• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

925 Cyber Security courses

CCTV Operation & Security Management - CPD Certified

4.7(26)

By Academy for Health and Fitness

24-Hour Knowledge Knockdown! Prices Reduced Like Never Before Ever wondered how safe your local shops and streets are? The UK has one of the most comprehensive CCTV networks in the world, with an estimated 4-5 million cameras keeping an eye on public spaces. But who monitors these cameras, and how can they be used to prevent crime? This CCTV Operation & Security Management bundle equips you with the knowledge and skills to launch a rewarding career in CCTV operation and surveillance. Our CCTV Operation & Security Management bundle goes beyond just CCTV operation. You'll gain a well-rounded foundation in security with courses on close protection, security guard training, and risk management. Learn to identify suspicious activity, deter criminal behaviour, and handle emergencies. Additionally, the bundle covers essential security topics like counter-terrorism awareness, data protection, and even first aid. Courses Are Included In this CCTV Operation & Security Management Training: Course 01: CCTV Operator Course Course 02: Basic Security Guard Training Course 03: Close Protection Course 04: DOOR SUPERVISOR Course 05: Lifeguard Training Course 06: Security Management Course 07: Risk Management Course 08: Extremism & Terrorism Awareness Course 09: Functional Skills - Fitness Course 10: Self Defense: Martial Arts Course 11: Criminology Course 12: Public Health and Safety Course 13: Fraud Detection & Prevention: Safeguarding Against Deception Course 14: IT Security Basics Course 15: Network Security and Risk Management Course 16: Cyber Security Awareness Training Course 17: Functional Skills IT Course 18: Data Protection and Data Security (GDPR) Course 19: Workplace First Aid Course 20: Human Rights Learning Outcomes of CCTV Operation & Security Management Develop comprehensive skills in operating CCTV systems and surveillance techniques. Gain knowledge in basic security guard procedures and door supervision. Learn close protection tactics and lifeguarding for ensuring public safety. Understand risk management principles and extremism/terrorism awareness for security. Acquire self-defence techniques, including martial arts, for personal protection. Explore criminology, fraud detection, cyber security, and data protection laws. Whether you're looking to become a CCTV operator, security guard, or want to enhance your security knowledge for any profession, this bundle is the perfect place to start. Enrol now! Why Choose Our CCTV Operation Bundle? Get a Free CPD Accredited Certificate upon completion of CCTV Operation Get a free student ID card with CCTV Operation Training The CCTV Operation is affordable and simple to understand Lifetime access to the CCTV Operation course materials The CCTV Operation comes with 24/7 tutor support Start your learning journey straightaway with our CCTV Operation & Security Management! *** Course Curriculum *** Course 01: CCTV Operator Course Module 01: Operational Requirement Module 02: CCTV Operator Skills And Ability Module 03: Basics Of CCTV Module 04: Technical Guidance Module 05: Monitoring CCTV Cameras Module 06: Watch Surveillance Module 07: Data Protection Regulations Module 08: Job Requirements Of A CCTV Operator Course 02: Basic Security Guard Training Module 01: Definition And Importance Of Security Module 02: Career Prospect Of Security Guard In The UK Module 03: Security Risk Analysis And Risk Reduction Module 04: Physical And Information Security Protection Module 05: Response To Immediate Crisis Module 06: The Use Of Technology For Managing Security Module 07: General Patrol Tactics And Techniques Module 08: Public Relations And Traffic Control Module 09: Violence In The Workplace Module 10: Laws And Regulations Course 03: Close Protection Module 01: Introduction To Close Protection Module 02: The Close Protection Team Module 03: The Planning Module 04: Threat Assessment Module 05: Vehicle Drills: Embus And Debus Module 06: Route Selection And Reconnaissance Module 07: Legislation Regarding Close Protection =========>>>>> And 17 More Courses <<<<<========= How will I get my Certificate? After successfully completing the course, you will be able to order your Certificates as proof of your achievement. PDF Certificate: Free (Previously it was £12.99*20 = £260) CPD Hard Copy Certificate: Free ( For The Title Course: Previously it was £29.99) CPD 200 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone interested in learning more about the topic is advised to take this CCTV Operation & Security Management bundle. This bundle is ideal for: Aspiring CCTV Operators Security Professionals Career Changers Requirements You will not need any prior background or expertise to enrol in this CCTV Operation & Security Management bundle. Career path After completing this CCTV Operation & Security Management bundle, you are to start your career or begin the next phase of your career. CCTV Operator Security officer Loss prevention Risk assessor Security consultant Surveillance specialist Certificates CPD Accredited Digital Certificate Digital certificate - Included Upon passing the Course, you need to order a Digital Certificate for each of the courses inside this CCTV Operation & Security Management bundle as proof of your new skills that are accredited by CPD QS for Free. CPD Accredited Hard Copy Certificate Hard copy certificate - Included Please note that International students have to pay an additional £10 as a shipment fee.

