assessment In order to ensure the Quality Licensing scheme endorsed and CPD acknowledged certificate, learners need to score at least 60% pass marks on the assessment process. After submitting assignments, our expert tutors will evaluate the assignments and give feedback based on the performance. After passing the assessment, one can apply for a certificate. Who Is This Course For The course is ideal for those who already work in this sector or are an aspiring expert. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a Certificate of Achievement to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Intelligence Analyst certificate, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Module 01: Defining Intelligence Analysis Defining Intelligence Analysis 00:48:00 Module 02: Development of Intelligence Analysis Development of Intelligence Analysis 00:51:00 Module 03: The Intelligence Cycle The Intelligence Cycle 00:37:00 Module 04: Critical Thinking and Structuring Critical Thinking and Structuring 00:41:00 Module 05: Intelligence Analysis and Best Practice Intelligence Analysis and Best Practice 01:02:00 Module 06: Intelligence and National Security Intelligence and National Security 00:47:00 Module 07: Legal Issues and Ethics Legal Issues and Ethics 00:44:00 Module 08: Your Role, Responsibilities, and Functions as an Analyst Your Role, Responsibilities, and Functions as an Analyst 00:47:00 Assignment Assignment - Intelligence Analyst Certification 2 weeks, 1 day Order Your Certificate Order your Certificate QLS 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Intelligence Analyst Certification
Delivered Online On Demand3 weeks
£25

Security Intelligence Analyst - 5 Courses Bundle

By NextGen Learning

Imagine yourself as a quiet protector, an unseen hero. You are the person who analyses information deeply to make sure everything stays safe and secure. This Security Intelligence Analyst course bundle comprising of five significant courses is designed to help you become this kind of hero in a theory-focused way. As you delve deeper into this theoretical Security Intelligence Analyst course bundle, you'll unlock the secrets of security management, understanding the vital role a Security Guard plays in maintaining peace and order. You'll understand the concept of close protection and its strategic significance in safeguarding people and assets. With each lesson, you will better understand door supervising and the essence of maintaining order at entrances and exits. Further, you will be exposed to the fascinating field of criminal intelligence analysis. You'll learn to interpret patterns, predict behaviours and make informed decisions that could prevent criminal activities. This course is your gateway into the world of security intelligence, transforming you from a learner into a guardian of peace and security. Master the principles of security and open doors to an exciting career in security intelligence. The five CPD Accredited courses are: Security Management Diploma Security Guard Close Protection Door Supervising Criminal Intelligence Analyst Learning Outcomes: Understand the principles and applications of security management. Acquire knowledge about the roles and responsibilities of a security guard. Gain insights into close protection practices and procedures. Learn about the functions and duties of door supervising. Grasp the core concepts of criminal intelligence analysis. Develop a holistic understanding of the security industry. "Security Management Diploma": Understand the intricate nuances of security management, providing you with a robust foundation. "Security Guard": Dive into the theoretical realm of a security guard's responsibilities and key roles. "Close Protection": Uncover the strategic elements that go into planning and executing close protection operations. "Door Supervising": Learn about the intricacies involved in door supervising, helping maintain optimal security. "Criminal Intelligence Analyst": Decode the fundamentals of criminal intelligence, aiding in threat detection and prevention. "Theoretical Focus": A rigorous theoretical approach ensures you grasp all the concepts with clarity. "Comprehensive Course": This course is designed to cover the broad aspects of security, enhancing your understanding. "Enrol Today": Begin your journey in mastering security intelligence analysis. Your intellectual arsenal awaits. CPD 50 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals aiming for a career in the security industry. Those interested in understanding security management and its associated roles. Aspiring security intelligence analysts seeking theoretical knowledge. Professionals in the field looking to deepen their understanding of security concepts. Career path Security Manager - £30K to £50K/year. Security Guard - £18K to £25K/year. Close Protection Officer - £25K to £50K/year. Door Supervisor - £20K to £30K/year. Criminal Intelligence Analyst - £25K to £45K/year. Security Consultant - £35K to £60K/year. Certificates Certificate Of Completion Digital certificate - Included Certificate Of Completion Hard copy certificate - Included You will get a complimentary Hard Copy Certificate.

Security Intelligence Analyst - 5 Courses Bundle
Delivered Online On Demand25 hours
£39

