• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5813 Computing courses in Wath-upon-Dearne delivered Online

Network Hacking Training

5.0(1)

By Course Gate

The goal of this Network Hacking Training is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand. The course will give you step by step instructions for insulation VirtualBox and creating your virtual environment on Windows, Mac, and Linux. You will learn how to ethically hack, protect, test, and scan your own systems. You'll also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.  By the end of this course, you will be familiar with how various types of wired and wireless network hacks are performed and you will be fully equipped to test and safegaurd a network infrastructure against various real time attack vectors. Who is this course for? Network Hacking Training is suitable for anyone who wants to gain extensive knowledge, potential experience, and professional skills in the related field. This course is CPD accredited so you don't have to worry about the quality. Requirements Our Network Hacking Training is open to all from all academic backgrounds and there are no specific requirements to attend this course. It is compatible and accessible from any device including Windows, Mac, Android, iOS, Tablets etc. CPD Certificate from Course Gate  At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. Career path This course opens a new door for you to enter the relevant job market and also gives you the opportunity to acquire extensive knowledge along with required skills to become successful. You will be able to add our qualification to your CV/resume which will help you to stand out in the competitive job industry. Course Curriculum Introduction Introduction 00:01:00 Introduction to Ethical Hacking. Footprinting and Reconnaissance Introduction to Ethical Hacking. Footprinting and Reconnaissance 00:25:00 Demo - Information Gathering using Google Dorks and DNS Queris 00:04:00 Demo - Scanning and Enumeration 00:08:00 Scanning Networks, Enumeration and Discovering Vulnearbilities Scanning and enumeration 00:09:00 Vulnerabilties Identification 00:08:00 Demo - Installing Nessus Scanner 00:03:00 Demo - Use Nessus to Discover Vulnerabilities 00:05:00 Demo - Using Nikto to discover Web Vulnerabilities 00:05:00 Demo - Using Paros for Vulnerability Discovery 00:05:00 Demo - Use Dirbuster to brute force sub-directories and filenames 00:03:00 System Hacking and Vulnerability Exploitation System hacking - vulnerability exploitation 00:06:00 Passwords 00:12:00 Authentication 00:07:00 Basics of Sniffing Sniffing 00:15:00 Metasploit Metasploit 00:17:00 Demo - Exploiting FTP Server Vulnerability using Metasploit 00:12:00 Demo - Post Exploitation Example 00:01:00 Demo - Exploiting NFS Vulnerability and exporting SSH Keys to the 00:10:00 Demo - Eploiting Samba Service on Linux using Metasploit 00:03:00 Demo - Windows backdoor using Metasploit 00:14:00 Trojans, Backdoors, Viruses and Worms Trojans and Backdoors 00:05:00 Computer viruses and worms 00:09:00 Cryptography Cryptography concepts 00:05:00 Cryptographic Algorithms 00:11:00 Cryptography and cryptanalysis tools. Cryptography attacks 00:03:00 Demo - Hack SSH passwords using Medusa 00:05:00 Hack the SSH Password using Hydra 00:05:00 Hack Linux Passwords using John the Ripper 00:03:00 Penetration Testing on Wireless Networks Penetration Testing on Wireless Networks 00:07:00 Case Study - Windows Hosted Network Bug or Feature 00:11:00 Penetration Testing Overview. Final words Penetration Testing Overview. Final Words 00:06:00 Bonus - OWASP Top 10 Vulnerabilities 00:18:00 (Bonus) Attacking the users trough websites - XSS and Beef-XSS Introduction to Cross-Site Scripting and Beef-XSS 00:08:00 XSS example - reflected 00:10:00 XSS example - stored 00:07:00 Beef-XSS Demo 00:16:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00

Network Hacking Training
Delivered Online On Demand5 hours 2 minutes
£11.99

Penetration Testing with OWASP ZAP: Mastery course

4.5(3)

