• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

716 Cyber Security Foundation courses

Level 5 Diploma in IT - Networking

4.7(160)

By Janets

Register on the Level 5 Diploma in IT - Networking today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Level 5 Diploma in IT - Networking is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Level 5 Diploma in IT - Networking Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Level 5 Diploma in IT - Networking, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Software: What is an Operating System 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:11:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:05:00 Hardware: Hardware and Peripherals 00:07:00 Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:24:00 Integrate Documentation into Risk Management 00:15:00 Classify Threats and Threat Profiles 00:08:00 Perform Ongoing Threat Research 00:13:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:10:00 Assess the Impact of Reconnaissance Incidents 00:11:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:11:00 Assessing the impact of Social Engineering 00:08:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:21:00 Rogue Devices 00:04:00 Public Hotspots 00:07:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:18:00 WLAN Security Infrastructure 00:38:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:16:00 Security: Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 Common Scams 01:00:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle 00:37:00 Information Security Controls 00:36:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:32:00 Malware 00:25:00 Software-Based Threats 00:22:00 Based Threats 00:39:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:55:00 Manage Device and Host Security 01:08:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:05:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:10:00 Networking: OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:17:00 Converters and Connectors 00:27:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:07:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 01:00:00 Common Problems 00:32:00 Troubleshooting 00:28:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT 00:06:00 EMR EHR Issues 00:05:00 Regulations, Standards, and Stakeholders 00:14:00 HIPAA Controls and Compliance 00:08:00 Roles and Responsibilities 00:10:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:03:00 Computing Essentials 00:05:00 Networking 00:33:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:20:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:08:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:15:00 Perform Backups and Disaster Recovery 00:16:00

Level 5 Diploma in IT - Networking
Delivered Online On Demand3 days
£25

IT Administration and Networking

4.7(160)

By Janets

Register on the IT Administration and Networking today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The IT Administration and Networking is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The IT Administration and Networking Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the IT Administration and Networking, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Software: What is an Operating System 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:11:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:05:00 Hardware: Hardware and Peripherals 00:07:00 Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:24:00 Integrate Documentation into Risk Management 00:15:00 Classify Threats and Threat Profiles 00:08:00 Perform Ongoing Threat Research 00:13:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:10:00 Assess the Impact of Reconnaissance Incidents 00:11:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:11:00 Assessing the impact of Social Engineering 00:08:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:21:00 Rogue Devices 00:04:00 Public Hotspots 00:07:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:18:00 WLAN Security Infrastructure 00:38:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:16:00 Security: Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 Common Scams 01:00:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle 00:37:00 Information Security Controls 00:36:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:32:00 Malware 00:25:00 Software-Based Threats 00:22:00 Based Threats 00:39:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:55:00 Manage Device and Host Security 01:08:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:05:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:10:00 Networking: OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:17:00 Converters and Connectors 00:27:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:07:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 01:00:00 Common Problems 00:32:00 Troubleshooting 00:28:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT 00:06:00 EMR EHR Issues 00:05:00 Regulations, Standards, and Stakeholders 00:14:00 HIPAA Controls and Compliance 00:08:00 Roles and Responsibilities 00:10:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:03:00 Computing Essentials 00:05:00 Networking 00:33:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:20:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:08:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:15:00 Perform Backups and Disaster Recovery 00:16:00

IT Administration and Networking
Delivered Online On Demand3 days
£25

IT Manager

4.7(160)