Higher Level Security Management with IT & Cyber Security

By Training Tale

Higher Level Security Management : Security Management, IT Security & Cyber Security Enhance your future with our specialized Security Management course. Discover Security Management principles, Security Management strategies, and Security Management best practices. Acquire in-depth Security Management knowledge and practical Security Management skills. Secure your success by enrolling in our Security Management course today! Elevate your career with Security Management expertise. Elevate your career with our cutting-edge Security Management course. Dive deep into Security Management, Security Management strategies, and Security Management techniques. Equip yourself with the latest Security Management knowledge and enhance your Security Management skills. Don't miss this opportunity to excel in Security Management. Unlock your potential with our comprehensive Security Management course. Delve into Security Management theories, Security Management strategies, and Security Management practices. Acquire the essential Security Management skills and knowledge to excel in your career. Invest in your future and join our Security Management course today! Are you passionate about Security Management? Our Security Management course is designed for you! Dive deep into Security Management, learn Security Management strategies, and explore Security Management best practices. Equip yourself with the latest Security Management knowledge and skills. Don't wait, enroll in our Security Management course and advance your career in Security Management today! Bundle Courses: Course 01: Security Management Course 02: IT Security Course 03: Cyber Security Course 04: General Data Protection (GDPR) Course 05: Financial Advisor Course 06: AML: Anti-Money Laundering Course 07: Level 7 Ledership & Management Certificate of Completion of Security Management After completing the MCQ/Assignment assessment for this Security Management : Security Management, IT Security & Cyber Security course, you will be entitled to a Certificate of Completion from Training Tale. As a result, by taking this Security Management : Security Management, IT Security & Cyber Security course, you could improve your skills and knowledge. Move one step closer to realizing your objective. Who is this course for? Higher Level Security Management : Security Management, IT Security & Cyber Security This Security Management : Security Management, IT Security & Cyber Security course is perfect for anyone who wants to make it a profession or further their education in Security Management, IT Security & Cyber Security. Requirements Higher Level Security Management : Security Management, IT Security & Cyber Security There are no specific requirements for this Security Management : Security Management, IT Security & Cyber Security course because it does not require any advanced knowledge or skills. Career path Higher Level Security Management : Security Management, IT Security & Cyber Security

Higher Level Security Management with IT & Cyber Security
Delivered Online On Demand48 hours
£12

C)SLO-Certified Security Leadership Officer Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for C - Level Managers IT Managers Cyber Security Personelle Engineers Information Systems Owners ISSO's CISSP Students ISO's Overview Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam. You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture. Certified Security Leadership Officerÿ course is designed for mid and upper-level managers.ÿ If you are an engineer, this course will increase your knowledge in the leading information system security teams. Plus, the C)SLO will give you an essential understanding of current security issues, best practices, and technology. With this knowledge you will then be prepared to manage the security component of an information technology project. As a Security Leadership Officer, you will be the bridge between cybersecurity and business operations. Course Outline Security Management Risk Management Encryption Information Security Access Control Concepts Incident Handling and Evidence Operations Security Network Security Additional course details: Nexus Humans C)SLO-Certified Security Leadership Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)SLO-Certified Security Leadership Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)SLO-Certified Security Leadership Officer Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Ethical Hacking with Kali Linux

5.0(10)