By Studyhub UK

Embark on a transformative journey into the world of cybersecurity with our comprehensive 'Penetration Testing with OWASP ZAP: Mastery Course.' This immersive programme delves into the intricacies of OWASP ZAP, a powerful tool that stands as the guardian against cyber threats. From mastering the fundamentals in the introductory phase to executing advanced scripting attacks, this course promises an engaging exploration of each facet, ensuring that you emerge not only skilled but also equipped to defend against evolving security challenges. In an era where digital landscapes are fraught with vulnerabilities, this course is your gateway to becoming a proficient cybersecurity professional, armed with the expertise to safeguard digital realms. Unlock the secrets of OWASP ZAP through a meticulously crafted curriculum. Delve into the configuration nuances, discover the art of automated attacks, and unravel the intricacies of security testing. With a mix of theoretical insights and hands-on applications, this course ensures a dynamic learning experience that goes beyond traditional boundaries. Join us on this odyssey, where every module propels you closer to mastering the art of penetration testing and fortifying applications against cyber threats. Learning Outcomes Installation and Configuration Mastery: Gain proficiency in installing OWASP ZAP across multiple platforms and delve into the intricacies of its configuration, marketplace, and add-ons. Attack Strategies: Develop automated attack skills within minutes, comprehend spidering, fuzzing, and active scanning techniques to fortify applications effectively. Scripting Prowess: Acquire the ability to script attacks using Zest Script, Python, and JavaScript, enhancing your toolkit for comprehensive security testing. Tool Integration Expertise: Explore the integration of Burp Suite into ZAP strategically, and learn to invoke various applications, amplifying your capabilities in diverse security scenarios. Report Generation and Analysis: Master the art of generating reports in multiple formats, a crucial skill for communicating findings and insights effectively. Why choose this Penetration Testing with OWASP ZAP: Mastery course course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Penetration Testing with OWASP ZAP: Mastery course course for? Cybersecurity Enthusiasts IT Professionals Seeking Advanced Security Skills Developers Interested in Application Security System Administrators Ethical Hackers Career path Cybersecurity Analyst: £30,000 - £50,000 Penetration Tester: £35,000 - £60,000 Security Consultant: £40,000 - £70,000 Security Engineer: £35,000 - £55,000 Application Security Analyst: £30,000 - £50,000 Information Security Manager: £50,000 - £80,000 Prerequisites This Penetration Testing with OWASP ZAP: Mastery course does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Penetration Testing with OWASP ZAP: Mastery course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Unit 01: Introduction Things to know about OWASP ZAP 00:24:00 Unit02: Configuration Of ZAP Installing ZAP on multi platform 00:19:00 Six elements of the ZAP - Desktop UI 00:12:00 ZAP marketplace and add-ons 00:09:00 Scan policy manager - config 00:25:00 Configuration of ZAP 00:32:00 ZAP attack modes 00:16:00 Unit 03: Attacking The Application With ZAP Automated attacks within 5 minutes 00:18:00 Spidering the target 00:24:00 Fuzzing the target in action 00:24:00 Active scanning the target 00:22:00 Break points and Requestor - Repeater 00:15:00 Authentication and session management 00:25:00 Forced browsing DIRs and Files using ZAP 00:12:00 Security testing in HUD mode - Heads-up display 00:17:00 ZAP Scripting attacks & Recording Zest Script, Python, JavaScript 00:24:00 Attack Surface Detector - SAST on ASP.NET MVC application 00:18:00 Security testing with ZAP API 00:15:00 Invoking applications into ZAP 00:17:00 Invoking Burp suite into ZAP - Best strategy 00:09:00 Other useful tools add-ons inside zap 00:29:00 Generating Reports in multiple formats 00:07:00 Additional Study Materials OWASP ZAP Course Guide 00:30:00 Assignment Assignment - Penetration Testing with OWASP ZAP 00:00:00

Penetration Testing with OWASP ZAP: Mastery course
Delivered Online On Demand7 hours 23 minutes
£10.99

Java Certification Cryptography Architecture

4.5(3)

