• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5588 Computing & IT courses in Morpeth delivered Online

CompTIA CySA+ Cybersecurity Analyst (CS0-002)

4.9(27)

By Apex Learning

Overview The demand for skilled cybersecurity professionals is soaring in today's digital landscape. The CompTIA CySA+ Cybersecurity Analyst (CS0-002) course is your gateway to a lucrative and rewarding career in this high-demand industry. This course delves deep into various aspects of cybersecurity, from threat analysis and vulnerability identification to incident response and digital forensics. It's designed to ensure you're ready to excel in the field. This course covers various topics, including threat intelligence, vulnerability identification, incident response, and forensics analysis.  With 60+ hours of engaging content, our expert instructors will equip you with the knowledge and skills required to excel in the CompTIA CySA+ certification exam and kickstart your career in cybersecurity. Enrol in the CompTIA CySA+ Cybersecurity Analyst (CS0-002) course today and secure your future in this high-demand industry! How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA CySA+ Cybersecurity Analyst (CS0-002). It is available to all students, of all academic backgrounds. Requirements Our CompTIA CySA+ Cybersecurity Analyst (CS0-002) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 22 sections • 96 lectures • 11:35:00 total length •Introduction: 00:02:00 •All about the Exam: 00:08:00 •What's New on the CompTIA CySA+ Exam?: 00:05:00 •Meet the Instructors: 00:02:00 •Thinking like the Enemy: 00:09:00 •Tools of the Trade: 00:08:00 •Intelligence Sources and Confidence Levels: 00:08:00 •Threat Indicators and Actors: 00:08:00 •Threat Trends: 00:07:00 •Intelligence Cycle and ISACs: 00:06:00 •Attack Frameworks: 00:06:00 •Threat Research: 00:11:00 •Threat Modeling and Intelligence Sharing: 00:06:00 •Vulnerability Identification: 00:07:00 •Scanning Parameters and Criteria: 00:09:00 •Scanning Special Considerations: 00:06:00 •Validation: 00:03:00 •Remediation and Mitigation: 00:08:00 •Inhibitors to Remediation: 00:07:00 •Web Applications Scanners, Part 1: 00:10:00 •Web Applications Scanners, Part 2: 00:05:00 •Scanning: 00:06:00 •Configuring and Executing Scans: 00:08:00 •Vulnerability Scanning: 00:10:00 •Reverse Engineering: 00:08:00 •Enumeration: 00:06:00 •Wireless Assessment Tools: 00:08:00 •Cloud Assessment Tools: 00:04:00 •Mobile and IoT: 00:10:00 •Embedded and Firmware Systems (RTOS, SoC, and FPGA): 00:09:00 •Access and Vehicles Risk: 00:08:00 •Automation and Control Risk: 00:10:00 •Cloud Models: 00:07:00 •Remote Service Invocation (FaaS, IaC, API): 00:10:00 •Cloud Vulnerabilities: 00:06:00 •Injection and Overflow Attacks: 00:09:00 •Injection and Overflow Attacks: 00:09:00 •Exploits: 00:08:00 •Application Vulnerabilities, Part 1: 00:08:00 •Application Vulnerabilities, Part 2: 00:07:00 •Network Architecture and Asset Management: 00:09:00 •Protecting Your Territory: 00:05:00 •Identity and Access Management: 00:11:00 •Encryption and Active Defense: 00:08:00 •Platforms: 00:07:00 •SOA and DevSecOps: 00:09:00 •Secure Software Development: 00:08:00 •Best Coding Practices: 00:04:00 •Trusted Hardware: 00:10:00 •Hardware Encryption: 00:04:00 •Hardware Security: 00:08:00 •Data Analytics: 00:10:00 •Endpoint Security: 00:08:00 •Recon Results, Part 1: 00:13:00 •Recon Results, Part 2: 00:05:00 •Impact Analysis: 00:05:00 •Collective Tools: 00:09:00 •Query Writing: 00:07:00 •E-mail Analysis, Part 1: 00:10:00 •E-mail Analysis, Part 2: 00:08:00 •Permissions: 00:09:00 •Firewalls: 00:08:00 •Intrusion Prevention Rules: 00:05:00 •DLP and Endpoint Detection: 00:05:00 •Threat Hunting and the Hypothesis: 00:06:00 •Threat Hunting Process: 00:07:00 •Results and Benefits: 00:05:00 •Workflow and Scripting: 00:07:00 •API and Malware Signature Creation: 00:08:00 •Threat Feeds and Machine Learning: 00:06:00 •Protocols, Standards, and Software Engineering: 00:05:00 •IR Roles and Responsibilities: 00:08:00 •IR Active Preparation: 00:10:00 •Incident Response Process: 00:07:00 •Network Symptoms: 00:04:00 •Host Symptoms: 00:08:00 •Application Symptoms: 00:04:00 •Digital Forensics: 00:10:00 •Seizure and Acquisitions: 00:05:00 •Forensics Acquisition Tools: 00:09:00 •Mobile, Virtualization, and Cloud: 00:06:00 •Forensics Analysis, Part 1: 00:04:00 •Forensics Analysis, Part 2: 00:08:00 •Packet Capture: 00:12:00 •Data Privacy and Security: 00:06:00 •Nontechnical Controls: 00:09:00 •Technical Controls: 00:08:00 •Business Impact Analysis: 00:05:00 •Risk Identification: 00:05:00 •Risk Calculation and Communication: 00:06:00 •Training: 00:04:00 •Supply Chain Assessment: 00:04:00 •Frameworks: 00:13:00 •Policies and Procedures: 00:05:00 •Controls and Procedures: 00:08:00 •Verification: 00:06:00

