CompTIA Security+ Certification is one of our best selling and most popular course. The CompTIA Security+ Certification is organised into 10 modules and includes everything you need to become successful in this profession. To make this course more accessible for you, we have designed it for both part-time and full-time students. You can study at your own pace or become an expert in just 17 hours! If you require support, our experienced tutors are always available to help you throughout the comprehensive syllabus of this course and answer all your queries through email. Why choose this course Earn an e-certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Benefit from instant feedback through mock exams and multiple-choice assessments Get 24/7 help or advice from our email and live chat teams Full Tutor Support on Weekdays Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Mock exams Multiple-choice assessment Certification After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for £9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for £15.99, which will reach your doorsteps by post. Course Content Security Fundamentals The Information Security Cycle 00:37:00 Information Security Controls 00:35:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Identifying Security Threats and Vulnerabilities Social Engineering 00:31:00 Malware 00:25:00 Software-Based Threats 00:21:00 Based Threats 00:38:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Managing Data, Application, and Host Security Manage Data Security 00:47:00 Manage Application Security 00:56:00 Manage Device and Host Security 01:07:00 Manage Mobile Security 00:10:00 Implementing Network Security Configure Security Parameters on Network Devices and Technologies 00:49:00 Network Design Elements and Components 00:26:00 Implement Networking Protocols and Services 01:09:00 Apply Secure Network Administration Principles 00:12:00 Secure Wireless Traffic 00:31:00 Implementing Access Control, Authentication, and Account Management Access Control and Authentication Services 00:42:00 Implement Account Management Security Controls 00:33:00 Managing Certificates Install a CA Hierarchy 00:25:00 Enroll Certificates 00:13:00 Secure Network Traffic by Using Certificates 00:03:00 Renew Certificates 00:01:00 Back Up and Restore Certificates and Private Keys 00:05:00 Revoke Certificates 00:07:00 Implementing Compliance and Operational Security Physical Security 00:20:00 Legal Compliance 00:10:00 Security Awareness and Training 00:11:00 Integrate Systems and Data with Third Parties 00:08:00 Risk Management A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:04:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Troubleshooting and Managing Security Incidents Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:09:00 Business Continuity and Disaster Recovery Planning Business Continuity 00:17:00 Plan for Disaster Recovery 00:17:00 Execute DRPs and Procedures 00:13:00 Mock Exam Mock Exam- CompTIA Security+ Certification 00:20:00 Final Exam Final Exam- CompTIA Security+ Certification 00:20:00 Order your Certificates & Transcripts Order your Certificates & Transcripts 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.
**Don't Spend More; Spend Smarter** Boost Your Career with Apex Learning and Get Noticed By Recruiters in this Hiring Season! Get Hard Copy + PDF Certificates + Transcript + Student ID Card worth £160 as a Gift - Enrol Now Give a compliment to your career and take it to the next level. This CompTIA Library will provide you with the essential knowledge to shine in your professional career. Whether you want to develop skills for your next job or elevate skills for your next promotion, this CompTIA Library will help you keep ahead of the pack. The CompTIA Library incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your expertise and essential knowledge, which will assist you in reaching your goal. Further, this CompTIA Library will add extra value to your resume to stand out to potential employers. Throughout the programme, it stresses how to improve your competency as a person in your chosen field while also outlining essential career insights in this job sector. Consequently, you'll sharpen your knowledge and skills; on the other hand, see a clearer picture of your career growth in future. By the end of the CompTIA Library, you can equip yourself with the essentials to keep you afloat in the competition. Along with this CompTIA Library course, you will get 10 premium courses, an originalHardcopy, 11 PDF Certificates (Main Course + Additional Courses) Student ID card as gifts. This CompTIA Library Bundle Consists of the following Premium courses: Course 01: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 02: CompTIA A+ (220-1001) Course 03: CompTIA A+ (220-1002) Course 04: CompTIA Network (N10-007) Course 05: CompTIA Security+ (SY0-401) New 2020 Course 06: CompTIA Security+ (SY0-601) Course 07: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 08: CompTIA PenTest+ (Ethical Hacking) Course 09: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 10: Cisco ASA Firewall Training Course 11: Linux for Absolute Beginners! As one of the top course providers in the UK, we're committed to providing you with the best educational experience possible. Our industry experts have designed the CompTIA Library to empower you to learn all at once with accuracy. You can take the course at your own pace - anytime, from anywhere. So, enrol now to advance your career! Benefits you'll get choosing Apex Learning for this CompTIA Library: Pay once and get lifetime access to 11 CPD courses Free e-Learning App for engaging reading materials & helpful assistance Certificates, student ID for the title course included in a one-time fee Free up your time - don't waste time and money travelling for classes Accessible, informative modules designed by expert instructors Learn at your ease - anytime, from anywhere Study the course from your