By Studyhub UK

Embark on a journey into the world of Java cryptography with our course, 'Java Certification Cryptography Architecture.' This course is designed to provide a deep dive into the critical aspects of Java's cryptographic capabilities, offering a blend of theoretical knowledge and practical application. Start with the basics in our introductory section, which sets the stage for a deeper exploration of Java Cryptography Architecture. As you progress, the course meticulously unfolds the complexities of message digest algorithms, MAC (Message Authentication Code), and PBKDF2 (Password-Based Key Derivation Function 2). This course is not just about coding; it's a comprehensive guide to understanding and implementing Java-based cryptographic solutions in real-world applications. Advance through the curriculum and discover practical examples of hashing, both simple and real-world, enhancing your ability to secure data effectively. Delve into efficient stream-based hashing and learn how to implement robust password hashing using PBKDF2. The course also includes a section on commercial wrapper libraries, demonstrating the integration of Java cryptography in commercial applications. By the conclusion of the course, you'll not only be proficient in Java Cryptography Architecture but also equipped with the skills to apply these cryptographic techniques in various professional scenarios, ensuring data security and integrity. Learning Outcomes Develop a foundational understanding of Java Cryptography Architecture. Learn to implement hashing algorithms and message digest techniques in Java. Gain expertise in creating and using MAC for data security. Master the application of PBKDF2 for secure password hashing. Understand the use of commercial wrapper libraries in Java cryptography. Why choose this Java Certification Cryptography Architecture course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Java Certification Cryptography Architecture course for? Software developers and programmers looking to specialize in Java cryptography. IT professionals seeking to enhance their data security skills. Computer science students interested in cryptography and data protection. System architects designing secure Java-based applications. Security enthusiasts keen on exploring Java's cryptographic capabilities. Career path Java Developer: £25,000 - £50,000 Software Engineer (Java): £30,000 - £60,000 Information Security Analyst: £35,000 - £70,000 Cryptography Engineer: £40,000 - £80,000 Application Security Developer: £38,000 - £75,000 Systems Architect (Java): £45,000 - £85,000 Prerequisites This Java Certification Cryptography Architecture does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Java Certification Cryptography Architecture was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Section 01: Introduction Introductory Lecture 00:02:00 Setup 00:03:00 Section 02: Java Cryptography Architecture: MessageDigest, MAC & PBKDF2 Simple Hashing Example 00:05:00 Real-world Hashing Example 00:07:00 Efficient Stream-Based Hashing 00:02:00 Message Authentication Code (MAC) 00:05:00 Secure Password Hashing with PBKDF2/PKCS#5 00:10:00 Section 03: Outro Commercial Wrapper Libraries: Demo 00:03:00 JCE Unlimited Strength Policy File Installation 00:03:00 Assignment Assignment - Java Certification Cryptography Architecture 00:00:00

Java Certification Cryptography Architecture
Delivered Online On Demand40 minutes
£10.99

Basic Security Guard Training

4.5(3)

By Studyhub UK

Overview In today's rapidly evolving world, the significance of security cannot be overstated. The 'Basic Security Guard Training' course offers a comprehensive introduction to the multifaceted realm of security, ensuring that learners grasp the foundational concepts and methodologies. From understanding the very essence of security to delving into the intricacies of risk analysis, this course covers a broad spectrum. Learners will be equipped with the knowledge of both physical and informational security measures and will be trained to respond adeptly to immediate crises. Furthermore, the course sheds light on the pivotal role of technology in security management, ensuring that participants are well-versed in contemporary security solutions. Learning Outcomes: Understand the fundamental definition and significance of security in various contexts. Analyse security risks and implement effective risk reduction strategies. Differentiate between physical and informational security measures and apply them appropriately. Respond efficiently to immediate security crises and manage potential threats. Familiarise oneself with the legal framework and regulations governing security in the UK. Why buy this Basic Security Guard Training ? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Basic Security Guard Training there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this Basic Security Guard Training course for? Individuals aspiring to embark on a career in the security sector in the UK. Organisational staff members keen on enhancing their understanding of workplace security. Business owners aiming to bolster their premises' security measures. Technology enthusiasts eager to explore the intersection of tech and security. Public service workers, such as traffic controllers, seeking to integrate security knowledge into their roles. Prerequisites This Basic Security Guard Training does not require you to have any prior qualifications or experience. You can just enrol and start learning. Career path Security Analyst - Average salary range: £30,000 - £45,000 Annually Security Consultant - Average salary range: £40,000 - £60,000 Annually Physical Security Manager - Average salary range: £35,000 - £50,000 Annually Information Security Officer - Average salary range: £45,000 - £65,000 Annually Crisis Response Coordinator - Average salary range: £32,000 - £48,000 Annually Security Technology Specialist - Average salary range: £38,000 - £55,000 Annually Course Curriculum Module 01: Definition and Importance of Security Definition and Importance of Security 00:16:00 Module 02: Career Prospect of Security Guard in the UK Career Prospect of Security Guard in the UK 00:11:00 Module 03: Security Risk Analysis and Risk Reduction Security Risk Analysis and Risk Reduction 00:25:00 Module 04: Physical and Information Security Protection Physical and Information Security Protection 00:36:00 Module 05: Response to Immediate Crisis Response to Immediate Crisis 00:26:00 Module 06: The Use of Technology for Managing Security The Use of Technology for Managing Security 00:25:00 Module 07: General Patrol Tactics and Techniques General Patrol Tactics and Techniques 00:25:00 Module 08: Public Relations and Traffic Control Public Relations and Traffic Control 00:21:00 Module 09: Violence in the Workplace Violence in the Workplace 00:27:00 Module 10: Laws and Regulations Laws and Regulations 00:29:00 Assignment Assignment - Basic Security Guard Training 00:00:00