CompTIA CySA+ Cybersecurity Analyst (CS0-002)
Delivered Online On Demand11 hours 35 minutes
£12

Data Science & Machine Learning with Python

4.9(27)

By Apex Learning

Overview This comprehensive course on Data Science & Machine Learning with Python will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Data Science & Machine Learning with Python comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Data Science & Machine Learning with Python. It is available to all students, of all academic backgrounds. Requirements Our Data Science & Machine Learning with Python is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 2 sections • 90 lectures • 10:24:00 total length •Course Overview & Table of Contents: 00:09:00 •Introduction to Machine Learning - Part 1 - Concepts , Definitions and Types: 00:05:00 •Introduction to Machine Learning - Part 2 - Classifications and Applications: 00:06:00 •System and Environment preparation - Part 1: 00:08:00 •System and Environment preparation - Part 2: 00:06:00 •Learn Basics of python - Assignment 1: 00:10:00 •Learn Basics of python - Assignment 2: 00:09:00 •Learn Basics of python - Functions: 00:04:00 •Learn Basics of python - Data Structures: 00:12:00 •Learn Basics of NumPy - NumPy Array: 00:06:00 •Learn Basics of NumPy - NumPy Data: 00:08:00 •Learn Basics of NumPy - NumPy Arithmetic: 00:04:00 •Learn Basics of Matplotlib: 00:07:00 •Learn Basics of Pandas - Part 1: 00:06:00 •Learn Basics of Pandas - Part 2: 00:07:00 •Understanding the CSV data file: 00:09:00 •Load and Read CSV data file using Python Standard Library: 00:09:00 •Load and Read CSV data file using NumPy: 00:04:00 •Load and Read CSV data file using Pandas: 00:05:00 •Dataset Summary - Peek, Dimensions and Data Types: 00:09:00 •Dataset Summary - Class Distribution and Data Summary: 00:09:00 •Dataset Summary - Explaining Correlation: 00:11:00 •Dataset Summary - Explaining Skewness - Gaussian and Normal Curve: 00:07:00 •Dataset Visualization - Using Histograms: 00:07:00 •Dataset Visualization - Using Density Plots: 00:06:00 •Dataset Visualization - Box and Whisker Plots: 00:05:00 •Multivariate Dataset Visualization - Correlation Plots: 00:08:00 •Multivariate Dataset Visualization - Scatter Plots: 00:05:00 •Data Preparation (Pre-Processing) - Introduction: 00:09:00 •Data Preparation - Re-scaling Data - Part 1: 00:09:00 •Data Preparation - Re-scaling Data - Part 2: 00:09:00 •Data Preparation - Standardizing Data - Part 1: 00:07:00 •Data Preparation - Standardizing Data - Part 2: 00:04:00 •Data Preparation - Normalizing Data: 00:08:00 •Data Preparation - Binarizing Data: 00:06:00 •Feature Selection - Introduction: 00:07:00 •Feature Selection - Uni-variate Part 1 - Chi-Squared Test: 00:09:00 •Feature Selection - Uni-variate Part 2 - Chi-Squared Test: 00:10:00 •Feature Selection - Recursive Feature Elimination: 00:11:00 •Feature Selection - Principal Component Analysis (PCA): 00:09:00 •Feature Selection - Feature Importance: 00:07:00 •Refresher Session - The Mechanism of Re-sampling, Training and Testing: 00:12:00 •Algorithm Evaluation Techniques - Introduction: 00:07:00 •Algorithm Evaluation Techniques - Train and Test Set: 00:11:00 •Algorithm Evaluation