computer, tablet or mobile device CPD accredited course - improve the chance of gaining professional skills Gain valuable knowledge without leaving your home How will I get my Certificate? After successfully completing the course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) Curriculum of CompTIA Library Bundle Course 01: CompTIA IT Fundamentals ITF+ (FCO-U61) How People Use Computers System Hardware Device Ports and Peripherals Data Storage and Sharing Understanding Operating Systems Setting Up and Configuring a PC Setting Up and Configuring a Mobile Device Managing Files Using and Managing Application Software Configuring Network and Internet Connectivity IT Security Threat Mitigation Computer Maintenance and Management IT Troubleshooting Understanding Databases Developing and Implementing Software Course 02: CompTIA A+ (220-1001) All about the CompTIA A+ Safety and Professionalism The Visible Computer CPUs RAM Firmware Motherboards Power Supplies Mass Storage Technologies Implementing Mass Storage Essential Peripherals Building a PC Display Technologies Essentials of Networking Local Area Networking Wireless Networking The Internet Virtualization Portable Computing Understanding Mobile Devices Care and Feeding of Mobile Devices Printers and Multifunction Devices Securing Computers Course 03: CompTIA A+ (220-1002) All About the CompTIA A+ 2019 Core 2 Exam Safety and Professionalism The Visible Computer CPUs RAM Power Supply Implementing Mass Storage Building a PC Windows under the Hood Users, Groups, and Permissions Maintaining and Optimizing Operating Systems Working with the Command-Line Interface Troubleshooting Operating Systems Display Technologies Essentials of Networking Local Area Networking Wireless Networking The Internet Portable Computing Care and Feeding of Mobile Devices Securing Computers Operational Procedures Course 04: CompTIA Network (N10-007) Introduction Network Models Cabling and Topology Ethernet Basics Modern Ethernet Installing a Physical Network TCP/IP Basics Routing TCP/IP Applications Network Naming Securing TCP/IP Advanced Networking Devices IPv6 Remote Connectivity Wireless Networking Virtualization and Cloud Computing Mobile Networking Building a Real-World Network Managing Risk Protecting Your Network Network Monitoring Network Troubleshooting Course 05: CompTIA Security+ (SY0-401) New 2020 Security Fundamentals Identifying Security Threats and Vulnerabilities Managing Data, Application, and Host Security Implementing Network Security Implementing Access Control, Authentication, and Account Management Managing Certificates Implementing Compliance and Operational Security Risk Management Troubleshooting and Managing Security Incidents Business Continuity and Disaster Recovery Planning Course 06: CompTIA Security+ (SY0-601) Introduction Risk Management Cryptography Identity and Account Management Tools of the Trade Securing Individual Systems The Basic LAN Securing Wireless LANs Securing Public Servers Securing Dedicated Systems Physical Security Secure Protocols and Applications Testing Infrastructure Dealing with Incidents Course 07: Cloud Computing / CompTIA Cloud+ (CV0-002) What You Need to Know Introducing the Cloud System Requirements for Cloud Deployments Cloud Storage Cloud Compute Cloud Networking Cloud Security Migrating to the Cloud Maintaining Cloud Solutions Troubleshooting Cloud Solutions Course 08: CompTIA PenTest+ (Ethical Hacking) Introduction Planning and Scoping Surveying the Target Select Your Attack Vector Selecting Pen Testing Tools Reporting and Communication Course 09: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Introduction The Importance of Threat Data and Intelligence Threat Intelligence in Support of Organizational Security Vulnerability Assessment Tools Threats and Vulnerabilities Associated with Specialized Technology Threats and Vulnerabilities Associated with Specialized Technology Threats and Vulnerabilities Associated with Operating in the Cloud Mitigating Controls for Attacks and Software Vulnerabilities Security Solutions for Infrastructure Management Software Assurance Best Practices Hardware Assurance Best Practices Data Analysis in Security Monitoring Activities Implement Configuration Changes to Existing Controls to Improve Security The Importance of Proactive Threat Hunting Compare and Contrast Automation Concepts and Technologies And Much More... Course 10: Cisco ASA Firewall Training Common Network Security Terms Confidentiality, Integrity, Availability. Security Concepts & Terms Intro to Firewall Technologies About Cisco ASA Firewall Install Cisco ASAv Firewall in GNS3 Install ASA 9 Cluster, Security Context enable in GNS3. Install Cisco ASAv Firewall on EVE-NG Install Cisco ASAv Firewall on VMWare Workstation. Cisco ASA Firewall Basic Configuration Commands. Device Management Cisco ASA Console Device Management Cisco ASA Telnet Device Management Cisco ASA SSH And Much More... Course 11: Linux for Absolute Beginners! Introduction to Linux Linux Installation Linux Command Line Interface (CLI) Essentials Advanced CLI Usage Linux Development Tools Web Development Project Web Server Setup, Host Cofiguration and App Deployment Linux User Management Linux Network Administration CPD 150 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this CompTIA Library bundle. Persons with similar professions can also refresh or strengthen their skills by enrolling in this course. Students can take this course to gather professional knowledge besides their study or for the future. Requirements Our CompTIA Library is fully compatible with PC's, Mac's, laptops, tablets and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones, so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course; it can be studied in your own time at your own pace. Career path Having this various expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (CompTIA IT Fundamentals ITF+ (FCO-U61)) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.
