• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3745 Courses in Belfast delivered Live Online

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Compliance and Risk Management

5.0(10)

By GBA Corporate

Overview This Compliance and Risk Management Course is designed for anyone looking for a pathway into this profession and wanting to develop their industry knowledge and skills. It covers the role of the Compliance Officer and compliance department in detail, with step-by-step training in compliance auditing and risk management. This Compliance and Risk Management Training Course will equip you with the fundamental skills needed to identify and manage regulatory risk in your organization, taking you through key topics such as how to implement an efficient Compliance Management System, ethics and compliance, risk types and classifications, and how to design a solid risk management strategy. By the end of this Compliance and Risk Management Training Course, you'll have an excellent understanding of core compliance issues, as well as how to promote a positive compliance culture for your organization, which will give you a head start when it comes to standing out in the relevant job market. 

Compliance and Risk Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Photoshop Evening Training

By London Design Training Courses

Why Choose Photoshop Evening Training Course? Click here for more info Become proficient in Photoshop, the premier photo editing software, with our London Software Training course. Gain essential skills in photo editing, enabling independent navigation of the interface for successful edits and graphic creation. Duration: 10 hours Approach: 1-on-1 guidance, Customized instruction. Schedule: Tailor your own hours, available from Mon to Sat between 9 am and 7 pm.Or Call 02077202581 or WhatsApp 07970325184. Participate in our Photoshop Evening Training Course, hosted at the UK's largest training school. Whether you're a beginner or an expert, our course is tailored to suit your level, offered both live online and in person. Adobe Photoshop Course Highlights: Embark on your design journey with our Adobe Photoshop course, conducted at the UK's leading Adobe Training Centre. Acquire proficiency in Adobe's premier digital imaging software, crucial for digital content creation. Our courses prioritize hands-on exercises, ensuring practical learning experiences. Whether you're new to Photoshop or an experienced user seeking efficiency, our diverse courses cater to your needs. Join us to master Photoshop and unleash your creative potential. Course Details: Duration: 10 hours Approach: Personalized 1-on-1 guidance, customized instruction. Schedule: Flexible hours available from Mon to Sat between 9 am and 7 pm. For inquiries, call 02077202581 or WhatsApp 07970325184. Evening Adobe Photoshop - 10-Hour Training Course Module 1: Introduction to Photoshop (1 hour) Overview of Photoshop interface and tools Understanding file formats and resolution Navigating the workspace and customizing preferences Essential keyboard shortcuts for efficient workflow Module 2: Working with Layers (1 hour) Mastering the concept of layers and their importance Organizing and managing layers effectively Applying layer styles for creative effects Utilizing blend modes for stunning compositions Module 3: Selection Techniques (1 hour) Understanding different selection tools and their uses Precise selections using the Marquee, Lasso, and Magic Wand tools Advanced selections with Quick Selection and Refine Edge Creating masks for non-destructive editing Module 4: Image Editing and Retouching (1 hour) Essential photo retouching techniques for portraits and landscapes Correcting exposure, color, and tone with Adjustment Layers Using the Healing Brush and Clone Stamp for seamless repairs Removing distractions and blemishes with Content-Aware tools Module 5: Typography and Text Effects (1 hour) Working with text layers and formatting options Creating eye-catching text effects using Layer Styles Manipulating text along paths and shapes Designing typographic compositions Module 6: Advanced Image Manipulation (1 hour) Combining images with layer masks and blending modes Creating composite images and surreal artwork Applying transformations and distortions for creative effects Working with Smart Objects for non-destructive editing Module 7: Filters and Special Effects (1 hour) Exploring various filters for artistic and practical purposes Applying blur, sharpening, and distortion filters Creating artistic effects with the Filter Gallery Using smart filters for flexible editing Module 8: Drawing and Vector Graphics (1 hour) Working with shape layers and vector tools Creating custom shapes and icons Utilizing the Pen tool for precise illustrations Designing logos and scalable graphics Module 9: Advanced Color Correction (1 hour) Mastering color adjustments with Curves and Levels Using Adjustment Layers for selective color control Understanding color spaces and profiles Creating duotones and split-tones Module 10: Designing for Web and Print (1 hour) Preparing images for web and social media platforms Understanding resolution and color modes for print Exporting files in various formats for different purposes Final project: Designing a digital artwork or print-ready composition Learning Outcome refers to what students are expected to know, understand, or be able to do at the end of a learning experience, such as a course, training program, or educational module. Learning outcomes are usually specific, measurable, and achievable objectives that demonstrate the effectiveness of the learning process. For example, learning outcomes for a Photoshop course could include: Participants will be proficient in using essential Photoshop tools and features. Participants will demonstrate the ability to apply advanced image editing and retouching techniques. Participants will be able to create visually appealing designs using layers, typography, and special effects. Participants will understand and utilize different file formats and color modes for various output requirements. Participants will produce a final project showcasing their skills and creativity in Adobe Photoshop.