Techniques - K-Fold Cross Validation: 00:09:00 •Algorithm Evaluation Techniques - Leave One Out Cross Validation: 00:05:00 •Algorithm Evaluation Techniques - Repeated Random Test-Train Splits: 00:07:00 •Algorithm Evaluation Metrics - Introduction: 00:09:00 •Algorithm Evaluation Metrics - Classification Accuracy: 00:08:00 •Algorithm Evaluation Metrics - Log Loss: 00:03:00 •Algorithm Evaluation Metrics - Area Under ROC Curve: 00:06:00 •Algorithm Evaluation Metrics - Confusion Matrix: 00:10:00 •Algorithm Evaluation Metrics - Classification Report: 00:04:00 •Algorithm Evaluation Metrics - Mean Absolute Error - Dataset Introduction: 00:06:00 •Algorithm Evaluation Metrics - Mean Absolute Error: 00:07:00 •Algorithm Evaluation Metrics - Mean Square Error: 00:03:00 •Algorithm Evaluation Metrics - R Squared: 00:04:00 •Classification Algorithm Spot Check - Logistic Regression: 00:12:00 •Classification Algorithm Spot Check - Linear Discriminant Analysis: 00:04:00 •Classification Algorithm Spot Check - K-Nearest Neighbors: 00:05:00 •Classification Algorithm Spot Check - Naive Bayes: 00:04:00 •Classification Algorithm Spot Check - CART: 00:04:00 •Classification Algorithm Spot Check - Support Vector Machines: 00:05:00 •Regression Algorithm Spot Check - Linear Regression: 00:08:00 •Regression Algorithm Spot Check - Ridge Regression: 00:03:00 •Regression Algorithm Spot Check - Lasso Linear Regression: 00:03:00 •Regression Algorithm Spot Check - Elastic Net Regression: 00:02:00 •Regression Algorithm Spot Check - K-Nearest Neighbors: 00:06:00 •Regression Algorithm Spot Check - CART: 00:04:00 •Regression Algorithm Spot Check - Support Vector Machines (SVM): 00:04:00 •Compare Algorithms - Part 1 : Choosing the best Machine Learning Model: 00:09:00 •Compare Algorithms - Part 2 : Choosing the best Machine Learning Model: 00:05:00 •Pipelines : Data Preparation and Data Modelling: 00:11:00 •Pipelines : Feature Selection and Data Modelling: 00:10:00 •Performance Improvement: Ensembles - Voting: 00:07:00 •Performance Improvement: Ensembles - Bagging: 00:08:00 •Performance Improvement: Ensembles - Boosting: 00:05:00 •Performance Improvement: Parameter Tuning using Grid Search: 00:08:00 •Performance Improvement: Parameter Tuning using Random Search: 00:06:00 •Export, Save and Load Machine Learning Models : Pickle: 00:10:00 •Export, Save and Load Machine Learning Models : Joblib: 00:06:00 •Finalizing a Model - Introduction and Steps: 00:07:00 •Finalizing a Classification Model - The Pima Indian Diabetes Dataset: 00:07:00 •Quick Session: Imbalanced Data Set - Issue Overview and Steps: 00:09:00 •Iris Dataset : Finalizing Multi-Class Dataset: 00:09:00 •Finalizing a Regression Model - The Boston Housing Price Dataset: 00:08:00 •Real-time Predictions: Using the Pima Indian Diabetes Classification Model: 00:07:00 •Real-time Predictions: Using Iris Flowers Multi-Class Classification Dataset: 00:03:00 •Real-time Predictions: Using the Boston Housing Regression Model: 00:08:00 •Resources - Data Science & Machine Learning with Python: 00:00:00

Data Science & Machine Learning with Python
Delivered Online On Demand10 hours 24 minutes
£12

Computer Science With Python

4.9(27)