CCTV Operation & Security Management - CPD Certified
Delivered Online On Demand4 days
£105

Full Stack Developer - QLS Endorsed Bundle

By Imperial Academy

10 QLS Endorsed Courses for Developer | 10 Endorsed Certificates Included | Life Time Access

Full Stack Developer - QLS Endorsed Bundle
Delivered Online On Demand
£599

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations

4.3(43)

By John Academy

Description: This CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations will help you to understand the anatomy of cyber-attacks. You will gain the skills needed to serve your organizations before, during, and after a breach. A CyberSec First Responder is the first line of defence against cyber-attacks. You will be able to prepare to analyze threats, design secure computing and network environments, proactively defend networks and respond/investigate cybersecurity incidents. It covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a computer security incident response team (CSIRT), and more. So, learn to assess and respond to security threats and operating systems and network security analysis platform by taking this course. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Overview of Wireless Communications Identify the Importance of Risk Management FREE 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:22:00 Integrate Documentation into Risk Management 00:14:00 Analyzing the Threat Landscape Classify Threats and Threat Profiles 00:07:00 Perform Ongoing Threat Research 00:12:00 Resources that Aid in Research of Threats 00:03:00 Analyzing Recon Threats to Computing and Network Environments Implement Threat Modeling 00:09:00 Assess the Impact of Reconnaissance Incidents 00:10:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:10:00 Assessing the impact of Social Engineering 00:07:00 Assessing the Impact of Phishing 00:03:00 Analyzing Attacks on Computing and Network Environments Assess the Impact of System Hacking Attacks 00:10:00 Cracking Passwords Using a Password File 00:08:00 Assess the Impact of Web Based Attacks 00:11:00 Assessing the Impact of Web-Based Threats 00:03:00 Assess the Impact of Malware 00:08:00 Malware Detection and Removal 00:05:00 Assess the Impact of Hijacking and Impersonation Attacks 00:13:00 Assess the Impact of DoS Incidents 00:09:00 Assessing the Impact of DoS Attacks 00:04:00 Assess the Impact of Threats to Mobile Security 00:08:00 Assess the Impact of Threats to Cloud Security 00:10:00 Analyzing Post-Attack Techniques Assess Command and Control Techniques 00:08:00 Assessing Command and Control Techniques 00:10:00 Assess Persistence Techniques 00:05:00 Detecting Rootkits 00:03:00 Assess Lateral Movement and Pivoting Techniques 00:13:00 Assess Data Exfiltration Techniques 00:04:00 Steganography 00:03:00 Assess Anti Forensics Techniques 00:09:00 Assessing Anti-Forensics 00:03:00 Evaluating the Organization's Security Posture Conduct Vulnerability Assessments 00:16:00 Perform a Vulnerability Scan with Nessus 00:07:00 Perform a Vulnerability Scan with MBSA 00:05:00 Conduct Penetration Tests on Network Assets 00:18:00 Follow Up on Penetration Testing 00:06:00 Collecting Cyber security Intelligence Deploy a Security Intelligence Collection and Analysis Platform 00:19:00 Collect Data from Network Based Intelligence Sources 00:15:00 Collecting Network-Based Security Intelligence 00:07:00 Collect Data from Host Based Intelligence Sources 00:13:00 Collecting Host-Based Security Intelligence 00:15:00 Parsing Log files 00:03:00 Analyzing Log Data Use Common Tools to Analyze Logs 00:22:00 Analyzing Linux Logs for Security Intelligence 00:08:00 Use SIEM Tools for Analysis 00:07:00 Incorporating SIEMs into Security Intelligence Analysis 00:18:00 Parse Log Files with Regular Expressions 00:25:00 Performing Active Asset and Network Analysis Analyze Incidents with Windows-Based Tools 00:17:00 Windows-Based Incident Analysis Tools 00:19:00 Analyze Incidents with Linux Based Tools 00:05:00 Linux-Based Incident Analysis Tools 00:07:00 Analyze Malware 00:11:00 Analyzing Malware 00:03:00 Analyze Indicators of Compromise 00:20:00 Analyzing Indicators of Compromise 00:15:00 Responding to Cyber security Incidents Deploy an Incident Handling and Response Architecture 00:22:00 Mitigate Incidents 00:16:00 Hardening Windows Servers 00:14:00 DNS Filtering 00:05:00 Blacklisting and Whitelisting 00:09:00 Prepare for Forensic Investigation as a CSIRT 00:03:00 Investigating Cyber security Incidents Apply a Forensic Investigation Plan 00:10:00 Securely Collect and Analyze Electronic Evidence 00:08:00 Securely Collecting Electronic Evidence 00:05:00 Analyzing Forensic Evidence 00:07:00 Follow Up on the Results of an Investigation 00:04:00 Mock Exam Mock Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations 00:20:00 Final Exam Final Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations
Delivered Online On Demand12 hours 7 minutes
£24

GDPR, Sceurity Management and Information Management

By Imperial Academy

3 QLS Endorsed Diploma | QLS Hard Copy Certificate Included | 10 CPD Courses | Lifetime Access | 24/7 Tutor Support

GDPR, Sceurity Management and Information Management
Delivered Online On Demand
£399

Fundamentals of Secure Software

By Packt

This course is complete training for someone who wants to join the security world and get familiar with most of the practices/risks and different areas, where they can invest to become experts. It covers both the 'admin' side of how to develop the processes and program around it as well as an insight into the technical aspects.