Photoshop Evening Training
Delivered in London or OnlineFlexible Dates
£300

AUTOCAD Training for Both MAC and PC Users

By Real Animation Works

Face to Face Training Customised and Bespoke.

AUTOCAD Training for Both MAC and PC Users
Delivered in London or OnlineFlexible Dates
£240

Management of Risk (M_o_R) Foundation: Virtual In-House Training

By IIL Europe Ltd

Management of Risk (M_o_R®) Foundation: Virtual In-House Training This M_o_R® Foundation course prepares learners to demonstrate knowledge and comprehension of the four elements of the M_o_R framework: Principles, Approach, Processes, Embedding and Reviewing and how these elements support corporate governance. The M_o_R Foundation Course is also a prerequisite for the M_o_R Practitioner qualification. What you will Learn At the end of the M_o_R Foundation course, participants will gain competencies in and be able to: Describe the key characteristics of risk and the benefits of risk management List the eight M_o_R Principles List and describe the use of the key M_o_R Approach documents Create Probability and Impact scales Define and distinguish between risks and issues Create a Risk Register Create a Stakeholder map Identify the key roles in risk management Use the key techniques and describe specialisms in risk management Undertake the M_o_R Foundation examination Introduction Introduction to the M_o_R course What is a risk? What is risk management? Why is risk management so important? Basic risk definitions The development of knowledge about risk management Corporate governance and internal control Where and when should risk management be applied? M_o_R Principles The purpose of M_o_R principles Aligns with objectives Fits the context Engages stakeholders Provides clear guidance Informs decision-making Facilitates continual improvement Creates a supportive culture Achieves measurable value Risk management maturity models M_o_R Approach Relationship between the documents Risk management policy Risk management process guide Risk management strategy Risk register Issue register Risk response plan Risk improvement plan Risk communications plan M_o_R Process Common process barriers Identify contexts Identify the risks Assess estimate Assess evaluate Plan Implement Communication throughout the process M_o_R Perspectives Strategic perspective Program perspective Project perspective Operational perspective Risk Specialisms Business continuity management Incident and crisis management Health and Safety management Financial risk management Environmental risk management Reputational risk management Contract risk management

Management of Risk (M_o_R) Foundation: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,850

Facilitation Skills for Business Analysts: In-House Training

By IIL Europe Ltd

Facilitation Skills for Business Analysts: In-House Training This course is part of IIL's Business Analysis Certificate Program (BACP), a program designed to help prepare individuals pass the IIBA® Certification exam to become a Certified Business Analysis Professional (CBAP™). Business analysts are communicators who bridge the gap between people with business needs and knowledge and the people who will provide solutions. Business analysts are continuously involved in communications with stakeholders and developers as they create the solution to business problems. They participate in information-gathering sessions including interviewing, joint requirements definition, and Joint Application Design (JAD) workshops which are used to streamline information gathering and get immediate validation from user representatives. The business analyst is also involved with negotiating the solution with the stakeholders, upper-level management, and the developers, mediating among the groups when disagreements take place, and influencing the results of decisions during the solution cycle. This course teaches the methods needed to organize and run information-gathering events. It combines the basics of graphic decision making and modeling with facilitation, communication, and meeting management skills. What you will Learn At the end of this program, you will be able to: Identify the major touch points between key BABOK® Guide knowledge areas and business analysis communication Describe the facilitation skills that are most supportive of those intersections Improve your ability to apply these skills in the context of your business analyst functions Foundation Concepts The role of the Business analyst (BA) An Introduction to the BABOK® Guide Business analyst roles and the product / project life cycle (PLC) Facilitation skills for the business analyst The BABOK® Guide and Communication An introduction to the communication process Addressing basic communications challenges Planning business analysis communication Communication and BABOK® Guide tasks Targeted Elicitation Techniques Synergy between communication and targeted elicitation techniques Preparing for elicitation Cornerstone targeted technique: interviews Other targeted elicitation techniques Related general communication skills Group Elicitation Techniques Synergy between requirements communication and group elicitation techniques Cornerstone group elicitation technique - requirements workshops Other group elicitation techniques Related general communication skills - meeting management best practices Related general communication skills - facilitating best practices Process / Model-Based Elicitation Techniques Synergy between requirements communication and process / model-based elicitation techniques Process / model-based elicitation techniques Related interpersonal skills - problem solving and decision making Investigative Elicitation Techniques Synergy between requirements communication and investigative elicitation techniques Cornerstone investigative elicitation technique - document analysis Other investigative elicitation techniques Summary of elicitation techniques by usage in the requirements process Using Presentations, Structured Walkthroughs, and Influencing Structured walkthroughs, presentations, and influencing within BABOK® Guide tasks Cornerstone technique - structured walkthroughs General communication skill - presenting Related interpersonal skill - influencing Special Facilitation Skills - Negotiating and Mediating Negotiating Mediating

Facilitation Skills for Business Analysts: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,695