By Janets

Register on the IT Manager today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The IT Manager is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The IT Manager Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the IT Manager, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Software: What is an Operating System 00:48:00 Configuring the Operating System 00:06:00 What is an Application 00:10:00 Using Control Panel 00:18:00 Software and Concepts 00:11:00 Licensing 00:06:00 Using Software 00:07:00 Software Tools 00:10:00 Software 00:14:00 Hardware, Devices, and Peripherals 00:05:00 Hardware: Hardware and Peripherals 00:07:00 Storage 00:12:00 Connectivity Devices 00:05:00 Network Components 00:09:00 Identify the Importance of Risk Management 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:24:00 Integrate Documentation into Risk Management 00:15:00 Classify Threats and Threat Profiles 00:08:00 Perform Ongoing Threat Research 00:13:00 Resources that Aid in Research of Threats 00:03:00 Implement Threat Modeling 00:10:00 Assess the Impact of Reconnaissance Incidents 00:11:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:11:00 Assessing the impact of Social Engineering 00:08:00 Assessing the Impact of Phishing 00:03:00 Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Wireless Security Risks 00:22:00 Authentication Attacks 00:21:00 Rogue Devices 00:04:00 Public Hotspots 00:07:00 Wireless Security Monitoring 00:21:00 Device Tracking 00:18:00 WLAN Security Infrastructure 00:38:00 Management Protocols 00:23:00 Other RADIUS Solutions 00:16:00 Security: Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 Common Scams 01:00:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 The Information Security Cycle 00:37:00 Information Security Controls 00:36:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Social Engineering 00:32:00 Malware 00:25:00 Software-Based Threats 00:22:00 Based Threats 00:39:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Manage Data Security 00:47:00 Manage Application Security 00:55:00 Manage Device and Host Security 01:08:00 Manage Mobile Security 00:10:00 A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:05:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:10:00 Networking: OSI Layers 00:44:00 LANs and WANs 00:14:00 Network Types 00:07:00 Transmissions 00:36:00 Cables 00:41:00 Fiber Optics 00:17:00 Converters and Connectors 00:27:00 Wireless Security 00:15:00 Authentication.prproj 00:21:00 Wireless Security Threats 00:30:00 TACACS 00:10:00 Keys 00:26:00 RADIUS 00:07:00 VPN Technologies 00:16:00 Tunneling Protocols.prproj 00:05:00 Acceptable Use 01:00:00 Common Problems 00:32:00 Troubleshooting 00:28:00 Network Technician Tools 00:46:00 Physical and Logical Issues 00:19:00 Open or Closed Ports 00:09:00 ARP Issues 00:13:00 Basic IT Literacy: Core Concepts in Healthcare IT 00:06:00 EMR EHR Issues 00:05:00 Regulations, Standards, and Stakeholders 00:14:00 HIPAA Controls and Compliance 00:08:00 Roles and Responsibilities 00:10:00 Manage Communication and Ethics Issues 00:15:00 Legal Best Practices, Requirements, and Documentation 00:09:00 Medical Document Imaging 00:04:00 Sanitation Management 00:03:00 Computing Essentials 00:05:00 Networking 00:33:00 Manage Servers and Software 00:27:00 Hardware Support 00:14:00 Set Up a Workstation 00:08:00 Troubleshoot Basic IT Issues 00:15:00 Troubleshoot Medical IT Issues 00:20:00 Implementation of an EMR EHR System 00:34:00 Change Control 00:08:00 Manage Physical and Logical Security 00:36:00 Implement Security Best Practices and Threat Mitigation Techniques 00:13:00 Manage Remote Access 00:06:00 Manage Wireless Security 00:15:00 Perform Backups and Disaster Recovery 00:16:00