This course on Information and Communication Technology (ICT) provides a comprehensive understanding of emerging technologies, input and output devices, storage media, networks, databases, and expert systems. It covers various ICT applications and their impact on society and businesses. Learning Outcomes: Understand the impact of emerging technologies on the field of ICT. Identify and describe different types of input and output devices used in computing. Familiarize with various storage devices and media and their applications. Gain knowledge about computer networks and their configurations. Explore the fundamentals of database systems and their importance in data management. Learn about expert systems and their role in decision-making processes. Discover practical ICT applications and their relevance in various domains. Why buy this ICT: Information and Communication Technology? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the ICT: Information and Communication Technology there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This ICT: Information and Communication Technology course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skill. Prerequisites This ICT: Information and Communication Technology does not require you to have any prior qualifications or experience. You can just enrol and start learning.This ICT: Information and Communication Technology was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This ICT: Information and Communication Technology is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Section 01: Introduction Introduction 00:06:00 What is ICT? 00:05:00 Hardware and Software 00:08:00 Information Processing Cycle 00:05:00 Software Explained 00:06:00 Human-Computer -Interface 00:07:00 Section 02: Impact of Emerging Technologies Introduction-Impact of Emerging Technology 00:01:00 Artificial intelligence 00:03:00 Biometrics 00:03:00 Vision enhancement 00:02:00 Robotics 00:03:00 Quantum cryptography 00:03:00 Computer-assisted translation 00:02:00 3D and holographic imaging 00:03:00 Virtual reality 00:06:00 Section 03: Types of Input Devices Types of Input Devices - Introduction 00:02:00 Manual input 00:07:00 Pointing devices 00:02:00 Inputting Images Devices 00:08:00 Inputting Sound & Music Devices 00:05:00 Direct input systems 00:07:00 Direct Input systems Part-2 00:05:00 Direct Input Systems Part-3 00:06:00 Direct Input Systems devices. Part-4 00:04:00 Sensors 00:05:00 Section 04: Types of Output Devices Types of Input Devices - Introduction 00:02:00 Monitors 00:06:00 Printers 00:08:00 Plotters 00:03:00 3D Printers 00:04:00 Speakers 00:02:00 Control Devices 00:06:00 Section 05: Storage Devices and Media Types of Storage Devices and Media 00:06:00 Magnetic Media 00:06:00 Optical media 00:10:00 Solid-State media 00:04:00 Backups 00:02:00 Section 06: Networks WHAT IS COMPUTER COMMUNICATION? 00:02:00 What is a computer network? 00:07:00 Types of NETWORK- Local Area Network 00:07:00 Wide Area Network 00:07:00 Bluetooth and WI-FI in Networks 00:07:00 Network Hardware 00:03:00 Network Switch 00:05:00 Network Bridge 00:02:00 Networking Hardware Router 00:05:00 Modem 00:04:00 Network Cables 00:03:00 How to set up a small network? 00:07:00 Section 07: Database What is a Database? 00:03:00 Database File 00:04:00 Database Types 00:09:00 Using Database 00:06:00 Data validation and verification 00:10:00 Section 08: Expert Systems What is an expert system? 00:10:00 Section 09: ICT Applications Applications in Banking: ATM, Electronic Fund Transfer 00:04:00 Applications in Banking: Internet Banking Telephone Banking 00:04:00 Applications in Banking: Cheque Clearing 00:05:00 RETAIL INDUSTRY Applications: POS 00:05:00 Retail: Stock Control 00:04:00 Retail: Automatic Reordering of Stock 00:03:00 Assignment Assignment - ICT: Information and Communication Technology 00:00:00
The 'Ethereum & Blockchain Applications Development with Solidity' course offers a comprehensive introduction to Ethereum and blockchain technology. It covers the basics of Ethereum, Solidity programming language, advanced concepts, and explores various use cases of blockchain beyond cryptocurrency applications. Learning Outcomes: Understand the fundamentals of Ethereum and its role in the blockchain ecosystem. Gain proficiency in the Solidity programming language to develop smart contracts on the Ethereum platform. Explore advanced concepts in Ethereum development, including security, optimization, and best practices. Discover other applications of blockchain technology beyond cryptocurrencies, such as supply chain management, voting systems, and more. Access additional resources to further enhance knowledge and skills in Ethereum and blockchain application development. Why buy this Ethereum & Blockchain Applications Development with Solidity? