Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou
Twitter is a social media platform that is used by a wide range of people, from celebrities, who use it to communicate with their fans to companies and brands who can use it to engage their customers and attract new ones. This courses will look in detail at the use of Twitter as part of your marketing activity.
💻 Want to improve your IT skills? Compete High’s Functional Skills IT Training (ICT) course covers everything from basic computer use to cybersecurity! 📚 Learn online at your own pace and earn a certificate. Perfect for beginners and professionals alike! 🎓🚀
This course helps you prepare for your CISSP certification. In this course, we will be discussing CISSP? Certification Domain 8 - Software Development Security. This course focuses on how to secure software as we develop it. Domain 8 makes up 11% of the exam questions.
Duration 5 Days 30 CPD hours This course is intended for IS Security Owners Security Officers Ethical Hackers Information Owners Penetration Testers System Owners and Managers Cyber Security Engineers Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam. To protect an information system you need to be able to see that system through the eyes of the attacker.ÿThe Certified Professional Ethical Hackerÿcertification course is the foundational training to Mile2?s line of penetration testing courses because it teaches you to think like a hacker.ÿ Therefore, you can set up dynamic defenses to prevent intrusion. First, you will learn the value of vulnerability assessments.ÿ Then, you will discover how to use those assessments to make powerful changes in an information system?s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack. Course Introduction Introduction to Ethical Hacking Linux Fundamentals Protocols Cryptography Password Cracking Malware Security Devices Information Gathering ? Passive Reconnaissance Social Engineering Active Reconnaissance Vulnerability Assessment Network Attacks Hacking Servers Hacking Web Technologies Hacking Wireless Technologies Maintaining Access and Covering Tracks
If you aim to enhance your Engineering Project Management skills, our comprehensive Engineering Project Management course is perfect for you. Designed for success, this Engineering Project Management course covers everything from basics to advanced topics in Engineering Project Management. Each lesson in this Engineering Project Management course is crafted for easy understanding, enabling you to become proficient in Engineering Project Management. Whether you are a beginner or looking to sharpen your existing skills, this Engineering Project Management is the ideal choice. With our Engineering Project Management exclusive bundle, you will get a PDF Certificate, PDF Transcript and Digital Student ID Card (worth £50) Absolutely FREE. Courses are Included in This Engineering Project Management Bundle: Course 01: Engineering Management Course 02: Project Management for Managers Course 03: Site Management Course 04: Time Management Course 05: Quality Assurance (QA) Management Course 06: Compliance and Risk Management Level 5 (CPD Certified) with Cyber Security Why Choose Us? Get a Free CPD Accredited Certificate upon completion of this course Get a free student ID card with this Training This course is affordable and simple to understand This course is entirely online, interactive lesson with voiceover audio Lifetime access to this course materials This course comes with 24/7 tutor support So enrol now in this Engineering Project Management Today to advance your career! Start your learning journey straightaway! This Engineering Project Management's curriculum has been designed by Engineering Project Management experts with years of Engineering Project Management experience behind them. The Engineering Project Management course is extremely dynamic and well-paced to help you understand Engineering Project Management with ease. You'll discover how to master the Engineering Project Management skill while exploring relevant and essential topics. Assessment Process Once you have completed all the courses in the Engineering Project Management bundle, you can assess your skills and knowledge with an optional assignment. Our expert trainers will assess your assignment and give you feedback afterwards. CPD 60 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Engineering Project Management bundle is suitable for everyone. Requirements You will not need any prior background or expertise. Career path This Engineering Project Management bundle will allow you to kickstart or take your career in the related sector to the next stage. Certificates CPD Accredited Digital certificate Digital certificate - Included CPD Accredited Hard copy certificate Hard copy certificate - £29 If you are an international student, you will be required to pay an additional fee of 10 GBP for international delivery, and 4.99 GBP for delivery within the UK, for each certificate
2 QLS Endorsed Course | CPD Certified | Free PDF + Hardcopy Certificates | 80 CPD Points | Lifetime Access
Looking to sharpen your digital know-how without wading through tech jargon or dull tutorials? The Functional Skills IT Diploma – QLS Endorsed Course is built for learners who want clarity, confidence, and competence in core IT tools and systems. Whether you’re updating your CV, boosting job readiness, or simply catching up with the digital age, this course delivers structured, relevant knowledge that fits your pace and lifestyle—without unnecessary fluff. From email etiquette to spreadsheet navigation, word processing to cloud basics, you’ll cover essential topics with a sense of direction and purpose. The course is thoughtfully organised, giving you the flexibility to learn from wherever you are, whenever suits you best. No pressure, no commute—just a solid learning experience designed to help you become digitally fluent and workplace-ready, with a qualification that speaks for itself. Functional Skills IT Diploma QLS Bundle Includes the following Courses Course 01: Diploma in Functional Skills IT at QLS Level 2 Course 02: Microsoft Word, PowerPoint & Outlook Course 03: Microsoft Excel Course 04: Graphic Design Using Canva Course 05: Cyber Security Awareness Training Key Features of Functional Skills IT Diploma Eligibility for QLS endorsed certificate upon successful completion of the Functional Skills IT Diploma course Free CPD Accredited Course Fully online, interactive Functional Skills IT Diploma course with audio voiceover Self-paced learning and laptop, tablet, smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases To become successful in your profession, you must have a specific set of skills to succeed in today's competitive world. In this in-depth Functional Skills IT Diplomatraining course, you will develop the most in-demand skills to kickstart your career, as well as upgrade your existing knowledge & skills. Assessment At the end of the Functional Skills IT Diploma course, we will provide assignment and quizzes. For each test, the pass mark will be set to 60%. Accreditation This Functional Skills IT Diploma course is QLS - Quality Licence Scheme Endorsed and CPD Certified, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Certification CPD Certified: Once you've successfully completed your Functional Skills IT Diploma course, you will immediately be sent a digital certificate. Also, you can have your printed certificate delivered by post (shipping cost £3.99). QLS Endorsed:After successfully completing the Functional Skills IT Diploma course, learners will be able to order an endorsed certificate, titled: Diploma in Functional Skills IT at QLS Level 2, as proof of their achievement. This certificate of achievement endorsed by the Quality Licence Scheme. CPD 55 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This course is ideal for all employees or anyone who genuinely wishes to learn more about Functional Skills IT Diploma basics. Requirements No prior degree or experience is required to enrol in this Functional Skills IT Diploma course. Career path This Functional Skills IT Diploma Course will help you to explore avariety of career paths in the related industry. Certificates Digital certificate Digital certificate - Included Hardcopy Certificate Hard copy certificate - Included Hardcopy Certificate (UK Delivery): For those who wish to have a physical token of their achievement, we offer a high-quality, printed certificate. This hardcopy certificate is also provided free of charge. However, please note that delivery fees apply. If your shipping address is within the United Kingdom, the delivery fee will be only £3.99. Hardcopy Certificate (International Delivery): For all international addresses outside of the United Kingdom, the delivery fee for a hardcopy certificate will be only £10.
This course will introduce the concept of emotional intelligence and look at how you can use it in effective and meaningful ways. It will examine the difference between emotional intelligence and IQ and dispel some of the myths surrounding emotional intelligence. It contains a section on the advantages and disadvantages of using emotional intelligence and considers the biological purpose for emotions and how best to manage them.