IT Manager
Delivered Online On Demand3 days
£25

GDPR and Business Law

By Compliance Central

The MOST DEMANDED PATHWAY Are WAITING for YOU GDPR Course Package Exclusively at lower price ... Are you looking to enhance your GDPR skills? If yes, then you have come to the right place. Our comprehensive course on GDPR will assist you in producing the best possible outcome by mastering the GDPR skills. The GDPR course is for those who want to be successful. In the GDPR course, you will learn the essential knowledge needed to become well versed in GDPR. Our GDPR course starts with the basics of GDPR and gradually progresses towards advanced topics. Therefore, each lesson of this GDPR course is intuitive and easy to understand Exclusive Bonus Courses: Course 01: Document Control Course 02: Cyber Security Course 03: Security Management Course 04: Workplace Confidentiality Course 05: Compliance Audit & Risk Management Along with the GDPR courses, you also get: Lifetime Access. Unlimited Retake Exam & Tutor Support. Easy Accessibility to the Course Materials- Anytime, Anywhere - From Any Smart Device (Laptop, Tablet, Smartphone Etc.) 100% Learning Satisfaction Guarantee. Learn at your own pace from the comfort of your home, as the rich learning materials of this course are accessible from any place at any time. The curriculums are divided into tiny bite-sized modules by industry specialists. And you will get answers to all your queries from our experts. So, enrol and excel in your career with Compliance Central. Certificate in GDPR Training Updated Version Basics Of GDPR Principles of GDPR Legal Foundation for Processing Rights of Individuals Accountability and Governance Data Protection Officer Security Of Data Personal Data Breaches International Data Transfers After the Brexit Exemptions - Part One Exemptions - Part Two National Security and Defence Understanding Data Protection Act 2018 Old Version Module 01: GDPR Basics Module 02: GDPR Explained Module 03: Lawful Basis for Preparation Module 04: Rights and Breaches Module 05: Responsibilities and Obligations CPD 50 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this GDPR bundle. Requirements To enrol in this GDPR course, all you need is a basic understanding of the English Language and an internet connection. Career path After completing this course, you can explore trendy and in-demand jobs. Certificates CPD Accredited PDF Certificate Digital certificate - Included Get 5 CPD accredited PDF certificate for Free. CPD Accredited Hard Copy Certificate Hard copy certificate - £9.99 Get 5 CPD accredited Hardcopy certificate for £9.99 each. The delivery charge for the hardcopy certificate inside the UK is £3.99 each and international students need to pay £9.99 each to get their hardcopy certificate.

GDPR and Business Law
Delivered Online On Demand12 hours
£28

Hacked Credit and Debit Card Recovery

By Course Cloud

Course Overview Credit and debit card fraud is on the rise, and hackers are finding new and more intelligent ways to extract personal financial information.  The Hacked Credit and Debit Card Recovery course is designed to teach learners how to prevent information leakage and protect their personal information against threat hackers and actors. It will teach you everything you need to know about credit, debit card and banking fraud, introducing fundamental cyber security best practices.  This course will also teach you how to use the Threat Ninja tool to rescue hacked credit and debit cards. By the end of this training, you will have an excellent understanding of how credit and debit card information is leaked, and will be fully familiar with the essential information handling procedures.  This best selling Hacked Credit and Debit Card Recovery has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Hacked Credit and Debit Card Recovery is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Hacked Credit and Debit Card Recovery is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Hacked Credit and Debit Card Recovery is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Hacked Credit and Debit Card Recovery, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Hacked Credit and Debit Card Recovery will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Hacked Credit and Debit Card Recovery to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Hacked Credit and Debit Card Recovery
Delivered Online On Demand
£25

Learn Ethical Hacking with Kali Linux

By Course Cloud

Course Overview Ethical hacking, otherwise known as penetration testing, is a system of identifying an IT system's weak points. It is an effective way to determine the cyber security position of an organisation, and plays a crucial role in IT security.  The Learn Ethical Hacking with Kali Linux course is designed to equip learners with the skills and practical knowledge to become computer security experts through Linux OS. You will learn how to use Linux for a wide range of tasks including penetration testing and wireless cracking. Most importantly, it will teach you how to create a secure hacking environment, and detect weaknesses and vulnerabilities.  Whether you are an ethical hacker who wants to gain proficiency in Linux, or are looking to gain the skills to work in IT security, this course is the solution to your training needs. This best selling Learn Ethical Hacking with Kali Linux has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Learn Ethical Hacking with Kali Linux is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Learn Ethical Hacking with Kali Linux is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Learn Ethical Hacking with Kali Linux is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Learn Ethical Hacking with Kali Linux, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Learn Ethical Hacking with Kali Linux will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Learn Ethical Hacking with Kali Linux to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Learn Ethical Hacking with Kali Linux
Delivered Online On Demand
£25

Certified Penetration Testing Consultant (CPTC) - Complete Video Course

4.3(43)