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Certification After studying the course materials of the Ethereum & Blockchain Applications Development with Solidity there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? Individuals with a keen interest in understanding blockchain technology and Ethereum's role within it. Software developers seeking to broaden their expertise into blockchain application development. Entrepreneurs aiming to leverage blockchain technology for innovative business solutions. Students in computer science or related fields desiring a comprehensive understanding of Ethereum and Solidity. Technology enthusiasts eager to explore the potential and workings of decentralized applications. Prerequisites This Ethereum & Blockchain Applications Development with Solidity does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Ethereum & Blockchain Applications Development with Solidity was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Blockchain Developer: £50,000 - £70,000 Annually Ethereum Developer: £55,000 - £75,000 Annually Smart Contract Developer: £60,000 - £80,000 Annually Cryptocurrency Analyst: £45,000 - £65,000 Annually DApp Developer (Decentralized Applications): £52,000 - £72,000 Annually Blockchain Project Manager: £58,000 - £78,000 Annually Course Curriculum Section 01: Introduction to This Course Course Introduction 00:02:00 What Is Solidity? 00:07:00 What Is Blockchain? 00:15:00 Centralised vs Decentralised vs Distributed Systems 00:12:00 Is Blockchain Truly Decentralised and Distributed? 00:08:00 Structure of a Block 00:10:00 What Is a Hash? 00:08:00 What Are Merkle Trees? 00:08:00 What Is a Ledger? 00:06:00 History of Blockchain 00:21:00 Why Use Blockchain? 00:10:00 What Are Cryptocurrencies? 00:09:00 What Is Cryptography? 00:09:00 Section 02: Ethereum Basics What Is Ethereum & How Does It Differ To Bitcoin? 00:10:00 Advantages and Disadvantages Compared To Bitcoin 00:10:00 Ethereum vs Ethereum Classic 00:09:00 Section 03: History & Overview What Are Smart Contracts? 00:17:00 What Is Gas? 00:09:00 What Is Ethereum Mining? 00:06:00 What Are Ethereum Virtual Machines (EVM)? 00:06:00 Section 04: Install Ethereum Client Setup on Mac OS X 00:04:00 Setup on Linux 00:04:00 Setup on Windows 00:02:00 Remix Online IDE 00:03:00 Remix IDE Overview 00:10:00 Section 05: Solidity Basics Simple Source Code Example 00:03:00 Comments 00:03:00 Data Types 00:08:00 Variable Literals 00:03:00 Conditional Statements 00:08:00 Loops 00:09:00 Ether and Time Units 00:07:00 Function Calls 00:06:00 Special Variables and Functions 00:03:00 Arrays 00:05:00 Structs 00:03:00 Enums 00:04:00 Interfacing with Other Contracts 00:04:00 Constructor Arguments 00:04:00 Contract Inheritance 00:05:00 Multiple Inheritance and Linearization 00:03:00 Abstract Contracts 00:04:00 Visibility Specifiers 00:07:00 Accessor Functions 00:02:00 Function Modifiers 00:05:00 Events 00:02:00 Esoteric Functions 00:02:00 Section 06: Advanced ICO (Initial Coin Offering) 00:11:00 2007/2008 Crisis 00:18:00 Cypherpunks 00:18:00 History of FIAT Currency 00:13:00 DAO (Decentralised Autonomous Organisations) 00:13:00 Section 07: Other Uses of Blockchain Education 00:15:00 Retail 00:21:00 Health Industry 00:18:00 Business 00:10:00 Governance 00:12:00 Last Will and Testament 00:12:00 Blood Diamonds 00:06:00 Housing 00:15:00 Proof of Ownership/Identity 00:11:00 Data Storage 00:13:00 Section 08: Resource Resource 00:00:00 Assignment Assignment - Ethereum & Blockchain Applications Development with Solidity 00:00:00
Overview This comprehensive course on Learn Ethical Hacking From A-Z: Beginner To Expert will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Learn Ethical Hacking From A-Z: Beginner To Expert comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Learn Ethical Hacking From A-Z: Beginner To Expert. It is available to all students, of all academic backgrounds. Requirements Our Learn Ethical Hacking From A-Z: Beginner To Expert is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 17 sections • 105 lectures • 11:51:00 total length •Course Overview: 00:08:00 •About Your Instructors: 00:03:00 •Section Overview: 00:03:00 •Current Cybersecurity Market: 00:09:00 •The 3 Types of Hackers: 00:05:00 •The 4 Elements of Security: 00:04:00 •Ethical Hacker Terminology: 00:04:00 •Common Methods of Hacking: 00:08:00 •Cybersecurity & Ethical Hacking Overview: 00:03:00 •Ethical Hacking vs Penetration Testing: 00:06:00 •Job Opportunities in Cybersecurity: 00:01:00 •Who is This Course is For?: 00:01:00 •Networking Section Overview: 00:12:00 •How Data Travels Across The Internet: 00:02:00 •Understanding Ports and Protocols: 00:08:00 •Understanding IP Addresses: Public & Private: 00:02:00 •What Are Subnets?: 00:03:00 •The Average Network vs Remote Based: 00:06:00 •Hacking Lab Section Overview: 00:09:00 •Understanding Virtual Machines: 00:03:00 •Setup Your Kali Linux Machine: 00:10:00 •VN Setup & Testing Vulnerable Systems: 00:23:00 •Linux+Python+Bash+Powershell Section Overview: 00:06:00 •Linux Basics: 00:11:00 •Working With Directories & Moving Files: 00:03:00 •Installing & Updating Application Files: 00:02:00 •Linux Text Editors: 00:04:00 •Searching For Files: 00:02:00 •Bash Scripting Basics: 00:09:00 •Python Basics: 00:11:00 •Remaining Anonymous Section Overview: 00:06:00 •TOR Browser Overview: 00:06:00 •Anonsurf Overview: 00:03:00 •Changing Mac Addresses: 00:03:00 •Using a Virtual Private Network/Server (VPN, VPS): 00:04:00 •WiFi Hacking Section Overview: 00:06:00 •WiFi Hacking System Setup: 00:09:00 •WEP