By Apex Learning

Overview This comprehensive course on Computer Science With Python will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Computer Science With Python comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Computer Science With Python. It is available to all students, of all academic backgrounds. Requirements Our Computer Science With Python is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 5 sections • 152 lectures • 04:54:00 total length •Introduction: 00:03:00 •Quiz 1: 00:02:00 •Quiz 1 Solution: 00:01:00 •What is Programming: 00:03:00 •Quiz 2: 00:01:00 •Quiz 2 Solution: 00:01:00 •Meeting the interpreter and Problem Quiz 3: 00:01:00 •Quiz 3 solution: 00:01:00 •Congratulations: 00:01:00 •Why programming and Quiz 4: 00:02:00 •Quiz 4 Solution: 00:03:00 •Grammar and Python Rules: 00:04:00 •Backus Naur Form: 00:03:00 •Quiz 4 part 2: 00:01:00 •Quiz 4 part 2 Solution: 00:01:00 •Python Grammar and Quiz 5: 00:05:00 •Quiz 5 Solution: 00:03:00 •Quiz 6: 00:01:00 •Quiz 6 Solution: 00:02:00 •Processors: 00:02:00 •Introducing Variables: 00:05:00 •Variables Quiz 7: 00:02:00 •Variables Can Vary: 00:03:00 •Variables Quiz 8: 00:01:00 •Quiz 8 Solution: 00:01:00 •Variables Quiz 9: 00:01:00 •Quiz 9 Solution: 00:01:00 •Variables Quiz 10: 00:01:00 •Quiz 10 Solution: 00:03:00 •Introducing Strings: 00:04:00 •Using Strings Quiz 11: 00:01:00 •Quiz 11 Solution: 00:03:00 •Strings and Numbers - String Concatenation Quiz Solution: 00:03:00 •String indexing: 00:02:00 •Quiz 13: 00:01:00 •Quiz 13 Solution: 00:03:00 •String subsequences: 00:04:00 •String subsequences quiz 14: 00:01:00 •Quiz 14 solution: 00:02:00 •Understanding selection quiz 15: 00:01:00 •Quiz 15 solution: 00:04:00 •Finding string in string quiz 16: 00:04:00 •Quiz 16 solution: 00:02:00 •Testing and quiz 17: 00:02:00 •Quiz 17 solution: 00:03:00 •Find With Parameter Quiz 18: 00:02:00 •Quiz 18 solution: 00:01:00 •Extracting links from a web page Quiz 19: 00:03:00 •Extracting links from a web page Quiz 19 Solution: 00:02:00 •Final Quiz: 00:01:00 •Final Quiz Solution: 00:02:00 •Congratulations: 00:01:00 •Unit Overview: 00:03:00 •Procedural Abstraction: 00:03:00 •Introducing Procedures: 00:04:00 •Procedure code quiz 1: 00:04:00 •Quiz 1 Solution: 00:01:00 •Output and quiz 2: 00:01:00 •Quiz 2 Solution: 00:02:00 •Return Statement and Quiz 3: 00:03:00 •Quiz 3 solution: 00:02:00 •Inc Procedure Quiz 4: 00:01:00 •Quiz 4 Solution: 00:01:00 •Sum Procedure and Quiz 5: 00:01:00 •Quiz 5 Solution: 00:02:00 •Sum procedure with a return statement: 00:02:00 •Square procedure quiz 6: 00:01:00 •Quiz 6 Solution: 00:02:00 •Sum 3 Quiz 7: 00:01:00 •Quiz 7 Solution: 00:02:00 •Double string procedure quiz 8: 00:01:00 •Quiz 8 Solution: 00:01:00 •Find second quiz 9: 00:02:00 •Quiz 9 Solution: 00:02:00 •Equality Comparison Quiz 10: 00:04:00 •Quiz 10 Solution: 00:01:00 •If statement quiz 11: 00:03:00 •Quiz 11 Solution: 00:03:00 •Is friend quiz 12: 00:02:00 •Quiz 12 solution: 00:02:00 •Is friend quiz 13: 00:02:00 •Quiz 13 Solution: 00:02:00 •The Or construct: 00:03:00 •Quiz 14 solution: 00:06:00 •While loop quiz 15: 00:05:00 •Quiz 15 solution: 00:03:00 •While loop quiz 16: 00:01:00 •Quiz 16 solution: 00:02:00 •Print numbers quiz 17: 00:01:00 •Quiz 17 solution: 00:02:00 •Factorial quiz 18: 00:02:00 •Quiz 18 solution: 00:02:00 •Break quiz 19: 00:04:00 •Quiz 19 solution: 00:03:00 •Quiz 20: 00:05:00 •Quiz 20 Solution: 00:01:00 •No links quiz 21: 00:01:00 •Print all links quiz 21 solution: 00:03:00 •Final Quiz: 00:01:00 •Final Quiz Solution: 00:02:00 •Unit Overview: 00:03:00 •Stooges and quiz 1: 00:01:00 •Quiz 1 Solution: 00:01:00 •Countries quiz: 00:01:00 •Quiz 3 solution: 00:01:00 •Relative Size Quiz: 00:01:00 •Quiz 4 Solution: 00:01:00 •Lists Mutation: 00:01:00 •Different Stooges quiz: 00:01:00 •Quiz 5 Solution: 00:01:00 •Secret Agent Man Quiz: 00:01:00 •Replace Spy Quiz: 00:01:00 •Quiz 7 Solution: 00:03:00 •Python List Addition and Length: 00:02:00 •List Operations In Python: 00:02:00 •Python lists length quiz: 00:01:00 •Quiz 8 Solution: 00:01:00 •Append Quiz: 00:01:00 •Hard drive quiz: 00:01:00 •Quiz 11 Solution: 00:01:00 •Python Loops on Lists Quiz: 00:02:00 •Quiz 12 solution: 00:02:00 •Python For loops: 00:03:00 •Sum List Quiz: 00:01:00 •Measure a String Quiz: 00:01:00 •Find Element Quiz: 00:02:00 •Quiz 15 solution: 00:04:00 •Quiz 16 solution: 00:01:00 •Python Union Procedure Quiz: 00:01:00 •Quiz 17 solution: 00:01:00 •Pop in Python Quiz 18: 00:02:00 •Quiz 18 solution: 00:03:00 •Collecting Links: 00:01:00 •Get All Links: 00:02:00 •Starting Get All Links Quiz: 00:01:00 •Quiz 19 solution: 00:01:00 •Updating Links Quiz: 00:01:00 •Quiz 20 Solution: 00:01:00 •Finishing Get All Links Quiz: 00:01:00 •Quiz 21 Solution: 00:01:00 •Finishing the Python Web Crawler: 00:03:00 •Crawling Process Quiz: 00:01:00 •Quiz 22 Solution: 00:01:00 •Crawl Web Quiz: 00:01:00 •Quiz 23 Solution: 00:01:00 •Crawl Web Loop Quiz: 00:01:00 •Quiz 24 Solution: 00:02:00 •Crawl If Quiz: 00:01:00 •Quiz 25 Solution: 00:01:00 •Finishing Crawl Web and Final Quiz: 00:02:00 •Final Quiz Solution & Conclusion: 00:03:00 •Assignment - Computer Science With Python: 00:00:00