By John Academy

Description: This Certified Penetration Testing Consultant (CPTC) - Complete Video Course covers everything you need to know about becoming a Certified Penetration Testing Consultant. In this course you will learn about packet capturing, Layer 2 attacks, Layer 3 attacks on Cisco-based infrastructures, pivoting and relays, IPv6 attacks, VPN attacks, defeating SSL, and IDS/IPS evasion. By taking this course, you will become a cyber security professional with the ability to plan, manage and perform a penetration test. The designation 'Consultant' is related to the depth and breadth of understanding required to manage a project involving multiple team members, manage the client's expectations and deliver an audit of security controls that is thorough, well documented and ethically sound. If you are an IT network administrator and interested in conducting Penetration tests against large network infrastructures, such as large corporate networks, then taking this course will help you to get more skilled. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Penetration Testing Consultant (CPTC) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Penetration Testing Consultant (CPTC) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Packet Capturing Packet Capturing 00:38:00 Layer 2 Attacks Layer 2 Attacks 00:59:00 Layer 3 Attacks on Cisco Based Infrastructures Layer 3 Attacks on Cisco Based Infrastructures 01:09:00 Pivoting and Relays Pivoting and Relays 00:20:00 IPv6 Attacks IPv6 Attacks 00:49:00 VPN Attacks VPN Attacks 00:38:00 Defeating SSL Defeating SSL 00:48:00 IDS/IPS Evasion IDS/IPS Evasion 01:11:00 Mock Exam Mock Exam- Certified Penetration Testing Consultant (CPTC) - Complete Video Course 00:20:00 Final Exam Final Exam- Certified Penetration Testing Consultant (CPTC) - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Penetration Testing Consultant (CPTC) - Complete Video Course
Delivered Online On Demand7 hours 12 minutes
£23

Data Protection (GDPR), Cyber Security & IT Security - CPD Certified

5.0(3)

By School Of Health Care

Data Protection: Data Protection Course Online If you want to learn about Data Protection: Data Protection Course and become an expert in the field, you have arrived at the right place. The Data Protection: Data Protection Course contains all major GDPR topics in several lectures to help you learn more. Industry experts designed this Data Protection: Data Protection Course to enable you to learn quickly and efficiently and at your own pace and convenience. This Data Protection: Data Protection Course also covers the UK's implementation of the General Data Protection: Data Protection Course Regulation Act. Data Protection: Data Protection Course aims to equip people and businesses with knowledge of the GDPR's obligations and measures. They must take to follow the regulation. The Data Protection: Data Protection Course Training seeks to educate individuals on their data rights and the obligations of organizations when it comes to collecting, processing, and keeping personal data. The Data Protection: Data Protection Course also includes best data protection, privacy practices, and advice on addressing data breaches and other problems. Main Course: GDPR Training Course Free Courses: Course 01: Security Management Diploma Course 02: Level 5 Diploma in Cyber Security Course 03: IT Security [ Note: Free PDF certificate as soon as completing the Data Protection: Data Protection Course] Data Protection: Data Protection Course Online This Data Protection: Data Protection Course also covers the UK's implementation of the General Data Protection Regulation Act. Data Protection: Data Protection Course aims to equip people and businesses with knowledge of the GDPR's obligations and measures. They must take to follow the regulation. This Data Protection: Data Protection Course consists of 09 modules. Assessment Method of Data Protection: Data Protection Course After completing each module of the Data Protection: Data Protection Course, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Certification of Data Protection: Data Protection Course After completing the MCQ/Assignment assessment for this Data Protection: Data Protection Course, you will be entitled to a Certificate of Completion from Training Tale which is completely free to download. Who is this course for? Data Protection: Data Protection Course Online This Data Protection: Data Protection Course is open to everyone, Requirements Data Protection: Data Protection Course Online To enrol in this Data Protection: Data Protection Course, students must fulfil the following requirements: Good Command over English language is mandatory to enrol in our Data Protection: Data Protection Course. Be energetic and self-motivated to complete our Data Protection: Data Protection Course. Basic computer Skill is required to complete our Data Protection: Data Protection Course. If you want to enrol in our Data Protection: Data Protection Course, you must be at least 15 years old. Career path Data Protection: Data Protection Course Online

Data Protection (GDPR), Cyber Security & IT Security - CPD Certified
Delivered Online On Demand22 hours
£12

Cybersecurity: Protecting Yourself and Your Company From Phishing Attacks

5.0(1)