Basic Security Guard Training
Delivered Online On Demand4 hours 1 minutes
£10.99

CompTIA Network

4.5(3)

By Studyhub UK

Dive into the intricate world of networking with the 'CompTIA Network' course. Embrace foundational theories and immerse yourself in practical application, ensuring you're well-equipped for a modern networking environment. Covering everything from TCP/IP addressing to Cloud technologies, this course promises an exhaustive grasp over networking. Furthermore, delve deep into network security, understanding not just how to prevent breaches but also how to effectively respond. By the course's conclusion, learners will possess the confidence and knowledge to plan and execute a seamless SOHO Network. Learning Outcomes Gain an in-depth understanding of network theory and implementations. Master the intricacies of TCP/IP addressing, routing, and associated services. Acquire knowledge on WAN infrastructure, Cloud, and Virtualization technologies. Understand and implement effective network security measures, breach prevention, and incident response strategies. Develop expertise in remote networking, network management, and troubleshooting network issues. Why choose this CompTIA Network course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the CompTIA Network Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this CompTIA Network course for? Aspiring network professionals seeking foundational knowledge. IT enthusiasts aiming to expand their networking expertise. Professionals in related IT fields aiming to diversify their skills. Businesses looking to train their IT staff in network best practices. Individuals aiming for CompTIA Network+ certification. Career path Network Administrator: £25,000 - £40,000 Network Engineer: £30,000 - £50,000 Network Analyst: £28,000 - £45,000 IT Support Specialist: £20,000 - £35,000 Network Security Specialist: £35,000 - £55,000 Systems Administrator: £25,000 - £45,000 Prerequisites This CompTIA Network does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA Network was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Network Theory OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Bounded Network Media Cables 00:41:00 Fiber Optics 00:17:00 Converters and Connectors 00:27:00 Unbounded Network Media 802.11 Standard 00:20:00 Wireless 00:11:00 Wireless Options 00:19:00 Network Implementations Topologies 00:39:00 Ethernet 00:50:00 Switches 01:48:00 VLANs 00:52:00 TCP/IP Addressing and Data Delivery Network Communication Protocols 00:37:00 IPv4 00:26:00 Special Addresses 00:13:00 CIDR 00:11:00 IPv6 00:31:00 Routing Routes 00:59:00 Routing Types 00:18:00 TCP/IP Services TCP and IP 00:40:00 FQDN and DNS 00:28:00 Transport-layer Protocols 00:05:00 UDP 00:06:00 WAN Infrastructure Wide Area Networks 00:18:00 QoS 00:39:00 Voice-over-Data Systems 00:06:00 Cloud and Virtualization Technologies Types of Server Virtualization 00:27:00 Fibre Channel 00:05:00 Cloud Concepts.prproj 00:24:00 Network Security Basics Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 Preventing Security Breaches Potent Points to Clear Channel Pain - Part 6 00:01:00 Vulnerabilities 00:16:00 Attacks 00:58:00 Authentication 00:25:00 Benefits of Acupressure 3 00:02:00 Education and Awareness 00:03:00 Responding to Security Incidents Response Policy 00:04:00 Remote Networking RADIUS 00:07:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Network Management Acceptable Use 01:00:00 Troubleshooting Network Issues Common Problems 00:32:00 Troubleshooting 00:28:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Planning and Implementing a SOHO Network SOHO Network 00:15:00 Mock Exam Mock Exam - CompTIA Network 00:20:00 Final Exam Final Exam - CompTIA Network 00:20:00

CompTIA Network
Delivered Online On Demand22 hours 59 minutes
£10.99

Website Hacking From Scratch

4.5(3)