Hacking Attack #1: 00:09:00 •WEP Hacking Attack #2: 00:04:00 •WPA/WPA2 Hacking: 00:10:00 •Reconnaissance Section Overview: 00:04:00 •Passive Recon vs Active Recon: 00:01:00 •Recon-ng Overview: 00:15:00 •Whois Enumeration: 00:02:00 •DNS Enumeration Overview: 00:02:00 •Netcraft.com DNS Information: 00:03:00 •Google Hacking: 00:05:00 •Shodan.io Overview: 00:02:00 •Securityheaders.com (Analyze HTTPS Headers of website): 00:02:00 •Ssllabs.com/ssltest (Look for SSL issues on website): 00:02:00 •Pastebin.com (Sensitive Information): 00:01:00 •NMAP Port Scanning (Discover open ports, OS, Services, Vulnerabilities, etc.): 00:15:00 •Netcat Overview + SMB/NFSEnumeration: 00:14:00 •Nikto & Sparta Web Application Scanner: 00:06:00 •SMPT Enumeration + Nessus/Openvas Scanners: 00:05:00 •Launching Attacks Overview: 00:10:00 •Analyzing Information Gathered: 00:04:00 •Taking Advantage of Telenet: 00:06:00 •Searching & Understanding Exploits: 00:06:00 •Copy Exploits From Searchsploit: 00:03:00 •Understanding Exploits: 00:04:00 •Launching Exploits: 00:24:00 •Brute Force Attacks: 00:07:00 •How To Crack Passwords: 00:04:00 •ARP Spoofing Overview: 00:21:00 •Introduction To Cryptography: 00:14:00 •Post Exploitation Section Overview: 00:03:00 •Privilege Escalation: 00:29:00 •Transferring Files in/out of Victim, Creating Custom Malware + Evading Antivirus: 00:27:00 •Installing a Keylogger: 00:03:00 •Installing a Backdoor: 00:07:00 •Website & Web Application Hacking Overview: 00:06:00 •Web Application Scanning: 00:08:00 •Directory Buster Hacking Tool: 00:03:00 •Nikto Web App Hacking Tool: 00:03:00 •SQLmap and SQL Ninja Overview: 00:01:00 •How To Execute Brute Force Attacks: 00:13:00 •Using Command Injection: 00:03:00 •Malicious File Upload: 00:10:00 •Local & Remote File Inclusion: 00:10:00 •SQL Injection Overview: 00:19:00 •Using Cross Site Request Forgery: 00:11:00 •Cross Site Scripting Overview: 00:12:00 •Mobile Phone Hacking Section Overview: 00:11:00 •Mobile Attack Vectors: 00:02:00 •Mobile Hacking Using URLs: 00:02:00 •Jail Breaking and Rooting Considerations: 00:01:00 •Privacy Issues (Geo Location): 00:01:00 •Mobile Phone Data Security: 00:02:00 •Getting Your Name Out There Section Overview: 00:02:00 •Building A Brand: 00:09:00 •Personal Branding: 00:13:00 •Setup Your Website and Blog: 00:11:00 •Writing a Book: 00:10:00 •Starting a Podcast: 00:08:00 •Networking Overview: 00:06:00 •Making Money Section Overview: 00:02:00 •Bug Bounty Programs: 00:04:00 •How To Start Freelancing: 00:11:00 •How To Start Client Consulting: 00:09:00 •Potential Salary & Cybersecurity Roadmap: 00:10:00 •Books Recommendations: 00:03:00 •Places to Practice Hacking for Free: 00:03:00 •Resources - Learn Ethical Hacking From A-Z: Beginner To Expert: 00:00:00 •Assignment - Learn Ethical Hacking From A-Z: Beginner To Expert: 00:00:00
Register on the Blockchain & Cryptocurrency today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Blockchain & Cryptocurrency is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Blockchain & Cryptocurrency Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Blockchain & Cryptocurrency, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Section 01: Introduction What Is Blockchain? 00:15:00 Centralised vs Decentralised vs Distributed Systems 00:12:00 Is Blockchain Truly Decentralised and Distributed? 00:08:00 Structure of a Block 00:10:00 What Is a Hash? 00:08:00 What Are Merkle Trees? 00:08:00 What Is a Ledger? 00:05:00 History of Blockchain 00:21:00 Why Use Blockchain? 00:10:00 What Are Cryptocurrencies? 00:09:00 What Is Cryptography? 00:09:00 Section 02: Bitcoin What Is Bitcoin? 00:12:00 Advantages and Disadvantages Compared To Fiat Currency 00:11:00 What Is Bitcoin Mining 00:12:00 What Are Mining Pools/Farms? 00:08:00 What Is A Bitcoin Wallet? 00:06:00 What Is A Bitcoin Exchange? 00:09:00 How Is The Price of Bitcoin Determined? 00:07:00 How to Use Bitcoin? 00:10:00 What Is Bitcoin Cash and How Does It Differ To Bitcoin? 00:11:00 What Is SegWit2x? 00:16:00 Soft Fork vs Hard Fork 00:08:00 Section 03: Ethereum What Is Ethereum & How Does It Differ To Bitcoin? 00:10:00 Advantages and disadvantages compared to Bitcoin 00:10:00 Ethereum vs Ethereum Classic 00:09:00 Section 04: Ripple What Is Ripple & How Does It Differ To Bitcoin? 00:10:00 Advantages and disadvantages compared to Bitcoin 00:10:00 Section 05: Other Popular Cryptocurrencies Litecoin 00:06:00 Dash 00:12:00 Monero 00:11:00 Why Should I Just Not Use Bitcoin? 00:09:00 Section 06: Law and Regulation Monetary Policy 00:11:00 Tax Regulations 00:12:00 Illegal Activities 00:10:00 Electronic Fund Transfer Act 00:11:00 Section 07: Other Uses of Blockchain Education 00:15:00 Retail 00:21:00 Health Industry 00:18:00 Business 00:10:00 Governance 00:12:00 Last Will and Testament 00:12:00 Blood Diamonds 00:06:00 Housing 00:15:00 Proof of Ownership/Identity 00:11:00 Data Storage 00:13:00 Section 08: Advanced ICO (Initial Coin Offering) 00:11:00 History of FIAT Currency 00:13:00 DAO (Decentralised Autonomous Organisations) 00:13:00 Building Your Online Business 01:00:00 Section 09: Updates Ripple Update 00:11:00 Bitcoin Update 00:06:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.