By Enspark

Some sources estimate that up to 91% of cyber security breaches begin with email scams, also known as phishing. While these types of attacks have been around for decades, they are becoming more common and more dangerous due to the growing sophistication of cyber criminals and their ability to trick employees. However, with the proper training, everyone in your organization can learn to identify phishing and protect your company from costly attacks. Our four-part series on phishing covers what a phishing attack is, how to quickly recognize one, rules for protecting yourself and your organization, and how to respond to an attempted attack. Learning Objectives Recognize the red flags and common tactics used in email-based phishing attacks, enabling you to identify and avoid potential threats.;Discover best practices for handling suspicious emails and social media-based phishing scams.;Gain insights into the importance of employee awareness and vigilance in preventing phishing attacks, ensuring your organization remains a challenging target for cybercriminals.

Cybersecurity: Protecting Yourself and Your Company From Phishing Attacks
Delivered Online On Demand30 minutes
£14.95

Certified Cloud Computing & IT Security Training

By iStudy UK

Cloud Computing and everything you need to know about security in the online world Do you have too much data to store and not enough space to manage all of them? Do you want to protect your valuable information online? Then this course might just be what you are looking for. Cloud computing is the delivery of computing services - servers, storage, databases, networking, software, analytics and more - over the Internet ('the cloud'). Companies offering these computing services are called cloud providers and typically charge for cloud computing services based on usage, similar to how you're billed for gas or electricity at home. Training in Security is a crucial enabler to instill a culture of awareness and to protect your business from internal and external Cyber Threats. This Course is designed to give you all the information regarding Cyber Security and how to protect yourself online. It will teach you about the benefits of cloud computing and the typpes of cloud services. So what are you waiting for! Take the course. Course Highlights Certified Cloud Computing & IT Security Training is an award winning and the best selling course that has been given the CPD Certification & IAO accreditation. It is the most suitable course anyone looking to work in this or relevant sector. It is considered one of the perfect courses in the UK that can help students/learners to get familiar with the topic and gain necessary skills to perform well in this field. We have packed Certified Cloud Computing & IT Security Training into 30 modules for teaching you everything you need to become successful in this profession. To provide you ease of access, this course is designed for both part-time and full-time students. You can become accredited in just 20 hours, 30 minutes and it is also possible to study at your own pace. We have experienced tutors who will help you throughout the comprehensive syllabus of this course and answer all your queries through email. For further clarification, you will be able to recognize your qualification by checking the validity from our dedicated website. Why You Should Choose Certified Cloud Computing & IT Security Training Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? Certified Cloud Computing & IT Security Training is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our Certified Cloud Computing & IT Security Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. Cloud Computing What Is Cloud Computing? FREE 00:15:00 Benefits Of Cloud Computing FREE 01:00:00 Is Cloud Computing Really Secure? 01:00:00 The Concept of Public Cloud 00:30:00 The Concept of Private Cloud 00:30:00 Hybrid Cloud and It's Advantages 00:30:00 Types of Cloud for Your Business 00:30:00 Key Features of Cloud Computing 01:00:00 How Cloud Computing Can Revolutionize Your Business? 00:30:00 Wrapping Up 00:15:00 Data Protection Why Internet Marketers Need More Protection FREE 01:00:00 You Can't Be Anonymous FREE 00:15:00 Start With Basic Security Measures 01:00:00 Using Disclaimers 01:00:00 Proper Use Of Email 01:00:00 Protecting Product Rights 01:00:00 Protecting Your Website 01:00:00 Terms Of Use Or Service 00:30:00 Privacy Policy 01:00:00 IT Security Spyware Can Destroy 00:30:00 How Does Spyware Spread? 00:30:00 How To Remove Spyware 00:30:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:15:00 Research And Learn More 00:15:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:15:00 Checklist Of Protection 00:15:00 Mock Exam Mock Exam- Certified Cloud Computing & IT Security Training 00:30:00 Final Exam Final Exam- Certified Cloud Computing & IT Security Training 00:30:00

Certified Cloud Computing & IT Security Training
Delivered Online On Demand20 hours 30 minutes
£25