Fundamentals of Secure Software
Delivered Online On Demand6 hours 33 minutes
£74.99

Security Management Level 5 - QLS Endorsed

By Compliance Central

Free QLS Endorsed Hardcopy Certificate There are currently over 10,000 vacancies for Security Managers in the UK. This number is expected to grow in the coming years, as businesses and organisations increasingly recognise the importance of security, and the average salary for a security manager in the UK is £45,000 per year. If you are interested in becoming a security manager, the Security Management Level 5 Training - QLS Endorsed bundle is the perfect place to start. 'But, why should you choose our course?' Our Security Management Level 5 Training Bundle is designed to give you the best possible chance of success in your career. This in-depth course not only offers the Diploma in Security Management at QLS Level 5 but also dives deep into specialised areas like Close Protection, Cyber Law, GDPR, and more. Every module has been meticulously curated to provide a holistic understanding, preparing you for the challenges and complexities of the security domain. By enrolling in this Security Management Level 5 bundle, you're not just gaining knowledge; you're securing your future. It's a strategic investment that will position you at the forefront of the security profession. Security Management 12-in-1 Bundle are: QLS Endorsed Course: Course 01: Diploma in Security Management at QLS Level 5 CPD Accredited Courses Course 02: Security Guard Course 03: Close Protection Course 04: Bodyguard Training Course 05: Lifeguard Training Course 06: Cyber Security Course 07: Cyber Law Course 08: GDPR Course 09: Workplace Confidentiality Course 10: Criminology & Profiling Course 11: Criminal Law & Police Course 12: Workplace Health and Safety This comprehensive QLS Endorsed course is designed to equip you with the essential skills and knowledge needed to excel in the field of security management. From mastering organisational security and risk analysis to understanding the intricacies of cyber-security and fraud prevention, you will gain a deep understanding of how to protect and safeguard organizations in today's complex security landscape. Diploma in Security Management at QLS Level 5 Course Curriculum: Module 01: Introduction to Security Management Module 02: Organisational Security Management Module 03: Security Risk Analysis and Risk Reduction Module 04: Physical and Information Security Protection Module 05: Business Resilience and Crisis Management Module 06: Cyber-security and Fraud Prevention Module 07: Security Investigations and Threat Awareness Module 08: Laws and Regulations Learning Outcomes: Acquire knowledge of security management and organisational security. Gain an overview of risk analysis, reduction, and fraud prevention. Learn about cyber security, crisis management, and relevant laws. Develop skills for security investigations and threat awareness. Understand physical and information security management. Improve communication through body language and telephone. Quality Licence Scheme Endorsed Certificate of Achievement Upon successful completion of the Security Management at QLS Level 5 course, you will get an original hardcopy certificate of achievement endorsed by the Quality Licence Scheme for free. CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Diploma in Security Management course helps aspiring professionals obtain knowledge and familiarise themselves with the skillsets needed to pursue a career in security management. It is also great for professionals already working in security management who want to get promoted. Aspiring Security Managers: Newcomers to the field seeking foundational and advanced knowledge. Current Security Professionals: Those wanting to enhance their skills and advance their careers. Business Leaders: Executives needing to understand and manage organizational security. IT and Cybersecurity Experts: Professionals broadening their expertise to include physical security. Military and Law Enforcement: Personnel transitioning to civilian security roles. Consultants and Risk Analysts: Those providing consultancy services in security and risk management. Requirements To enrol in this Security Management course, all you need is a basic understanding of the English Language and an internet connection. Career path The Security Management course will enhance your knowledge and improve your confidence in exploring opportunities in various sectors related to Security Management. Security Manager - £25,000 to £38,000 per annum Corporate Security Supervisor - £25,000 to £34,000 per annum Cyber Security Manager - £40,000 to £66,000 per annum IT Security Co-ordinator - £35,000 to £60,000 per annum Certificates 12 CPD Accerdited PDF Certificate - Free Digital certificate - Included QLS Endorsed HARDCOPY Certificate - Free Hard copy certificate - Included

Security Management Level 5 - QLS Endorsed
Delivered Online On Demand7 days
£109

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online
£3,495

Security Operations Manager

4.8(9)

By Skill Up

Enhance your knowledge of social anxiety and learn how to provide therapy in the best way possible with

Security Operations Manager
Delivered Online On Demand8 hours 4 minutes
£25

Information Management and GDPR ( Data Protection)

By Imperial Academy

Level 3 - Two Endorsed Training | QLS Hard Copy Certificate Included | Plus 5 CPD Courses | Lifetime Access

Information Management and GDPR ( Data Protection)
Delivered Online On Demand
£300

GDPR with Security Management QLS Training

By Imperial Academy

Level 3 & 5 Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 5 CPD Courses | Lifetime Access

GDPR with Security Management QLS Training
Delivered Online On Demand
£199