Earned Value Management: Virtual In-House Training

By IIL Europe Ltd

Earned Value Management: In-House Training: Virtual In-House Training Earned Value Management (EVM) incorporates a set of proven practices appropriate for project or program management methodologies. These include integration of program scope, schedule, and cost objectives, establishment of a baseline plan for accomplishment of program objectives and use of earned value techniques for performance measurement during the execution of a program. Earned Value Management (EVM) incorporates a set of proven practices appropriate for project or program management methodologies. These include integration of program scope, schedule, and cost objectives, establishment of a baseline plan for accomplishment of program objectives and use of earned value techniques for performance measurement during the execution of a program. EVM provides a solid platform for risk identification, corrective actions, and management re-planning as may be required over the life of a project or program. The course emphasis is on the latest EVM principles and concepts in accordance with changes and guidelines for Earned Value Management in The Guide to the Project Management Body of Knowledge (PMBOK® Guide) and The Practice Standard for Earned Value Management published by the Project Management Institute. What you Will Learn You'll learn how to: Develop a project baseline, using an effective WBS Record actual project performance Calculate EVM measures Evaluate project performance based on EVM measures Respond to project variances Integrate EVM and risk management Determine how EVM will add value to your organization Develop an EVM implementation plan for your organization Getting Started Introductions Course structure Course goals and objectives Expectations Foundation Concepts Introduction to Earned Value Management (EVM) Benefits of EVM EVM Process Overview Applications of EVM Creating a Work Breakdown Structure Reviewing WBS concepts Reviewing WBS development process (decomposition) Using a WBS to support EVM Building a Project Baseline Defining a project baseline Developing a project baseline Using a project baseline Recording Actuals Recording actuals overview Collecting data for actual project performance Determining earned value - various methods EVM Performance Measures Using current status measures Using forecasting measures Analyzing EVM measures EVM and Risk Management Integrating EVM and Risk Management Using EVM measures in the risk register Exploring how EVM can facilitate reserves management Drawing down contingency reserves Responding to Variances Introduction to variances Process for responding to variances Response options Reporting Project Performance EVM reporting overview Meeting EVM reporting needs Addressing EVM reporting challenges Implementing an EVMS Defining EVMS requirements EVM for Agile projects Tailoring the EVMS Summary and Next Steps Review of content Review of objectives / expectations Personal action plan

Earned Value Management: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

Project Management Office: Virtual In-House Training

By IIL Europe Ltd

Project Management Office: Virtual In-House Training The goal of this course is to equip the participant with the necessary knowledge and skills to establish, improve, and support a project management office (PMO) that is the catalyst for portfolio and delivery management excellence. This course addresses the complexities of both understanding and choosing the correct PMO framework from among several alternatives. Additionally, the typical PMO supporting elements: domains of work, maturity level, and performance metrics, are elaborated. These elements position a PMO to realize and sustain the business value anticipated by the organization.

Project Management Office: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

Portfolio Management Skills: Virtual In-House Training

By IIL Europe Ltd

Portfolio Management Skills: Virtual In-House Training The main purpose of this workshop is to equip and enable people in a portfolio management office and PMO to effectively and efficiently support the Executive Leadership and Operational Management to plan, implement, manage, and evolve portfolio management in their organization. There is a deliberate focus on preparing you to become a strong and effective change advocate for meaningful portfolio management that delivers objective measurements of benefit contribution towards the strategic objectives to lead, manage, and continuously improve portfolio management governance, processes, and frameworks with and through the direction of a portfolio practice, principles, and delivery boards. What you Will Learn At the end of this program, you will be able to: Articulate the benefits of portfolio management Link the initiatives in an organization with its strategic objectives Participate in the introduction of portfolio management in an organization Create or improve the portfolio governance structure Lead the inventory of ongoing and new initiatives Assist the executives in the prioritization of initiatives through the use of Multi-criteria Analysis and other selection tools Support the executives in balancing the portfolio based on the optimal use of resources and priorities Create a portfolio delivery plan Define thresholds and variance reporting criteria Assist the executives and the financial team in the definition of Stage Gate Funding Lead the Stage Gate reviews Analyze the benefits that are being realized by the initiatives Foundation Concepts Definitions Benefits of Portfolio Management Objectives of Portfolio Management Portfolio Life Cycles Governing the Portfolio Portfolio Governance structure Roles and responsibilities Initial activities when starting portfolio management Prioritizing Initiatives Prioritize purpose Multi-Criteria Analysis Analytical Hierarchy Process (AHP) Strategic alignment Balancing the Portfolio Allocating resources and budgets Communicating decisions of initiatives status Planning the Portfolio Planning review cycles Using Stage Gate Funding Setting thresholds and variance reporting Tool examples Managing the Portfolio Delivery Project and Program Life Cycles Stage Gate Reviews Loop back to Prioritize, Balance and Plan Interaction with the Portfolio Delivery Board Project, Program and Functional Managers' roles and responsibilities

Portfolio Management Skills: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,250

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997