Register on the ICT: Information and Communication Technology today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The ICT: Information and Communication Technology is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The ICT: Information and Communication Technology Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the ICT: Information and Communication Technology, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Section 01: Introduction Introduction 00:06:00 What is ICT? 00:05:00 Hardware and Software 00:08:00 Information Processing Cycle 00:05:00 Software Explained 00:06:00 Human-Computer -Interface 00:07:00 Section 02: Impact of Emerging Technologies Introduction-Impact of Emerging Technology 00:01:00 Artificial intelligence 00:03:00 Biometrics 00:03:00 Vision enhancement 00:02:00 Robotics 00:03:00 Quantum cryptography 00:03:00 Computer-assisted translation 00:02:00 3D and holographic imaging 00:03:00 Virtual reality 00:06:00 Section 03: Types of Input Devices Types of Input Devices - Introduction 00:02:00 Manual input 00:07:00 Pointing devices 00:12:00 Inputting Images Devices 00:08:00 Inputting Sound & Music Devices 00:05:00 Direct input systems 00:07:00 Direct Input systems Part-2 00:05:00 Direct Input Systems Part-3 00:06:00 Direct Input Systems devices. Part-4 00:04:00 Sensors 00:05:00 Section 04: Types of Output Devices Types of Input Devices - Introduction 00:02:00 Monitors 00:06:00 Printers 00:08:00 Plotters 00:03:00 3D Printers 00:04:00 Speakers 00:02:00 Control Devices 00:06:00 Section 05: Storage Devices and Media Types of Storage Devices and Media 00:06:00 Magnetic Media 00:06:00 Optical media 00:10:00 Solid-State media 00:04:00 Backups 00:02:00 Section 06: Networks WHAT IS COMPUTER COMMUNICATION? 00:02:00 What is a computer network? 00:07:00 Types of NETWORK- Local Area Network 00:07:00 Wide Area Network 00:07:00 Bluetooth and WI-FI in Networks 00:07:00 Network Hardware 00:03:00 Network Switch 00:05:00 Network Bridge 00:02:00 Networking Hardware Router 00:05:00 Modem 00:04:00 Network Cables 00:03:00 How to set up a small network? 00:07:00 Section 07: Database What is a Database? 00:03:00 Database File 00:04:00 Database Types 00:09:00 Using Database 00:06:00 Data validation and verification 00:10:00 Section 08: Expert Systems What is an expert system? 00:10:00 Section 09: ICT Applications Applications in Banking: ATM, Electronic Fund Transfer 00:04:00 Applications in Banking: Internet Banking Telephone Banking 00:04:00 Applications in Banking: Cheque Clearing 00:05:00 RETAIL INDUSTRY Applications: POS 00:05:00 Retail: Stock Control 00:04:00 Retail: Automatic Reordering of Stock 00:03:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.
Embark on a thrilling journey into 'Blockchain & Cryptocurrency.' Explore the revolutionary potential of blockchain technology and unravel the mysteries of popular cryptocurrencies like Bitcoin, Ethereum, and Ripple. Dive deep into the intricacies of this digital landscape, from understanding the fundamentals to navigating the ever-evolving legal and regulatory frameworks. In this course, you'll uncover the essence of blockchain technology and its transformative impact on various industries. From exploring cryptocurrency prices and news to delving into advanced concepts, you'll gain a comprehensive understanding of this dynamic field. Navigate the complexities of blockchain explorer tools and cryptocurrency wallets, equipping yourself with the knowledge to make informed decisions in the cryptocurrency market. By the end of this course, you'll emerge with a solid grasp of blockchain fundamentals and cryptocurrency intricacies. Stay updated with the latest developments in this rapidly evolving field and explore alternative uses of blockchain beyond cryptocurrencies. Whether you're an aspiring investor, tech enthusiast, or curious learner, this course offers invaluable insights into the future of finance and technology. Learning Outcomes: Understand the fundamentals of blockchain technology and its applications. Analyze the characteristics and functionalities of popular cryptocurrencies like Bitcoin, Ethereum, and Ripple. Navigate legal and regulatory considerations surrounding blockchain and cryptocurrency. Explore advanced concepts and alternative uses of blockchain beyond cryptocurrency. Stay updated with the latest developments and updates in the blockchain and cryptocurrency space. Why buy this Blockchain & Cryptocurrency Course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Certification After studying the course materials of the Blockchain & Cryptocurrency there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this Blockchain & Cryptocurrency course for? Investors seeking to understand blockchain and cryptocurrency for investment opportunities. Tech enthusiasts interested in exploring the innovative potential of blockchain technology. Finance professionals looking to expand their knowledge of digital currencies and blockchain applications. Entrepreneurs considering blockchain-based solutions for their business ventures. Students and researchers interested in the intersection of technology, finance, and regulation. Prerequisites This Blockchain & Cryptocurrency does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Blockchain & Cryptocurrency was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Blockchain Developer: £30,000 - £70,000 Per Annum Cryptocurrency Analyst: £25,000 - £50,000 Per Annum Blockchain Project Manager: £40,000 - £80,000 Per Annum Cryptocurrency Trader: £20,000 - £100,000+ (depending on success) Per Annum Blockchain Consultant: £35,000 - £90,000 Per Annum Cryptocurrency Compliance Officer: £30,000 - £60,000 Per Annum Course Curriculum Section 01: Introduction What Is Blockchain? 