Computer Science With Python
Delivered Online On Demand4 hours 54 minutes
£12

Cyber Security Incident Handling and Incident Response

4.9(27)

By Apex Learning

Overview This comprehensive course on Cyber Security Incident Handling and Incident Response will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Cyber Security Incident Handling and Incident Response comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Cyber Security Incident Handling and Incident Response. It is available to all students, of all academic backgrounds. Requirements Our Cyber Security Incident Handling and Incident Response is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 10 sections • 13 lectures • 01:04:00 total length •Promo: 00:05:00 •1.1 Incident Handling: 00:07:00 •2.1 Preparation of People and Policy: 00:07:00 •2.2 Team Building and Management: 00:06:00 •3.1 Where Does Identification Occur?: 00:06:00 •3.2 What to Check?: 00:07:00 •4.1 Deployment and Categorisation: 00:05:00 •4.2 Short-term and Long-term Actions: 00:05:00 •5.1 Restoring and Improving Defenses: 00:05:00 •6.1 Validation and Monitoring: 00:06:00 •7.1 Meet, Fix, and Share: 00:05:00 •Resources - Cyber Security Incident Handling and Incident Response: 00:00:00 •Assignment - Cyber Security Incident Handling and Incident Response: 00:00:00

Cyber Security Incident Handling and Incident Response
Delivered Online On Demand1 hour 4 minutes
£12

Computer Networks Security

4.9(27)