By Studyhub UK

Embark on a riveting expedition into the realm of website security with our course, 'Website Hacking From Scratch.' Delve deep into the labyrinth of potential vulnerabilities, from SQL injections to XSS vulnerabilities, equipping yourself with the prowess to identify and safeguard against digital threats. By course end, learners are not only conversant with the anatomy of website vulnerabilities but are also adept at leveraging tools like Owasp ZAP for holistic website fortification. Learning Outcomes Gain comprehensive insights into the foundation of website vulnerabilities and their exploitation. Understand and identify risks associated with file uploads, code executions, and session management. Acquire proficiency in detecting and safeguarding against SQL and XSS vulnerabilities. Master the use of automated tools, such as Owasp ZAP, in vulnerability detection. Develop strategies for effective post-exploitation management. Why choose this Website Hacking From Scratch course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Website Hacking From Scratch Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this Website Hacking From Scratch course for? Aspiring cybersecurity enthusiasts eager to delve into website security. Web developers keen to fortify their sites against potential breaches. IT professionals aiming to enhance their repertoire with security expertise. Entrepreneurs looking to ensure the robustness of their online platforms. Individuals curious about ethical hacking and its applications. Career path Ethical Hacker: £25,000 - £70,000 Penetration Tester: £30,000 - £60,000 Cybersecurity Analyst: £28,000 - £55,000 IT Security Consultant: £35,000 - £75,000 Web Security Manager: £40,000 - £80,000 Information Security Officer: £45,000 - £85,000 Prerequisites This Website Hacking From Scratch does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Website Hacking From Scratch was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Course Introduction Course Introduction 00:02:00 Preparation - Creating a Penetration Testing Lab Lab Overview & Needed Software 00:08:00 Installing Kali 2019 As a Virtual Machine Using a Ready Image 00:10:00 Installing Kali 2019 As a Virtual Machine 00:10:00 Installing Metasploitable As a Virtual Machine 00:04:00 Preparation - Linux Basics Basic Overview of Kali Linux 00:05:00 The Linux Terminal & Basic Linux Commands 00:11:00 Configuring Metasploitable & Lab Network Settings 00:06:00 Website Basics What is a Website? 00:04:00 How To Hack a Website? 00:04:00 Information Gathering Gathering Information Using Whois Lookup 00:05:00 Discovering Technologies Used On The Website 00:06:00 Gathering Comprehensive DNS Information 00:10:00 Discovering Websites On The Same Server 00:04:00 Discovering Subdomains 00:12:00 Discovering Sensitive Files 00:07:00 Analysing Discovered Files 00:04:00 Maltego - Discovering Servers, Domains & Files 00:08:00 Maltego - Discovering Websites, Hosting Provider & Emails 00:05:00 File Upload Vulnerabilities What are they? And How To Discover & Exploit Basic File Upload Vulnerabilities 00:07:00 HTTP Requests - GET & POST 00:04:00 Intercepting HTTP Requests 00:07:00 Exploiting More Advanced File Upload Vulnerabilities 00:04:00 Exploiting More Advanced File Upload Vulnerabilities 00:04:00 [Security] Fixing File Upload Vulnerabilities 00:06:00 Code Execution Vulnerabilities What are they? & How To Discover & Exploit Basic Code Execution Vulnerabilities 00:07:00 Exploiting Advanced Code Execution Vulnerabilities 00:06:00 [Security] - Fixing Code Execution Vulnerabilities 00:06:00 Local File Inclusion Vulnerabilities (LFI) What are they? And How To Discover & Exploit Them 00:06:00 Gaining Shell Access From LFI Vulnerabilities - Method 1 00:07:00 Gaining Shell Access From LFI Vulnerabilities - Method 2 00:11:00 