00:15:00 Centralised vs Decentralised vs Distributed Systems 00:12:00 Is Blockchain Truly Decentralised and Distributed? 00:08:00 Structure of a Block 00:10:00 What Is a Hash? 00:08:00 What Are Merkle Trees? 00:08:00 What Is a Ledger? 00:06:00 History of Blockchain 00:21:00 Why Use Blockchain? 00:10:00 What Are Cryptocurrencies? 00:09:00 What Is Cryptography? 00:09:00 Section 02: Bitcoin What Is Bitcoin? 00:12:00 Advantages and Disadvantages Compared To Fiat Currency 00:11:00 What Is Bitcoin Mining 00:12:00 What Are Mining Pools/Farms? 00:08:00 What Is A Bitcoin Wallet? 00:06:00 What Is A Bitcoin Exchange? 00:09:00 How Is The Price of Bitcoin Determined? 00:07:00 How to Use Bitcoin? 00:10:00 What Is Bitcoin Cash and How Does It Differ To Bitcoin? 00:11:00 What Is SegWit2x? 00:16:00 Soft Fork vs Hard Fork 00:08:00 Section 03: Ethereum What Is Ethereum & How Does It Differ To Bitcoin? 00:10:00 Advantages and disadvantages compared to Bitcoin 00:10:00 Ethereum vs Ethereum Classic 00:09:00 Section 04: Ripple What Is Ripple & How Does It Differ To Bitcoin? 00:10:00 Advantages and Disadvantages Compared To Bitcoin 00:10:00 Section 05: Other Popular Cryptocurrencies Litecoin 00:06:00 Dash 00:12:00 Monero 00:11:00 Why Should I Just Not Use Bitcoin? 00:09:00 Section 06: Law and Regulation Monetary Policy 00:11:00 Tax Regulations 00:12:00 Illegal Activities 00:10:00 Electronic Fund Transfer Act 00:11:00 Section 07: Other Uses of Blockchain Education 00:15:00 Retail 00:21:00 Health Industry 00:18:00 Business 00:10:00 Governance 00:12:00 Last Will and Testament 00:12:00 Blood Diamonds 00:06:00 Housing 00:15:00 Proof of Ownership/Identity 00:11:00 Data Storage 00:13:00 Section 08: Advanced ICO (Initial Coin Offering) 00:11:00 2007/2008 Crisis 00:18:00 Cypherpunks 00:18:00 History of FIAT Currency 00:13:00 DAO (Decentralised Autonomous Organisations) 00:13:00 Section 09: Updates Bitcoin Update 00:06:00 Ripple Update 00:11:00 Assignment Assignment - Blockchain & Cryptocurrency 00:00:00
Overview This comprehensive course on CompTIA Security+ (SY0-601) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Security+ (SY0-601) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA Security+ (SY0-601). It is available to all students, of all academic backgrounds. Requirements Our CompTIA Security+ (SY0-601) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 14 sections • 164 lectures • 20:35:00 total length •Introduction to CompTIA Security+ SY0-601: 00:03:00 •About the CompTIA Security+ SY0-601 Exam: 00:03:00 •Defining Risk: 00:08:00 •Threats and Vulnerabilities: 00:07:00 •Threat Intelligence: 00:11:00 •Risk Management Concepts: 00:07:00 •Security Controls: 00:09:00 •Risk Assessments and Treatments: 00:06:00 •Quantitative Risk Assessments: 00:07:00 •Qualitative Risk Assessments: 00:04:00 •Business Impact Analysis: 00:09:00 •Data Types and Roles: 00:11:00 •Security and the Information Life Cycle: 00:09:00 •Data Destruction: 00:06:00 •Personnel Risk and Policies: 00:10:00 •Third-Party Risk Management: 00:09:00 •Agreement Types: 00:07:00 •Exam Question Review: 00:02:00 •Wiping Disks with the dd Command Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Cryptography Basics: 00:16:00 •Data Protection: 00:09:00 •Cryptographic Methods: 00:07:00 •Symmetric Cryptosystems: 00:13:00 •Symmetric Block Modes: 00:08:00 •Asymmetric Cryptosystems: 00:13:00 •Diffie-Hellman: 00:07:00 •Hashing: 00:09:00 •Understanding Digital Certificates: 00:08:00 •Trust Models: 00:05:00 •Public Key Infrastructure: 00:04:00 •Certificate Types: 00:14:00 •Touring Certificates: 00:09:00 •Cryptographic Attacks: 00:05:00 •Password Cracking: 00:10:00 •Password Cracking Demo: 00:06:00 •Exam Question Review: 00:02:00 •SSH Public Key Authentication Lab: 00:09:00 •Ask Me Anything (AMA): 00:02:00 •Identification, Authentication, and Authorization: 00:08:00 •Enabling Multifactor Authentication: 00:05:00 •Authorization: 00:05:00 •Accounting: 00:05:00 •Authentication Methods: 00:14:00 •Access Control Schemes: 00:07:00 •Account Management: 00:13:00 •Network Authentication: 00:09:00 •Identity Management Systems: 00:06:00 •Exam Question Review: 00:02:00 •Creating LInux Users and Groups Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Touring the CLI: 00:16:00 •Shells: 00:06:00 •The Windows Command Line: 00:05:00 •Microsoft PowerShell: 00:13:00 •Linux Shells: 00:12:00 •Python Scripts: 00:07:00 •Windows Command-Line Tools: 00:16:00 •Linux Command-Line Tools: 00:10:00 •Network Scanners: 00:05:00 •Network Scanning with Nmap: 00:09:00 •Network Protocol Analyzers: 00:08:00 •Using Wireshark to Analyze Network Traffic: 00:09:00 •Using tcpdump to Analyze Network Traffic: 00:08:00 •Log Files: 00:09:00 •Centralized Logging: 00:09:00 •Configuring Linux Log Forwarding: 00:08:00 •Exam Question Review: 00:03:00 •Lunux Shell Script Lab: 00:07:00 •Nmap Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00 •Malware: 00:14:00 •Weak Configurations: 00:12:00 •Common Attacks: 00:09:00 •Driver and Overflow Attacks: 00:08:00 •Password Attacks: 00:08:00 •Bots and Botnets: 00:06:00 •Disk RAID Levels: 00:10:00 •Securing Hardware: 00:11:00 •Securing Endpoints: 00:09:00 •Exam Question Review: 00:02:00 •Linux Software RAID Lab: 