By Apex Learning

Overview This comprehensive course on Computer Networks Security will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Computer Networks Security comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Computer Networks Security. It is available to all students, of all academic backgrounds. Requirements Our Computer Networks Security is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 12 sections • 52 lectures • 08:08:00 total length •Introduction: 00:10:00 •1.1 Computer Network: 00:11:00 •1.2 Computer Network Topologies: 00:11:00 •1.3 Categories of Computer Network: 00:10:00 •1.4 Computer Network Devices: 00:11:00 •1.5 Transmission Media: 00:09:00 •2.1 ISO/OSI Model: 00:10:00 •2.2 Application, Presentation, and Session Layers: 00:12:00 •2.3 Transport and Network Layers: 00:11:00 •2.4 Data Link and Physical Layers: 00:09:00 •2.5 ISO/OSI Model in Action: 00:10:00 •3.1 Introduction to Computer Networks Protocols: 00:11:00 •3.2 IP Protocol: 00:13:00 •3.3 TCP and UDP Protocols: 00:12:00 •3.4 Application Protocols: 00:12:00 •3.5 TCP/IP Characteristics and Tools: 00:11:00 •4.1 Wireless Networks Benefits: 00:09:00 •4.2 Types of Wireless Networks: 00:12:00 •4.3 Wireless Networks Protocol (Wi-Fi): 00:07:00 •4.4 Wireless Networks Devices: 00:10:00 •4.5 Wireless Networks Drawbacks: 00:09:00 •5.1 Security Goals: 00:09:00 •5.2 Securing the Network Design: 00:10:00 •5.3 TCP/IP Security and Tools: 00:12:00 •5.4 Port Scanning and Tools: 00:11:00 •5.5 Sniffing and Tools: 00:10:00 •6.1 Reasons to Use Firewall: 00:13:00 •6.2 Firewalls Rules: 00:11:00 •6.3 Firewalls Filtering: 00:09:00 •6.4 Honeypots: 00:07:00 •6.5 Bypassing Firewalls: 00:08:00 •7.1 Intrusion Detection System: IDS: 00:11:00 •7.2 Network IDS: NIDS: 00:06:00 •7.3 NIDS Challenges: 00:09:00 •7.4 Snort as NIDS: 00:08:00 •7.5 Intrusion Prevention Systems: IPS: 00:07:00 •8.1 Wired Equivalent Privacy WEP Attacking: 00:11:00 •8.2 WPA and AES Protocols: 00:09:00 •8.3 Wireless Security Misconceptions: 00:09:00 •8.4 Wireless Attacks and Mitigation: 00:09:00 •8.5 Secure Network Design with Wireless: 00:09:00 •9.1 Physical Security Objectives: 00:11:00 •9.2 Physical Threats and Mitigation: 00:11:00 •9.3 Defense in Depth (DiD): 00:07:00 •9.4 Incident: 00:06:00 •9.5 Incident Handling: 00:14:00 •10.1 Confidentiality, Integrity, and Availability (CIA): 00:06:00 •10.2 Assets, Threats, and Vulnerabilities: 00:04:00 •10.3 Risks and Network Intrusion: 00:06:00 •10.4 Common Attacks: 00:09:00 •10.5 Security Recommendations: 00:06:00 •Assignment - Computer Networks Security: 00:00:00

Computer Networks Security
Delivered Online On Demand8 hours 8 minutes
£12

Bash Scripting, Linux and Shell Programming

4.9(27)

By Apex Learning

Overview This comprehensive course on Bash Scripting, Linux and Shell Programming will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Bash Scripting, Linux and Shell Programming comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Bash Scripting, Linux and Shell Programming. It is available to all students, of all academic backgrounds. Requirements Our Bash Scripting, Linux and Shell Programming is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 11 sections • 61 lectures • 03:03:00 total length •Introduction: 00:02:00 •Bash vs Shell vs Command Line vs Terminal: 00:06:00 •Listing Folder Contents (ls): 00:05:00 •Print Current Folder (pwd): 00:01:00 •Change Folder (cd): 00:03:00 •Using A Stack To Push Folders (pushd/popd): 00:03:00 •Check File Type (file): 00:01:00 •Find File By Name (locate) & Update Locate Database (updatedb): 00:02:00 •Find A Command (which): 00:02:00 •Show Command History (history): 00:02:00 •Show Manual Descriptions (whatis): 00:01:00 •Search Manual (apropos): 00:02:00 •Reference Manuals (man): 00:02:00 •Creating A Folder (mkdir): 00:02:00 •Creating A File (touch): 00:02:00 •Copy Files/Folders (cp): 00:02:00 •Move & Rename Files/Folders (mv): 00:02:00 •Delete Files/Folders (rm): 00:02:00 •Delete Empty Folder (rmdir): 00:02:00 •Change File Permissions (chmod): 00:06:00 •File Concatenation (cat): 00:03:00 •File Perusal Filter (more/less): 00:02:00 •Terminal Based Text Editor (nano): 00:03:00 •Run Commands As A Superuser (sudo): 00:03:00 •Change User (su): 00:03:00 •Show Effecter User and Group IDs (id): 00:02:00 •Kill A Running Command (ctrl + c): 00:02:00 •Kill All Processes By A Name (killall): 00:02:00 •Logging Out Of Bash (exit): 00:01:00 •Tell Bash That There Is No More Input (ctrl + d): 00:02:00 •Clear The Screen (ctr + l): 00:02:00 •Zoom In (ctrl + +): 00:02:00 •Zoom Out (ctrl + -): 00:02:00 •Moving The Cursor: 00:02:00 •Deleting Text: 00:04:00 •Fixing Typos: 00:03:00 •Cutting and Pasting: 00:03:00 •Character Capitalisation: 00:03:00 •Bash File Structure: 00:03:00 •Echo Command: 00:04:00 •Comments: 00:04:00 •Variables: 00:06:00 •Strings: 00:06:00 •While Loop: 00:04:00 •For Loop: 00:04:00 •Until Loop: 00:03:00 •Break & Continue: 00:03:00 •Get User Input: 00:02:00 •If Statement: 00:09:00 •Case Statements: 00:06:00 •Get Arguments From The Command Line: 00:04:00 •Functions: 00:05:00 •Global vs Local Variables: 00:03:00 •Arrays: 00:06:00 •Shell & Environment Variables: 00:06:00 •Scheduled Automation: 00:03:00 •Aliases: 00:03:00 •Wildcards: 00:03:00 •Multiple Commands: 00:02:00 •Resource: 00:00:00 •Assignment - Bash Scripting, Linux and Shell Programming@@: 00:00:00