Remote File Inclusion Vulnerabilities (RFI) Remote File Inclusion Vulnerabilities - Configuring PHP Settings 00:04:00 Remote File Inclusion Vulnerabilities - Discovery & Exploitation 00:06:00 Exploiting Advanced Remote File Inclusion Vulnerabilities 00:03:00 [Security] Fixing File Inclusion Vulnerabilities 00:06:00 SQL Injection Vulnerabilities What is SQL 00:06:00 Dangers of SQL Injections 00:03:00 SQL Injection Vulnerabilities - SQLi In Login Pages Discovering SQL Injections In POST 00:08:00 Bypassing Logins Using SQL Injection Vulnerability 00:05:00 Bypassing More Secure Logins Using SQL Injections 00:06:00 [Security] Preventing SQL Injections In Login Pages 00:08:00 SQL Injection Vulnerabilities - Extracting Data From The Database Discovering SQL Injections in GET 00:07:00 Reading Database Information 00:05:00 Finding Database Tables 00:04:00 Extracting Sensitive Data Such As Passwords 00:04:00 SQL Injection Vulnerabilities - Advanced Exploitation Discovering & Exploiting Blind SQL Injections 00:06:00 Discovering a More Complicated SQL Injection 00:07:00 Extracting Data (passwords) By Exploiting a More Difficult SQL Injection 00:05:00 Bypassing Filters 00:05:00 Bypassing Security & Accessing All Records 00:09:00 [Security] Quick Fix To Prevent SQL Injections 00:07:00 Reading & Writing Files On The Server Using SQL Injection Vulnerability 00:06:00 Getting A Reverse Shell Access & Gaining Full Control Over The Target Web Server 00:08:00 Discovering SQL Injections & Extracting Data Using SQLmap 00:07:00 [Security] - The Right Way To Prevent SQL Injection 00:05:00 XSS Vulnerabilities Introduction - What is XSS or Cross Site Scripting? 00:03:00 Discovering Basic Reflected XSS 00:04:00 Discovering Advanced Reflected XSS 00:05:00 Discovering An Even More Advanced Reflected XSS 00:07:00 Discovering Stored XSS 00:03:00 Discovering Advanced Stored XSS 00:04:00 XSS Vulnerabilities - Exploitation Hooking Victims To BeEF Using Reflected XSS 00:06:00 Hooking Victims To BeEF Using Stored XSS 00:04:00 BeEF - Interacting With Hooked Victims 00:04:00 BeEF - Running Basic Commands On Victims 00:04:00 BeEF - Stealing Credentials/Passwords Using A Fake Login Prompt 00:02:00 Bonus - Installing Veil 3.1 00:06:00 Bonus - Veil Overview & Payloads Basics 00:07:00 Bonus - Generating An Undetectable Backdoor Using Veil 3 00:10:00 Bonus - Listening For Incoming Connections 00:07:00 Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 00:07:00 BeEF - Gaining Full Control Over Windows Target 00:04:00 [Security] Fixing XSS Vulnerabilities 00:07:00 Insecure Session Management Logging In As Admin Without a Password By Manipulating Cookies 00:06:00 Discovering Cross Site Request Forgery Vulnerabilities (CSRF) 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link (Preview) 00:06:00 [Security] The Right Way To Prevent CSRF Vulnerabilities 00:09:00 Brute Force & Dictionary Attacks What Are Brute Force & Dictionary Attacks? 00:04:00 Creating a Wordlist 00:07:00 Launching a Wordlist Attack & Guessing Login Password Using Hydra 00:14:00 Discovering Vulnerabilities Automatically Using Owasp ZAP Scanning Target Website For Vulnerabilities 00:04:00 Analysing Scan Results 00:04:00 Post Exploitation Post Exploitation Introduction 00:04:00 Interacting With The Reverse Shell Access Obtained In Previous Lectures 00:07:00 Escalating Reverse Shell Access To Weevely Shell 00:08:00 Weevely Basics - Accessing Other Websites, Running Shell Commands etc 00:07:00 Bypassing Limited Privileges & Executing Shell Commands 00:05:00 Downloading Files From Target Webserver 00:05:00 Uploading Files To Target Webserver 00:08:00 Getting a Reverse Connection From Weevely 00:08:00 Accessing The Database 00:09:00 Resources Resources - Website Hacking From Scratch 00:00:00 Assignment Assignment - Website Hacking From Scratch 00:00:00