By Apex Learning

Overview This comprehensive course on Ethical Hacking with Kali Linux will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Ethical Hacking with Kali Linux comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Ethical Hacking with Kali Linux. It is available to all students, of all academic backgrounds. Requirements Our Ethical Hacking with Kali Linux is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 16 sections • 150 lectures • 05:54:00 total length •Introduction to the course: 00:05:00 •Virtual box installation: 00:16:00 •Kali linux installation: 00:14:00 •Enabling full screen: 00:18:00 •Basic commands part 1: 00:10:00 •Basic commands part 2: 00:21:00 •Basic commands part 3: 00:13:00 •Changing ip address and wireless adapter setup: 00:05:00 •Creating a bootable Kali USB drive: 00:05:00 •Essential networking terms: 00:10:00 •Essential hacking terms: 00:18:00 •Additional kali tools to install: 00:09:00 •Changing our MAC address with mac changer: 00:06:00 •Google hacking: 00:13:00 •Nikto basics: 00:11:00 •Whois tools: 00:07:00 •Email harvesting: 00:06:00 •Shodan: 00:10:00 •Zone transfer with Dig: 00:08:00 •Installing Metasploitable: 00:07:00 •Nmap part 1: 00:16:00 •Nmap part 2: 00:12:00 •Nmap part 3: 00:12:00 •Zen map: 00:08:00 •TCP scans: 00:16:00 •Nmap by passing defenses: 00:17:00 •Nmap scripts part 1: 00:09:00 •Nmap scripts part 2: 00:14:00 •Installing OWASP: 00:08:00 •HTTP request: 00:10:00 •HTTP response: 00:10:00 •Burpsuite configuration: 00:13:00 •Editing packets in Burpsuite: 00:12:00 •Whatweb and Dirb: 00:10:00 •Password recovery attack: 00:16:00 •Burpsuite login bruteforce: 00:11:00 •Hydra login bruteforce: 00:09:00 •Session fixation: 00:14:00 •Injection attacks: 00:06:00 •Simple command injection: 00:11:00 •Exploiting command injection vulnerability: 00:08:00 •Finding blind command injection: 00:14:00 •SQL basics: 00:10:00 •Manual SQL injection part 1: 00:13:00 •Manual SQL injection part 2: 00:21:00 •SQL map basics: 00:17:00 •XML injection: 00:16:00 •Installing XCAT and preventing injection attacks: 00:06:00 •Reflected XSS: 00:11:00 •Stored XSS: 00:13:00 •Changing HTML code with XSS: 00:07:00 •XSSer and XSS sniper: 00:14:00 •Wireless attacking theory: 00:11:00 •Enabling monitor mode: 00:05:00 •Capturing handshake with airodump: 00:15:00 •Rockyou.txt: 00:14:00 •Cracking with aircrack: 00:16:00 •Cracking with hashcat: 00:15:00 •Creating password lists with crunch: 00:18:00 •Creating password lists with cup: 00:07:00 •Rainbow tables part 1: 00:17:00 •Rainbow tables part 2: 00:06:00 •Installing fluxion: 00:06:00 •Finding and cracking hidden networks: 00:08:00 •Preventing wireless attacks: 00:08:00 •ARP protocol basics: 00:10:00 •Man in the middle attack theory: 00:07:00 •Installing MITMf: 00:07:00 •Manual ARP spoofing: 00:13:00 •Problems while installing MITMf: 00:06:00 •HTTP traffic sniffing: 00:08:00 •DNS spoofing and HTTPS password sniffing: 00:24:00 •Hooking browser with BEEF: 00:16:00 •Screenshotting targets browser: 00:11:00 •Cloning any webpage: 00:09:00 •Ettercap basics: 00:07:00 •MFS console environment: 00:16:00 •Metasploit modules explained: 00:12:00 •Bruteforcing SSH with Metasploit: 00:15:00 •Attacking tomcat with metasploit: 00:09:00 •Getting meterpreter with command injection: 00:25:00 •PHP code injection: 00:06:00 •Metasploitable exploits: 00:07:00 •Wine installation: 00:12:00 •Creating windows payloads with Msfvenom: 00:10:00 •Encoders and Hex editors: 00:19:00 •Windows 10 meterpreter shell: 00:12:00 •Meterpreter environment: 00:11:00 •Windows 10 privilege escalation: 00:11:00 •Preventing privilege escalation: 00:06:00 •Post exploitation modules: 00:14:00 •Getting Meterpreter over Internet with port forwarding: 00:11:00 •Eternalblue exploit: 00:20:00 •Persistence module: 00:13:00 •Hacking over the internet with Ngrok: 00:10:00 •Android device hacking with venom: 00:10:00 •The real hacking begins now!: 00:02:00 •Variables: 00:14:00 •Raw input: 00:11:00 •If else statements: 00:10:00 •For loops: 00:07:00 •While loops: 00:08:00 •Python lists: 00:08:00 •Functions: 00:15:00 •Classes: 00:10:00 •Importing libraries: 00:07:00 •Files in python: 00:12:00 •Try and except the rule: 00:05:00 •Theory behind reverse shells: 00:07:00 •Simple server code: 00:13:00 •Connection with reverse shell: 00:07:00 •Sending and receiving messages: 00:11:00 •Sending messages with while true loop: 00:08:00 •Executing commands on target system: 00:10:00 •Fixing backdoor bugs and adding functions: 00:20:00 •First test using our backdoor: 00:18:00 •Trying to connect every 20 seconds: 00:12:00 •Creating persistence part 1: 00:06:00 •Creating persistence part 2: 00:17:00 •Changing directory: 00:12:00 •Uploading and downloading files: 00:22:00 •Downloading files from the internet: 00:23:00 •Starting programs using our backdoor: 00:07:00 •Capturing screenshots on the target PC: 00:19:00 •Embedding backdoor in an image part 1: 00:13:00 •Embedding backdoor in an image part 2: 00:09:00 •Checking for administrator privileges: 00:12:00 •Adding help option: 00:09:00 •Importing Pynput: 00:10:00 •Simple keylogger: 00:10:00 •Adding report function: 00:11:00 •Writing key strokes to a file: 00:14:00 •Adding the keylogger to our reverse shell part 1: 00:23:00 •Adding the keylogger to our reverse shell part 2: 00:08:00 •Final project test: 00:14:00 •Printing banner: 00:11:00 •Adding available options: 00:11:00 •Starting threads for bruteforce: 00:08:00 •Writing function to run the attack: 00:11:00 •Bruteforcing router login: 00:10:00 •Bypassing antivirus with your future programs: 00:14:00 •Sending malware with spoofed email: 00:15:00 •What will you learn in this section?: 00:03:00 •Why is ethical hacking a valuable skill?: 00:23:00 •What is the best ethical hacking certification?: 00:17:00 •Tips for getting your first job as an ethical hacker: 00:18:00 •How I started my career as an ethical hacker: 00:14:00 •How to price your work: 00:11:00 •Bonuses. Enjoy the Benefits: 01:05:00 •Assignment - Ethical Hacking with Kali Linux: 00:00:00

Ethical Hacking with Kali Linux
Delivered Online On Demand5 hours 54 minutes
£12

Diploma in Learn Ethical Hacking From A-Z: Beginner To Expert - Level 7 (QLS Endorsed)

By Kingston Open College

QLS Endorsed + CPD QS Accredited - Dual Certification | Instant Access | 24/7 Tutor Support

Diploma in Learn Ethical Hacking From A-Z: Beginner To Expert - Level 7 (QLS Endorsed)
Delivered Online On Demand12 hours
£15