Bash Scripting, Linux and Shell Programming
Delivered Online On Demand3 hours 3 minutes
£12

Certified Information Systems Security Professional (CISSP)

4.9(27)

By Apex Learning

Overview This comprehensive course on Certified Information Systems Security Professional (CISSP) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Certified Information Systems Security Professional (CISSP) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Certified Information Systems Security Professional (CISSP). It is available to all students, of all academic backgrounds. Requirements Our Certified Information Systems Security Professional (CISSP) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 1 sections • 8 lectures • 02:13:00 total length •Security and Risk Management: 00:24:00 •Asset Security: 00:12:00 •Security Engineering: 00:16:00 •Communication and Network Security: 00:10:00 •Identity and Access Management: 00:10:00 •Security Assessment and Testing: 00:12:00 •Security Operations: 00:36:00 •Software Development Security: 00:13:00

Certified Information Systems Security Professional (CISSP)
Delivered Online On Demand2 hours 13 minutes
£12

CyberSecurity Law Online Course

4.9(27)

By Apex Learning

Course Overview: Cybersecurity is a rapidly growing field, and the demand for qualified cybersecurity professionals is only going to increase in the years to come. This Cybersecurity Law Online Course is designed to provide you with a comprehensive understanding of cyber law and cybersecurity ethics. The course is divided into 8 modules that cover topics such as cybersecurity and trust in cyberspace, threat factors computers as a target, threats to cybersecurity by criminals and organised crimes, threats to cybersecurity by hacktivists and nation-states, cyberterrorism, an evolving threat to the deep web, and fraud. According to recent reports, the demand for cybersecurity experts in the UK has surged by over 160% in the past year alone. This presents a golden opportunity for individuals with a passion for technology and a desire to protect against cyber threats. Enrol today and start your journey to a rewarding career in cybersecurity law. Key Features of the Course: CPD certificate upon completion 24/7 Learning Assistance for uninterrupted progress Engaging and interesting learning materials Expertly designed curriculum focusing on vital cyber law concepts Who is This Course For? This CyberSecurity Law Online Course is ideal for individuals who are passionate about the intersection of law and technology. It is specifically tailored for legal professionals, IT specialists, compliance officers, business owners, and anyone seeking to enhance their understanding of cyber law and its implications. What You Will Learn: In this comprehensive CyberSecurity Law Online Course, you will gain in-depth knowledge about various aspects of Cybersecurity Law. From exploring cyber ethics and online gambling to understanding the threats posed by criminals, hacktivists, and nation-states, you will delve into the intricacies of cyberterrorism and the hidden world of the deep web. Furthermore, you will examine fraud-related issues and develop a comprehensive understanding of the legal landscape surrounding cyber security. Why Enrol in This Course: Firstly, it is a top-reviewed CyberSecurity Law Online Course with high ratings and positive feedback from learners. Secondly, the course content is regularly updated to ensure you have the most relevant and up-to-date information. Lastly, cyber security is a rapidly growing field, and by acquiring the skills taught in this course, you will position yourself as a sought-after professional in a trending industry. Requirements: There are no specific prerequisites for this CyberSecurity Law Online course. However, a basic understanding of legal concepts and familiarity with digital technology will be beneficial in comprehending the course content effectively. Career Path: Upon completing this CyberSecurity Law Online Course, you will possess the knowledge and skills for various career opportunities in cyber law. Such as: Cybersecurity Analyst (£35,000 - £60,000 per annum) Data Protection Officer (£40,000 - £70,000 per annum) Cyber Security Consultant (£45,000 - £80,000 per annum) Digital Forensics Investigator (£30,000 - £60,000 per annum) IT Risk Manager (£50,000 - £90,000 per annum) Compliance Officer (£35,000 - £60,000 per annum) Cyber Law Attorney (£50,000 - £100,000 per annum) Certification: Upon successful completion of the Cybersecurity Law Online Course, you will receive a CPD certificate. This certification serves as a testament to your expertise and commitment to professional growth in the field of cyber law. Course Curriculum 11 sections • 11 lectures • 10:40:00 total length •Introduction to Cyber Law: 00:40:00 •Cyber Law Cyber Ethics and Online Gambling: 01:20:00 •Cyber Security and Trust in Cyberspace: 01:00:00 •Threat Factors Computer as a Target: 01:50:00 •Threats to Cyber Security by Criminals and Organised Crimes: 01:40:00 •Threats to Cybersecurity by Hacktivists and Nation-States: 01:00:00 •Cyberterrorism: 00:50:00 •An Evolving Threat The Deep Web: 01:00:00 •Fraud: 00:45:00 •Jurisdiction: 00:35:00 •Assignment - CyberSecurity Law Online Course: 00:00:00