Website Hacking From Scratch
Delivered Online On Demand9 hours 23 minutes
£10.99

Arduino Crash Course

4.5(3)

By Studyhub UK

Overview Uplift Your Career & Skill Up to Your Dream Job - Learning Simplified From Home! Kickstart your career & boost your employability by helping you discover your skills, talents and interests with our special Arduino Crash Course. You'll create a pathway to your ideal job as this course is designed to uplift your career in the relevant industry. It provides professional training that employers are looking for in today's workplaces. The Arduino Crash Course is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Arduino Crash Course  has been designed by industry experts to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Arduino Crash Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into elementary modules, allowing our students to grasp each lesson quickly. At StudyHub, we don't just offer courses; we also provide a valuable teaching process. When you buy a course from StudyHub, you get unlimited Lifetime access with 24/7 dedicated tutor support. Why buy this Arduino Crash Course? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Arduino Crash Course there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Arduino Crash Course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skill. Prerequisites This Arduino Crash Course does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Arduino Crash Course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This Arduino Crash Course is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Section 1: Introduction & Requirements Unit 1: Introduction 00:01:00 Unit 2: Instructor's Introduction 00:05:00 Unit 3: What is Arduino 00:02:00 Section 2: Objective to Remember Unit 1: The Holes in Board 00:01:00 Unit 2: Working Procedure 00:01:00 Unit 3: The Breadboard 00:05:00 Section 3: Thinking Process of Arduino Unit 1: Thinking Process of Arduino 00:06:00 Section 4: Making a Circuit Unit 1: Putting Together a Circuit 00:04:00 Section 5: Coding Arduino Unit 1: Cut and Paste Coding 00:12:00 Section 6: More About Circuit Diagram Unit 1: Circuit Diagram 00:03:00 Section 7: Practical Work Unit 1: Inputs: Buttons 00:04:00 Unit 2: Analog Input: IR sensor 00:04:00 Unit 3: Analog Input: Potentiometer 00:09:00 Assignment Assignment - Arduino Crash Course 00:00:00

Arduino Crash Course
Delivered Online On Demand57 minutes
£10.99

Transport Management & British Transport System ( BTS )

4.7(47)

By Academy for Health and Fitness

Have you ever experienced a delayed flight or a late item delivery? There may be a rational explanation, but poor transportation management might also be blamed. We provide an excellent option for you if you want to get into this sector and make a significant difference in an inefficient system. The Transport Management course, devised by industry professionals, will assist you in developing a skill or expanding your knowledge. Our Transport Management course is designed to assist you in achieving success at every stage of your logistics career. We are here to assist you to reach your professional goals, from the foundations of project management and transport management to sophisticated strategic planning of logistics and supply chain management for ports and airlines. Our Logistics courses are part of a bigger portfolio of Transport Management courses that cover every aspect of the organisation. Don't waste time learning what you already know-unlike many other courses, we have tailored this course to your learning style, career goals, and current workload, ensuring you get the most out of your studies. Enrol in this Transportation Management course and study everything on your own time. Learning Outcomes Upon successful completion of this Transport Management course, you will be able to, Get introduced to transport management. Explore transport management systems. Improve your transport management strategy. Recognise the importance of transport management for rail and airlines. Discover the trends, challenges, and best practices in transport management. Determine the health and safety issues regarding transport management. Why Prefer Us? Opportunity to earn a certificate accredited by CPDQS. Get a free student ID card!(£10 postal charge will be applicable for international delivery) Innovative and Engaging Content. Free Assessments 24/7 Tutor Support. Take a step toward a brighter future! *** Course Curriculum *** Module 01: Introduction Module 02: Transport Management Systems (TMS) Module 03: Transportation Management Strategy Module 04: Road Freight Transport Laws and Permits Module 05: Rail and Transport Management Module 06: Transport Management for Ports and Inland Waters Module 07: Transport Management for Airlines Module 08: Trends, Challenges and Best Practice Module 09: Transport Management and Health and Safety Assessment Process Your skills and knowledge will be tested with an automated multiple-choice assessment or with an optional assignment. You will then receive instant results to let you know if you have successfully passed the Transport Management course. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone interested in learning more about the topic is advised to take this course. This course is open to everybody. Requirements You will not need any prior background or expertise to enrol in this course. Career path This Transport Management course is comprehensively designed and will be beneficial for the following careers. Transport Supervisor Transport Manager Transport Co-ordinator In the UK, the average salary of these professions ranges from £40k to £70k per year.