00:08:00 •Ask Me Anything (AMA): 00:02:00 •The OSI Model: 00:13:00 •ARP Cache Poisoning: 00:09:00 •Other Layer 2 Attacks: 00:05:00 •Network Planning: 00:07:00 •Load Balancing: 00:06:00 •Securing Network Access: 00:06:00 •Honeypots: 00:06:00 •Firewalls: 00:11:00 •Proxy Servers: 00:06:00 •Network and Port Address Translation: 00:07:00 •IP Security (IPsec): 00:09:00 •Virtual Private Networks (VPNs): 00:10:00 •Intrusion Detection and Prevention Systems (IDS/IPS): 00:13:00 •Exam Question Review: 00:03:00 •Linux Snort IDS Lab: 00:07:00 •Ask Me Anything (AMA): 00:01:00 •Wi-Fi Encryption Standards: 00:10:00 •RFID, NFC, and Bluetooth: 00:07:00 •Wi-Fi Coverage and Performance: 00:08:00 •Wi-Fi Discovery and Attacks: 00:12:00 •Cracking WPA2: 00:10:00 •Wi-Fi Hardening: 00:11:00 •Exam Question Review: 00:02:00 •WPA2 Cracking Lab: 00:06:00 •Ask Me Anything (AMA): 00:01:00 •Defining a Public Server: 00:01:00 •Common Attacks and Mitigations: 00:10:00 •Containers and Software-Defined Networking: 00:11:00 •Hypervisors and Virtual Machines: 00:08:00 •Cloud Deployment Models: 00:09:00 •Cloud Service Models: 00:08:00 •Securing the Cloud: 00:10:00 •Exam Question Review: 00:02:00 •Docker Container Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Embedded Systems: 00:13:00 •Industrial Control System (ICS): 00:07:00 •Internet of Things (IoT) Devices: 00:10:00 •Connecting to Dedicated and Mobile Systems: 00:11:00 •Security Constraints for Dedicated Systems: 00:05:00 •Mobile Device Deployment and Hardening: 00:11:00 •Exam Question Review: 00:03:00 •Smartphone Hardening Lab: 00:03:00 •Ask Me Anything (AMA): 00:02:00 •Physical Security Overview: 00:01:00 •Physical Security: 00:10:00 •Keylogger Demo: 00:05:00 •Environmental Controls: 00:05:00 •Exam Question Review: 00:02:00 •Physical Security Lab: 00:03:00 •Ask Me Anything (AMA): 00:03:00 •DNS Security: 00:05:00 •FTP Packet Capture: 00:03:00 •Secure Web and E-mail: 00:02:00 •Request Forgery Attacks: 00:05:00 •Cross-Site Scripting Attacks: 00:07:00 •Web Application Security: 01:20:00 •Web App Vulnerability Scanning: 00:06:00 •Exam Question Review: 00:03:00 •OWASP ZAP Web App Scan Lab: 00:04:00 •Ask Me Anything (AMA): 00:02:00 •Testing Infrastructure Overview: 00:05:00 •Social Engineering: 00:06:00 •Social Engineering Attacks: 00:11:00 •Vulnerability Assessments: 00:09:00 •Penetration Testing: 00:10:00 •Security Assessment Tools: 00:12:00 •The Metasploit Framework: 00:08:00 •Exam Question Review: 00:02:00 •Hping3 Forged Packet Lab: 00:06:00 •Ask Me Anything (AMA): 00:02:00 •Incident Response Overview: 00:03:00 •Incident Response Plans (IRPs): 00:06:00 •Threat Analysis and Mitigating Actions: 00:08:00 •Digital Forensics: 00:12:00 •Gathering Digital Evidence: 00:10:00 •Business Continuity and Alternate Sites: 00:06:00 •Data Backup: 00:10:00 •Exam Question Review: 00:01:00 •Autopsy Forensic Browser Lab: 00:05:00 •Ask Me Anything (AMA): 00:02:00
Register on the Level 5 Diploma in IT - Networking today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Level 5 Diploma in IT - Networking is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Level 5 Diploma in IT - Networking Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Level 5 Diploma in IT - Networking, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Software: What is an Operating System 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:11:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:05:00 Hardware: Hardware and Peripherals 00:07:00 Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:24:00 Integrate Documentation into Risk Management 00:15:00 Classify Threats and Threat Profiles 00:08:00 Perform Ongoing Threat Research 00:13:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:10:00 Assess the Impact of Reconnaissance Incidents 00:11:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:11:00 Assessing the impact of Social Engineering 00:08:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:21:00 Rogue Devices 00:04:00 Public Hotspots 00:07:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:18:00 WLAN Security Infrastructure 00:38:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:16:00 Security: Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 Common Scams 01:00:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle 00:37:00 Information Security Controls 00:36:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:32:00 Malware 00:25:00 Software-Based Threats 00:22:00 Based Threats 00:39:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:55:00 Manage Device and Host Security 01:08:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:05:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:10:00 Networking: OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:17:00 Converters and Connectors 00:27:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:07:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 01:00:00 Common Problems 00:32:00 Troubleshooting 00:28:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT 00:06:00 EMR EHR Issues 00:05:00 Regulations, Standards, and Stakeholders 00:14:00 HIPAA Controls and Compliance 00:08:00 Roles and Responsibilities 00:10:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:03:00 Computing Essentials 00:05:00 Networking 00:33:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:20:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:08:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:15:00 Perform Backups and Disaster Recovery 00:16:00