CyberSecurity Law Online Course
Delivered Online On Demand10 hours 40 minutes
£12

Cyber Security Advanced Training

4.9(27)

By Apex Learning

Overview This comprehensive course on Cyber Security Advanced Training will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Cyber Security Advanced Training comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast-track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Cyber Security Advanced Training. It is available to all students, of all academic backgrounds. Requirements Our Cyber Security Advanced Training is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 1 sections • 15 lectures • 02:05:00 total length •Introduction: 00:04:00 •Cyber Security Everything You Need to Know: 00:10:00 •Types of Cyber Attacks: 00:11:00 •What is Hacking and How to Prevent It: 00:10:00 •Types of Hackers: 00:08:00 •Types of Malwares and How to Recognize Them: 00:10:00 •How to Detect and Protect Your Business From Malware Attacks: 00:09:00 •How to Identify, Prevent and Recover from Crypto Jacking: 00:08:00 •What is Phishing and Tips to Protect from Phishing Attacks: 00:07:00 •How to Guard Yourself from Visiting Unsafe Websites: 00:10:00 •Reduce the Risk of Cyber Attacks - Top Cyber Security Practices to Prevent a breach: 00:08:00 •Latest Cyber Security Tools You Should Know: 00:10:00 •Skill Needed for Cyber Security Expert: 00:09:00 •Tips to Create an Ideal Budget in Covid Era: 00:06:00 •How Should Companies Adapt their new Security Strategy post Pandemic?: 00:05:00

Cyber Security Advanced Training
Delivered Online On Demand2 hours 5 minutes
£12

Computer Hacking Forensic Investigator

4.9(27)

By Apex Learning

Overview This comprehensive course on Computer Hacking Forensic Investigator will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Computer Hacking Forensic Investigator comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Computer Hacking Forensic Investigator. It is available to all students, of all academic backgrounds. Requirements Our Computer Hacking Forensic Investigator is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 13 sections • 25 lectures • 14:11:00 total length •Overview: 00:35:00 •Reconnaissance: 00:25:00 •Protocols: 01:26:00 •Windows Hacking: 01:19:00 •Attacking Web Technologies: 00:56:00 •Pen Testing Wireless Networks: 01:34:00 •Introduction: 00:13:00 •Computer Forensic Incidents: 00:28:00 •Investigation Process: 00:54:00 •Disk Storage Concepts: 00:31:00 •Digital Acquisition & Analysis: 00:24:00 •Forensic Examination Protocols: 00:25:00 •Digital Evidence Protocols: 00:21:00 •CFI Theory: 00:25:00 •Digital Evidence Presentation: 00:22:00 •Computer Forensic Laboratory Protocols: 00:33:00 •Computer Forensic Processing: 00:22:00 •Digital Forensics Reporting: 00:20:00 •Specialized Artifact Recovery: 00:46:00 •Discovery and ESI: 00:12:00 •Cell Phone Forensics: 00:21:00 •USB Forensics: 00:06:00 •Incident Handling: 00:36:00 •PDA Forensics: 00:23:00 •Investigating Harassment: 00:14:00

Computer Hacking Forensic Investigator
Delivered Online On Demand14 hours 11 minutes
£12