Transport Management & British Transport System ( BTS )
Delivered Online On Demand4 hours
£12

Nodejs MySQL Login System Course

4.9(27)

By Apex Learning

Overview This comprehensive course on Nodejs MySQL Login System Course will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Nodejs MySQL Login System Course comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Nodejs MySQL Login System Course. It is available to all students, of all academic backgrounds. Requirements Our Nodejs MySQL Login System Course is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 1 sections • 12 lectures • 03:21:00 total length •Module 01: Introduction: 00:03:00 •Module 02: Creating the Server: 00:15:00 •Module 03: Connecting the Database: 00:12:00 •Module 04: Handlebars: 00:14:00 •Module 05: Home and Register Page: 00:22:00 •Module 06: Creating Routes: 00:20:00 •Module 07: Register User: 00:30:00 •Module 08: Login User: 00:29:00 •Module 09: User Profile Page: 00:17:00 •Module 10: Private Pages: 00:31:00 •Module 11: User Logout: 00:08:00 •Module 12: Project Files: 00:00:00

Nodejs MySQL Login System Course
Delivered Online On Demand3 hours 21 minutes
£12

Windows 10 Pro Complete Training

4.9(27)

By Apex Learning

Overview This comprehensive course on Windows 10 Pro Complete Training will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Windows 10 Pro Complete Training comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? At the end of the course there will be an online written test, which you can take either during or after the course. After successfully completing the test you will be able to order your certificate, these are included in the price. Who is This course for? There is no experience or previous qualifications required for enrolment on this Windows 10 Pro Complete Training. It is available to all students, of all academic backgrounds. Requirements Our Windows 10 Pro Complete Training is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 11 sections • 43 lectures • 04:21:00 total length •Course Overview: 00:05:00 •Easily download ISO Images: 00:10:00 •Lab - Creating a Virtual Install of Windows 10 Pro Using VirtualBox: 00:16:00 •Lab - Create Virtual Install of Server 2016 Full GUI Using VirtualBox: 00:13:00 •Taking a Snapshot of Your Current configuration: 00:04:00 •Perform a Windows 10 Upgrade for Free: 00:09:00 •Preparing Your Network for Active Directory: 00:10:00 •Lab - Prepare Server 2016 for Promotion to a Domain Controller: 00:10:00 •Lab - Promote Server 2016 to a Domain Controller: 00:09:00 •Lab - Join a Windows 10 Workstation to a Microsoft Domain: 00:15:00 •Installing WDS on a Windows Server Using VirtualBox: 00:18:00 •Deploy a Windows 10 Client Using WDS: 00:09:00 •lab - Create an Unattended Install of Windows 10 Pro: 00:17:00 •Turn the Windows 10 Firewall Off or On: 00:01:00 •Allow an app through the Windows 10 firewall: 00:05:00 •Add a rule or port to a Windows 10 firewall: 00:05:00 •Allow PING for Windows 10: 00:04:00 •Disable the UAC User Account Control in Windows 10: 00:02:00 •Using netsh to Manage the Windows Firewall: 00:05:00 •Using Powershell to Gather Firewall Information: 00:04:00 •Change your IP address in Windows 10: 00:05:00 •Add a second IP address in Windows 10: 00:09:00 •Enable System Restore on Windows 10: 00:03:00 •Create a System Restore point on Windows 10: 00:02:00 •Recover using System Restore on Windows 10: 00:04:00 •Fix TCPIP Corruption in Windows 10 Using Netsh: 00:02:00 •Repair Windows 10 with System File Checker (SFC): 00:03:00 •Repair Windows 10 System files offline Using SFC: 00:04:00 •Use ReadyBoost to Speed up Windows 10: 00:05:00 •Reset Your Network Adapter: 00:06:00 •Lab - Troubleshooting Internet Connectivity: 00:16:00 •NSLookup: 00:05:00 •Windows Reliability Monitor: 00:04:00 •Disable the Lock Screen on Windows 10: 00:03:00 •Disable Superfetch via Windows Services: 00:03:00 •Disable Screen Saver in Windows 10 using REGEDIT: 00:02:00 •Disable Windows 10 Automatic Logoff For Inactivity: 00:02:00 •Overview of the Windows 10 Shutdown and Restart buttons: 00:01:00 •Rename your Windows 10 computer: 00:01:00 •Change the date and time in Windows 10: 00:03:00 •Create a new local user in Windows 10: 00:04:00 •Rearm the 30-day evaluation Period for Windows 10 Pro: 00:03:00 •Assignment - Windows 10 Pro Complete Training: 00:00:00

Windows 10 Pro Complete Training
Delivered Online On Demand4 hours 21 minutes
£12